Political Terrorism : a Conceptual and Theoretical Framework / by Eric
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Burn It Down! Anarchism, Activism, and the Vancouver Five, 1967–1985
Burn it Down! Anarchism, Activism, and the Vancouver Five, 1967–1985 by Eryk Martin M.A., University of Victoria, 2008 B.A. (Hons.), University of Victoria, 2006 Dissertation Submitted in Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy in the Department of History Faculty of Arts and Social Sciences © Eryk Martin 2016 SIMON FRASER UNIVERSITY Spring 2016 Approval Name: Eryk Martin Degree: Doctor of Philosophy (History) Title: Burn it Down! Anarchism, Activism, and the Vancouver Five, 1967–1985 Examining Committee: Chair: Dimitris Krallis Associate Professor Mark Leier Senior Supervisor Professor Karen Ferguson Supervisor Professor Roxanne Panchasi Supervisor Associate Professor Lara Campbell Internal Examiner Professor Gender, Sexuality, and Women’s Studies Joan Sangster External Examiner Professor Gender and Women’s Studies Trent University Date Defended/Approved: January 15, 2016 ii Ethics Statement iii Abstract This dissertation investigates the experiences of five Canadian anarchists commonly knoWn as the Vancouver Five, Who came together in the early 1980s to destroy a BC Hydro power station in Qualicum Beach, bomb a Toronto factory that Was building parts for American cruise missiles, and assist in the firebombing of pornography stores in Vancouver. It uses these events in order to analyze the development and transformation of anarchist activism between 1967 and 1985. Focusing closely on anarchist ideas, tactics, and political projects, it explores the resurgence of anarchism as a vibrant form of leftWing activism in the late tWentieth century. In addressing the ideological basis and contested cultural meanings of armed struggle, it uncovers Why and how the Vancouver Five transformed themselves into an underground, clandestine force. -
Issue Terrorism: an Analysis of Trends in North America
ISSUE TERRORISM: AN ANALYSIS OF TRENDS IN NORTH AMERICA Jesse L. Cale B.A., Mount Royal College, 2001 THESIS SUBMITTED IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF MASTER OF ARTS In the School of Criminology O Jesse L. Cale 2003 SIMON FRASER UNIVERSITY November 2003 All rights reserved. This work may not be reproduced in whole or in part, by photocopy or other means, without permission of the author. APPROVAL Name: Jesse L. Cale Degree: M.A. Title of Thesis: issue Terrorism: An Analysis of Trends in North America Examining Committee: Chair: Neil Madu, M.A. Raymon?! R. Corr o, m~ Senior Su~ervisorT William G. Glackman, Ph.D. Me&r Ronald Roesch, Ph.D. ~xternalExaminer Psychology Department Simon Fraser University Date Approved: \ q 7- Y\,?, -? ii PARTIAL COPYRIGHT LICENCE I hereby grant to Simon Fraser University the right to lend my thesis, project or extended essay (the title of which is shown below) to users of the Simon Fraser University Library, and to make partial or single copies only for such users or in response to a request from the library of any other university, or other educational institution, on its own behalf or for one of its users. I further agree that permission for multiple copying of this work for scholarly purposes may be granted by me or the Dean of Graduate Studies. It is understood that copying or publication of this work for financial gain shall not be allowed without my written permission. Title of Thesis/Project/Extended Essay Issue Terrorism: An Analysis of Trends in North America Name ABSTRACT I Issue motivated terrorism can be understood as an extreme, illegitimate, and often violent response to a controversial issue within a given society. -
Transition in Canada’S Important Fossil Own Interests (To the Great Frustration Fulfilling, for the Greatest Number of Fuel Sectors (Page 16)
in transition CANADIAN CENTRE FOR POLICY ALTERNATIVES JULY/AUGUST 2018 $6.95 Contributors Martin Adelaar is a retired Cynthia Khoo is a public of Technology (UOIT), and energy management interest lawyer who focuses one of the world’s foremost consultant and advocate on internet policy and digital authorities and renowned and a member of the Ottawa rights. Her column, Below the authors on hate crime. She is Renewable Energy Co- Fold, appears regularly in the Director of the newly formed Vol. 25, No. 2 operative. Monitor. Centre on Hate, Bias and ISSN 1198-497X Extremism at UOIT. Canada Post Publication 40009942 Frank Bayerl is a retired Marc Lee is a senior economist translator and regular with the British Columbia Roger Peters is a retired The Monitor is published six times volunteer at the CCPA’s office of the Canadian Centre environmental researcher, a year by the Canadian Centre for national office in Ottawa. for Policy Alternatives. consultant, writer and Policy Alternatives. Simon Enoch is Director of the Laura Macdonald is a professor advocate, and a founding The opinions expressed in the CCPA-Saskatchewan. in the department of political member of the Ottawa Monitor are those of the authors science and the Institute of Renewable Energy Co- and do not necessarily reflect Gerard Di Trolio writes Political Economy at Carleton operative. the views of the CCPA. about labour and politics. His articles have appeared in University, and co-investigator Peter G. Prontzos is Professor Please send feedback to RankandFile.ca, where he is an on the SSHRC-funded research Emeritus of Political Science at [email protected]. -
Filling Terrorism Gaps: Veos, Evaluating Databases, and Applying Risk Terrain Modeling to Terrorism RH Hagan
PNNL-25727 Filling Terrorism Gaps: VEOs, Evaluating Databases, and Applying Risk Terrain Modeling to Terrorism RH Hagan August 2016 PNNL-25727 Filling Terrorism Gaps: VEOs, Evaluating Databases, and Applying Risk Terrain Modeling to Terrorism RH Hagan August 2016 Prepared for the U.S. Department of Energy under Contract DE-AC05-76RL01830 Pacific Northwest National Laboratory Richland, Washington 99352 PNNL-25727 Abstract This paper aims to address three issues: the lack of literature differentiating terrorism and violent extremist organizations (VEOs), terrorism incident databases, and the applicability of Risk Terrain Modeling (RTM) to terrorism. Current open source literature and publicly available government sources do not differentiate between terrorism and VEOs; furthermore, they fail to define them. Addressing the lack of a comprehensive comparison of existing terrorism data sources, a matrix comparing a dozen terrorism databases is constructed, providing insight toward the array of data available. RTM, a method for spatial risk analysis at a micro level, has some applicability to terrorism research, particularly for studies looking at risk indicators of terrorism. Leveraging attack data from multiple databases, combined with RTM, offers one avenue for closing existing research gaps in terrorism literature. iii Acknowledgments The author would like to sincerely thank several individuals for their contributions to this research. My mentor, Chrissie Noonan, for her guidance and support throughout this process, Carolyn Cramer for her operational support and insight, Alex Stephan, Lead for the Special Programs and Scientific Studies Team at PNNL, George Muller for his support and direction, Hannah Trump for her substantial help with the appendices, and Dan Fortin, Sam Chatterjee, and Thomas Johansen for the constant discussions. -
Patterns of Terrorism in the United States, 1970-2013
Patterns of Terrorism in the United States, 1970-2013 Final Report to Resilient Systems Division, DHS Science and Technology Directorate October 2014 National Consortium for the Study of Terrorism and Responses to Terrorism A Department of Homeland Security Science and Technology Center of Excellence Based at the University of Maryland 8400 Baltimore Ave, Suite 250 • College Park, MD 20740 • 301.405.6600 www.start.umd.edu National Consortium for the Study of Terrorism and Responses to Terrorism A Department of Homeland Security Science and Technology Center of Excellence About This Report The author of this report is Erin Miller at the University of Maryland. Questions about this report should be directed to Erin Miller at [email protected]. The initial collection of data for the Global Terrorism Database (GTD) data was carried out by the Pinkerton Global Intelligence Services (PGIS) between 1970 and 1997 and was donated to the University of Maryland in 2001. Digitizing and validating the original GTD data from 1970 to 1997 was funded by a grant from the National Institute of Justice in 2004 (PIs Gary LaFree and Laura Dugan; grant number: NIJ2002-DT-CX-0001) and in 2005 as part of the START Center of Excellence by the Department of Homeland Security Science and Technology Directorate (DHS S&T), Office of University Programs (PI Gary LaFree; grant numbers N00140510629 and 2008-ST-061-ST0004). Data collection for incidents that occurred between January 1998 and March 2008 and updates to the earlier data to make it consistent with new GTD coding criteria were funded by the DHS S&T Human Factors/Behavioral Sciences Division (HFD) (PIs Gary LaFree and Gary Ackerman; contract number HSHQDC-05-X-00482) and conducted by database staff at the National Consortium for the Study of Terrorism and Responses to Terrorism (START) and the Center for Terrorism and Intelligence Studies (CETIS). -
Barefoot Into Cyberspace Adventures in Search of Techno-Utopia
Barefoot into Cyberspace Adventures in search of techno-Utopia By Becky Hogge July 2011 http://www,barefootintocyberspace.com Barefoot into Cyberspace Becky Hogge Read This First This text is distributed by Barefoot Publishing Limited under a Creative Commons Attribution-ShareAlike 2.0 UK: England & Wales Licence. That means: You are free to copy, distribute, display, and perform the work to make derivative works to make commercial use of the work Under the following conditions Attribution. You must attribute the work in the manner specified by the author or licensor (but not in any way that suggests that they endorse you or your use of the work). Share Alike. If you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar licence to this one. For any reuse or distribution, you must make clear to others the licence terms of this work. The best way to do this is with a link to http://barefootintocyberspace.com/book/hypertext Any of these conditions may be waived by seeking permission from Barefoot Publishing Limited. To contact Barefoot Publishing Limited, email barefootpublishing [AT] gmail [DOT] com. More information available at http://creativecommons.org/licenses/by- sa/2.0/uk/. See the end of this file for complete legalese 2 Barefoot into Cyberspace Becky Hogge Contents Prologue: Fierce Dancing ...................................................................................................................................... 5 Chapter 1: Digging the command line ............................................................................................................ -
The Strategy of Radical Environmentalism
Journal of Military and Strategic Studies, Summer 2008, Vol. 10, Issue 4. THROWING A WRENCH INTO THINGS: THE STRATEGY OF RADICAL ENVIRONMENTALISM Teale Phelps Bondaroff, University of Calgary Introduction: The current focus on Islamic terrorism has resulted in a lack of awareness of other forms of terrorism. Similarly, the focus on external non-conventional threats to security has meant that domestic threats are being overlooked. One such instance is that of the threat posed by radical environmentalist organizations, such as Earth First! (EF!)1, the Earth Liberation Front (ELF), and the Sea Shepherds Society. These organizations, which premise themselves upon the assertion of “No compromise in the Defense of Mother Earth!” have declared themselves Mother Nature’s armies and navies and represent the militarization of the environmental movement.2 The operations in which they engage, of which there have been more than 600 in the United States and Canada since 1996, have been responsible for an estimated $100 million in damages.3 Though the impact of these operations pale in comparison to those of the terrorist attacks on the World Trade Centre and Pentagon in 2001, they represent a growing trend in environmental organizations, and a growing non-conventional societal threat. The threat is especially real in Canada where many groups find their origins in Canadian-born organizations such as Greenpeace. 1 The name of the ‘Earth First!’ includes the exclamation mark, which places emphasis on their commitment to action. 2 Jonathan I. Lange, “Refusal to Compromise: The Case of Earth First!” Western Journal of Speech Communication, 54 (Fall 1990), p. -
A Theory of Categorical Terrorism
A Theory of Categorical Terrorism Jeff Goodwin, New York University Abstract When revolutionaries or insurgents, broadly defined, indiscriminately attack civilians, they generally attack “complicitous civilians,” i.e., those categories of noncombatants which the revolutionaries see as benefiting from, supporting and/or having a substantial capacity to influence the states that the revolutionaries are attempting to displace or overthrow. Such “categorical” terrorism will be most extensive when revolutionaries view these states (or complicitous civilians themselves) as perpetrators of extensive, indiscriminate violence against the revolutionaries and their constituents. However, if significant numbers of complicitous civilians are seen by rebel groups as potential supporters (or as capable of being influenced by nonviolent appeals or protests), then they will not be indiscriminately attacked. Whether specific categories of civilians will be perceived as potential allies by revolutionaries depends mainly on the prior history of political interaction and cooperation between these civilians and the revolutionaries. Categorical terrorism is most likely where there has been little such interaction or cooperation, resulting in weak political alliances between the revolutionaries and complicitous civilians – for example, where the revolutionaries and complicitous civilians speak different languages, practice different religions, claim the same land, and/or are territorially segregated. The terrorist attacks of Sept. 11, 2001, have spurred many social scientists to explore the dynamics of terrorism, most for the first time. Before 9/11, terrorism research was the exclusive preserve, with very few exceptions, of small networks of political scientists and non-academic “security experts,” relatively few of whom were interested in social-science theory. Descriptive case studies abound, replete with ad hoc, case-specific explanations of terrorism. -
Israel's Other Terrorism Challenge
The University of Notre Dame Australia ResearchOnline@ND Arts Book Chapters School of Arts 2010 Israel's other terrorism challenge Sandra M. Nasr University of Notre Dame Australia, [email protected] Follow this and additional works at: https://researchonline.nd.edu.au/arts_chapters Recommended Citation Nasr, S. (2010). Israel's other terrorism challenge. In R. Jackson, E. Murphy, E & S. Poynting (eds.). Contemporary state terrorism: Theory and practice. Abingdon, Oxon: Routledge. This Book Chapter is brought to you by the School of Arts at ResearchOnline@ND. It has been accepted for inclusion in Arts Book Chapters by an authorized administrator of ResearchOnline@ND. For more information, please contact [email protected]. (In Contemporary State Terrorism: Theory and Practice , Sep. 2009) ‘Israel’s other Terrorism Challenge’ By Sandra Nasr In the West, we hear a lot about terrorism in relation to Israel: Palestinian militants in Gaza using rockets to fire at Israeli towns over the ‘border’; and Palestinian suicide bombers strapping on explosives and detonating their payloads in Israeli cafes, bars, restaurants and buses. These attacks on civilian targets for the purpose of making a political statement are, indeed, examples of terrorism and Israeli civilians are right to demand that their government act decisively to prevent such acts. Yet Israel often responds to these terrorist tactics by adopting its own. When Israel sanctions and employs tactics which are designed to instil fear, humiliate, injure or otherwise cause harm to a civilian population for a political purpose, the state is guilty of state terrorism. Identifying those policies which constitute state terrorism requires an examination of both the intent and effect of actions (and inaction) by the state. -
Direct Action: Memoirs of an Urban Guerrilla Ann Hansen Guilty of Everything John Armstrong
145 BC STUDIES Direct Action: Memoirs of an Urban Guerrilla Ann Hansen Toronto: Between the Lines, 2001. 493 pp. $19.95 paper. Guilty of Everything John Armstrong Vancouver: Transmontanus/New Star Books, 2001. 98 pp. CDN$i6/us$i2 paper. SCOTT BEADLE Vancouver HE AUTHORS OF Direct Action that were formed between some of the and Guilty of Everything made city's radical activists and punks in the Ttheir mark in BC popular late 1970s. culture during the first few years of the Although it is possible that Hansen 1980s. John Armstrong was a creative and Armstrong crossed paths at a punk force in Vancouver's independent rock concert at the Oddfellows Hall, or music scene, while Ann Hansen made rubbed elbows at the Smilin' Buddha her mark with a bang — literally — as a Cabaret, they probably did not know member of the urban guerrilla group each other at all. Armstrong and Hansen Direct Action, better known after their tell two different, but not necessarily arrest as the Squamish Five. opposed, sides of the punk experience. Authors Hansen and Armstrong Hansen's story is concerned with the revisit and confront their respective nature of political activism, commitment, cultural legacies. Both works are self-doubt, and the gritty day-to-day autobiographical and explore a narrow realities of being an urban guerrilla. segment of the authors'lives soon after Armstrong, mirroring the nature of his they had come of age. musical contributions, is totally Some reviewers will inevitably link unconcerned with punk's political Direct Action and Guilty of Everything dimensions; rather, he focuses on the with Vancouver's punk rock subculture romance of the rock 'n' roll lifestyle - indeed, that is why they are being and its outlaw mystique. -
Various Definitions of Terrorism
Various Definitions of Terrorism Controversy in Defining Terrorism The difficulty in defining “terrorism” is in agreeing on a basis for determining when the use of violence (directed at whom, by whom, for what ends) is legitimate; therefore, the modern definition of terrorism is inherently controversial. The use of violence for the achievement of political ends is common to state and non-state groups. The majority of definitions in use has been written by agencies directly associated with government, and is systematically biased to exclude governments from the definition. The contemporary label of "terrorist" is highly pejorative-- it denotes a lack of legitimacy and morality. As a practical matter, so-called acts of “terrorism” or terrorism are often a tactic committed by the actors as part of a larger military or geo-political agenda. United Nations The UN General Assembly Resolution 49/60 (adopted on December 9, 1994), titled "Measures to Eliminate International Terrorism," contains a provision describing terrorism: Criminal acts intended or calculated to provoke a state of terror in the general public, a group of persons or particular persons for political purposes are in any circumstance unjustifiable, whatever the considerations of a political, philosophical, ideological, racial, ethnic, religious or any other nature that may be invoked to justify them. The UN Member States still have no agreed-upon definition of terrorism, and this fact has been a major obstacle to meaningful international countermeasures. Terminology consensus would be necessary for a single comprehensive convention on terrorism, which some countries favor in place of the present 12 piecemeal conventions and protocols. -
Building a Global Terrorism Database
The author(s) shown below used Federal funds provided by the U.S. Department of Justice and prepared the following final report: Document Title: Building a Global Terrorism Database Author(s): Gary LaFree ; Laura Dugan ; Heather V. Fogg ; Jeffrey Scott Document No.: 214260 Date Received: May 2006 Award Number: 2002-DT-CX-0001 This report has not been published by the U.S. Department of Justice. To provide better customer service, NCJRS has made this Federally- funded grant final report available electronically in addition to traditional paper copies. Opinions or points of view expressed are those of the author(s) and do not necessarily reflect the official position or policies of the U.S. Department of Justice. BUILDING A GLOBAL TERRORISM DATABASE Dr. Gary LaFree Dr. Laura Dugan Heather V. Fogg Jeffrey Scott University of Maryland April 27, 2006 This project was supported by Grant No. 2002-DT-CX-0001 awarded by the National Institute of Justice, Office of Justice Programs, U.S. Department of Justice. Points of view in this document are those of the authors and do not necessarily represent the official position or policies of the U.S. Department of Justice. TABLE OF CONTENTS Excutive Summary.................................................................................................. 1 Building a Global Terrorism Database ................................................................... 4 The Original PGIS Database.......................................................................... 6 Methods..................................................................................................................