Human Rights Concerns in Indonesia's Counterterrorism Policies
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Architecture in the Era of Terror: the Security Dilemma
Safety and Security Engineering 805 Architecture in the era of terror: the security dilemma G. Zilbershtein Department of Architecture, Texas A&M University, U.S.A. Abstract The growing public concern over the proliferation of terrorism has made protection of the physical environment of potential targets and terror interdiction a salient issue. The objective to secure the built environment against terrorism introduces a complex dilemma. At one level, the extent of investments in security in terms of cost-effectiveness is not proportional to the relatively rare threat of terrorism. Another level of the dilemma is rooted in the complex psychological implications of using security measures, that is, how to physically secure a building, while psychologically deter potential terrorists; more importantly is the question of how to accomplish those and yet not scare the users, i.e., the public. The latter part of the dilemma has been relatively ignored in the analysis of architectural measures against terrorism. And since catering to the psychological comfort of the users of the built environment has always been one of the greatest challenges of architecture, this paper focuses on that portion of the security dilemma of terrorism. Specifically, the study examines the threat characteristics and analyzes design recommendations that address the threat of terror for their contribution to the psychological comfort of the end users. Keywords: architecture, built environment, terrorism, risk assessment, security perception, security measures, design recommendations. 1 Introduction The post–cold war, as defined by John Lewis Gaddis [1], began with the collapse of one structure, the Berlin wall on November 9, 1989, and ended with the collapse of another, the World Trade Center on September 11, 2001. -
Coping with the Security Dilemma: a Fundamental Ambiguity of State Behaviour Andras Szalai Central European University
Volume 2 (2), 2009 AMBIGUITIES Coping with the Security Dilemma: A Fundamental Ambiguity of State Behaviour Andras Szalai Central European University Abstract he wording of international treaties, the language and actions of statesmen are often T ambiguous, even controversial. But there is a different, more fundamental ambiguity underlying international relations; one that is independent of human nature or the cognitive limitations of decision makers but instead results from the correct adjustment of state behaviour to the uncertainties of an anarchical international system. Due to the anarchical nature of the international system — the lack of a sovereign — states can only rely on their own strength for self-defence. But self-protection often threatens other states. If a state purchases armaments, even if it claims not to have aggressive intents, there is no sovereign to enforce these commitments and there is no way of being certain that the purchasing state is telling the truth, or that it will not develop such intents in the future. The so- called security dilemma has a number of effects on state behaviour. First, states often worry about implausible threats (see e.g. British defence plans against a possible French invasion in the 1930s) and/or get caught in arms races. Second, states develop an inherent mistrust in the language of the other, requiring commitments to be firm and unambiguous in order to be credible, since ambiguity invites conflicts and renders cooperation more difficult. Still, on the one hand, instead of a world of constant mistrust, we register instances of institutionalized inter-state cooperation. On the other hand, states often choose to make commitments that are deliberately ambiguous and outperform more transparent commitments. -
MOE Steve Ijames
27-CR-20-12953 Filed in District Court State of Minnesota 1/14/2021 1:33 PM Steve Ijames EDUCATION • Bachelor of Science degree in Criminal Justice Administration, Drury University, Springfield, Missouri • Master of Science Degree in Public Administration, City University, Bellevue, Washington • Graduate, Missouri State Highway Patrol Law Enforcement Academy • Graduate, Missouri State Highway Patrol undercover narcotics investigator training program. • Graduate, Drug Enforcement Administration (DEA) undercover narcotics investigator training program. • Graduate, Mid States Organized Crime Information Center (MOCIC) narcotic investigators Criminal Intelligence Techniques training program. • Graduate, Springfield, Missouri Police Department Academy • Graduate, 186th FBI National Academy LAW ENFORCEMENT/PROFESSIONAL EXPERIENCE Poplar Bluff, Missouri Police Department • April 1979 through February 1981-Patrol Officer • February 1981 through August 1982-Narcotics Detective Springfield, Missouri Police Department • August 1982-1000 hour Springfield Police academy training • January 1983-uniformed patrol officer • September 1985-undercover narcotics investigator and Federal Drug Task Force member-Commissioned Deputy Untied States Marshal • October 1987-uniformed patrol • July 1988-Detective-criminal investigations and undercover narcotics investigations • September 1989-Sergeant-criminal investigations • April 1990-Crisis Action Team leader/sergeant (SWAT) • December 1992-Lieutenant, Special Operations Commander-overseeing all SWAT and narcotics -
Correspondence Ronan Tse-Min Fu David James Gill Eric Hundman
Correspondence: Looking for Asia’s Security Dilemma Correspondence Ronan Tse-min Fu David James Gill Looking for Asia’s Security Dilemma Eric Hundman Adam P. Liff and G. John Ikenberry To the Editors (Ronan Tse-min Fu writes): In “Racing toward Tragedy? China’s Rise, Military Competition in the Asia Paciªc, and the Security Dilemma,” Adam Liff and John Ikenberry claim that “a number of recent developments suggest that the region is ripe for, or may already be experiencing, severe security dilemma–driven dynamics, even arms races.”1 They portray China’s rise as the main cause of this dilemma and assert that states must adopt measures to reduce mili- tary competition in the region while they still can. I applaud Liff and Ikenberry for the policy relevance of their research, but their fun- damental claim about the prevalence of severe military competition in the Asia Paciªc region does not match the empirical reality. The real puzzle is why over the last thirty years Asian countries have shown a surprising lack of interest in boosting their military expenditures in response to China’s massive increases, whether these expenditures are measured in absolute or proportional terms, and whether they are measured over the past generation or the last few years. is there “severe military competition” in the asia paciªc? Liff and Ikenberry ground their analysis in the empirical observation that Asia might already be engaged in severe military competition, but they never deªne what they mean by “military competition” (pp. 65–82). They imply that such competition exists when parties seek to enhance their military capabilities in response to an external threat (p. -
When Are Arms Races Dangerous? When Are Arms Races Charles L
When Are Arms Races Dangerous? When Are Arms Races Charles L. Glaser Dangerous? Rational versus Suboptimal Arming Are arms races dan- gerous? This basic international relations question has received extensive at- tention.1 A large quantitative empirical literature addresses the consequences of arms races by focusing on whether they correlate with war, but remains divided on the answer.2 The theoretical literature falls into opposing camps: (1) arms races are driven by the security dilemma, are explained by the rational spiral model, and decrease security, or (2) arms races are driven by revisionist adversaries, explained by the deterrence model, and increase security.3 These Charles L. Glaser is a Professor in the Irving B. Harris Graduate School of Public Policy Studies at the Uni- versity of Chicago. For their helpful comments on earlier drafts of this article, the author would like to thank James Fearon, Michael Freeman, Lloyd Gruber, Chaim Kaufmann, John Schuessler, Stephen Walt, the anonymous reviewers for International Security, and participants in seminars at the Program on In- ternational Security Policy at the University of Chicago, the Program on International Political Economy and Security at the University of Chicago, the John M. Olin Institute at Harvard Univer- sity, and the Institute of War and Peace Studies at Columbia. He also thanks John Schuessler for valuable research assistance. 1. The pioneering study is Samuel P. Huntington, “Arms Races: Prerequisites and Results,” Public Policy, Vol. 8 (1958), pp. 41–86. Historical treatments include Paul Kennedy, “Arms-Races and the Causes of War, 1850–1945,” in Kennedy, Strategy and Diplomacy, 1870–1945 (London: George Allen and Unwin, 1983); and Grant T. -
IN THIS ISSUE: Briefs
VOLUME IX, ISSUE 32 uAUGUST 12, 2011 IN THIS ISSUE: BRIEFS..................................................................................................................................1 SOMALIA’S FAMINE CONTRIBUTES TO POPULAR REVOLT AGAINST AL-SHABAAB MILITANTS By Muhaydin Ahmed Roble ......................................................................................3 INDONESIA’S “GHOST BIRDS” TACKLE ISLAMIST TERRORISTS: A PROFILE OF Armed tribesmen work- DENSUS-88 ing with Yemeni Army By Jacob Zenn .........................................................................................................5 THE BATTLE OF ZINJIBAR: THE TRIBES OF YEMEN’S ABYAN GOVERNORATE JOIN Terrorism Monitor is a publication THE FIGHT AGAINST ISLAMIST MILITANCY of The Jamestown Foundation. By Andrew McGregor ..............................................................................................7 The Terrorism Monitor is designed to be read by policy- makers and other specialists QADDAFI ALLY ROBERT MUGABE CALLS NATO “TERRORISTS,” yet be accessible to the general public. The opinions expressed THREATENS TO EXPROPRIATE WESTERN FIRMS IN ZIMBABWE within are solely those of the authors and do not necessarily Mu’ammar Qaddafi’s policy of using Libya’s oil wealth to build stronger ties reflect those of The Jamestown with sub-Saharan African nations through financial aid, investment and arms Foundation. supplies has resulted in a distinct lack of support in many of these nations for NATO’s military intervention in the Libyan rebellion. Among the most Unauthorized reproduction or vociferous of Qaddafi’s supporters has been the long-time ruler of Zimbabwe, redistribution of this or any Robert Mugabe. Zimbabwe has been frequently mentioned as a possible place Jamestown publication is strictly of exile for the Libyan leader and there were rumors earlier this year that prohibited by law. Zimbabwean troops had been sent to Libya, rumors that gained strength within Zimbabwe after the nation’s defense minister declined to issue a straightforward denial (Zimbabwean, February 25). -
Assessing the Effectiveness of Current De-Radicalization Initiatives And
Assessing the Effectiveness of Current De‐Radicalization Initiatives and Identifying Implications for the Development of U.S.‐Based Initiatives in Multiple Settings Final Report to Human Factors/Behavioral Sciences Division, Science and Technology Directorate, U.S. Department of Homeland Security September 2009 (revised) National Consortium for the Study of Terrorism and Responses to Terrorism A Department of Homeland Security Science and Technology Center of Excellence Based at the University of Maryland 3300 Symons Hall • College Park, MD 20742 • 301.405.6600 • www.start.umd.edu National Consortium for the Study of Terrorism and Responses to Terrorism A Department of Homeland Security Science and Technology Center of Excellence About This Report This report is part of a series sponsored by the Human Factors/Behavioral Sciences Division in support of the Counter‐IED Prevent/Deter program. The goal of this program is to sponsor research that will aid the intelligence and law enforcement communities in identifying potential terrorist threats and support policymakers in developing prevention efforts. This project officially terminated on June 30th, 2009. The research was carried out by two researchers from the Pennsylvania State University, Dr. John Horgan, the Principal Investigator, and Mr. Kurt Braddock, Research Assistant. Biographical notes on the researchers is contained in Appendix A. This report represents the principal delivery of the findings of the research. A further report on the research findings will be published in an academic journal, to be submitted for review in early‐Fall 2009.This project was conducted over twelve months, and is the result of an analysis of open source, secondarily obtained material. -
Al-Shabaab Attack on Peacekeepers Cannot Hide
VOLUME XIII, ISSUE 18 u SEPTEMBER 4, 2015 IN THIS ISSUE: BRIEFS ............................................................................................................................1 THE FINNISH FOREIGN FIGHTER CONTINGENT IN SYRIA AND IRAQ By Juha Saarinen ...............................................................................................................3 Detachment 88, Indonesia’s ISLAMIC STATE IN AFGHANISTAN READY TO CAPITALIZE ON MULLAH counter-terrorism unit, inspects a stall after OMAR’S DEATH arresting individuals for By Farhan Zahid ...............................................................................................................6 allegedly planning a terrorist attack with INDONESIA’S NEW COUNTER-TERRORISM CHALLENGES support from Syria. By Andrew Zammit and Muhammad Iqbal ..................................................................7 Terrorism Monitor is a publication of The Jamestown Foundation. AL-SHABAAB ATTACK ON PEACEKEEPERS CANNOT HIDE GROUPS’ The Terrorism Monitor is DISARRAY designed to be read by policy- makers and other specialists James Brandon yet be accessible to the general public. The opinions expressed within are solely those of the The Somali Islamist militant organization al-Shabaab carried out one of its most lethal authors and do not necessarily attacks in years on September 1, when it bombed a Ugandan military base in the Janale reflect those of The Jamestown district of the lower Shabele region, southwest of the capital Mogadishu. Al-Shabaab Foundation. claimed that the attack killed around 50 Ugandan soldiers, who are in the country as part of an African Union (AU) peacekeeping mission, although official AU statements Unauthorized reproduction have not announced the casualty toll (AU, September 1). The attack began when a or redistribution of this or any suicide bomber drove an explosive-packed car into the base’s entrance, after which a Jamestown publication is strictly large number of other militants stormed the facility (Horseed Media, September 1). -
Security Debates and Alliance Against Terrorism Ramazan Erdağ
ALTERNATIVES: Turkish Journal of International Relations Vol.9, No.4, 133-148, Winter 2010 Security Debates and Alliance against Terrorism Ramazan Erda ğ* Abstract This article searches the answer that how security could be defined, what the new security studies are and what can be done against global terrorism and how can be assured peace and stability condition? In this context, with new security disputes and perspectives it can be said that security is not an alone issue, it’s a collective study and mostly claimed as dilemma. It also can be said that in the new era more international collaboration and alliance are need to supply international security. In this regard this article expounds global alliances’ effectiveness -especially NATO- for global security. Key words : security, terrorism, alliance, cooperation and NATO * PhD Candidate, Sakarya University, Department of International Relations, Sakarya, TÜRK İYE, [email protected] 134 Ramazan Erda ğ Introduction During Cold War world lived two super power’s competition and armament race. Under this two-pole construction states had to take one side in order to survive. This era’s security concept based on nuclear threats. Classical security threats ad armament were basic arguments. 1 State had to be strong and provide security via military force. In the nation-state process this argument was the main concern of the states. But the end of the cold war changed this paradigm. Dissolving of Soviet Union finished the bipolar era and this changed not only world order but also threat perceptions. When new states gained independency against Soviet Union new security matters appeared in the Caucasus and East Europe. -
The Rise of Cyber Warfare: the Digital Age and American Decline
The Rise of Cyber Warfare The Digital Age and American Decline Hanyu Chwe In May 2007, unknown attackers de- advantages in cyberspace; the increasing clared cyberwar on Estonia. Estonians importance of cyberwarfare will accelerate woke up to find that the websites of their the relative decline of American military banks, newspapers, and government agen- power. cies had been systematically dismantled. This was one of the world’s first cyberwar- For the purposes of this paper, I define fare attacks; I argue that it won’t be the cyberwarfare as the use of computer pro- last. grams to attack, disrupt, destroy, disable, In the future, the amount of cyberwar- or steal anything of military, economic or fare will increase drastically. First, the in- general strategic value or e↵orts to defend creased value of cyberspace increases the against such attacks. I am not considering incentives to wage cyberwarfare. Second, industrial corporate espionage, cyber at- the logic of cyberwarfare nullifies several tacks meant to aid the use of conventional mechanisms that constrain territorial war. military force, or the use of internet media Finally, the o↵ensive advantage inherent to organize social action. In my definition, in cyberwarfare exacerbates the security cyberwarfare is not intentionally accompa- dilemma. The United States lacks many nied by corresponding actions in the real of its traditional military and economic world. Cyberwarfare Incentives The strategic and economic value of state needs to guard its cyberspace in order cyberspace is huge. Facebook and to ensure stability. Google were worth 200 billion dollars It’s unlikely internet reliance will de- and 400 billion dollars in 2014 respec- crease. -
Biological Weapons and Security Dilemmas
Biological Weapons and Security Dilemmas by David Malet and Herman Rogers Technological advancements throughout history have had significant effects on international politics and conflict strategies. Some inventions, such as the compound bow and the strategic bomber, were designed specifically for combat purposes. Others, such as the stirrup and the sextant, were innovations intended for commerce that inevitably changed the nature of military competition. The advent of “Weapons of Mass Destruction”—most of which originated from scientific developments unrelated to national defense—has also produced dramatic changes in warfare. 1 The best-known example of this occurred during the Cold War, as both superpowers engaged in nuclear stockpiling rather than bearing the cost of maintaining fully mobilized conventional forces. The resulting reliance on strategies of brinksmanship and deterrence arguably prevented the resumption of great power warfare in the decades following World War II. However, this trade-off created the perpetual risk that any miscalculation would produce Armageddon. As both sides sought security through larger arsenals, each side became more threatening to the other, resulting in a seemingly inescapable security dilemma. 2 The perceived necessity of maintaining a nuclear second-strike capability resulted in the spiraling of attempted strategic advantage into the strategic stalemate of mutual assured destruction (MAD). It also led to proliferation concerns as other actors attempted to create their own nuclear deterrents. At the same time, a less familiar but perhaps equally consequential security dilemma arose out of bioweapon proliferation. The competition in biological arms led to the Biological Weapons Convention (BWC) of 1972 that formally restricted research into offensive technologies. -
Strengthening Tourism Business Resilience Against the Impact of Terrorist Attack
Strengthening Tourism Business Resilience against the Impact of Terrorist Attack Report on the APEC Counter-Terrorism Working Group’s Workshop on 9-10 May 2017, Bali, Indonesia APEC Counter-Terrorism Working Group September 2017 APEC Project: APEC CTWG 01/2016A Produced by: Project Overseer National Counter Terrorism Agency of Indonesia Komplek IPSC Jl. Anyar Desa Tangkil, Sentul, Bogor, INDONESIA Email : [email protected] Website : https://www.bnpt.go.id/ Editor Fitriani, Gilang Kembara and Rebekha Adriana Centre for Strategic and International Studies (CSIS) Jakarta Jalan Tanah Abang 3 No. 23, Gedung Pakarti Center, Tanah Abang, RT.3/RW.3, Petojo Selatan, Gambir, Jakarta Pusat, 10260, INDONESIA Telephone : (62-21) 386 5532 Fax : (62-21) 384 7517 Email : [email protected] Website : http://www.csis.or.id/ Produced for: APEC Secretariat 35 Heng Mui Keng Terrace Singapore 119616 Telephone: (65) 68919600 Fax: (65) 68919690 Email: [email protected] Website: www.apec.org APEC#217-CO-04.1 © 2017 APEC Secretariat ii Strengthening Tourism Business Resilience against the Impact of Terrorist Attack Report on the APEC Counter-Terrorism Working Group’s Workshop on 9-10 May 2017, Bali, Indonesia APEC Counter Terrorism Working Group September 2017 iii LIST OF CONTENT List of Content ...................................................................................................................................... iv List of Abbreviations ..........................................................................................................................