PERSPECTIVES on Responsible Behavior in State Uses of Icts

Total Page:16

File Type:pdf, Size:1020Kb

PERSPECTIVES on Responsible Behavior in State Uses of Icts DRAFT – shared with the participants of the ICT4Peace Workshop on Existing and future norms on international ICT infrastructure and data integrity PERSPECTIVES on Responsible Behavior in State Uses of ICTs ICT4Peace Foundation 2017 DRAFT – shared with the participants of the ICT4Peace Workshop on Existing and future norms on international ICT infrastructure and data integrity FOREWORD The ICT4Peace Foundation stands for an open, neutral and inclusive promotion of a peaceful cyberspace through international negotiations with governments, companies and non-state actors, in particular on norms and confidence building measures and capacity building. Our roots in the UN World Summit on the Information Society in 2003 placed upon us the task of carefully considering all different viewpoints, arguments and proposals and to promote a broad societal acceptance of standards of responsible behavior in uses of ICTs. With the support of the Dutch Government, Microsoft and the Cyber Policy Institute, in 2014 ICT4Peace launched a process to promote and support the international cyber norms dialogue. This publication contains a collection of papers developed during this process. We offer the ‘Perspectives on Responsible Behavior in State Uses of ICTs’ as a collaborative contribution to the international community, hoping to enrich and inform further discussion of the theme. Sincerely, Dr. Daniel Stauffacher Founder and President, ICT4Peace Foundation DRAFT – shared with the participants of the ICT4Peace Workshop on Existing and future norms on international ICT infrastructure and data integrity FOREWORD It seems that in the cyber community everybody is talking about norms. The roots of this global discourse lie in fast development of information and communication technologies (ICTs). Since the early steps to create information societies in the late 1990s and early 2000s, we have heard the voices of civil society groups, business community, regional and international organizations, and the States. Cyber Policy Institute (CPI) would like to hear more. We want to contribute to an open and inclusive dialogue on responsible State behaviour in the context of ICTs. We want to promote systematic studies of norms and State practice that bypasses disciplinary, administrative and national boundaries. We seek to achieve a dialogue that acknowledges our individual differences as strengths rather than weaknesses. We seek to enhance constructive dialogue that moves mountains. CPI shares the ICT for Peace Foundation’s view that information and communication technologies are first and foremost tools of peace and development. It was the Leitmotiv of the Conference on State Practice and Future of International Law in Cyberspace we organized for the Estonian Ministry of Foreign Affairs in 2016. I hope that views from this Conference trigger fruitful dialogue where arguments and claims are shaped by shared convictions and mutual understanding. Sincerely Mika Kerttunen Director, Cyber Policy Institute TABLE OF CONTENTS Key Problems of Application of International Law to ICT environment Streltsov Comprehensive Normative Approach to Cyber Complexity Tikk Patterns of Behaviour: States in, through, and about Cyberspace Kerttunen Commentary to Paragraph 13 of the 2015 UN GGE Report Streltsov Application of International Law to Cyber Security: National Views Korzak Subversion: Normative Considerations Adamson Great Expectations: Multi-stakeholder Approach and International Cybersecurity Kerttunen Stability and Cyberspace Kerttunen & Tikk National Cyber Security Strategies: Commitment for Development Tikk & Kerttunen Address to the Participants of the Conference on State Practice and Future of International Law in Cyberspace Kaljurand DRAFT – shared with the participants of the ICT4Peace Workshop on Existing and future norms on international ICT infrastructure and data integrity KEY PROBLEMS OF APPLICATION OF INTERNATIONAL LAW TO ICT ENVIRONMENT KEYNOTE AT THE CONFERENCE ON STATE PRACTICE AND DEVELOPMENT OF INTERNATIONAL LAW TALLINN, ESTONIA MAY 5-6, 2016 Anatoly Streltsov Dear hosts of the conference! Dear participants! Ladies and gentlemen! I truly appreciate the opportunity to make a speech at such a high-level conference and talk about our point of view of the key problems arising from the application of international law to the ICT environment. This issue appears of great interest, and it has been pointed out in the Reports of the 2010, 2013 and 2015 UN Group of Government Experts. I would like to raise a few questions and offer answers that reflect our way of thinking about these issues. 1. Do the established principles and norms apply to ICT? I think that the established principles and norms apply to ICT, because of three main reasons. First. In modern conditions it is almost impossible and inexpedient to create a new branch of international law. It is not possible because the world is so changeable today and it is unreal to achieve an agreement on such complicated issue. It is inexpedient because everything new that we create will be based on existing principles and norms of international law. DRAFT – shared with the participants of the ICT4Peace Workshop on Existing and future norms on international ICT infrastructure and data integrity Second. We think that the established principles and norms of international law may be used in state practice. They have stood the test of time and reflect a certain consensus of the states concerning regulation of international relations. The states have a great experience of applying them to real causes related to maintenance of international peace and security. Third. The great challenge in this application is that there is a prominent possibility of mistake in assessment of situation, considering the misuse of ICTs for military and political purposes and attribution of the actors responsible for this activity. Such mistake may provoke international conflict and as a consequence – a threat for international peace and security. We prefer the approach of the adaptation of international law to a new field of application. It is intended to reduce the possibility of this situation. Adaptation requires interpretation of some terms from the sources of international law and development of harmonious judicial principals and procedures for fulfilment of correspondent actions. I think that such approach could help us to get the necessary effect, but also will reduce duration and cost of the task. 2. What is the environment of ICT from the standpoint of international law? In my opinion, the environment of ICT is a legal fiction, which consists in the fact that ICT environment is considered as a part of the territory of the state. This allows us to extend the concept of "sovereignty" to the ICT environment. It should be understood that the ICT environment includes two components – the cyberspace and the media sphere. Here we limit ourselves to cyberspace. The main differences of cyberspace from the other components of territory are as follows. - Cyberspace is created and exists through the efforts of people. Its creation caused the emergence of new objects of international relations (for example, an incident in the cyberspace, information system). - Objects of international relations, legal facts that determine the dynamics of changing the legal relationships and their subjects have a virtual character that is in large part invisible. This greatly limits our ability to use the witnesses and the means of objective control during investigation of incidents in cyberspace. - Cyberspace as an object that is covered by sovereignty of the state and is characterized by such aspects as inclusion in the global cyberspace and the safety of its use. They are the analogues for such properties as territorial integrity and political independence. From this point of view, a disruption of national inclusion in global cyberspace, as well as violation of the safety of its use, are similar to violation of territorial integrity and political independence. 3. What is the problem in application of "sovereignty" concept to cyberspace? It is necessary to note several aspects. DRAFT – shared with the participants of the ICT4Peace Workshop on Existing and future norms on international ICT infrastructure and data integrity First. Lack of territorial constraints of sovereignty limits the implementation of certain rules and principles of international law. For example, documentation of state border violations as a means of exercising territorial authority, as well as assurance of compliance with international obligations in the sovereign territory. Second. There are some deficiencies in the international legal regulation. Primarily it concerns the legal relations in the field of sustainability and safe use of the DNS system. Some states, for historical reasons, believe that this system falls within their jurisdiction, but there are no international obligations to ensure the stable functioning of and safe use of the system for the benefit of the entire international community. The lack of international regulation in this area limits the sovereignty of states in cyberspace. Third. The lack of legal guarantees for the respect of human rights of citizens outside the national territory (for example, privacy, the right of authorship). As you know, states are obliged to respect these rights, but when for technical reasons data leaves national territory, the implementation of international commitments becomes physically impossible. This applies to personal data, the
Recommended publications
  • DIPLOMACY-2021/05/27 ANDERSON COURT REPORTING 1800 Diagonal Road, Suite 600 Alexandria, VA 22314 Phone
    DIPLOMACY-2021/05/27 1 THE BROOKINGS INSTITUTION WEBINAR STRENGTHENING US FOREIGN POLICY THROUGH SUBNATIONAL DIPLOMACY Washington, D.C. Thursday, May 27, 2021 PARTICIPANTS: Welcome: ANTHONY F. PIPA Senior Fellow, Center for Sustainable Development, The Brookings Institution The Value of international engagement for local progress: Dallas LIZ SCHRAYER, Moderator President and CEO, U.S. Global Leadership Coalition THE HONORABLE ERIC JOHNSON Mayor, City of Dallas AMBASSADOR JEANNE PHILLIPS Senior Vice President, Corporate Engagement & International Relations Hunt Consolidated, Inc. The Value of Subnational Diplomacy for U.S. Foreign Policy ANTHONY F. PIPA, Moderator Senior Fellow, Center for Sustainable Development, The Brookings Institution HEATHER HURLBURT Director, New Models of Policy Change New America AMBASSADOR NINA HACHIGIAN Deputy Mayor for International Affairs, City of Los Angeles AMBASSADOR THOMAS A. SHANNON, JR. Senior International Policy Advisor, Arnold & Porter Closing Remarks: THE HONORABLE TED LIEU (D-CA) Member, U.S. House of Representatives * * * * * ANDERSON COURT REPORTING 1800 Diagonal Road, Suite 600 Alexandria, VA 22314 Phone (703) 519-7180 Fax (703) 519-7190 DIPLOMACY-2021/05/27 2 P R O C E E D I N G S MR. PIPA: Welcome and good morning. I'm Tony Pipa, senior fellow in the Center for Sustainable Development at the Brookings Institution. And on behalf of the center and Brookings, I'm really pleased to welcome here to today's event to examine the relationship between the global affairs of cities and states and U.S. foreign policy. And in particular, we're going to explore how setting up an office of subnational diplomacy at the State Department might leverage the global leadership of U.S.
    [Show full text]
  • Mar 1968 - North Korean Seizure of U.S.S
    Keesing's Record of World Events (formerly Keesing's Contemporary Archives), Volume 14, March, 1968 United States, Korea, Korean, Page 22585 © 1931-2006 Keesing's Worldwide, LLC - All Rights Reserved. Mar 1968 - North Korean Seizure of U.S.S. “Pueblo.” - Panmunjom Meetings of U.S. and North Korean Military Representatives. Increase in North Korean Attacks in Demilitarized Zone. - North Korean Commando Raid on Seoul. A serious international incident occurred in the Far East during the night of Jan. 22–23 when four North Korean patrol boats captured the 906-ton intelligence ship Pueblo, of the U.S. Navy, with a crew of 83 officers and men, and took her into the North Korean port of Wonsan. According to the U.S. Defence Department, the Pueblo was in international waters at the time of the seizure and outside the 12-mile limit claimed by North Korea. A broadcast from Pyongyang (the North Korean capital), however, claimed that the Pueblo–described as “an armed spy boat of the U.S. imperialist aggressor force” –had been captured with her entire crew in North Korean waters, where she had been “carrying out hostile activities.” The Pentagon statement said that the Pueblo “a Navy intelligence-collection auxiliary ship,” had been approached at approximately 10 p.m. on Jan. 22 by a North Korean patrol vessel which had asked her to identify herself. On replying that she was a U.S. vessel, the patrol boat had ordered her to heave to and had threatened to open fire if she did not, to which the Pueblo replied that she was in international waters.
    [Show full text]
  • America's War in Angola, 1961-1976 Alexander Joseph Marino University of Arkansas, Fayetteville
    University of Arkansas, Fayetteville ScholarWorks@UARK Theses and Dissertations 5-2015 America's War in Angola, 1961-1976 Alexander Joseph Marino University of Arkansas, Fayetteville Follow this and additional works at: http://scholarworks.uark.edu/etd Part of the African History Commons, and the United States History Commons Recommended Citation Marino, Alexander Joseph, "America's War in Angola, 1961-1976" (2015). Theses and Dissertations. 1167. http://scholarworks.uark.edu/etd/1167 This Thesis is brought to you for free and open access by ScholarWorks@UARK. It has been accepted for inclusion in Theses and Dissertations by an authorized administrator of ScholarWorks@UARK. For more information, please contact [email protected], [email protected]. America’s War in Angola, 1961-1976 America’s War in Angola, 1961-1976 A thesis submitted in partial fulfillment of the requirements for the degree of Master of Arts in History by Alexander J. Marino University of California, Santa Barbara Bachelor of Arts in History, 2008 May 2015 University of Arkansas This thesis is approved for recommendation to the Graduate Council ______________________________________ Dr. Randall B. Woods Thesis Director ______________________________________ Dr. Andrea Arrington Committee Member ______________________________________ Dr. Alessandro Brogi Committee Member ABSTRACT A study of the role played by the United States in Angola’s War of Independence and the Angolan Civil War up to 1976. DEDICATION To Lisa. TABLE OF CONTENTS INTRODUCTION ........................................................................................................................
    [Show full text]
  • Justice for Rwanda: Toward a Universal Law of Armed Conflict Heather Alexander
    Golden Gate University Law Review Volume 34 | Issue 2 Article 7 January 2004 Justice for Rwanda: Toward a Universal Law of Armed Conflict Heather Alexander Follow this and additional works at: http://digitalcommons.law.ggu.edu/ggulrev Part of the Human Rights Law Commons, and the International Law Commons Recommended Citation Heather Alexander, Justice for Rwanda: Toward a Universal Law of Armed Conflict, 34 Golden Gate U. L. Rev. (2004). http://digitalcommons.law.ggu.edu/ggulrev/vol34/iss2/7 This Comment is brought to you for free and open access by the Academic Journals at GGU Law Digital Commons. It has been accepted for inclusion in Golden Gate University Law Review by an authorized administrator of GGU Law Digital Commons. For more information, please contact [email protected]. Alexander: Justice for Rwanda COMMENT JUSTICE FOR RWANDA TOWARD A UNIVERSAL LAW OF ARMED CONFLICT INTRODUCTION In 1994, an armed conflict raged in Rwanda between a non-state party and the Rwandan Government. l This armed conflict triggered the attempted extermination of the Tutsi ethnic group by the Rwandan Government. As a result of this appalling campaign, the United Nations (hereinafter "U.N.") created the International Criminal Tribunal for Rwanda (here­ inafter "ICTR") to prosecute three categories of offenses against the law of nations, classified as human-rights violations, com­ mitted during the Rwandan conflict: genocide,2 crimes against humanity,3 and violations of humanitarian law.4 Because of the 1 s.c. Res. 955, U.N. SCOR, 49th Sess., 3453rd mtg., at P2, U.N. Doc. S/Res/955 (1994) !hereinafter S.C.
    [Show full text]
  • Hybrid Threats a Strategic Communications Perspective ISBN - 978-9934-564-33-8
    IMAGES – SHUTTERSTOCK – IMAGES Hybrid Threats A Strategic Communications Perspective ISBN - 978-9934-564-33-8 DISCLAIMER: This document is a research product of the NATO Strategic Communications Centre of Excellence (NATO StratCom COE). It is produced for NATO, NATO member countries, NATO partners, related private and public institutions and related individuals. It does not represent the opinions or policies of NATO or NATO StratCom COE. The NATO Strategic Communications Centre of Excellence (NATO StratCom COE) is a NATO accredited multi-national organisation that conducts research, publishes studies, and provides strategic communications training for government and military personnel. The NATO StratCom COE was initially founded by Latvia, Estonia, Germany, Italy, Lithuania, Poland, and the United Kingdom in 2014. Since then Canada, Finland, the Netherlands and Sweden have joined the Centre. Denmark, France and Slovakia are set to join in 2019. © All rights reserved by the NATO StratCom COE. Material may not be copied, reproduced, distributed or publicly displayed without permission of the originator. Hybrid Threats A Strategic Communications Perspective Acknowledgements Project Director Ben Heap Project Assistants Sophia Krauel, Jente Althuis Research Assistants Alexandra Clifton, Tara Flores, Leonie Haiden, Pia Hansen, Torsten Hertig Contributing Authors Dr Sean Aday, Dr Māris Andžāns, Dr Una Bērziņa-Čerenkova, Dr Francesca Granelli, John-Paul Gravelines, Dr Mils Hills, Miranda Holmstrom, Adam Klus, Irene Martinez-Sanchez, Mariita Mattiisen,
    [Show full text]
  • Atoms for Peace and the Origins of Nuclear Power in Japan, 1952-1958
    Nuclear Society: Atoms for Peace and the Origins of Nuclear Power in Japan, 1952-1958 DISSERTATION Presented in Partial Fulfillment of the Requirements for the Degree Doctor of Philosophy in the Graduate School of The Ohio State University By Craig D. Nelson Graduate Program in History The Ohio State University 2014 Dissertation Committee: James R. Bartholomew, Adviser Philip C. Brown Christopher A. Reed Copyright by Craig D. Nelson 2014 Abstract This project seeks to explain why Japan developed nuclear power despite its negative experiences with nuclear weapons and fallout. It focuses on the period from the end of the American Occupation in 1952, when the Japanese regained full sovereignty, until the signing of the agreement to import a commercial British nuclear reactor in 1958. The Japanese experience with atomic bombs and radioactive fallout made Japan a seemingly unlikely candidate to develop nuclear power. These fears were renewed following the Lucky Dragon Incident when an American hydrogen bomb test showered a Japanese fishing vessel with radioactive fallout and contaminated deep water tuna throughout the Pacific. Japan, however, had ample reasons to embrace nuclear power as it: provided a potential solutions to Japan’s energy crisis, while offering Japan a way to secure its place in the international community and a means of defining itself as a nation dedicated to scientific, technological, and economic development. Pro-nuclear advocates identified nuclear power as a key to the advancement of Japan, partaking in what Hiromi Mizuno termed “scientific nationalism.” Although Japanese policy makers were interested in the adopting nuclear power before the US offered to extend aid to Japan, the process of doing so was influenced by the American approach to the Cold War and was heavily informed by American efforts to maintain the support of both the government and the general public.
    [Show full text]
  • The Validity of the Incidents Genre
    The Validity of the Incidents Genre Richard Falkt Intellectual breakthroughs in a field of study often come from perse- vering in a slightly different way of perceiving reality. And so it is with incidents jurisprudence, introduced by Michael Reisman as "a new genre in the study of international law." 1 It is not new to assess the legal impli- cations of a prominent international occurrence, whether it be a particu- lar cross-border retaliatory raid after allegations of a terrorist attack or the dropping of atomic bombs on the cities of Hiroshima and Nagasaki at the end of World War II. Instead, what is new here is the identification of the incident itself as the law-shaping event, and the regarding of the incident as a basis for the systematic observation and generalized under- standing of international law as a distinctive type of law. Especially after the emergence of realist international theories in the 1950's,2 the study of international law in the United States has been ac- companied by an appreciation that neither appellate judicial decisions nor doctrines detached from specific factual contexts provide insight into the actual functioning of international law. This recognition has animated the multi-volume enterprise of scholarship carried on at the Yale Law School by Myres S. McDougal and his many associates over the years, including, of course, Michael Reisman, a prime collaborator and heir apparent. Although never free from controversy-or from snip- ing by more literal-minded, positivist international law specialists-Mc- Dougal has put the United States on the map of global legal studies and made New Haven its capital.
    [Show full text]
  • International Law Regime Against Piracy Lawrence Azubuike
    Annual Survey of International & Comparative Law Volume 15 | Issue 1 Article 4 2009 International Law Regime Against Piracy Lawrence Azubuike Follow this and additional works at: http://digitalcommons.law.ggu.edu/annlsurvey Part of the Law of the Sea Commons Recommended Citation Azubuike, Lawrence (2009) "International Law Regime Against Piracy," Annual Survey of International & Comparative Law: Vol. 15: Iss. 1, Article 4. Available at: http://digitalcommons.law.ggu.edu/annlsurvey/vol15/iss1/4 This Article is brought to you for free and open access by the Academic Journals at GGU Law Digital Commons. It has been accepted for inclusion in Annual Survey of International & Comparative Law by an authorized administrator of GGU Law Digital Commons. For more information, please contact [email protected]. Azubuike: International Law Regime Against Piracy INTERNATIONAL LAW REGIME AGAINST PIRACY DR. LAWRENCE AZUBUII<E" I. INTRODUCTION It has been the lot of international law that the question is always asked whether it is really law. While there may not be anyone answer to this question, it is commonly accepted that international law is different from municipal positive laws. International law deals with states and municipal law, in most cases, concerns individuals. However, the twentieth century marked a shift from the state-centric outlook of international law towards a more realistic accommodation that individuals might, in certain cases, be subjects of international law. Developments in the areas of humanitarian and international criminal laws best illustrate this shift. Yet, the relevance of international law to the individual, even if recognizable by scholars of international law, might not be easily perceptible to the average citizen of a state.
    [Show full text]
  • Removal of Diplomatic Immunity in the Extraordinary Rendition of Abu Omar •Fi Can It Be Done?
    Seton Hall University eRepository @ Seton Hall Law School Student Scholarship Seton Hall Law 5-1-2013 Removal of Diplomatic Immunity in the Extraordinary Rendition of Abu Omar – Can It Be Done? Michael Liguori Noonan Follow this and additional works at: https://scholarship.shu.edu/student_scholarship Recommended Citation Noonan, Michael Liguori, "Removal of Diplomatic Immunity in the Extraordinary Rendition of Abu Omar – Can It Be Done?" (2013). Law School Student Scholarship. 278. https://scholarship.shu.edu/student_scholarship/278 Removal of Diplomatic Immunity in the extraordinary rendition of Abu Omar – Can it be Done? By Michael Noonan Since the attacks of September 11, 2001 and the subsequent war on terror, the United States has been forced to find new means and methods of bringing foreign terrorists to justice. One of those methods is the process of extraordinary rendition, by which foreign nationals are forcibly taken from their respective countries for interrogation and possible trial in the U.S. Abducted targets are often held in CIA controlled “secret prisons” around the world for months or years at a time. The target’s family is not told when he is taken, and, despite allegations that some nations from which suspected terrorists are taken are implicit in the kidnapping, their own governments are typically none the wiser either.1 Targets quite simply vanish. This process of extraordinary rendition has sparked a multitude of questions of international law and earned the condemnation of certain nations.2 One particular act of extraordinary rendition known to have occurred took place in Milan on February 17, 2003. Cleric Hassan Mustafa Osama Nasr, or Abu Omar, was abducted by a combination of Italian police and American CIA agents while on the way to his mosque.
    [Show full text]
  • A Legal Analysis of the Shooting of Korean Airlines Flight 007 by the Soviet Union Farooq Hassan
    Journal of Air Law and Commerce Volume 49 | Issue 3 Article 3 1984 A Legal Analysis of the Shooting of Korean Airlines Flight 007 by the Soviet Union Farooq Hassan Follow this and additional works at: https://scholar.smu.edu/jalc Recommended Citation Farooq Hassan, A Legal Analysis of the Shooting of Korean Airlines Flight 007 by the Soviet Union, 49 J. Air L. & Com. 555 (1984) https://scholar.smu.edu/jalc/vol49/iss3/3 This Article is brought to you for free and open access by the Law Journals at SMU Scholar. It has been accepted for inclusion in Journal of Air Law and Commerce by an authorized administrator of SMU Scholar. For more information, please visit http://digitalrepository.smu.edu. A LEGAL ANALYSIS OF THE SHOOTING OF KOREAN AIRLINES FLIGHT 007 BY THE SOVIET UNION By DR. FAROOQ HASSAN* O N SEPTEMBER 2, 1983, the world was stunned by the news that during the previous day the Soviet Union had shot down a South Korean jetliner over the Sea of Japan, killing all 269 passengers aboard. The airliner, which was on a scheduled flight between New York and Seoul, had appar- ently strayed off course into Soviet airspace when it was de- stroyed by Russian jet fighter planes. The tragedy was brought to international attention through strong statements issued by the President and Secretary of State of the United States.' While some aspects of this incident may never be known, 2 sufficient data is available to analyze the legal as- pects of the actions taken by the Korean airliner and the So- viet interceptors.
    [Show full text]
  • Contribs6.Pdf
    Contributions to the Study of Peacemaking Volume 6 A Summary of Pr ojects Completed by Grantees and Fel l ow s 1997– 9 9 Pre p a r ed By Anne-Marie Smith United States Institute of Peace Washington, D.C. First published December 1999 The views expressed in this report are those of the authors alone. They do not necessarily reflect views of the United States Institute of Peace. UNITED STATES INSTITUTE OF PEACE 1200 17th Street NW,Suite 200 Washington, DC 20036-3011 Phone: (202) 457-1700 Fax: (202) 429-6063 E-mail: [email protected] Web: www.usip.org CONTENTS Introduction v 1. Understanding and Organizing International Security 1 2. Peace Operations 11 3. Nationalism and Ethnic Conflict 19 4. Humanitarian Emergencies, Human Rights, and NGO Responses 26 5. Cross-Cultural Negotiation 31 6. Europe and the Former Soviet Union 36 7. Middle East 41 8. Africa 48 9. Asia 55 10. Latin America 60 Bibliography 68 Author Index 73 INTRODUCTION The Institute’s Grant Program and its fellowship program, the Jennings Randolph Program for International Peace, are the principal means by which the United States Institute of Peace supports the work of scholars and international affairs practitioners to promote better management of international conflict. The publications summarized in these pages direct- ly resulted from projects funded by these two programs. In many cases these projects are multifaceted and ongoing, and what is summarized here may represent only part of the project’s impact on policy and intellectual debates or the resolution of international conflicts. Institute fellows, for instance, often conduct policy briefings and workshops related to their publications, and they write Institute Special Reports and other policy- oriented papers and opinion pieces.
    [Show full text]
  • 28210NCJRS.Pdf
    If you have issues viewing or accessing this file, please contact us at NCJRS.gov. ~-.--------------------- ARPA ORDER NO.: 189~1 I 5G10 Tactical Technology Office R-1597 ... DOS/ ARPA March 1975 s Iinternational Terrorism: A Chronology, 1968-1974 Brian M. Jenkins and Janera Johnson A Report prepared for ~:, DEPARTMENT OF STATE ~ and , DEFENSE ADVANCED RESEARCH PROJECTS AGEr\JCY J,~ ,,_ ':!.I.~; ,~ Rand"SANTA MONICA, tAo 90406 1 ,I~ ~.------------.------------------------ The research described in this Report was sponsored by the Department of State and by the Defense Advanced Research Projects Agency under contract No. DAHC15-73·C-0181. Reports of The Rand Corporation do not necessar­ ily reflect the opinion or policies of the sponsors of Rand research. --- ~-- ~-- --~ --------------------------------- - ARPA ORDER NO.: 189-1 5G10 Tactical Technology Office R-1597-Dosl ARPA March 1975 International Terrorism: A Chronology., 1968-1974 Brian M. Jenkins and Janera Johnson A Report prepared for DEPARTMENT OF STATE and DEFENSE ADVANCED RESEARCH PROJECTS AGENCY Rand SANTA MONICA, CA. 911406 APPROVED FOR PUBLIC RELEASE; DISTRIBUTION UNLIMITED Published by The Rand Corporation PREFACE This chronology and its companion report, International Terrorism: An An­ notated Bibliography (R-1598-DOS/ ARPA, The Rand Corporation, forthcoming), are intended to serve as reference works on recent acts of international terrorism. Most of the chronological material is based on press reports. Other sources in­ cluded unofficial chronologies supplied by government agencies; the Arab Report and Record, which is published twice a month in London; and Political Kidnap­ ping 1968-1973, a staff study prepared by the Committee on Internal Security, U.S. House of Representatives, 93rd Congress, 1st Session (Washington, D.C.: U.S.
    [Show full text]