Policing Terrorism Gary Lafree

Total Page:16

File Type:pdf, Size:1020Kb

Policing Terrorism Gary Lafree Ideas in POLICE American FOUNDATION Number 15 Policing July 2012 Policing Terrorism Gary LaFree lthough terrorism has past. However, some optimism This balance between being much in common is provided by the fact that the effective in counterterrorism A with ordinary crime strong connections to community efforts and maintaining the trust (LaFree and Dugan 2004), it that produce the best results of the community should not be also raises unique challenges for for policing in general may also taken lightly but in some ways policing. Perhaps the greatest be the same characteristics that resembles the challenges police challenges center on how to are most useful in preventing have long faced in responding use scarce police resources to terrorist attacks and responding to crimes that require proactive fight crimes that are relatively to those that are carried out. At rather than reactive methods. uncommon, that have national the same time, providing support I divide this essay into four and sometimes international for counterterrorism must be parts. In part one, I consider the implications, and that require done by local police in such a frequency and characteristics of intelligence that may be limited way that it does not erode their terrorist attacks on the United or altogether unavailable at the effectiveness in communities. States, especially since 9/11. In local and state levels. But despite these challenges, it is hard to Ideas in American Policing presents commentary and insight from leading crimi- imagine any effective national nologists on issues of interest to scholars, practitioners, and policy makers. The policy on preventing terrorism papers published in this series are from the Police Foundation lecture series of the same name. Points of view in this document are those of the author and do not or responding to its aftermath necessarily represent the official position of the Police Foundation. The full series that does not heavily rely on the is available online at http://www.policefoundation.org/docs/library.html. hundreds of thousands of sworn © 2012 Police Foundation. All rights reserved. police officers that serve the Gary LaFree is professor of criminology and criminal justice United States. Addressing these at the University of Maryland and the director of the National complex challenges requires a Consortium for the Study of Terrorism and Responses to level of cooperation across federal, Terrorism. Dr. LaFree is a member of the Police Foundation’s state, and local jurisdictions Research Advisory Committee. that has not been typical in the this section, I briefly examine international terrorist attacks series peak in 1991—just before global terrorist threats to the is the Global Terrorism the collapse of the Soviet Union. United States, foreign groups Database (GTD) maintained Attacks then fell off even more that target the United States, and by the National Consortium sharply so that total attacks just terrorist attacks within the United for the Study of Terrorism before 9/11 were at about the States. In the second part of the and Responses to Terrorism same level as they were in the essay, I consider how terrorism (START), headquartered at the late 1970s. Following the US-led is similar to and different from University of Maryland (LaFree invasion of Iraq in 2003, total ordinary street crime. These and Dugan 2007; LaFree 2012). attacks again rose sharply, coming similarities and differences have Terrorism in the GTD is defined close to a series high during important implications for as the threatened or actual use of the last three years of the series policing terrorism. Perhaps most illegal force and violence by non- (2008 to 2010). Fatal attacks importantly, terrorism more state actors, in order to attain a are much less common but are closely resembles crimes that have political, economic, religious, or significantly correlated with total gained prominence in the last half social goal through fear, coercion, attacks. In general, there was a century, like hate crimes, drug- or intimidation. At the time greater gap between total and related crimes, and gang violence, this essay was written, the GTD fatal attacks during the 1980s and than crimes with older, common included information on more early 1990s than there was before law roots, like homicide or than 98,000 terrorist attacks from or since. The total number of robbery. In the third part of the around the world from 1970 to fatal attacks from 2008 to 2010 is essay, I consider some of the ways 2010 (www.start.umd.edu/gtd/). at about the same level as it was that the 9/11 attacks changed In the next section, I use the in the peak year of 1992 (about policing. Because much of the GTD to indicate the nature of the 2,000 attacks per year). police work aimed at preventing global terrorist threat, the threat terrorist attacks happens at the from foreign groups that target Terrorist Organizations federal level, I will examine the United States both at home that Target the United in particular major changes in and abroad, and the threat of FBI strategies since 9/11. The terrorism within the United States. States move toward a more proactive My colleagues Sue-Ming Yang approach to terrorism after Global Terrorism Trends and Martha Crenshaw and 9/11 has important implications I recently tracked the attack for policing at all levels. And, Figure 1 shows total and fatal patterns of fifty-three terrorist finally, I conclude by taking the terrorist attacks from 1970 to organizations identified by the 1 information from the first three 2010 from the GTD. I include US Department of State as sections and considering some of a marker to distinguish attacks representing the most serious the implications for policies on before and after 9/11. Total threat to the United States policing terrorism in the twenty- attacks rose sharply during the (LaFree, Yang, and Crenshaw first century. 1970s and 1980s, reaching a 2009). Collectively, these foreign terrorist groups were linked to 1 The Nature of the Our data record no domestic nearly 17,000 attacks. However, attacks for 1993. The original data on we found that just 3 percent of Terrorist Threat which the GTD is based were collected by the Pinkerton Global Intelligence these attacks by designated anti- At present, the longest running Service, which lost the data for 1993 US groups were actually directed in an office move. We have never been terrorism event database that able to completely reconstruct these at the United States. Moreover, includes both domestic and missing data. 99 percent of attacks targeting —— 2 —— Figure 1. Worldwide Total and Fatal Terrorist Attacks 1970–2010 domestic attacks are the rule. The fact that most terrorism is local underscores the importance of strong local policing. Trends in Terrorism Attacks Within the United States Developing a valid data source for terrorist attacks within the United States has been challenging. Most early terrorism event databases (e.g., ITERATE, RAND) excluded domestic attacks and, as a matter of policy, the US Department of State did not publish data on domestic terrorist attacks in its Patterns of Global Source: Global Terrorism Database (www.start.umd.edu/gtd). Terrorism series. Brent Smith and his colleagues (Smith 1994; the United States did not occur National Liberation Front), and Smith, Shields, and Damphousse on US soil but were aimed at the early twenty-first century 2011a) have contributed a US targets in other countries (al-Qa’ida, the Taliban)—as great deal to our knowledge of (e.g., embassies, multinational well as a trajectory that did not domestic terrorism by codifying corporations). We also found exhibit wave-like characteristics FBI arrests and prosecutions that more than 90 percent of the but instead was characterized by for terrorism, but these data are non-US attacks were domestic irregular and infrequent attacks limited to federal cases. The GTD (i.e., nationals from one country (including the Popular Liberation includes data on both domestic attacking targets of the same Army and the Moro Islamic and international terrorism nationality in the same country). Liberation Front). going back to 1970; however, We used group-based trajectory The results of this analysis the original data provided no analysis (Nagin 2005) to examine underscore the importance of simple mechanism for separating the different developmental proximity for terrorist targeting. domestic from international trajectories of strikes that Terrorists, like ordinary criminals, cases. With funding from the targeted the United States, and are likely to choose targets US Department of Homeland concluded that four trajectories close to their operational base. Security’s Human Factors/ best captured the attack patterns. However, when attacks occur Behavioral Science Division, for As shown in Figure 2, these further from the terrorists’ home the last three years my colleagues trajectories constituted three very bases, they are more deadly. In and I in the START Consortium distinct terrorist waves—which framing counterterrorism policies, have been building a database occurred in the 1970s (including our results highlight the need to on terrorist attacks against the the Red Brigades and People’s put threats into perspective by United States, called Terrorism Liberation Forces), 1980s acknowledging that international and Extremist Violence in the (Shining Path, Farabundo Marti attacks are the exception and local United States (TEVUS). —— 3 —— Figure 2. Trajectories of Attacks on the United States of 53 in the early 1970s, attacks Anti-US Terrorist Groups 1970–2004 reached a secondary peak of 142 in 1975. Attack rates again declined throughout the end of the 1970s and early 1980s, falling below fifty attacks per year for most years. Interestingly, the total number of domestic attacks since 9/11 has generally been lower than at any other period during the past forty years.
Recommended publications
  • Deception, Disinformation, and Strategic Communications: How One Interagency Group Made a Major Difference by Fletcher Schoen and Christopher J
    STRATEGIC PERSPECTIVES 11 Deception, Disinformation, and Strategic Communications: How One Interagency Group Made a Major Difference by Fletcher Schoen and Christopher J. Lamb Center for Strategic Research Institute for National Strategic Studies National Defense University Institute for National Strategic Studies National Defense University The Institute for National Strategic Studies (INSS) is National Defense University’s (NDU’s) dedicated research arm. INSS includes the Center for Strategic Research, Center for Complex Operations, Center for the Study of Chinese Military Affairs, Center for Technology and National Security Policy, Center for Transatlantic Security Studies, and Conflict Records Research Center. The military and civilian analysts and staff who comprise INSS and its subcomponents execute their mission by conducting research and analysis, publishing, and participating in conferences, policy support, and outreach. The mission of INSS is to conduct strategic studies for the Secretary of Defense, Chairman of the Joint Chiefs of Staff, and the Unified Combatant Commands in support of the academic programs at NDU and to perform outreach to other U.S. Government agencies and the broader national security community. Cover: Kathleen Bailey presents evidence of forgeries to the press corps. Credit: The Washington Times Deception, Disinformation, and Strategic Communications: How One Interagency Group Made a Major Difference Deception, Disinformation, and Strategic Communications: How One Interagency Group Made a Major Difference By Fletcher Schoen and Christopher J. Lamb Institute for National Strategic Studies Strategic Perspectives, No. 11 Series Editor: Nicholas Rostow National Defense University Press Washington, D.C. June 2012 Opinions, conclusions, and recommendations expressed or implied within are solely those of the contributors and do not necessarily represent the views of the Defense Department or any other agency of the Federal Government.
    [Show full text]
  • National Security and Local Police
    BRENNAN CENTER FOR JUSTICE NATIONAL SECURITY AND LOCAL POLICE Michael Price Brennan Center for Justice at New York University School of Law ABOUT THE BRENNAN CENTER FOR JUSTICE The Brennan Center for Justice at NYU School of Law is a nonpartisan law and policy institute that seeks to improve our systems of democracy and justice. We work to hold our political institutions and laws accountable to the twin American ideals of democracy and equal justice for all. The Center’s work ranges from voting rights to campaign finance reform, from racial justice in criminal law to Constitutional protection in the fight against terrorism. A singular institution — part think tank, part public interest law firm, part advocacy group, part communications hub — the Brennan Center seeks meaningful, measurable change in the systems by which our nation is governed. ABOUT THE BRENNAN CENTER’S LIBERTY AND NATIONAL SECURITY PROGRAM The Brennan Center’s Liberty and National Security Program works to advance effective national security policies that respect Constitutional values and the rule of law, using innovative policy recommendations, litigation, and public advocacy. The program focuses on government transparency and accountability; domestic counterterrorism policies and their effects on privacy and First Amendment freedoms; detainee policy, including the detention, interrogation, and trial of terrorist suspects; and the need to safeguard our system of checks and balances. ABOUT THE BRENNAN CENTER’S PUBLICATIONS Red cover | Research reports offer in-depth empirical findings. Blue cover | Policy proposals offer innovative, concrete reform solutions. White cover | White papers offer a compelling analysis of a pressing legal or policy issue.
    [Show full text]
  • James Daffern 15/09/2020, 2109
    Spotlight: JAMES DAFFERN 15/09/2020, 2109 JAMES DAFFERN C S A 3rd Floor Joel House, 17-21 Garrick Street, London WC2E 9BL Phone: 020-7420 9351 E-mail: [email protected] WWW: www.shepherdmanagement.co.uk HARVEY VOICES 49 Greek Street, London W1D 4EG Phone: 020 7952 4361 Mobile: 07739 902784 Photo: Jennie Scott E-mail: [email protected] WWW: www.harveyvoices.co.uk Location: Greater London, Appearance: White, England, United Scandinavian, Kingdom Eastern Height: 6' (182cm) European Weight: 13st. 7lb. (86kg) Other: Equity Playing Age: 40 - 50 years Eye Colour: Blue Hair Colour: Dark Brown Hair Length: Short About me: Television Television, Andrew Wallace, PROFESSOR T, Eagle Eye Productions, Indra Siera Television, Jim Bonning, CASUALTY, BBC, Various Television, One Eyed Marc, BIRDS OF A FEATHER, ITV, Martin Dennis Television, Leon, X COMPANY, CBC Television/Sony Pictures Television Television, Ben Owens, DOCTORS (NINE EPS), BBC, Various Television, Zac Glazerbrook, CUFFS, BBC/Tiger Aspect Productions, Kieron Hawkes Television, Natie, RAISED BY WOLVES, C4, Mitchell Altieri Television, Bruce, FLYING HIGH, ZDF, Stephen Bartmann Television, Andrew Hayden, HUNTED, Kudos/HBO/BBC, Daniel Percival/James Strong Television, Ray Keats, WATERLOO ROAD, Shed Productions, Fraser Macdonald Television, Lucas North in Flashback, SPOOKS, BBC Television, Edward Hall Television, Paul Walsh, HOME TIME, BBC Television, Christine Gernon Television, Nathan, RIVER CITY, BBC Television, Semi regular Television, Jimmy Barrett, THE ROYAL, Yorkshire Television,
    [Show full text]
  • Spooks Returns to Dvd
    A BAPTISM OF FIRE FOR THE NEW TEAM AS SPOOKS RETURNS TO DVD SPOOKS: SERIES NINE AVALIABLE ON DVD FROM 28TH FEBRUARY 2011 “Who doesn’t feel a thrill of excitement when a new series of Spooks hits our screens?” Daily Mail “It’s a tribute to Spooks’ staying power that after eight years we still care so much” The Telegraph BAFTA Award‐winning British television spy drama Spooks is back for its ninth knuckle‐clenching series and is available on DVD from 28th February 2011 courtesy of Universal Playback. Filled with spy‐tastic extra features, the DVD is a must for any die‐hard Spooks fan. The ninth series of the critically acclaimed Spooks, is filled with dramatic revelations and a host of new characters ‐ Sophia Myles (Underworld, Doctor Who), Max Brown (Mistresses, The Tudors), Iain Glen (The Blue Room, Lara Croft: Tomb Raider), Simon Russell Beale (Much Ado About Nothing, Uncle Vanya) and Laila Rouass (Primeval, Footballers’ Wives). Friendships will be tested and the depth of deceit will lead to an unprecedented game of cat and mouse and the impact this has on the team dynamic will have viewers enthralled. Follow the team on a whirlwind adventure tracking Somalian terrorists, preventing assassination attempts, avoiding bomb efforts and vicious snipers, and through it all face the personal consequences of working for the MI5. The complete Spooks: Series 9 DVD boxset contains never before seen extras such as a feature on The Cost of Being a Spy and a look at The Downfall of Lucas North. Episode commentaries with the cast and crew will also reveal secrets that have so far remained strictly confidential.
    [Show full text]
  • Civilians in Cyberwarfare: Conscripts
    Civilians in Cyberwarfare: Conscripts Susan W. Brenner* with Leo L. Clarke** ABSTRACT Civilian-owned and -operated entities will almost certainly be a target in cyberwarfare because cyberattackers are likely to be more focused on undermining the viability of the targeted state than on invading its territory. Cyberattackers will probably target military computer systems, at least to some extent, but in a departure from traditional warfare, they will also target companies that operate aspects of the victim nation’s infrastructure. Cyberwarfare, in other words, will penetrate the territorial borders of the attacked state and target high-value civilian businesses. Nation-states will therefore need to integrate the civilian employees of these (and perhaps other) companies into their cyberwarfare response structures if a state is to be able to respond effectively to cyberattacks. While many companies may voluntarily elect to participate in such an effort, others may decline to do so, which creates a need, in effect, to conscript companies for this purpose. This Article explores how the U.S. government can go about compelling civilian cooperation in cyberwarfare without violating constitutional guarantees and limitations on the power of the Legislature and the Executive. * NCR Distinguished Professor of Law and Technology, University of Dayton School of Law. ** Associate, Drew, Cooper & Anding, P.C., Grand Rapids, Michigan. 1011 1012 Vanderbilt Journal of Transnational Law [Vol. 43:1011 TABLE OF CONTENTS I. INTRODUCTION .............................................................
    [Show full text]
  • A Season of Spooks and Style – Trick Or Treat Yourself – CREATE a DEVILISH DINING SPACE with THEMED DÉCOR
    HALLOWEEN 2019 A season of spooks and style – trick or treat yourself – CREATE A DEVILISH DINING SPACE WITH THEMED DÉCOR 1. Host 3. Exclusive! Our large lanterns are only available when you Host 1. Spider Web Tealight Pair a Party. Glass. 10 cm h. P92816 £19.95 5. 6. 2. GloLite by PartyLite® Mystery Potion Jar Candle Two wicks, yellow wax. Burn time: 50-60 hrs. 2. 12 cm w. G26783E £24.95 3. Tapers - Unscented Six piece tray. 7-8 hrs. 25 cm h. Orange P07301 £10.95 4. Black Cat Tealight Holder Ceramic. 24 cm h. P9415 £22.95 7. 4. 10. 5. Elevated Candle Holder Centerpiece 8. Metal. Includes 4 glass cups and 4 magnetic metal taper holders (In cups: votive, tealight; On frame: 5x10 cm pillar, large tealight; In magnetic holders on 9. frame: taper). Frame with cups: 15 cm h, 36 cm w. P93375 £44.95 6. Host Only: Hammered Minaret Don’t be afraid of Lantern – Large the dark! They transform Metal and glass. Includes metal jar stand plus in low light 3-tealight tree (tealight, jar, large tealight, pillar). 11. With ring down: 59 cm h, 23 cm w. P93381 £59.95 7. Spiced Pumpkin 3-Wick Jar Candle Burn time: 25-45 hrs. G73B842E £22.95 8. Perfect Pumpkin Jar Candle 11. Spooky Shadow Faces Tealight Holder Pair Lidded ceramic pumpkin filled with Spiced Pumpkin Porcelain. 8 cm h, 9 cm w. 13. fragrance. 11 cm h, 9 cm w. Burn time: 30-40 hrs. P93394 £24.95 12. P93405E £19.95 12.
    [Show full text]
  • DEVELOPING a HAUNTOLOGY of the BLACK BODY Kashif Jerome
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by Carolina Digital Repository SPECTERS AND SPOOKS: DEVELOPING A HAUNTOLOGY OF THE BLACK BODY Kashif Jerome Powell, MA A dissertation submitted to the faculty of the University of North Carolina at Chapel Hill in partial fulfillment of the requirements for the degree of Doctor of Philosophy in Department of Communication Studies. Chapel Hill 2014 Approved by: Renee Alexander-Craft Ashley Lucas Della Pollock Alvaro Reyes Eric King Watts © 2014 Kashif Jerome Powell ALL RIGHTS RESERVED ii ABSTRACT Kashif Jerome Powell: Specters and Spooks: Developing a Hauntology of The Black Body (Under the direction of Dr. Renee Alexander-Craft) This dissertation utilizes theories of embodiment and performance to develop a “hauntology of blackness,” which investigates imaginative sites of death constructed through the historical, social, and performative facets of institutional slavery in the United States to theorize notions of blackness and the black body. I argue that the relationship between the black body and death have conjured a death-driven specter that manifest historically, performatively, visually, and phenomenally as blackness. The rise and continual return of this “specter of blackness” positions the black body in the United States as a body “haunted” by its own biological and phenotypical disposition. Placing the theory of Jacques Derrida and Frantz Fanon in conversation with scholars such as Avery Gordon, Saidiya Hartman, Toni Morrison, and others, I evoke the language of haunting to consider the profound effect the relationship between the black body and death has had on ontological, psychoanalytic, and phenomenological understandings of blackness within post-modernity.
    [Show full text]
  • Richard Armitage
    Richard Armitage Agents Kirk Whelan-Foran Assistant +44 (0) 20 3214 0800 Donovan Mathews +44 (0)7920713142 [email protected] 02032140800 Dallas Smith Associate Agent Sarah Roberts [email protected] +44 (0) 20 3214 0800 Assistant Alexandra Rae [email protected] +44 (0) 20 3214 0800 Roles Film Production Character Director Company THE SEVILLE COMMUNION/THE Quart Sergio Dow Drumskin Productions MAN FROM ROME MY ZOE James Julie Delpy Baby Cow Productions THE LODGE Richard Severin Fiala, FilmNation Veronika Franz Entertainment OCEAN'S 8 Claude Becker Gary Ross Warner Bros PILGRIMAGE Raymond De Brendan Savage Productions Merville Muldowney SLEEPWALKER Dr. Scott White Elliott Lester Marvista Entertainment United Agents | 12-26 Lexington Street London W1F OLE | T +44 (0) 20 3214 0800 | F +44 (0) 20 3214 0801 | E [email protected] Production Character Director Company BRAIN ON FIRE Tom Cahalan Gerard Barrett Broad Green Pictures ALICE THROUGH THE LOOKING King Oleron James Bobin Walt Disney Pictures GLASS URBAN AND THE SHED CREW Chop Candida Brady Blenheim Films THE HOBBIT: THE BATTLE OF Thorin Peter Jackson MGM THE FIVE ARMIES Oakenshield INTO THE STORM Gary Morris Steven Quale Broken Road/New Line THE HOBBIT - THE DESOLATION Thorin Peter Jackson MGM OF SMAUG Oakenshield THE HOBBIT - AN UNEXPECTED Thorin Peter Jackson MGM JOURNEY Oakenshield CAPTAIN AMERICA: THE FIRST Heinz Kruger Joe Johnston Marvel AVENGER CLEOPATRA Epiphanes Frank Roddan Alexandria Films FROZEN Steven Juliet McKoen Liminal Films MACBETH Angus
    [Show full text]
  • WORLD WAR C : Understanding Nation-State Motives Behind Today’S Advanced Cyber Attacks
    REPORT WORLD WAR C : Understanding Nation-State Motives Behind Today’s Advanced Cyber Attacks Authors: Kenneth Geers, Darien Kindlund, Ned Moran, Rob Rachwald SECURITY REIMAGINED World War C: Understanding Nation-State Motives Behind Today’s Advanced Cyber Attacks CONTENTS Executive Summary ............................................................................................................................................................................................................................................................................................................... 3 Introduction ............................................................................................................................................................................................................................................................................................................................................... 4 A Word of Warning ................................................................................................................................................................................................................................................................................................................. 5 The FireEye Perspective ...........................................................................................................................................................................................................................................................................................
    [Show full text]
  • I ESCALATION in the BALTICS: an OVERVIEW of RUSSIAN INTENT Author-Joseph M. Hays Jr. United States Air Force Submitted in Fulfil
    ESCALATION IN THE BALTICS: AN OVERVIEW OF RUSSIAN INTENT Author-Joseph M. Hays Jr. United States Air Force Submitted in fulfillment of the requirements for AIR UNIVERSITY ADVANCED RESEARCH (NEXT GENERATION INTELLIGENCE, SURVEILLANCE, AND RECONNAISSANCE) in part of SQUADRON OFFICER SCHOOL VIRTUAL – IN RESIDENCE AIR UNIVERSITY MAXWELL AIR FORCE BASE December 2020 Advisor: Ronald Prince ISR 200 Course Director Curtis E. LeMay Center i THIS PAGE INTENTIONALLY LEFT BLANK ii ABSTRACT Russia poses a significant threat to the Baltics. Through hybrid warfare means, Russia has set the stage for invasion and occupation in Estonia, Latvia, and Lithuania. This paper begins with an exploration of the motivations and history Russia has for occupying the Baltics by primarily addressing the issues of energy dominance and the Baltics’ precedence for insurgency. The Baltic states have whole-of-nation defense strategies in conjunction with NATO interoperability which should most likely deter a full-scale invasion on the part of Russia, despite Russia possessing military superiority. However, Russia has a history of sewing dissent through information operations. This paper addresses how Russia could theoretically occupy an ethnically Russian city of a Baltic country and explores what measures Russia may take to hold onto that territory. Specifically as it pertains to a nuclear response, Russia may invoke an “escalate to de-escalate” strategy, threatening nuclear war with intermediate-range warheads. This escalation would take place through lose interpretation of Russian doctrine and policy that is supposedly designed to protect the very existence of the Russian state. This paper concludes by discussing ways forward with research, specifically addressing NATO’s full spectrum of response to Russia’s escalation through hybrid warfare.
    [Show full text]
  • The Dictionary Legend
    THE DICTIONARY The following list is a compilation of words and phrases that have been taken from a variety of sources that are utilized in the research and following of Street Gangs and Security Threat Groups. The information that is contained here is the most accurate and current that is presently available. If you are a recipient of this book, you are asked to review it and comment on its usefulness. If you have something that you feel should be included, please submit it so it may be added to future updates. Please note: the information here is to be used as an aid in the interpretation of Street Gangs and Security Threat Groups communication. Words and meanings change constantly. Compiled by the Woodman State Jail, Security Threat Group Office, and from information obtained from, but not limited to, the following: a) Texas Attorney General conference, October 1999 and 2003 b) Texas Department of Criminal Justice - Security Threat Group Officers c) California Department of Corrections d) Sacramento Intelligence Unit LEGEND: BOLD TYPE: Term or Phrase being used (Parenthesis): Used to show the possible origin of the term Meaning: Possible interpretation of the term PLEASE USE EXTREME CARE AND CAUTION IN THE DISPLAY AND USE OF THIS BOOK. DO NOT LEAVE IT WHERE IT CAN BE LOCATED, ACCESSED OR UTILIZED BY ANY UNAUTHORIZED PERSON. Revised: 25 August 2004 1 TABLE OF CONTENTS A: Pages 3-9 O: Pages 100-104 B: Pages 10-22 P: Pages 104-114 C: Pages 22-40 Q: Pages 114-115 D: Pages 40-46 R: Pages 115-122 E: Pages 46-51 S: Pages 122-136 F: Pages 51-58 T: Pages 136-146 G: Pages 58-64 U: Pages 146-148 H: Pages 64-70 V: Pages 148-150 I: Pages 70-73 W: Pages 150-155 J: Pages 73-76 X: Page 155 K: Pages 76-80 Y: Pages 155-156 L: Pages 80-87 Z: Page 157 M: Pages 87-96 #s: Pages 157-168 N: Pages 96-100 COMMENTS: When this “Dictionary” was first started, it was done primarily as an aid for the Security Threat Group Officers in the Texas Department of Criminal Justice (TDCJ).
    [Show full text]
  • Theocrit 9201 Cyber War Theory Instructor: Dr. Nick Dyer-Witheford Office Hours: Tuesday 1:30-3:30, FNB 4045 Email: Ncdyerwi@Uwo
    Theocrit 9201 Cyber War Theory Instructor: Dr. Nick Dyer-Witheford Office Hours: Tuesday 1:30-3:30, FNB 4045 Email: [email protected] Seminar: Tuesday, 9:30 -12:30, STVH 3165 Course Description: Cyberwar is all the rage today. Stories of Russian election hacking, Chinese networked espionage, jihadi virtual recruitment, and Pentagon contracts in Silicon Valley abound, mostly told by spooks, hypesters, politicians and journalists. This course, however, examines the idea of cyberwar as the site of an encounter between two bodies of critical theory, one dealing with “cyber”— the realm of the digital, the other with “war”—the domain of organized violence. It defines cyberwar in a broad sense, not just as military hacking, but as a phenomenon with constitutive adjacencies to and overlaps with cyber-crime and cyber-activism, surveillance, terrorism, drones and autonomous weaponry. From this vantage point, we will study Marxist, Lacanian, Derridean, and Deleuzian accounts of cyberwar, and the prescient work of war theorists such as Virilio and Kittler; the relation of cyberwar to classical theories of war and international relations, from Clausewitz to Schmitt; and the rapidly emergent field of feminist and postcolonial cyberwar studies. The seminar will thus offer a far ranging examination of critical thought on the current wave of digital militarism. It will be geared to the interests of seminar participants in a way helpful both in the writing of comprehensive exams, theses and dissertations and/or in political practice. Topic & Readings Schedule: This schedule of seminar topics and readings is provisional; it will be redesigned and reiterated, if necessary several times, dependent on the interests and priorities of the seminar.
    [Show full text]