Terrorism Bibliography

Total Page:16

File Type:pdf, Size:1020Kb

Terrorism Bibliography ARCHIVED - Archiving Content ARCHIVÉE - Contenu archivé Archived Content Contenu archivé Information identified as archived is provided for L’information dont il est indiqué qu’elle est archivée reference, research or recordkeeping purposes. It est fournie à des fins de référence, de recherche is not subject to the Government of Canada Web ou de tenue de documents. Elle n’est pas Standards and has not been altered or updated assujettie aux normes Web du gouvernement du since it was archived. Please contact us to request Canada et elle n’a pas été modifiée ou mise à jour a format other than those available. depuis son archivage. Pour obtenir cette information dans un autre format, veuillez communiquer avec nous. This document is archival in nature and is intended Le présent document a une valeur archivistique et for those who wish to consult archival documents fait partie des documents d’archives rendus made available from the collection of Public Safety disponibles par Sécurité publique Canada à ceux Canada. qui souhaitent consulter ces documents issus de sa collection. Some of these documents are available in only one official language. Translation, to be provided Certains de ces documents ne sont disponibles by Public Safety Canada, is available upon que dans une langue officielle. Sécurité publique request. Canada fournira une traduction sur demande. ÉOUNTER - TERRORISM BIBLIOGRAPHY No 1988 - 14 Solicitor General Canada Ministry Secretariat f e-, A. Us; D.'\ c' L. , •' Q. e.. CL> "•-: ' -• C et 41) (:) Q.) t ,%« 1 rjZ.) -1.,-,, c:›,,è..-- cz.,.... .. J BRUCE gEANLANDS & . Q., , ,,, , if? e g -.'e, --tz›---- 6 e/ :)) k'z -t, , AND a '11e --(z. Ig88 JAMES DEACON L.. ....„ ., r zz-.-. J • co L- -2.) 1 POLICE RESEARCH AND DEMONSTRATION DIVISION, , .,!,_.::' -c "a ''s• -kz.--, POLICE AND SECURITY BRANCH .str 1_9 `Q.) ezb ny .... 1::' . '-e- -. cb -(4., .e. •te lz:, 4 c...,ér)41 ....i),---% .,., -,:,-..5-_1.-ti —. Q.)-e' cl- ei Q?c. ,,-0c,,,, À ---' « -6,T 1 à COUNTER - TERRORISM BIBLIOGRAPHY, 1 No 1988 - 14 This bibliography, prepared in 1988, is made available as submitted to the Ministry. The views expressed are those of the authors and are not necessarily those of the Ministry of the Solicitor General of Canada. This bibliography is available in French. Cette bibliographie est disponible en français. 1 Table of Contents Chapter Page INTRODUCTION SECTION I OVERVIEW 2 General 3 International 15 By Nation/Region 18 II DIPLOMACY 30 General 31 By Nation/Region 32 III LEGAL APPROACHES 35 General 36 International 40 By Nation/Region 49 IV INTELLIGENCE APPROACHES 58 General 59 By Nation/Region 63 V LAW ENFORCEMENT APPROACHES 76 General 77 International 79 By Nation/Region 80 VI MILITARY APPROACHES 84 General 85 International 88 By Nation 88 VII RESEARCH METHODOLOGY 94 General 95 VIII POLITIC S/PHILOS OHPY 99 General 100 International 103 By Nation/Region 109 By Terrorist Organization 152 1 IX MEDIA 167 General 168 International 177 By Nation/Region 178 X PSYHOLOGY/SOCIAL PSYCHOLOGY 182 General 183 By Terrorist Organization 192 XI TRENDS/TACTICS OF TERRORISM 195 General 196 International 204 By Nation/Region 209 By Terrorist Organization 221 SECTION II XII OVERVIEW 227 General 228 Technology/Information - Communication Services 231 Private Citizens/Corporations 231 Tactic/Threat 233 Private Property/Corporation/Individual 233 Military 234 Transportation Facilities 235 Technology/Information - Communication Services 235 Diplomats/Embassies/Politicians 235 Response/Prevention 236 Transportation Facilities 236 Technology/Information - Communication Services 238 Diplomats/Embassies/Politicians 239 Police/Law Enforcement 240 Military 241 Private Citizens/Corporations 242 XIII INTELLIGENCE/COUNTERINTELLIGENCE 246 General 247 International 250 Tactic/Threat 250 ComputersfTechnology 252 Response/Prevention 252 Military 255 XIV INTERROGATION 256 General 257 Response/Prevention 258 XV PHYSICAL SECURITY 263 General 264 XVI ARMED ATTACK/EMBASSY SEIZURE 268 General 269 Tactic/Threat 269 Response/Prevention 270 XVII ASSASSINATION 271 General 272 Tactic/Threat 273 Response/Prevention 274 XVIII BIOLOGICAL AND CHEMICAL AGENTS 275 General 276 Tactic/Threat 276 Response/Prevention 277 Police/Law Enforcement 278 XIX EXPLOSIVES 279 General 280 Tactic/Threat 281 Transportation Facilities 282 Response/Prevention 282 XX HIJACKING 284 General 285 Tactic/Threat 289 Response/Prevention 289 XXI HOSTAGE - TAKING 293 General 294 Tactic/Threat 297 Diplomats/Embassies/Politicians 297 Response/Prevention 297 Diplomats/Embassies/Politicians 301 Police/Law Enforcement 302 Private Citizens/Corporations 303 XXII KIDNAPPING 304 General 305 Tactic/Threat 306 Private Property/Corporations/Individuals 306 Diplomats/Embassies/Politicians 306 Response/Prevention 306 Diplomats/Embassies/Politicians 307 Private Citizens/Corporations/Individuals 308 XXIII NUCLEAR TERRORISM 309 General 310 Tactic/Threat 313 Response/Prevention 316 XXIV RISK ASSESSMENT 318 General 319 XXV CRISIS MANAGEMENT 321 General 322 APPENDIX A 327 APPENDIX B 331 APPENDIX C 333 APPENDIX D 338 Nation / Region Index 356 i INTRODUCTION This bibliography is a guide to publically available material of value to those interested in the area of counter-terrorism. For the purpose of this document, counter-terrorism includes efforts to control and prevent terrorism at the policy and the operational levels. The material in the bibliography deals with issues respecting national and international developments in counter-terrorism policy, and with the operations and threats faced by counter-terrorism establishments. Also included are references discussing the ideologies of terrorist groups and their sponsor states, along with treatments of the psychological and social characteristics which define terrorists, terrorist groups and the contexts within which terrorists operate. References have been entered on computer diskettes to facilitate updating of the bibliography. The location of a source, the headings under which it is listed, its year of publication, author, title, or any combination of these may be searched. The bibliography is divided into two sections. SECTION I deals with general approaches and issues concerning counter-terrorism, where SECTION II focuses on the tactical variations of terrorism, their control, and prevention. Each section has a number of primary headings, with each primary heading forming one chapter. Within each primary heading, there is a subdivision into secondary headings and, if warranted, into nation/region or tertiary headings. Every reference is coded numerically and entered into the database with a specific set of codes defining its place in the bibliography. The coding format is displayed in Appendix A. The subdivision within each chapter reflects a narrowing of focus as the material becomes more oriented to substantive concerns. The secondary headings General, By Nation/Region, International, and By Terrorist Organization are used in Section I. The General heading refers to material that maintains a broad, sometimes abstract discussion in the area covered by the primary heading. The headings International and By Nation/Region indicate material pertaining to the international forum or to a specific nation-state or region, respectively. Where the secondary heading is By Nation/Region, a further subdivision occurs with the listing of which nation or region is being discussed. The Section I secondary heading, By Terrorist Organization, is only connected with the primary headings Political Conflict/Philosophy, Psychology/Social Psychology and Trends/Tactics of Terrorism. These three primary.headings are the only ones which contain material relating to terrorist groups. When the By Nation/Region heading is used, a code is supplied to specify the nation or area or origin of the terrorist group. These are typical examples of codes for a Section I reference: Police Approaches [50] - By Nation/Region [30] - Canada [112], or Trends/Tactics of Terrorism [110] - By Terrorist Organization [40] - Great Britain [132]. The subdivision by secondary headings in Section II includes the General heading (which has the same purpose here as it does in Section I), and the headings Tactic/Threat and Response/Prevention. These last two headings take material pertaining to a Section II primary heading, such as Hijacking, and allocate each reference according to whether it discusses the nature of the threat posed or the control options ii available to the agencies dealing with the threat. Tertiary headings are used in Section II to specify the target of the threat or the particular agency responding to the threat. These tertiary headings, as do the By Nation/Region headings in Section I, represent the final level of narrowing of focus in the bibliography. For example, a reference relating to police procedures in cases of hijacking is coded as follows: Hijacking [250] - Response/Prevention [60] - Police/Law Enforcement [70]. For the most part, the content of the bibliography is restricted to material published after 1975. In the case of notable works or where there is a lack of recent material in a certain area, references published before 1975 are included. This bibliography does not incorporate newspaper or magazine articles, policy statements or speeches (with rare exceptions). References were selected in three manners. The first method entailed using Library of Congress subject headings
Recommended publications
  • Big Brother Canada
    Toronto - T 416.967.1174 F 416.960.0971 Montréal - T 514.525.1133 F 514.525.1355 Vancouver - T 604.422.6422 F 604.422.6521 HUGE REACH! 13.4 MILLION viewers 21 MILLION page views, BigBrotherCanada.ca 1.3 MILLION unique visitors, BigBrotherCanada.ca 1.6 MILLION live hours streamed 2.6 MILLION media impressions 2.1 THOUSAND press stories published SEASON 3. Source: Numeris PPM Data, Jan 5 – May 31/15 – confirmed data, Total Canada, based on 3+ airings, * based on Ind 2+ CumRch(000) SEASON 3. Adobe Site Catalyst, March 16, 2015 to June 3, 2015 Adobe Site Catalyst, March 16, 2015 to June 3, 2015 ENORMOUS ENGAGEMENT! 697,000 votes cast, BigBrotherCanada.ca 73,000 registered users, BigBrotherCanada.ca 759,676 #BBCAN3 Twitter mentions SEASON 3. Secret Location, March 23, 2015 to June 3, 2015 SEASON 3. March 19 – May 27 2015 AWARD WINNING! Winner of Best Cross Platform Project – Non Fiction! 2015 Canadian Screen Awards Winner of Best Production Design or Art Direction Non- Fiction! 2015 Canadian Screen Awards Worldwide winner of Best Series, Best Twist, Best Moment! 2014 BBSPY Fan Awards The Viewers Lounge, General Segment, n = 371, 164 http://181.224.147.207/~insigh75/wordpress/awards/ http://www.bbspy.co.uk/bbau/features/0105/bbspy-big-brother-awards-2014-international-winners-canada-usa-australia/6 GET INVOLVED! Work with Big Brother Canada Season 4 to create custom branded content, and take advantage the show’s massive and highly engaged audiences across all platforms! Thought starter opportunities include: Custom Challenges Themed Tasks Influence
    [Show full text]
  • Dragon Magazine Within the Last Cherie Knull Tually Has Been with Us Since Last October, Year
    January 1981 Dragon 1 Dragon Vol. V, No. 7 Vol. V, No. 7 January 1981 Publisher. E. Gary Gygax Editor. Jake Jaquet Assistant editor. Kim Mohan Good-bye 1980, hello 1981. And hello to a tain aspects of role-playing and the benefits Editorial staff . Bryce Knorr couple of new (and pretty, I might add, if I derived therefrom. He and his wife, who is Marilyn Mays won’t get accused of sexism) faces here at the typist and a behind-the-scenes collab- Sales & Circulation . Debbie Chiusano Dragon Publishing. New, or at least rela- orator, have been responsible for more Corey Koebernick tively new, to our sales and circulation de- than a dozen short articles and stories pub- Office staff . Dawn Pekul partment is Debbie Chiusano—Debbie ac- lished in Dragon magazine within the last Cherie Knull tually has been with us since last October, year. Roger’s name is on the alchemist and Roger Raupp but this has been our first opportunity to astrologer NPC articles in this issue, and in Contributing editors . Roger Moore formally welcome her in print. The most Dragon issue #44 he became the first Ed Greenwood recent addition to our organization is author to have two creatures featured in Marilyn Mays, added just last month to our Dragon’s Bestiary in the same magazine. editorial staff. Let’s hear it for the new kids This month’s contributing artists: on the block! With the start of a new year, it seems appro- Morrissey Jeff Lanners priate to reflect a bit on the past year and Roger Raupp Kenneth Rahman We’re also happy to welcome two other look ahead a little to the future.
    [Show full text]
  • The Ethics of Intelligence Collection Ross W. Bellaby
    What’s the Harm? The Ethics of Intelligence Collection Ross W. Bellaby Thesis submitted in fulfilment of the requirements for the degree of PhD Department of International Politics Aberystwyth University June 13th, 2011 DECLARATION This work has not previously been accepted in substance for any degree and is not being concurrently submitted in candidature for any degree. Signed ...................................................................... (Ross W. Bellaby) Date ........................................................................ STATEMENT 1 This thesis is the result of my own investigations, except where otherwise stated. Where *correction services have been used, the extent and nature of the correction is clearly marked in a footnote(s). Other sources are acknowledged by footnotes giving explicit references. A bibliography is appended. Signed ..................................................................... (Ross W. Bellaby) Date ........................................................................ [*this refers to the extent to which the text has been corrected by others] STATEMENT 2 I hereby give consent for my thesis, if accepted, to be available for photocopying and for inter- library loan, and for the title and summary to be made available to outside organisations. Signed ..................................................................... (Ross W. Bellaby) Date ........................................................................ I hereby give consent for my thesis, if accepted, to be available for photocopying
    [Show full text]
  • Darpa Starts Sleuthing out Disloyal Troops
    UNCLASSIFIED (U) FBI Tampa Division CI Strategic Partnership Newsletter JANUARY 2012 (U) Administrative Note: This product reflects the views of the FBI- Tampa Division and has not been vetted by FBI Headquarters. (U) Handling notice: Although UNCLASSIFIED, this information is property of the FBI and may be distributed only to members of organizations receiving this bulletin, or to cleared defense contractors. Precautions should be taken to ensure this information is stored and/or destroyed in a manner that precludes unauthorized access. 10 JAN 2012 (U) The FBI Tampa Division Counterintelligence Strategic Partnership Newsletter provides a summary of previously reported US government press releases, publications, and news articles from wire services and news organizations relating to counterintelligence, cyber and terrorism threats. The information in this bulletin represents the views and opinions of the cited sources for each article, and the analyst comment is intended only to highlight items of interest to organizations in Florida. This bulletin is provided solely to inform our Domain partners of news items of interest, and does not represent FBI information. In the JANUARY 2012 Issue: Article Title Page NATIONAL SECURITY THREAT NEWS FROM GOVERNMENT AGENCIES: American Jihadist Terrorism: Combating a Complex Threat p. 2 Authorities Uncover Increasing Number of United States-Based Terror Plots p. 3 Chinese Counterfeit COTS Create Chaos For The DoD p. 4 DHS Releases Cyber Strategy Framework p. 6 COUNTERINTELLIGENCE/ECONOMIC ESPIONAGE THREAT ITEMS FROM THE PRESS: United States Homes In on China Spying p. 6 Opinion: China‟s Spies Are Catching Up p. 8 Canadian Politician‟s Chinese Crush Likely „Sexpionage,‟ Former Spies Say p.
    [Show full text]
  • Covert Networks a Comparative Study Of
    COVERT NETWORKS A COMPARATIVE STUDY OF INTELLIGENCE TECHNIQUES USED BY FOREIGN INTELLIGENCE AGENCIES TO WEAPONIZE SOCIAL MEDIA by Sarah Ogar A thesis submitted to Johns Hopkins University in conformity with the requirements for the degree of Master of Arts Baltimore, Maryland December 2019 2019 Sarah Ogar All Rights Reserved Abstract From the Bolshevik Revolution to the Brexit Vote, the covert world of intelligence has attempted to influence global events with varying degrees of success. In 2016, one of the most brazen manifestations of Russian intelligence operations was directed against millions of Americans when they voted to elect a new president. Although this was not the first time that Russia attempted to influence an American presidential election, it was undoubtedly the largest attempt in terms of its scope and the most publicized to date. Although much discussion has followed the 2016 election, there have not been much concerted historical analysis which situates the events of 2016 within the global timeline of foreign intelligence collection. This paper argues that the onset of social media has altered intelligence collection in terms of its form, but not in terms of its essence. Using the case study method, this paper illustrates how three different nations apply classical intelligence techniques to the modern environment of social media. This paper examines how China has utilized classical agent recruitment techniques through sites like LinkedIn, how Iran has used classical honey trap techniques through a combination of social media sites, and how Russia has employed the classical tactics of kompromat, forgery, agents of influence and front groups in its modern covert influence campaigns.
    [Show full text]
  • Phantom Effects Freakshow P.16
    1 October 15 – 29, 2015 A FREE PAPER FOR THE PEOPLE WHO FIND THEMSELVES IN THE ANNAPOLIS VALLEY October 15 – 29, 2015 | Issue No. 12.21 ARTS CULTURE COMMUNITY You're holding one of 5700 copies PHANTOM EFFECTS FREAKSHOW P.16 REDRESS PROJECT P.3 COME FROM AWAY P.12 PRIVET HOUSE P.14 FESTIVE CARDS P.17 HARVEST PRIDE EVENTS P.19 DEEP ROOTS REVIEW P.19 ROMÉO DALLAIRE P.23 ••••••• SARA POUND CD RELEASE P.27 ••• PAGE 2 REG 2 October 15 – 29, 2015 ON THE COVER Phantom Effects teams up with Stirling Fruit Farms to create a creepy haunted house experi- ence for the Annapolis Valley. Visit them in Wolfville and show support for the IWK Foundation. 2,000 Bonus reward miles. To apply, visit us at: Wolfville Branch, That’s two tickets! 424 Main St. BMO® AIR MILES®† World MasterCard®* Stop waiting. Start doing. Le Caveau is now taking bookings for private functions; book our dining room for your private party! Contact Beatrice at 902-542-7177 or send an email to [email protected] The Grapevine is looking for someone who WANTED is enthusiastic and community-minded for an ad sales position. Interested applicants are asked to email for a full job description. Grapevine Delivery INFO: [email protected] TeamDELIVERERS Members NEEDED FOR: Coldbrook, New Minas, & Grand Pré INFO: [email protected] Public After-School Program Mon-Fri 2:45 - 5:00pm Grades K - 8 / $15 per day For details: www.bookerschool.ca / 902.585.5000 FEATURES 3 October 15 – 29, 2015 REDress Project Genevieve Allen Hearn bone-chilling and deeply sorrowful.
    [Show full text]
  • Evicted Trio Dish on Big Brother All-Stars Big Brother
    10/4/2020 Evicted trio dish on Big Brother All-Stars - globaltv Big Brother Episodes & Clips News Cast About BACK Evicted Trio Dish On Big Brother All-Stars Posted By: John Powell | October 2, 2020 By John Powell – GlobalTV.com ADVERTISEMENT Ad Choices https://www.globaltv.com/shows/big-brother/articles/evicted-trio-dish-on-big-brother-all-stars/ 1/7 10/4/2020 Evicted trio dish on Big Brother All-Stars - globaltv Big Brother scored a hat trick last night filling three more seats on this year’s jury. Kevin, David and Danielle saw their All-Stars dreams become nightmares as the first-ever triple eviction on Big Brother USA took its toll. For 58 days the trio has battled it out with the remaining six houseguests. Now that they are on the jury who do they think are playing the best? Danielle and Kevin gave us their answers. Danielle: “I would love to see Cody at the end even though he betrayed me but like I said, I am a good sport. I think Cody is playing the best game. I truly do. I think a lot of them need to step it up. I want to see Cody in the end. I really do.” Kevin: “I would like Enzo to get to the end of the game. I wouldn’t be mad at Tyler getting to the end of the game. Even Nicole F making it to the end. Can I say Zingbot, too? (Laughs) Can he make it to the end of the game and win? I don’t know.
    [Show full text]
  • The Glamorization of Espionage in the International Spy Museum
    W&M ScholarWorks Undergraduate Honors Theses Theses, Dissertations, & Master Projects 5-2015 Counter to Intelligence: The Glamorization of Espionage in the International Spy Museum Melanie R. Wiggins College of William and Mary Follow this and additional works at: https://scholarworks.wm.edu/honorstheses Part of the American Film Studies Commons, American Material Culture Commons, American Popular Culture Commons, Other American Studies Commons, and the Sociology of Culture Commons Recommended Citation Wiggins, Melanie R., "Counter to Intelligence: The Glamorization of Espionage in the International Spy Museum" (2015). Undergraduate Honors Theses. Paper 133. https://scholarworks.wm.edu/honorstheses/133 This Honors Thesis is brought to you for free and open access by the Theses, Dissertations, & Master Projects at W&M ScholarWorks. It has been accepted for inclusion in Undergraduate Honors Theses by an authorized administrator of W&M ScholarWorks. For more information, please contact [email protected]. Counter to Intelligence: The Glamorization of Espionage in the International Spy Museum A thesis submitted in partial fulfillment of the requirement for the degree of Bachelor of Arts in American Studies from The College of William and Mary by Melanie Rose Wiggins Accepted for____________________________________________________ (Honors, High Honors, Highest Honors) _________________________________________________________ Alan Braddock, Director _________________________________________________________ Charlie McGovern _________________________________________________________
    [Show full text]
  • Faces of Terrorism in the Age of Globalization: Terrorism from Above and Below
    University of Tennessee, Knoxville TRACE: Tennessee Research and Creative Exchange Sociology Publications and Other Works Sociology 11-7-2008 Faces of Terrorism in the Age of Globalization: Terrorism from Above and Below Asafa Jalata University of Tennessee - Knoxville, [email protected] Follow this and additional works at: https://trace.tennessee.edu/utk_socopubs Part of the African Studies Commons, Other International and Area Studies Commons, Race, Ethnicity and Post-Colonial Studies Commons, and the Sociology Commons Recommended Citation Jalata, Asafa, "Faces of Terrorism in the Age of Globalization: Terrorism from Above and Below" (2008). Sociology Publications and Other Works. https://trace.tennessee.edu/utk_socopubs/3 This Presentation is brought to you for free and open access by the Sociology at TRACE: Tennessee Research and Creative Exchange. It has been accepted for inclusion in Sociology Publications and Other Works by an authorized administrator of TRACE: Tennessee Research and Creative Exchange. For more information, please contact [email protected]. FACES OF TERRORISM IN THE AGE OF GLOBALIZATION: TERRORISM FROM ABOVE AND BELOW Asafa Jalata The University of Tennessee, Knoxville Paper presented at the Oak Ridge Institute for Continued Learning Philosophical Society, November 7, 2008. This paper explains how the intensification of globalization as the modern world system with its ideological intensity of racism and religious extremism and its concomitant advancement in technology and organizational skills has increased the danger of all forms of terrorism. In this world system, the contestation over economic resources and power and the resistance to domination and repression or religious and ideological extremism have increased the occurrence of terrorism from above (i.e.
    [Show full text]
  • Icsc Canadian Shopping Centre Awards Canada Proud 2016 Winners
    ICSC CANADIAN SHOPPING CENTRE AWARDS CANADA PROUD 2016 WINNERS Exploring new retail frontiers. MARKETING ADVERTISING CENTRES 150,000 TO 400,000 SQ. FT. CENTRES 400,000 TO 750,000 SQ. FT. OF TOTAL RETAIL SPACE OF TOTAL RETAIL SPACE SILVER SILVER Always Trending Happy Shopping! Holt Renfrew Centre White Oaks Mall Toronto, Ontario London, Ontario Owner: Owner: Pensionfund Realty, Ltd. Prime Canadian Fund Management Company: Management Company: Morguard Bentall Kennedy (Canada) Limited Partnership Toronto’s Holt Renfrew Centre earns Maple Leaf Silver for It’s Maple Leaf Silver for London, Ontario’s White Oaks Mall. its ‘Always Trending’ campaign. The multifaceted branding Their ‘Happy Shopping!’ campaign used a series of humourous campaign featured stunning images of each season’s latest, and light-hearted taglines to promote centre promotions and a on-trend merchandise extensively communicated across all roster of family-friendly events to drive traffic and sales during traditional marketing and social media platforms. its extensive interior redevelopment project. CENTRES 400,000 TO 750,000 SQ. FT. CENTRES 750,000 TO 1,000,000 SQ. FT. OF TOTAL RETAIL SPACE OF TOTAL RETAIL SPACE GOLD SILVER Only Oakridge In Town Oakridge Centre Pickering Town Centre Vancouver, British Columbia Pickering, Ontario Owner/Management Owner: Company: Ontario Pension Board Ivanhoé Cambridge, Inc. Management Company: Oakridge Centre earns Maple Leaf Gold for its unique 20 Vic Management, Inc. collaboration with the National Art Gallery of Canada. The comprehensive branding campaign used masterpieces from It’s Maple Leaf Silver for Pickering Town Centre’s extensive, the European Art Collection as a stunning backdrop for the multiplatform ‘In Town’ branding campaign.
    [Show full text]
  • A Quarterly of Women's Studies
    WOMEN’S STUDIES LIBRARIAN FEMINIST COLLECTIONS A QUARTERLY OF WOMEN’S STUDIES RESOURCES Volume 31 Numbers 1–2 Winter–Spring 2010 University of Wisconsin System Feminist Collections A Quarterly of Women’s Studies Resources Women’s Studies Librarian University of Wisconsin System 430 Memorial Library 728 State St. Madison, WI 53706 Phone: 608-263-5754 Fax: 608-265-2754 Email: [email protected] Website: http://womenst.library.wisc.edu Editors: Phyllis Holman Weisbard, JoAnne Lehman Cover art: One panel from “Dear Sisters: Referencing Women,” collage installation by Melissa A. Young, displayed for Women’s History Month in Memorial Library, University of Wisconsin–Madison, 2010. Digitally enhanced photo by JoAnne Lehman. Drawings: pp. 30, 43, 47: Miriam Greenwald Cover design and graphic design assistance: Daniel Joe Staff assistance: Elzbieta Beck, Linda Fain, Madelyn Homuth, Heather Shimon, Melissa A. Young Subscriptions: Wisconsin subscriptions: $10.00 (individuals affiliated with the UW System), $20.00 (organizations affili- ated with the UW System), $20.00 (individuals or non-profit women’s programs), $30.00 (institutions). Out-of-state sub- scriptions: $35.00 (individuals & women’s programs in the U.S.), $65.00 (institutions in the U.S.), $50.00 (individuals & women's programs in Canada/Mexico), $80.00 (institutions in Canada/Mexico), $55.00 (individuals & women's programs elsewhere outside the U.S.), $85.00 (institutions elsewhere outside the U.S.) Subscriptions include Feminist Collections, Feminist Periodicals, and New Books on Women, Gender, & Feminism. Wisconsin subscriber amounts include state tax (except UW organizations amount). All subscription rates include postage. Feminist Collections is indexed by Alternative Press Index, Women’s Studies International, and Library, Information Science, & Technology Abstracts.
    [Show full text]
  • Coversheet for Thesis in Sussex Research Online
    A University of Sussex PhD thesis Available online via Sussex Research Online: http://sro.sussex.ac.uk/ This thesis is protected by copyright which belongs to the author. This thesis cannot be reproduced or quoted extensively from without first obtaining permission in writing from the Author The content must not be changed in any way or sold commercially in any format or medium without the formal permission of the Author When referring to this work, full bibliographic details including the author, title, awarding institution and date of the thesis must be given Please visit Sussex Research Online for more information and further details 1 Escaping the Honeytrap Representations and Ramifications of the Female Spy on Television Since 1965 Karen K. Burrows Submitted in fulfillment of the degree of Doctor of Philosophy in Media and Cultural Studies at the University of Sussex, May 2014 3 University of Sussex Karen K. Burrows Escaping the Honeytrap: Representations and Ramifications of the Female Spy on Television Since 1965 Summary My thesis interrogates the changing nature of the espionage genre on Western television since the middle of the Cold War. It uses close textual analysis to read the progressions and regressions in the portrayal of the female spy, analyzing where her representation aligns with the achievements of the feminist movement, where it aligns with popular political culture of the time, and what happens when the two factors diverge. I ask what the female spy represents across the decades and why her image is integral to understanding the portrayal of gender on television. I explore four pairs of television shows from various eras to demonstrate the importance of the female spy to the cultural landscape.
    [Show full text]