Were Timothy Mcveigh and the Unabomber the Only White Terrorists?: Race, Religion, and the Perception of Terrorism
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Terrorism Opinion Piece
THE EVOLVING NATURE OF TERRORISM--------NINE YEARS AFTER THE 9/11 ATTACKS Committee on Homeland Security U.S. House of Representatives 15 September 2010 Written Testimony Submitted by Professor Bruce Hoffman School of Foreign Service, Georgetown University - 2 - Several disquieting trends converged in New York City’s fabled Times Square entertainment district on Saturday evening, May 1st, 2010.1 First, a foreign terrorist group, with a hitherto local agenda and otherwise parochial aims, once more stretched its wings and sought to operate on a broader, more ambitious global canvas. Second, the conventional wisdom, which has long held that the threat to the U.S. was primarily external; involving foreigners coming from overseas to kill Americans in this country as had occurred on September 11th 2001, was once again shattered. Third, the belief that the American ‘‘ melting pot’’ --------our historical capacity to readily absorb new immigrants--------would provide a ‘‘ fire-wall’’ against radicalization and recruitment has fallen by the wayside. Finally, al- Qaeda and its allies have embraced a strategy of attrition that is deliberately designed to overwhelm, distract and exhaust its adversaries. Thus, the Times Square incident, despite initial claims to the contrary, was not a ‘‘ one off’’ event perpetrated by an individual variously described as ‘‘ isolated’’ or a ‘‘ lone wolf’’ but rather is part of an emerging pattern of terrorism that directly threatens the U.S. and presents new and even more formidable challenges to our national security.2 LOCAL GROUPS WITH NEW GLOBAL AMBITIONS IN ALLIANCE WITH OLD ENEMIES This was precisely the message that Faisal Shahzad sought to convey when he appeared before a New York Federal District Court in June 2010. -
Intelligence Security Law Enforcement
The Methods and Value of Behavioral Detection in Retail Michael Rozin, Doug Reynolds, Eric White MR The Threat is Real NY, USA Moscow, Russia Madrid, Spain London, UK Mumbai, India Terrorist Threat Adam Gadahn: 1. Simple Attacks. “ The fact is, the heroic Fort Hood operation opens up a host of new opportunities…“ 2. Act Individually “ We must look to further undermine the West's already-struggling economies with carefully timed-and-targeted attacks on symbols of capitalism which will again shake consumer confidence and stifle spending aspects of the Western Crusader culture….” 3. Don’t Travel Overseas “ And Brother Nidal didn't unnecessarily raise his security profile or waste money better spent on the operation itself by traveling abroad to acquire skills and instructions which could easily be acquired at home, or indeed, deduced by using one's own powers of logic and reasoning…. 4. Choose “Easy” Targets Terrorism Threat in USA • May 20, 2009 - Four Muslim converts were arrested in New York for plotting to bomb two Jewish synagogues and shoot down a military aircraft. The suspects were James Cromitie, David Williams, Onta Williams and Laguerre Payen. • June 1, 2009 – Carlos Bledsoe aka., “Abdul Muhammad” carried out a deadly shooting at a recruiting station in Little Rock, Arkansas. One soldier was killed and one was injured. • July 28, 2009 – The FBI arrested seven men in North Carolina as a part of a terrorist conspiracy to wage an Islamic holy war overseas. All seven had received paramilitary training within the US. • September 19, 2009 – Authorities arrested Najibullah Zazi on terrorism charges. -
Federal Complaint Filed Against Jared Lee Loughner
Office of the United States Attorney, Dennis K. Burke District of Arizona MEDIA ADVISORY Public Affairs Sunday, January 09, 2011 MANNY TARANGO Telephone: (602) 514-7456 Cell: (602) 799-8322 Federal Complaint Filed Against Jared Lee Loughner PHOENIX - The United States Attorney for the District of Arizona, Dennis K. Burke, announced today that his office filed a federal complaint against Jared Lee Loughner. The complaint was signed by Magistrate Judge Michelle Burns in Phoenix. Loughner is suspected of shooting U.S. Representative Gabrielle Giffords, Chief Judge John Roll, Giffords' staff member Gabriel Zimmerman and approximately 16 others Saturday in Tucson. The federal complaint alleges five counts against Loughner: COUNT 1 On or about January 8, 2011, at or near Tucson, in the District of Arizona, the defendant, JARED LEE LOUGHNER, did attempt to kill Gabrielle Giffords, a Member of Congress; in violation of Title 18, United States Code Section 351(c). COUNT 2 On or about January 8, 2011, at or near Tucson, in the District of Arizona, the defendant, JARED LEE LOUGHNER, did unlawfully kill Gabriel Zimmerman, an employee of the United States who was engaged in performance of official duties and who was assisting Member of Congress Gabrielle Giffords while she was engaged in performance of official duties; in violation of Title 18, United States Code, Sections 1114 and 1111. COUNT 3 On or about January 8, 2011, at or near Tucson, in the District of Arizona, the defendant, JARED LEE LOUGHNER, did unlawfully kill John M. Roll, a United States District Court Judge for the District of Arizona, an employee of the United States who was engaged in performance of official duties; in violation of Title 18, United States Code, Sections 1114 and 1111. -
In Defense of Cyberterrorism: an Argument for Anticipating Cyber-Attacks
IN DEFENSE OF CYBERTERRORISM: AN ARGUMENT FOR ANTICIPATING CYBER-ATTACKS Susan W. Brenner Marc D. Goodman The September 11, 2001, terrorist attacks on the United States brought the notion of terrorism as a clear and present danger into the consciousness of the American people. In order to predict what might follow these shocking attacks, it is necessary to examine the ideologies and motives of their perpetrators, and the methodologies that terrorists utilize. The focus of this article is on how Al-Qa'ida and other Islamic fundamentalist groups can use cyberspace and technology to continue to wage war againstthe United States, its allies and its foreign interests. Contending that cyberspace will become an increasingly essential terrorist tool, the author examines four key issues surrounding cyberterrorism. The first is a survey of conventional methods of "physical" terrorism, and their inherent shortcomings. Next, a discussion of cyberspace reveals its potential advantages as a secure, borderless, anonymous, and structured delivery method for terrorism. Third, the author offers several cyberterrorism scenarios. Relating several examples of both actual and potential syntactic and semantic attacks, instigated individually or in combination, the author conveys their damagingpolitical and economic impact. Finally, the author addresses the inevitable inquiry into why cyberspace has not been used to its full potential by would-be terrorists. Separately considering foreign and domestic terrorists, it becomes evident that the aims of terrorists must shift from the gross infliction of panic, death and destruction to the crippling of key information systems before cyberattacks will take precedence over physical attacks. However, given that terrorist groups such as Al Qa'ida are highly intelligent, well-funded, and globally coordinated, the possibility of attacks via cyberspace should make America increasingly vigilant. -
In the Aftermath of Rampage Shootings: Is Healing Possible? Hard Lessons from the Red Lake Band of Chippewa Indians and Other Indigenous Peoples
ARTICLE In the Aftermath of Rampage Shootings: Is Healing Possible? Hard Lessons from the Red Lake Band of Chippewa Indians and Other Indigenous Peoples JAMES D. DIAMOND* ABSTRACT This Article produces insights, ideas, and findings which link mass shootings and communal responses in the United States and on American Indian reservations. This Article compares the aftermath of these tragedies in non-indigenous communities with the responses when the tragedies have occurred in certain Native American1 commun- ities, including comparisons between indigenous and non-indigenous courts. It looks to the roots of the Native American approach in indigenous historical evidence. Described is an institutional weakness in the Anglo-European judicial model in how it responds to the aftermath of heinous crimes. Explored is the adaptation of certain practices from in- digenous peoples as a method of contributing to healing, closure, and reconciliation fol- lowing heinous criminal behavior. Further explored is the possibility of incorporating face-to-face, interpersonal interactions between mass shooting victims, offenders, and their families. TABLE OF CONTENTS INTRODUCTION .......................................... 103 I. THE CRISIS OF RAMPAGE SHOOTINGS IN THE UNITED STATES . 106 A. Rampage Shootings in the School Setting: Two Non-Indigenous Cases.......................................... 107 * Dean of Academic Affairs, National Tribal Trial College; former Director of the Trial Justice Clinic at the James E. Rogers College of Law Indigenous Peoples Law and Policy Program. S.J.D., University of Arizona James E. Rogers College of Law; J.D., Brooklyn Law School; B.A., University at Albany (S.U.N.Y.). © 2019, James D. Diamond. Portions of this Article are an extension of my dissertation. -
UNIVERSITY of CALIFORNIA RIVERSIDE Los Angeles and the 1984 Olympic Games
UNIVERSITY OF CALIFORNIA RIVERSIDE Los Angeles and the 1984 Olympic Games: Cultural Commodification, Corporate Sponsorship, and the Cold War A Dissertation submitted in partial satisfaction of the requirements for the degree of Doctor of Philosophy in History by Josh R. Lieser December 2014 Dissertation Committee: Dr. Catherine Gudis, Chairperson Dr. Molly McGarry Dr. Kiril Tomoff Copyright by Josh R. Lieser 2014 The Dissertation of Josh R. Lieser is approved: Committee Chairperson University of California, Riverside ABSTRACT OF THE DISSERTATION Los Angeles and the 1984 Olympic Games: Cultural Commodification, Corporate Sponsorship, and the Cold War by Josh R. Lieser Doctor of Philosophy, Graduate Program in History University of California, Riverside, December 2014 Dr. Catherine Gudis, Chairperson The 1984 Olympics offer an unprecedented opportunity to consider the way that sports were used as cultural and ideological warfare or soft power in the late stages of the Cold War era. Despite the Soviet Union’s decision to boycott the Olympics in Los Angeles in 1984, the 1984 Los Angeles Olympics were a claimed “victory” by President Ronald Reagan in the Cultural Cold War between the United States and the Soviet Union. Los Angeles won the right to host the games, and was a politically prudent choice for the United States within the context of the Cultural Cold War. The complicated history of Los Angeles and its constructed post-WWII identity are important elements to the choice of Los Angeles as host city. The Soviet boycott of the 1984 Olympic Games by the Soviet Union is central to the buildup to 1984, but due to the financial success of the Games the Soviet absence was not the crisis that many predicted. -
Military Guide to Terrorism in the Twenty-First Century
US Army TRADOC TRADOC G2 Handbook No. 1 AA MilitaryMilitary GuideGuide toto TerrorismTerrorism in the Twenty-First Century US Army Training and Doctrine Command TRADOC G2 TRADOC Intelligence Support Activity - Threats Fort Leavenworth, Kansas 15 August 2007 DISTRIBUTION RESTRICTION: Approved for Public Release; Distribution Unlimited. 1 Summary of Change U.S. Army TRADOC G2 Handbook No. 1 (Version 5.0) A Military Guide to Terrorism in the Twenty-First Century Specifically, this handbook dated 15 August 2007 • Provides an information update since the DCSINT Handbook No. 1, A Military Guide to Terrorism in the Twenty-First Century, publication dated 10 August 2006 (Version 4.0). • References the U.S. Department of State, Office of the Coordinator for Counterterrorism, Country Reports on Terrorism 2006 dated April 2007. • References the National Counterterrorism Center (NCTC), Reports on Terrorist Incidents - 2006, dated 30 April 2007. • Deletes Appendix A, Terrorist Threat to Combatant Commands. By country assessments are available in U.S. Department of State, Office of the Coordinator for Counterterrorism, Country Reports on Terrorism 2006 dated April 2007. • Deletes Appendix C, Terrorist Operations and Tactics. These topics are covered in chapter 4 of the 2007 handbook. Emerging patterns and trends are addressed in chapter 5 of the 2007 handbook. • Deletes Appendix F, Weapons of Mass Destruction. See TRADOC G2 Handbook No.1.04. • Refers to updated 2007 Supplemental TRADOC G2 Handbook No.1.01, Terror Operations: Case Studies in Terror, dated 25 July 2007. • Refers to Supplemental DCSINT Handbook No. 1.02, Critical Infrastructure Threats and Terrorism, dated 10 August 2006. • Refers to Supplemental DCSINT Handbook No. -
Across the Universe? a Comparative Analysis of Violent Behavior And
The author(s) shown below used Federal funds provided by the U.S. Department of Justice and prepared the following final report: Document Title: Across the Universe? A Comparative Analysis of Violent Behavior and Radicalization Across Three Offender Types with Implications for Criminal Justice Training and Education Author(s): John G. Horgan, Ph.D., Paul Gill, Ph.D., Noemie Bouhana, Ph.D., James Silver, J.D., Ph.D., Emily Corner, MSc. Document No.: 249937 Date Received: June 2016 Award Number: 2013-ZA-BX-0002 This report has not been published by the U.S. Department of Justice. To provide better customer service, NCJRS has made this federally funded grant report available electronically. Opinions or points of view expressed are those of the author(s) and do not necessarily reflect the official position or policies of the U.S. Department of Justice. Across the Universe? A Comparative Analysis of Violent Behavior and Radicalization Across Three Offender Types with Implications for Criminal Justice Training and Education Final Report John G. Horgan, PhD Georgia State University Paul Gill, PhD University College, London Noemie Bouhana, PhD University College, London James Silver, JD, PhD Worcester State University Emily Corner, MSc University College, London This project was supported by Award No. 2013-ZA-BX-0002, awarded by the National Institute of Justice, Office of Justice Programs, U.S. Department of Justice. The opinions, findings, and conclusions or recommendations expressed in this publication are those of the authors and do not necessarily reflect those of the Department of Justice 1 ABOUT THE REPORT ABOUT THE PROJECT The content of this report was produced by John Horgan (Principal Investigator (PI)), Paul Gill (Co-PI), James Silver (Project Manager), Noemie Bouhana (Co- Investigator), and Emily Corner (Research Assistant). -
Daesh/IS Armored Vehicle Borne Improvised Explosive Devices (Avbieds): Insurgent Use and Terrorism Potentials
Claremont Colleges Scholarship @ Claremont CGU Faculty Publications and Research CGU Faculty Scholarship 2-2-2016 Daesh/IS Armored Vehicle Borne Improvised Explosive Devices (AVBIEDs): Insurgent Use and Terrorism Potentials. Robert J. Bunker Claremont Graduate University Recommended Citation Bunker, R. J. (2016, February 02). Daesh/IS Armored Vehicle Borne Improvised Explosive Devices (AVBIEDs): Insurgent Use and Terrorism Potentials. Retrieved February 02, 2016, from TRENDS Research & Advisory, http://trendsinstitution.org/daeshis- armored-vehicle-borne-improvised-explosive-devices-avbieds-insurgent-use-and-terrorism-potentials/ This Blog is brought to you for free and open access by the CGU Faculty Scholarship at Scholarship @ Claremont. It has been accepted for inclusion in CGU Faculty Publications and Research by an authorized administrator of Scholarship @ Claremont. For more information, please contact [email protected]. Robert J. Bunker Non-Resident Fellow, Counter-Terrorism © January 2016 http://trendsinstitution.org/daeshis-armored-vehicle-borne-improvised-explosive-devices-avbieds-insurgent- use-and-terrorism-potentials/ Daesh/IS Armored Vehicle Borne Improvised Explosive Devices (AVBIEDs): Insurgent Use and Terrorism Potentials This essay in the TRENDS terrorism futures series focuses on advanced threats related to vehicle borne improvised explosive devices (VBIEDs). It provides a threat typology of these devices with their evolution into the armored (AVBIED) variant that has now been fielded by Daesh/IS in both Iraq and Syria. A short overview of such insurgent use will be provided as well as a brief discussion of the terrorism potentials of such use if directed against the UAE, Europe, or the United States. VBIED Threat Typology Vehicle borne improvised explosive devices (VBIEDs), or simply vehicle bombs, have existed since the September 1920 deployment of ‘Buda’s Wagon’—an actual horse drawn wagon filled with explosives and scrap metal—at Wall and Broad streets in downtown Manhattan by the anarchist Mario Buda. -
Fngtf BOSTON, MA 02203 HEALTH, EDUCATION, LABOR, and PENSIONS P: 617- 565-3170
ELIZABETH WARREN UNITED STATES SENATE MASSACHUSETTS WASHINGTON, DC 20510-2105 P: 202- 224-4543 COMMITTEES: 2400 JFK FEDERAL BUILDING BANKING, HOUSING, AND URBAN AFFAIRS 15 NEW SUDBURY STREET tlnitfd ~tGtfS ~fnGtf BOSTON, MA 02203 HEALTH, EDUCATION, LABOR, AND PENSIONS P: 617- 565-3170 ARMED SERVICES 1550 MAIN STREET SUITE 406 SPECIAL COMMITTEE ON AGING SPRINGFIELD, MA 01103 P: 413- 788- 2690 www.warren.senate.gov September 4, 2019 The Honorable Mike Pompeo Secretary U.S. Department of State 2201 C Street, NW Washington, DC 20520 Dear Secretary Pompeo: I am writing to request information regarding recent reports that Vice President Mike Pence patronized President Donald Trump's Trump International Golf Links & Hotel Doonbeg while in Ireland - at the "suggestion" of the President. 1 This transaction - another example of what appears to be open corruption in this administration - deepens my concerns about the ongoing ethics issues related to the President's continued financial relationship with the Trump Organization and the abuse of taxpayer funds to enrich the President and his family through their business interests. During his two-day visit in Ireland earlier this week, Vice President Pence stayed at the Trump International Hotel in Doonbeg and "[flew] the hour-or-so into Dublin [on the other side of Ireland] for official meetings," rather than staying at a hotel in Dublin a short drive away.2 The Vice President's chief of staff indicated that the President encouraged the Vice President to stay at his hotel, telling him, "[Y]ou should stay at my place."3 The Vice President's decision to trek across country is "clearly not convenient. -
The Expression of Orientations in Time and Space With
The Expression of Orientations in Time and Space with Flashbacks and Flash-forwards in the Series "Lost" Promotor: Auteur: Prof. Dr. S. Slembrouck Olga Berendeeva Master in de Taal- en Letterkunde Afstudeerrichting: Master Engels Academiejaar 2008-2009 2e examenperiode For My Parents Who are so far But always so close to me Мои родителям, Которые так далеко, Но всегда рядом ii Acknowledgments First of all, I would like to thank Professor Dr. Stefaan Slembrouck for his interest in my work. I am grateful for all the encouragement, help and ideas he gave me throughout the writing. He was the one who helped me to figure out the subject of my work which I am especially thankful for as it has been such a pleasure working on it! Secondly, I want to thank my boyfriend Patrick who shared enthusiasm for my subject, inspired me, and always encouraged me to keep up even when my mood was down. Also my friend Sarah who gave me a feedback on my thesis was a very big help and I am grateful. A special thank you goes to my parents who always believed in me and supported me. Thanks to all the teachers and professors who provided me with the necessary baggage of knowledge which I will now proudly carry through life. iii Foreword In my previous research paper I wrote about film discourse, thus, this time I wanted to continue with it but have something new, some kind of challenge which would interest me. After a conversation with my thesis guide, Professor Slembrouck, we decided to stick on to film discourse but to expand it. -
Marcin Styszyński PRESENT TRENDS AMONG JIHADISTS
XI: 2014 nr 3 Marcin Styszyński PRESENT TRENDS AMONG JIHADISTS AFTER THE ARAB SPRING Post-revolutionary environment The Arab Spring created three main trends in current political Islam. The fi rst fi eld concerns offi cial Muslim parties declaring implementation of some Islamic values in legal, constitutional and social life. They resign from violence and accept politi- cal dialogue and mechanisms such as free elections, referendum or parliamentary activities. The second factor refl ects Salafi preaching and radical ideas preserving conservative traditions from the period of the Prophet Mohammad. Salafi groups are focused on their theological teaching, charity work and popularization of moral values among societies. The third category concerns jihadist organizations that dec- lare violence and fi ght against authorities and societies. They refer to the concept of takfīr (excommunication), which considers the state and the society as a sinful and atheistic group supporting immoral and corrupted governments. Moreover, the idea of takfīr is close to Al-Qaeda activities regarding violent renaissance of historic caliphate and implementation of strict sharia rules. Al-Qaeda also adapts defensive and off ensive sense of jihad to modern political context related to Western policy in the Muslim world. The victory of the Muslim Brotherhood and Salafi groups in parliamentary elections in Egypt and Tunisia in 2011, the presidency of Mohammad Mursi as 26 MARCIN STYSZYŃSKI well as control of main regions in Libya and Syria by extremist militias increased infl uences of radical Islam in post-revolutionary countries.1 However, after three years of the transition process Arab societies have changed their attitude to the crucial values of the Arab revolution such as democra- cy, freedom, liberalism or fi ght against authoritarianism.