An Analysis of Successful and Unsuccessful Terrorist Assassinations: Informing Counterterrorism Through Situational Crime Prevention

Total Page:16

File Type:pdf, Size:1020Kb

An Analysis of Successful and Unsuccessful Terrorist Assassinations: Informing Counterterrorism Through Situational Crime Prevention City University of New York (CUNY) CUNY Academic Works All Dissertations, Theses, and Capstone Projects Dissertations, Theses, and Capstone Projects 2-2018 An Analysis of Successful and Unsuccessful Terrorist Assassinations: Informing Counterterrorism Through Situational Crime Prevention Marissa Mandala The Graduate Center, City University of New York How does access to this work benefit ou?y Let us know! More information about this work at: https://academicworks.cuny.edu/gc_etds/2487 Discover additional works at: https://academicworks.cuny.edu This work is made publicly available by the City University of New York (CUNY). Contact: [email protected] AN ANALYSIS OF SUCCESSFUL AND UNSUCCESSFUL TERRORIST ASSASSINATIONS: INFORMING COUNTERTERRORISM THROUGH SITUATIONAL CRIME PREVENTION by MARISSA MANDALA A dissertation submitted to the Graduate Faculty in Criminal Justice in partial fulfillment of the requirements for the degree of Doctor of Philosophy, The City University of New York 2018 © 2018 MARISSA MANDALA All Rights Reserved ii AN ANALYSIS OF SUCCESSFUL AND UNSUCCESSFUL TERRORIST ASSASSINATIONS: INFORMING COUNTERTERRORISM THROUGH SITUATIONAL CRIME PREVENTION by MARISSA MANDALA This manuscript has been read and accepted for the Graduate Faculty in Criminal Justice in satisfaction of the dissertation requirement for the degree of Doctor of Philosophy. __________________________ ____________________________________ Date Joshua D. Freilich Chair of Examining Committee __________________________ ____________________________________ Date Deborah Koetzle Executive Officer Supervisory Committee: Michael G. Maxfield ____________________________________ Mangai Natarajan ____________________________________ THE CITY UNIVERSITY OF NEW YORK iii ABSTRACT An Analysis of Successful and Unsuccessful Terrorist Assassinations: Informing Counterterrorism Through Situational Crime Prevention by Marissa Mandala Advisor: Professor Joshua D. Freilich This study applies environmental criminology and situational crime prevention (SCP) to study successful and unsuccessful assassinations by terrorists. Using these perspectives, a series of hypotheses were devised to understand the situational factors that contribute to successful compared to unsuccessful assassinations. A random sample of roughly 1,000 successful and 1,000 unsuccessful assassination attacks taking place between 2005 and 2014 was acquired from the Global Terrorism Database (GTD). Open source materials were then consulted to supplement the GTD with the creation of new SCP variables. The hypotheses were tested in a binary logistic regression, and additional regression models were created for 4 specific regions (the Middle East & North Africa, South Asia, Southeast Asia, and Sub Saharan Africa). Results indicate support for the application of SCP and environmental criminology to the study of assassinations by terrorists. Specifically, successful assassinations are associated with guardianship, weapon type, target location, terrorist location, attack intensity, and distance. Findings are largely consistent across the different regions, however, the results from each regional model deviated slightly from the full model, indicating that the impact of certain SCP variables on successful assassinations vary by region. iv ACKNOWLEDGMENTS I express the sincerest gratitude to my committee members for their unwavering confidence in my ideas and abilities throughout every step of this endeavor. To my dissertation chair, Dr. Joshua Freilich, for his invaluable guidance and encouragement, and for believing in this project from day one of its conceptualization. To Dr. Mangai Natarajan for her constructive feedback and for introducing me to the world of environmental criminology and situational crime prevention. To Dr. Michael Maxfield, whose generosity in time and support has been instrumental to my development as a researcher and writer. I am deeply appreciative of Dr. Freda Adler, who saw my potential before I even began my first day of graduate school at Penn. I am immensely thankful for my family, friends, and colleagues for their continued reassurance throughout this seemingly endless and oftentimes stressful journey. Lastly, I have had the privilege of pursuing a doctoral education because of the sacrifices made by my parents. My past, present, and future accomplishments are a direct result of the values and work ethic they have instilled in me. I am eternally grateful for their unconditional love and support. v TABLE OF CONTENTS INTRODUCTION 1 CH. 1: ASSASSINATION BACKGROUND 4 a. Defining Assassination and Terrorism 4 b. History of Assassination 6 a. Origins of Assassination 6 b. Impact of Assassination: Examples 7 c. Links to Terrorism 11 c. Current Assassination Literature 13 CH. 2: THEORETICAL FRAMEWORK 21 a. Environmental Criminology and SCP 21 b. Terrorism and SCP 24 CH. 3: HYPOTHESES 28 a. Capable Guardians 30 b. Weapons 31 c. Targets 34 d. Terrorists 36 e. Attack Intensity 37 f. Distance 38 g. Control Variables 39 CH. 4: DATA 40 a. Data Background 40 b. Dependent Variable, Independent Variables & Control Variables 43 CH. 5: METHODOLOGY 46 a. Research Design 46 b. Univariate & Bivariate Statistics 52 c. Multivariate Analyses 53 CH. 6: RESULTS 56 a. Descriptive Statistics 56 b. Bivariate Statistics 61 c. Multivariate Analyses 66 a. Partial Binary Logistic Regression Models 72 b. Full Binary Logistic Regression Model (All Regions) 78 c. Regional Binary Logistic Regression Models 81 i. Middle East & North Africa 81 ii. South Asia 84 iii. Southeast Asia 89 iv. Sub Saharan Africa 92 d. Results Summary 95 vi CH. 7: DISCUSSION 98 a. Full Model 99 a. Capable Guardianship 99 b. Weapons 101 c. Targets 104 d. Terrorists 107 e. Attack Intensity 109 f. Distance 113 g. Control Variables & Insignificant Variables 114 b. Regional Models 116 a. Middle East & North Africa 117 b. South Asia 120 c. Southeast Asia 122 d. Sub Saharan Africa 123 CH. 8: LIMITATIONS, CONTRIBUTIONS & FUTURE RESEARCH 125 a. Limitations 125 b. Contributions to Literature, Research and Policy 127 CONCLUSION 129 APPENDIX 132 a. Codebook 132 REFERENCES 136 vii LIST OF TABLES AND FIGURES Figure 1 25 Techniques of Situational Prevention 24 Table 1 Hypotheses and Data Source 29 Table 2 Hypotheses and Corresponding Variables 45 Table 3 Descriptive Statistics, 2005-2014 57 Table 4 T-test for Successful Assassinations and Collateral Deaths 61 Table 5 Assassination Chi Square Results, 2005-2014: Multiple Terrorists, Target in Motorcade, Close Proximity, Security Present, Official Target 62 Table 6 Assassination Chi Square Results, 2005-2014: Target Location, Terrorist Location 64 Table 7 Assassination Chi Square Results, 2005-2014: Weapon Type, Others Around 65 Table 8 Assassination Chi Square Results, 2005-2014: Day of the Week 65 Table 9 Correlations Matrix 70 Table 10 Correlations Matrix, Continued 71 Table 11 Linear Regression Multicollinearity Diagnostics 71 Table 12 Collinearity Diagnostics 72 Table 13 Binary Logistic Regression Predicting Success, 2005-2014, All Regions Partial Model (Independent Variables Only) 73 viii Table 14 Binary Logistic Regression Predicting Success, 2005-2014, All Regions Partial Model (Significant Independent Variables + Control Variables) 75 Table 15 Binary Logistic Regression Predicting Success, 2005-2014, All Regions, Full Model 78 Table 16 Binary Logistic Regression Predicting Success, 2005-2014, Middle East & North Africa 82 Table 17 Binary Logistic Regression Predicting Success, 2005-2014, South Asia 85 Table 18 Binary Logistic Regression Predicting Success, 2005-2014, Southeast Asia 89 Table 19 Binary Logistic Regression Predicting Success, 2005-2014, Sub Saharan Africa 92 Table 20 Significant Independent Variables 97 ix INTRODUCTION This dissertation analyzes successful and unsuccessful terrorist assassination incidents through the framework of environmental criminology and situational crime prevention (SCP). It devises a series of hypotheses developed from the prior literature to identify characteristics associated with successful (i.e., the target was killed) assassination outcomes. The main analysis uses a random sample of 1,000 successful and 1,000 unsuccessful assassination incidents between 2005 and 2014 from the Global Terrorism Database (GTD). The hypotheses are tested in a series of binary logistic regression models. Since the GTD provides limited details on assassination events, this dissertation innovatively expands the dataset by utilizing open source material to add new SCP variables that do not currently exist in any terrorism database. This approach allows for an improved and more refined test of the SCP framework compared to if only the GTD variables were relied upon. Importantly, this dissertation tests an additional 12 hypotheses, as opposed to only five hypotheses available from the GTD variables. Studies have successfully employed a similar strategy to examine maritime piracy by reviewing narratives published by the International Maritime Bureau (IMB) to code for SCP variables (Shane & Magnuson, 2014; Shane, Piza, & Mandala, 2015). Mandala and Freilich (2017a) utilize this approach in their analysis of 100 successful and 100 unsuccessful assassinations. This dissertation therefore extends the previous work conducted by Mandala and Freilich (2017a)1. 1 This dissertation extends Mandala and Freilich’s study (2017a) in five important ways. First, this dissertation uses an enhanced sample of roughly 2000 incidents, as opposed to 200, to better detect significant effects. Second,
Recommended publications
  • Travelling Law
    Draft: cite only with authors permission Craig Jones1 Department of Geography, University of British Columbia, Vancouver. Travelling Law Targeted Killing, Lawfare and the Deconstruction of the Battlefield Striking Origins Above the Palestinian village of Beit Sahour on the morning of November 9th 2000 an Israeli Air Force (IAF) helicopter could be heard. Then, an explosion. The Jeep of Hussein Abiyat went up in flames, and with it the senior member of Fatah. The anti-tank missile killed Abiyat and two innocent elderly women. Collateral damage. Later that day, two months after the outbreak of the second Intifada, the Israeli military publically assumed responsibility for the strike: “During an operation initiated by the IDF, in the area of the village of Beit Sahour, missiles were launched from Air Force helicopters towards the vehicle of a senior activist of the Fatah Tanzim. The pilots reported the target was accurately hit. The activist was killed and his deputy, who was with him, was injured."1 The announcement marked the beginning of Israel’s official assassination policy. The justification and legal contention was that Israel had entered what IDF lawyers called “an armed conflict short of war”2 and Israel was thus entitled to target and kill enemy individuals as permitted by the rules of war. Though it might now seem difficult to believe, the European Union and the U.S. condemned the attacks and rejected the Israeli legal justification. British Foreign Secretary Jack Straw claimed that the assassinations were "unlawful, unjustified and self-defeating"3. The E.U. said the policy amounted to "extrajudicial killings", while U.S.
    [Show full text]
  • Volume XV, Issue 1 February 2021 PERSPECTIVES on TERRORISM Volume 15, Issue 1
    ISSN 2334-3745 Volume XV, Issue 1 February 2021 PERSPECTIVES ON TERRORISM Volume 15, Issue 1 Table of Content Welcome from the Editors...............................................................................................................................1 Articles Bringing Religiosity Back In: Critical Reflection on the Explanation of Western Homegrown Religious Terrorism (Part I)............................................................................................................................................2 by Lorne L. Dawson Dying to Live: The “Love to Death” Narrative Driving the Taliban’s Suicide Bombings............................17 by Atal Ahmadzai The Use of Bay’ah by the Main Salafi-Jihadist Groups..................................................................................39 by Carlos Igualada and Javier Yagüe Counter-Terrorism in the Philippines: Review of Key Issues.......................................................................49 by Ronald U. Mendoza, Rommel Jude G. Ong and Dion Lorenz L. Romano Variations on a Theme? Comparing 4chan, 8kun, and other chans’ Far-right “/pol” Boards....................65 by Stephane J. Baele, Lewys Brace, and Travis G. Coan Research Notes Climate Change—Terrorism Nexus? A Preliminary Review/Analysis of the Literature...................................81 by Jeremiah O. Asaka Inventory of 200+ Institutions and Centres in the Field of Terrorism and Counter-Terrorism Research.....93 by Reinier Bergema and Olivia Kearney Resources Counterterrorism Bookshelf: Eight Books
    [Show full text]
  • MHMP 2014 UPDATE PART 3 III Humanrelated
    III. HUMAN-RELATED HAZARDS The following list summarizes the significant human-related hazards covered in this section: 1. Catastrophic Incidents (National Emergencies) 2. Civil Disturbances 3. Nuclear Attack 4. Public Health Emergencies 5. Terrorism and Similar Criminal Activities These hazards all tie in with each other in various ways, and by placing them all in the same section of this document, this updated 2014 edition of the Michigan Hazard Mitigation Plan intends to make it easier for planners and emergency management personnel to learn about and consider the many aspects of these threats, risks, activities, conditions, and incidents. The new hazard section, Catastrophic Incidents (National Emergencies), was primarily inspired by some of the states of alert and response activities that Michigan had to adopt in the past decade for incidents that primarily took place outside of its own borders. The main examples were the 9/11/2001 terrorist attacks (and subsequent anthrax incidents and threats), and the Gulf Coast disaster involving Hurricanes Katrina and Rita in 2005. It makes sense to consider, in advance, these types of incidents as well as other types of large-scale disasters that could occur in the future, which require a large-scale national response even though the actual incident itself may occur only within the borders of a few states outside of Michigan’s immediate environment. Preparedness, planning, exercising, and mutual aid arrangements are the main “mitigation” activities proposed for this hazard during its initial phase of consideration in this 2014 edition of the Michigan Hazard Mitigation Plan. Some catastrophic incidents may involve other types of human-related hazards.
    [Show full text]
  • “A Licenced Troubleshooter” James Bond As Assassin
    “A Licenced Troubleshooter” James Bond as Assassin ROGER PAULY If a pollster were to ask the average person on the street “What does James Bond do?” the response would almost certainly be that he is a spy. his is the most ba! sic defnition of the dashing British literary and "lm hero. But is it accurate? #o Bond$s activities represent spying or something else? %ecent studies have borne fruit by looking at the character of Bond outside of the basic parameters of the “spy” persona. &or example, )atharina *agen +,-./0 analysed Bond as a pirate; while #avid 2egram +,-./0 viewed him through the lens of an extreme athlete. 3f particular interest to this essay is Mathew edesco$s observation5 “6t7here$s no getting around it 8 James Bond is an assassin” +,--9( .,-0. edesco does not e'! plore this point in depth however( since his study is primarily devoted to the moral ethics of killing and torture. &urthermore, his characterisation of James Bond as an assassin is a decided anomaly in Bond scholarship and the spy classi! "cation remains predominant. &or example, Liisa &unnell and )laus #odds refer to Bond as a “British super spy” in a recent work +,-.;( ,.<0. his article will de! velop more fully edesco$s brief identi"cation by directly exploring the historical roots of Bond as an assassin. argeting key individuals for murder is an ancient and well-established el! ement of political and military history( and the Second World War was no e'cep! tion. In his capacity as an intelligence ofcer( Ian &leming had knowledge of ?l! Roger Pauly is /n Asso0i/*e Pro1essor o1 2is*or3 /* *he Uni5ersi*3 o1 ,en*r/l Ar6/ns/s% 2e is mos*ly 6nown 1or his 7or6 on *he his*or3 o1 1ire/rms bu* 4/s /lso wri**en on su('ec*s /s di5erse /s 8/r0us G/r5e39 8/u 8/u9 /n+ Mi- ami Vice% Volume 4 · Issue 1 · Spring 2021 ISSN 2514 21!" DOI$ 10%24"!!&'bs%)" Dis*ribu*ed under ,, -Y 4%0 U.
    [Show full text]
  • Terrorismterrorism
    U.S. FOREIGN POLICY AGENDA VOLUME 6 AN ELECTRONIC JOURNAL OF THE U.S. DEPARTMENT OF STATE NUMBER 3 TERRORISMTERRORISM Threat Assessment, Countermeasures and Policy November 2001 TERRORISM: THREAT ASSESSMENT, COUNTERMEASURES AND POLICY On September the 11th, enemies of freedom committed an act of war against our country. Americans have known wars — but for the past 136 years, they have been wars on foreign soil, except for one Sunday in 1941. Americans have known the casualties of war — but not at the center of a great city on a peaceful morning. Americans have known surprise attacks — but never before on thousands of civilians. All of this was brought upon us in a single day — and night fell on a different world, a world where freedom itself is under attack... This is not, however, just America’s fight. And what is at stake is not just America’s freedom. This is the world’s fight. This is civilization’s fight. This is the fight of all who believe in progress and pluralism, tolerance and freedom. We ask every nation to join us. We will ask, and we will need, the help of police forces, intelligence services, and banking systems around the world. The United States is grateful that many nations and many international organizations have already responded — with sympathy and with support. Nations from Latin America, to Asia, to Africa, to Europe, to the Islamic world. Perhaps the NATO Charter reflects best the attitude of the world: An attack on one is an attack on all. The civilized world is rallying to America’s side.
    [Show full text]
  • THE PREVALENCE of GUILE: Deception Through Time and Across Cultures and Disciplines
    2 February 2007 THE PREVALENCE OF GUILE: Deception through Time and across Cultures and Disciplines by Barton Whaley “The Game is so large that one sees but a little at a time.” —Kipling, Kim (1901), Chapter 10 Foreign Denial & Deception Committee National Intelligence Council Office of the Director of National Intelligence Washington, DC 2007 -ii- CONTENTS Acknowledgments ........................................................................................................... iv INTRODUCTION .......................................................................................................... 1 1. In a Nutshell: What I Expected & What I Found 2. Force versus Guile 3. The Importance of Guile in War, Politics, and Philosophy PART ONE: OF TIME, CULTURES, & DISCIPLINES ................................................. 11 4. Tribal Warfare 5. The Classical West 6. Decline in the Medieval West 7. The Byzantine Style 8. The Scythian Style 9. The Renaissance of Deception 10. Discontinuity: “Progress” and Romanticism in the 19th Century 11. The Chinese Way 12. The Japanese Style 13. India plus Pakistan 14. Arabian to Islamic Culture 15. Twentieth Century Limited 16. Soviet Doctrine 17. American Roller-coaster and the Missing Generation 18. Twenty-First Century Unlimited: Asymmetric Warfare Revisited PART TWO: LIMITATIONS ON THE PRACTICE OF DECEPTION ............................ 58 19. Biological Limitations: Nature & Nurture 20. Cultural Limitations: Philosophies, Religions, & Languages 21. Social Limitations: Ethical Codes and Political
    [Show full text]
  • Palestinian Women: Mothers, Martyrs and Agents of Political Change
    University of Denver Digital Commons @ DU Electronic Theses and Dissertations Graduate Studies 1-1-2011 Palestinian Women: Mothers, Martyrs and Agents of Political Change Rebecca Ann Otis University of Denver Follow this and additional works at: https://digitalcommons.du.edu/etd Part of the Gender and Sexuality Commons, Near and Middle Eastern Studies Commons, and the Politics and Social Change Commons Recommended Citation Otis, Rebecca Ann, "Palestinian Women: Mothers, Martyrs and Agents of Political Change" (2011). Electronic Theses and Dissertations. 491. https://digitalcommons.du.edu/etd/491 This Dissertation is brought to you for free and open access by the Graduate Studies at Digital Commons @ DU. It has been accepted for inclusion in Electronic Theses and Dissertations by an authorized administrator of Digital Commons @ DU. For more information, please contact [email protected],[email protected]. Palestinian Women: Mothers, Martyrs and Agents of Political Change __________ A Dissertation Presented to the Faculty of the Josef Korbel School of International Studies University of Denver __________ In Partial Fulfillment of the Requirements for the Degree Doctor of Philosophy __________ by Rebecca A. Otis June 2011 Advisor: Dr. Martin Rhodes ©Copyright by Rebecca A. Otis 2011 All Rights Reserved Author: Rebecca A. Otis Title: PALESTINIAN WOMEN: MOTHERS, MARTYRS AND AGENTS OF POLITICAL CHANGE Advisor: Dr. Martin Rhodes Degree Date: June 2011 ABSTRACT This dissertation seeks to understand the role of women as political actors in the rise of Islamo-nationalist movement in Palestine. Using a historical and ethnographic approach, it examines the changing opportunity structures available to Palestinian women in the nationalist struggle between 1987 and 2007.
    [Show full text]
  • Interdisciplinary Review for the Humanities
    Interdisciplinary Review for the Humanities Are so-called suicide bombers our “ritual others”? Stamenkovic, Marko. estrema: Interdisciplinary Review for the Humanities 5 [ Fall 2014 ] / Special Issue: Insecurity and Global Terror(s). Edited by Nuno Marques, Igor Furão and Susana Araújo. A project of the Center for Comparative Studies of the University of Lisbon / Special Issue in collaboration with the project City and (In)security in Literature and the Media (CILM). For further information CILM project official website 1 Are so-called suicide bombers our “ritual others”?1 Marko Stamenkovic2 Abstract Within the First World scholarship, the concept of “suicide missions” has occupied an uneasy place in relation to the issues of risk and security for Western neoliberal democracies. As part of colonial humanism, these and related concepts have been contested by mediated (ideological, gendered and racist) perspectives growing within a single, imperial epistemic paradigm. This paper challenges such a paradigm by centering on the most recent neuralgic points surrounding the ‘universalist’ and ‘rationalist’ imaginaries of “suicide terror.” It approaches “suicide bombers” as theoretical figures from an interdisciplinary perspective, focused mainly on contemporary decolonial philosophy and post-Eurocentric social and cultural theories. This paper aims to break away from normative exercises of discursive power through which an ethical interruption of the epistemological becomes my primary task, in particular with regard to the notions of ritual otherness, death-politics, colonial matrix of power, sovereignty, resistance, and self-sacrifice. Keywords: epistemic violence, ‘suicide bombing,’ ritual others, necropolitics, decolonial thinking. 1 STAMENKOVIC, Marko. 2014. “Are so-called suicide bombers our ‘ritual others’?” Special Issue: Insecurity and Global Terror(s), estrema: Interdisciplinary Review for the Humanities 5 (Fall).
    [Show full text]
  • Maritime Terrorism, Piracy and Acts of Armed Robbery of Ships: Southeast Asia and Africa, 2000 – 2008
    MARITIME TERRORISM, PIRACY AND ACTS OF ARMED ROBBERY OF SHIPS: SOUTHEAST ASIA AND AFRICA, 2000 – 2008 by LYDELLE AMELIA JOUBERT Submitted in fulfilment of the requirements for the degree of MASTER OF INTERNATIONAL RELATIONS in the Department of Political Sciences, Faculty of Humanities at the University of Pretoria Study Leader: Professor M. Hough September 2011 © University of Pretoria DEDICATION I dedicate this study to Deon Terblanche. i ACKNOWLEDGEMENTS I would like to thank the following people and organizations for their assistance and contribution towards this study: My supervisor, Professor M. Hough for his support, insight and perspective, and guidance during the study. I felt privileged for this opportunity. The International Maritime Bureau for providing their Annual Reports to me. The Norwegian Council for Africa for access to African Newspaper articles. Mr Eric Frécon for making his book and lectures on pirate groups in Southeast Asia available to me. Ms M. Buys from the University of Pretoria‟s library and Ms J.M. Calitz of the South African Navy Library in Simonstown for assisting me with obtaining research material. Ms W. Martin for her administrative assistance. Deon Terblanche, Janis Peart and Ron Kessler for their help in proof reading. My fiancée, Deon Terblanche for his love and support that made this study possible. God for his blessings and my good health. ii Acronyms 5e RIAOM Fifth Regiment Interarmes d‟Outre-Mer 9/11 11 September 2001 AAIA Aden-Abyan Islamic Army AFRICOM United States African Command AIS Automatic
    [Show full text]
  • PROLOGUE Rethinking Policy and Theory in the New Era of Terrorism
    01- Martin.qxd 2/2/04 3:08 PM Page 1 1 PROLOGUE Rethinking Policy and Theory In the New Era Of Terrorism he events of September 11, 2001 awakened the international community to the reality of mass-casualty violence perpetrated by suicidal terrorists. These T terrorists were motivated by an uncompromisingly sectarian worldview that allowed for the murder of large numbers of innocent civilians in the name of their faith. The attacks confirmed warnings from experts that a new breed of terrorist would transform available technologies into weapons of enormous destructive power. In the United States, the attacks on the Twin Towers and the Pentagon imme- diately engendered a thorough reexamination and enhancement of the nation’s domestic security environment. This process occurred simultaneously with an unprecedented reorganization of government and the passage of sweeping security laws. As these measures fundamentally changed how Americans would respond to future threats of terrorist violence, they also reflected a basic adaptation of policy and theory to a new era of terrorism. Many experts revisited, and continue to revisit, the questions of which policies are best suited to address the new terrorist threat, as well as how to define and characterize terrorism in the new era. The articles in this chapter introduce policy and theoretical questions posed by the events of September 11, 2001. In “Rethinking Terrorism and Counterterrorism Since 9/11,” Bruce Hoffman explores the lessons of the September 11, 2001 terrorist attacks. The article examines the nature of the new era of terrorism, its impact on the contemporary global community, and the problem of adapting counterterrorism to the new environment.
    [Show full text]
  • European Master's Degree in Human Rights and Democratisation Awarded Theses of the Academic Year 2013/2014
    European Master’s Degree In Human Rights and Democratisation Awarded Theses of the Academic Year 2013/2014 “Blasting into fame: female terrorists make a statement.” Thesis by Mihailescu Laura European Master’s Degree in E.MAHuman Rights and Democratisation EIUC gratefully acknowledges the contribution of the European Commission which made this publication possible. © Venice: EIUC, 2015 DOI 10.7404/eiuc.ema.20132014.01 www.eiuc.org European Master’s Degree In Human Rights and Democratisation Awarded Theses of the Academic Year 2013/2014 “Blasting into fame: female terrorists make a statement” Thesis by Mihailescu Laura FOREWORD The European Master’s Programme in Human Rights and Democra­ tisation (E.MA) is the first Master’s course in human rights and democra­ tisation launched and financed by the European Commission that later served as model for establishing other Regional Master’s around the world. Since January 2013 these are all connected and managed by the European Inter­University Centre for Human Rights and Democratisation (EIUC) under the Global Campus of Regional Master’s Programmes (GC). E.MA is a one­year master’s course aimed at preparing professionals to respond to the requirements of daily work in international organi­ sations, field operations, governmental and non­governmental bodies, and academia. The programme offers an action and policy­oriented approach to learning about human rights, democratisation and inter­ national relations from legal, political, historical, anthropological, and philosophical perspectives. This interdisciplinary nature and wide­ranging scope of E.MA reflect the benefits of true European inter­university cooperation in human rights education. It is an inter­ disciplinary programme that reflects the indivisible links between human rights, democracy, peace and development.
    [Show full text]
  • Mifitary I Law Xeview
    I rr ,I Mifitary I Law xeview AMERICAN MILITARY LAW IN THE LIGHT OF THE FIRST MUTINY ACT'S TRICENTENNIAL Colonel Frederick Bernays Wiener, AUS (Retired) THE SIXTH ANNUAL WALDEMAR A. SOLF LECTURE IN INTERNATIONAL LAW. TERRORISM, THE LAW, AND THE NATIONAL DEFENSE Abraham D. Sofaer THE CULTURE OF CHANGE IN MILITARY LAW Eugene R. Fidel1 ANDREW JACKSON, MARTIAL LAW, CMLIAN CONTROL OF THE MILITARY, AND AMERICAN POLITICS: AN INTRIGUING AMALGAM Jonathan Lurie INSTRUCI'IONS AND ADVOCACY Major Michael D. Warren and Lieutenant Colonel W. Gary Jewel1 Volume 126 Fall 1989 Pamphlet HEADQUARTERS DEPARTMENT OF THE ARMY NO. 27-100-126 Washington, D.C., Fall 1989 MILITARY LAW REVIEW-VOL. 126 The Military Law Review has been published quarterly at The Judge Advocate General’s School, US. Army, Charlottesville, Vir- ginia, since 1958. The Review provides a forum for those interested in military law to share the products of their experience and research and is designed for use by military attorneys in connection with their official duties. Writings offered for publication should be of direct concern and import in this area of scholarship, and preference will be given to those writings having lasting value as reference material for the military lawyer. The Review encourages frank discussion of relevant legislative, administrative, and judicial developments. EDITORIAL STAFF MAJOR ALAN D. CHUTE,Editor MS. EVA F. SKINNER, Editorial Assistant SUBSCRIFWONS: Private subscriptions may be purchased from the Superintendent of Documents, United States Government Printing Office, Washington, D.C. 20402. Publication exchange subscriptions are available to law schools and other organizations that publish legal periodicals.
    [Show full text]