The Use of the Internet for Terrorist Purposes

Total Page:16

File Type:pdf, Size:1020Kb

The Use of the Internet for Terrorist Purposes The use of the Internet for terrorist purposes In collaboration with the UNITED NATIONS COUNTER-TERRORISM IMPLEMENTATION TASK FORCE UNITED NATIONS OFFICE ON DRUGS AND CRIME Vienna THE USE OF THE INTERNET FOR TERRORIST PURPOSES UNITED NATIONS New York, 2012 © United Nations, September 2012. All rights reserved. The designations employed and the presentation of material in the present publica- tion do not imply the expression of any opinion whatsoever on the part of the Sec- retariat of the United Nations concerning the legal status of any country, territory, city or area, or of its authorities, or concerning the delimitation of its frontiers or boundaries. Information on uniform resource locators and links to Internet sites contained in the present publication are provided for the convenience of the reader and are cor- rect at the time of issue. The United Nations takes no responsibility for the continued accuracy of that information or for the content of any external website. Publishing production: English, Publishing and Library Section, United Nations Office at Vienna. “The Internet is a prime example of how terrorists can behave in a truly transnational way; in response, States need to think and function in an equally transnational manner.” Ban Ki-moon Secretary-General of the United Nations Foreword Executive Director United Nations Office on Drugs and Crime The use of the Internet for terrorist purposes is a rapidly growing phenomenon, requiring a proactive and coordinated response from Member States. The United Nations Office on Drugs and Crime (UNODC) plays a key role inproviding assistance to Member States, in furtherance of its mandate to strengthen the capacity of national criminal justice systems to implement the provisions of the interna tional legal instruments against terrorism, and does so in compliance with the principles of rule of law and international human rights standards. In particular, in 2011, the General Assembly, in its resolution 66/178, reaffirmed the mandate of UNODC to continue to develop specialized legal knowledge in the area of counter-terrorism and pertinent thematic areas, including the use of the Internet for terrorist purposes. Despite increasing international recognition of the threat posed by terrorists’ use of the Internet in recent years, there is currently no universal instrument specifically address- ing this pervasive facet of terrorist activity. Moreover, there is limited specialized training available on the legal and practical aspects of the investigation and prosecution of ter- rorism cases involving the use of the Internet. The present publication complements the existing resources developed by UNODC in the areas of counter-terrorism, cyber- crime and rule of law. It also addresses the importance of developing integrated, specialized knowledge to respond to the technical assistance needs of Member States in combating this continually evolving threat. UNODC is deeply grateful for the generous support of the Government of the United Kingdom of Great Britain and Northern Ireland, which made the publication of that work possible. The publication, which is intended for use both as a stand-alone resource and in sup- port of the capacity-building initiatives of UNODC, is aimed at providing guidance regarding current legal frameworks and practice at the national and international levels relating to the criminalization, investigation and prosecution of terrorist cases involving the Internet. Terrorism, in all its manifestations, affects us all. The use of the Internet to further terrorist purposes disregards national borders, amplifying the potential impact on victims. By highlighting cases and best practices that respond to this unique challenge, the present publication has two aims: first, to promote a better understanding of the ways in which communications technologies may be misused in furtherance of acts of ter- rorism and, second, to increase collaboration among Member States, so that effective criminal justice responses to this transnational challenge can be developed. Yury Fedotov Executive Director United Nations Office on Drugs and Crime v Secretary-General’s Counter-Terrorism Implementation Task Force The Working Group on Countering the Use of the Internet for Terrorist Purposes of the Counter-Terrorism Implementation Task Force is aimed at coordinating the activities of the United Nations system in support of the United Nations Global Counter- Terrorism Strategy, adopted by the General Assembly in its resolution 60/288, in which Member States resolved to “coordinate efforts at the international and regional levels to counter terrorism in all its forms and manifestations on the Internet” and “use the Internet as a tool for countering the spread of terrorism, while recognizing that States may require assistance in this regard”. The Working Group has identified three key themes for discussion: legal issues, technical issues and ways in which the international community might use the Internet more effectively to counter terrorism by exposing the fallacy of the terrorist message that violence is a legitimate way to effect political change. The present study, produced by the United Nations Office on Drugs and Crime and conducted within the framework of the Working Group, owes much to the contribution and support of Member States. It takes discussion of the legal challenges to the next stage and adds significantly to the knowledge and expertise that the Working Group has accumulated and shared with Member States in that area. In particular, it provides important examples of Member State legislation dealing with terrorist use of the Internet and demonstrates, through real examples of legal cases, the difficulties faced by Member States in criminalizing and prosecuting such acts. The Working Group is confident that the present report will help to identify the legisla- tive areas in which the United Nations can assist in the implementation by Member States of the Global Counter-Terrorism Strategy in combating the use of the Internet for terrorist purposes. Richard Barrett Coordinator of the Analytical Support and Sanctions Monitoring Team Co-Chair of the Counter-Terrorism Implementation Task Force Working Group on Countering the Use of the Internet for Terrorist Purposes vi Government of the United Kingdom The United Kingdom has pioneered legislation to counter use of the Internet for ter- rorist purposes over the past decade; we have had considerable success in tackling online terrorist activity within the country’s borders, while doing our utmost to uphold free- doms and benefits that the Internet has brought to our citizens. However, we recognize that the threat is transnational by its very nature. Only by tak- ing action together can the international community hope to tackle terrorist use of the Internet effectively. The British Government therefore welcomes the opportunity to support UNODC in producing the publication that you are about to read. We hope that it will rapidly become a useful tool for legislators, law enforcement officials and criminal justice practitioners to develop and implement legal frameworks that will effectively disrupt terrorists’ activities online. If so, it will make a valuable contribution to making our communities—both real and virtual—safer places. Simon Shercliff Sue Hemming OBE Head, Counter Terrorism (Ops) Head of the Special Crime and Counter Department Foreign and Terrorism Division Commonwealth Office Crown Prosecution Service vii Contents Page Foreword . v Executive Director United Nations Office on Drugs and Crime ............ v Secretary-General’s Counter-Terrorism Implementation Task Force .......... vi Government of the United Kingdom ................................. vii Background . 1 I . Use of the Internet for terrorist purposes ..................... 3 A. Introduction ............................................ 3 B. Means by which the Internet is utilized for terrorist purposes ..... 3 C. Uses of the Internet for countering terrorist activity ............. 12 D. Rule-of-law considerations ................................. 13 II . The international context . 15 A. Introduction ............................................ 15 B. United Nations counter-terrorism resolutions .................. 16 C. Universal counter-terrorism legal instruments .................. 17 D. International human rights law ............................. 19 E. Regional and subregional counter-terrorism legal instruments ..... 20 F. Model legislation ........................................ 23 III . Policy and legislative frameworks . 27 A. Introduction ............................................ 27 B. Policy ................................................. 27 C. Legislation ............................................. 31 IV . Investigations and intelligence-gathering . 53 A. Tools in the commission of terrorist offences involving the Internet . 53 B. Investigations of terrorist cases involving the Internet ............ 60 ix Page C. Forensic data preservation and recovery ...................... 64 D. Supporting the authentication of digital evidence ............... 67 E. Operational cybercrime units ............................... 68 F. Intelligence-gathering ..................................... 70 G. Training ............................................... 72 V . International cooperation . 73 A. Introduction ............................................ 73 B. Instruments and arrangements relating to international cooperation . 73 C. National legislative
Recommended publications
  • Explanatory Notes
    These notes refer to the Serious Crime Bill [HL] as introduced in the House of Lords on 5th June 2014 [HL Bill 1] SERIOUS CRIME BILL [HL] —————————— EXPLANATORY NOTES INTRODUCTION 1. These Explanatory Notes relate to the Serious Crime Bill [HL] as introduced into the House of Lords on 5th June 2014. They have been prepared by the Home Office in order to assist the reader of the Bill and to help inform debate on it. They do not form part of the Bill and have not been endorsed by Parliament. 2. The Notes need to be read in conjunction with the Bill. They are not, and are not meant to be, a comprehensive description of the Bill. So where a clause or part of a clause does not seem to require any explanation or comment, none is given. 3. A glossary of abbreviations and terms used in these Explanatory Notes is contained in Annex A to these Notes. OVERVIEW 4. Serious and organised crime includes drug trafficking, human trafficking, organised illegal immigration, child sexual exploitation, high value fraud and other financial crime, counterfeiting, organised acquisitive crime and cyber crime. Organised crime costs the United Kingdom at least £24 billion each year. As at December 2013, there are some 36,600 organised criminals in 5,300 groups currently operating in ways that directly affect the UK1. In October 2013, the Government published its Serious and Organised Crime Strategy (Cm 8715)2. The aim of the strategy is to reduce substantially the level of serious and organised crime affecting the UK and its interests.
    [Show full text]
  • Ep Delegation for Relations with the Palestinian
    Delegation for Relations with the Palestinian Legislative Council European Parliament/Palestinian Legislative Council 7th Interparliamentary Meeting East Jerusalem/Ramallah/Gaza/Hebron 29 April -3 May 2007 Report by Mr Kyriacos TRIANTAPHYLLIDES, Chairman of the Delegation CR\671268EN.doc PE 384.740 EN EN I. Introduction The visit of the EP delegation in Palestine was the first official contact between both sides since November 2005. Due to the situation in the region, several attempts to meet earlier had failed. Following the Hamas victory in the legislative elections in January 2006, the EP delegation insisted to meet with the newly elected government of national unity agreed in Mekka in February 2007. The representation of the Commission did not attend the meetings where Ministers from Hamas and the Prime Minister were present. (This is the reasoning for listing participants at the beginning of each meeting report). One week before travelling to Palestine, the Chair, in a meeting on 25 April 2007 with Deputies from the Knesset, announced that the Delegation wished to meet with members of the new government, including Hamas members. The reaction of the Chair of the Knesset delegation was quite positive. It is worth adding that the Israeli authorities were cooperative during the whole visit, especially at the airport in Tel Aviv and on the Gaza border. II. Meetings Monday 30 April 1. Briefing by ECTAO (European Technical Assistance Office for the West Bank and Gaza Strip) on the humanitarian and political situation in the Occupied Palestinian Territories. Location: ECTAO, Jerusalem, 09h00-10h15 Participants: John Kjaer (ECTAO Representative), Roy Dickinson (Head of Operations), Ana Gallo (Head of the Political Section), Mark Gallagher (Head of Section - Economic and Financial Cooperation), Regis Meritan (Head of Section - Infrastructure, Water, Environment, Agriculture and UNRWA), EP Delegation.
    [Show full text]
  • Flashback As a Rhetorical Online Battleground
    http://www.diva-portal.org This is the published version of a paper published in Social Media + Society. Citation for the original published paper (version of record): Blomberg, H., Stier, J. (2019) Flashback as a rhetorical online battleground: Debating the (dis)guise of the Nordic Resistance Movement Social Media + Society https://doi.org/10.1177/2056305118823336 Access to the published version may require subscription. N.B. When citing this work, cite the original published paper. Permanent link to this version: http://urn.kb.se/resolve?urn=urn:nbn:se:du-29134 SMSXXX10.1177/2056305118823336Social Media <span class="symbol" cstyle="Mathematical">+</span> SocietyBlomberg and Stier 823336research-article20192019 Article Social Media + Society January-March 2019: 1 –10 Flashback as a Rhetorical Online © The Author(s) 2019 Article reuse guidelines: sagepub.com/journals-permissions Battleground: Debating the (Dis)guise DOI:https://doi.org/10.1177/2056305118823336 10.1177/2056305118823336 of the Nordic Resistance Movement journals.sagepub.com/home/sms Helena Blomberg1 and Jonas Stier2 Abstract The right-wing Swedish Nordic Resistance Movement (NRM) is increasingly active on social media. Using discursive psychology, this text explores the rhetorical organization of text and rhetorical resources used on the Swedish online forum Flashback. The aim is to reveal and problematize truth claims about NRM made by antagonists and protagonists. Questions are (1) how and what do NRM antagonists and protagonists convey in Flashback posts about NRM, and its ideology and members? (2) how do NRM antagonists and protagonists make truth claims about NRM in Flashback posts? The empirical material consisting of 1546 Flashback posts analyzed to identify typical discussions on “NMR’s true nature”; accomplished social actions stemming from the posts.
    [Show full text]
  • Forze Di Polizia, Forze Armate E Capitanerie Di Porto
    9 dicembre 2020 Censimento permanente delle Istituzioni Pubbliche: Forze di polizia, Forze armate e Capitanerie di porto. Anni 2015 e 2017 I censimenti permanenti della popolazione e delle unità economiche rappresentano un’importante innovazione nell’ambito della statistica ufficiale, fino al 2011 caratterizzata da censimenti generali a cadenza decennale. Quelli effettuati sulle unità economiche sono accomunati dalla medesima strategia e si basano su due elementi cardine: l’uso di un registro statistico, realizzato dall’Istat attraverso l’integrazione di diverse fonti amministrative e statistiche e aggiornato annualmente; una rilevazione diretta a forte valenza tematica, necessaria a completare, a cadenza periodica (per le istituzioni pubbliche biennale e dalla prossima edizione triennale; per imprese e istituzioni non profit triennale), il quadro informativo e consentire l’analisi in serie storica del profilo di istituzioni pubbliche, imprese e istituzioni non profit. La strategia censuaria prevede, a regime, che negli anni non coperti da rilevazione diretta il rilascio dei dati sia di fonte registro. Nel 2016, l’Istat ha avviato la prima edizione del Censimento permanente delle istituzioni pubbliche (data di riferimento 31/12/2015)1, basato sull’integrazione del Registro di base delle istituzioni pubbliche con le informazioni desunte dall’indagine statistica diretta. Da quest’ultima sono state escluse le scuole statali (oltre 40mila), vista la disponibilità di informazioni di fonte amministrativa. L’indagine diretta a supporto del Registro delle istituzioni pubbliche si basa su una parte di informazioni core, da acquisire con continuità, e su un set di informazioni di approfondimento da raccogliere a cadenza pluriennale. Rispetto al precedente Censimento generale a cadenza decennale, il Censimento permanente delle istituzioni pubbliche ha esteso la rilevazione2 a Forze di polizia, Forze armate e Capitanerie di porto, secondo specifiche modalità condivise in accordo con i Ministeri competenti.
    [Show full text]
  • Eyeless in Gaza 21
    Acram 1/24/04 1:49 AM Page 19 19 Eyeless Michael Ancram: Good to see you. Lots has happened since we last met.1 I guess you have in Gaza been busy, Gaza has been interesting, I’m keen The liberation of Alan to hear what has been going on. How do you Johnston and the think things will go? imprisonment of Gaza Usamah Hamdan: I will start from the Mecca Agreement. At Mecca there were three Daily in the common Prison important points. The first one was on the else enjoyn’d me, National Unity Government; the second point Where I a Prisoner chain’d, covered the reform of the security services and scarce freely draw called for a new security plan for the Palestinian The air imprison’d also, territories, and the third point was on the reform close and damp, of the PLO and the new political arrangements Unwholsom draught … inside the Palestinian political body. That means John Milton, the relations within the PLO itself, the relations Samson Agonistes between the PLO and the Palestinian Authority, the internal Palestinian relations.2 And we [in the Hamas movement] went back to Gaza and within one month there was the formation of the Usamah Hamden National Unity Government. We started talking about security. There was a security plan that Michael Ancram MP was put forward and that was endorsed by the Jonathan Lehrle government and that was then endorsed by Abu Mark Perry Mazen himself as President.3 When we started to apply that [the security plan] on the ground we faced an important problem – which was that the main General in the security service failed to apply and rejected 1.
    [Show full text]
  • Military Guide to Terrorism in the Twenty-First Century
    US Army TRADOC TRADOC G2 Handbook No. 1 AA MilitaryMilitary GuideGuide toto TerrorismTerrorism in the Twenty-First Century US Army Training and Doctrine Command TRADOC G2 TRADOC Intelligence Support Activity - Threats Fort Leavenworth, Kansas 15 August 2007 DISTRIBUTION RESTRICTION: Approved for Public Release; Distribution Unlimited. 1 Summary of Change U.S. Army TRADOC G2 Handbook No. 1 (Version 5.0) A Military Guide to Terrorism in the Twenty-First Century Specifically, this handbook dated 15 August 2007 • Provides an information update since the DCSINT Handbook No. 1, A Military Guide to Terrorism in the Twenty-First Century, publication dated 10 August 2006 (Version 4.0). • References the U.S. Department of State, Office of the Coordinator for Counterterrorism, Country Reports on Terrorism 2006 dated April 2007. • References the National Counterterrorism Center (NCTC), Reports on Terrorist Incidents - 2006, dated 30 April 2007. • Deletes Appendix A, Terrorist Threat to Combatant Commands. By country assessments are available in U.S. Department of State, Office of the Coordinator for Counterterrorism, Country Reports on Terrorism 2006 dated April 2007. • Deletes Appendix C, Terrorist Operations and Tactics. These topics are covered in chapter 4 of the 2007 handbook. Emerging patterns and trends are addressed in chapter 5 of the 2007 handbook. • Deletes Appendix F, Weapons of Mass Destruction. See TRADOC G2 Handbook No.1.04. • Refers to updated 2007 Supplemental TRADOC G2 Handbook No.1.01, Terror Operations: Case Studies in Terror, dated 25 July 2007. • Refers to Supplemental DCSINT Handbook No. 1.02, Critical Infrastructure Threats and Terrorism, dated 10 August 2006. • Refers to Supplemental DCSINT Handbook No.
    [Show full text]
  • The Pragmatics of Powerlessness in Police Interrogation
    Seattle University School of Law Digital Commons Faculty Scholarship 1-1-1993 In a Different Register: The Pragmatics of Powerlessness in Police Interrogation Janet Ainsworth Follow this and additional works at: https://digitalcommons.law.seattleu.edu/faculty Part of the Constitutional Law Commons Recommended Citation Janet Ainsworth, In a Different Register: The Pragmatics of Powerlessness in Police Interrogation, 103 YALE L.J. 259 (1993). https://digitalcommons.law.seattleu.edu/faculty/287 This Article is brought to you for free and open access by Seattle University School of Law Digital Commons. It has been accepted for inclusion in Faculty Scholarship by an authorized administrator of Seattle University School of Law Digital Commons. For more information, please contact [email protected]. Articles In a Different Register: The Pragmatics of Powerlessness in Police Interrogation Janet E. Ainswortht CONTENTS I. INTRODUCTION ............................................ 260 II. How WE Do THINGS WITH WORDS .............................. 264 A. Performative Speech Acts ................................. 264 B. Indirect Speech Acts as Performatives ......................... 267 C. ConversationalImplicature Modifying Literal Meaning ............. 268 H. GENDER AND LANGUAGE USAGE: A DIFFERENT REGISTER .............. 271 A. Characteristicsof the Female Register ........................ 275 1. Hedges ........................................... 276 2. Tag Questions ...................................... 277 t Associate Professor of Law, University of Puget Sound School of Law. B.A. Brandeis University, M.A. Yale University, J.D. Harvard Law School. My appreciative thanks go to Harriet Capron and Blain Johnson for their able research assistance. I am also indebted to Melinda Branscomb, Jacqueline Charlesworth, Annette Clark, Sid DeLong, Carol Eastman, Joel Handler, Robin Lakoff, Debbie Maranville, Chris Rideout, Kellye Testy, Austin Sarat, and David Skover for their helpful comments and suggestions.
    [Show full text]
  • Interrogation Nation: Refugees and Spies in Cold War Germany Douglas Selvage / Office of the Federal Commissioner for the Stasi Records
    Interrogation Nation: Refugees and Spies in Cold War Germany Douglas Selvage / Office of the Federal Commissioner for the Stasi Records In Interrogation Nation: Refugees and Spies in Cold War Germany, historian Keith R. Allen analyzes the “overlooked story of refugee screening in West Germany” (p. xv). Building upon his previous German-language study focused on such screening at the Marienfelde Refugee Center in West Berlin (Befragung - Überprüfung - Kontrolle: die Aufnahme von DDR- Flüchtlingen in West-Berlin bis 1961, Berlin: Ch. Links, 2013), Allen examines the places, personalities, and practices of refugee screening by the three Western Powers, as well as the German federal government, in West Berlin and throughout West Germany. The topic is particularly timely since, as Allen notes, many of “the screening programs established during the darkest days of the Cold War” (p. xv) continue today, although their targets have shifted. The current political debates about foreign and domestic intelligence activities in Germany, including the issue of refugee screening, echo earlier disputes from the years of the Bonn Republic. The central questions remain: To what extent have citizenship rights and the Federal Republic’s sovereignty been compromised by foreign and domestic intelligence agencies – largely with the consent of the German government – in the name of security? BERLINER KOLLEG KALTER KRIEG | BERLIN CENTER FOR COLD WAR STUDIES 2017 Douglas Selvage Interrogation Nation Allen divides his study into three parts. In Part I, he focuses on “places” – the various sites in occupied West Berlin and western Germany where refugees were interrogated. He sifts through the alphabet soup of acronyms of US, British, French, and eventually West German civilian and military intelligence services and deciphers the cover names of the institutions and locations at which they engaged in screening activities during the Cold War and beyond.
    [Show full text]
  • Monitoring of Online Offenders by Researchers
    SGOC STUDYING GROUP ON ORGANISED CRIME https://sgocnet.org Sifting through the Net: Monitoring of Online Offenders by Researchers Research note Sifting through the Net: Monitoring of Online Offenders by Researchers David Décary-Hétu and Judith Aldridge* Abstract: Criminologists have traditionally used official records, interviews, surveys, and observation to gather data on offenders. Over the past two decades, more and more illegal activities have been conducted on or facilitated by the Internet. This shift towards the virtual is important for criminologists as traces of offenders’ activities can be accessed and monitored, given the right tools and techniques. This paper will discuss three techniques that can be used by criminologists looking to gather data on offenders who operate online: 1) mirroring, which takes a static image of an online resource like websites or forums; 2) monitoring, which involves an on- going observation of static and dynamic resources like websites and forums but also online marketplaces and chat rooms and; 3) leaks, which involve downloading of data placed online by offenders or left by them unwittingly. This paper will focus on how these tools can be developed by social scientists, drawing in part on our experience developing a tool to monitor online drug “cryptomarkets” like Silk Road and its successors. Special attention will be given to the challenges that researchers may face when developing their own custom tool, as well as the ethical considerations that arise from the automatic collection of data online. Keywords: Cybercrime – Internet research methods – Crawler – Cryptomarkets avid e cary- e tu is Assistant Professor at the School of Criminology, University of Montreal, and Researcher at the International Centre of Comparative Criminology (ICCC).
    [Show full text]
  • NATO ARMIES and THEIR TRADITIONS the Carabinieri Corps and the International Environment by LTC (CC) Massimo IZZO - LTC (CC) Tullio MOTT - WO1 (CC) Dante MARION
    NATO ARMIES AND THEIR TRADITIONS The Carabinieri Corps and the International Environment by LTC (CC) Massimo IZZO - LTC (CC) Tullio MOTT - WO1 (CC) Dante MARION The Ancient Corps of the Royal Carabinieri was instituted in Turin by the King of Sardinia, Vittorio Emanuele 1st by Royal Warranty on 13th of July 1814. The Carabinieri Force was Issued with a distinctive uniform in dark blue with silver braid around the collar and cuffs, edges trimmed in scarlet and epaulets in silver, with white fringes for the mounted division and light blue for infantry. The characteristic hat with two points was popularly known as the “Lucerna”. A version of this uniform is still used today for important ceremonies. Since its foundation Carabinieri had both Military and Police functions. In addition they were the King Guards in charge for security and honour escorts, in 1868 this task has been given to a selected Regiment of Carabinieri (height not less than 1.92 mt.) called Corazzieri and since 1946 this task is performed in favour of the President of the Italian Republic. The Carabinieri Force took part to all Italian Military history events starting from the three independence wars (1848) passing through the Crimean and Eritrean Campaigns up to the First and Second World Wars, between these was also involved in the East African military Operation and many other Military Operations. During many of these military operations and other recorded episodes and bravery acts, several honour medals were awarded to the flag. The participation in Military Operations abroad (some of them other than war) began with the first Carabinieri Deployment to Crimea and to the Red Sea and continued with the presence of the Force in Crete, Macedonia, Greece, Anatolia, Albania, Palestine, these operations, where the basis leading to the acquirement of an international dimension of the Force and in some of them Carabinieri supported the built up of the local Police Forces.
    [Show full text]
  • Transnational Neo-Nazism in the Usa, United Kingdom and Australia
    TRANSNATIONAL NEO-NAZISM IN THE USA, UNITED KINGDOM AND AUSTRALIA PAUL JACKSON February 2020 JACKSON | PROGRAM ON EXTREMISM About the Program on About the Author Extremism Dr Paul Jackson is a historian of twentieth century and contemporary history, and his main teaching The Program on Extremism at George and research interests focus on understanding the Washington University provides impact of radical and extreme ideologies on wider analysis on issues related to violent and societies. Dr. Jackson’s research currently focuses non-violent extremism. The Program on the dynamics of neo-Nazi, and other, extreme spearheads innovative and thoughtful right ideologies, in Britain and Europe in the post- academic inquiry, producing empirical war period. He is also interested in researching the work that strengthens extremism longer history of radical ideologies and cultures in research as a distinct field of study. The Britain too, especially those linked in some way to Program aims to develop pragmatic the extreme right. policy solutions that resonate with Dr. Jackson’s teaching engages with wider themes policymakers, civic leaders, and the related to the history of fascism, genocide, general public. totalitarian politics and revolutionary ideologies. Dr. Jackson teaches modules on the Holocaust, as well as the history of Communism and fascism. Dr. Jackson regularly writes for the magazine Searchlight on issues related to contemporary extreme right politics. He is a co-editor of the Wiley- Blackwell journal Religion Compass: Modern Ideologies and Faith. Dr. Jackson is also the Editor of the Bloomsbury book series A Modern History of Politics and Violence. The views expressed in this paper are solely those of the author, and not necessarily those of the Program on Extremism or the George Washington University.
    [Show full text]
  • CPS December 1994 - Publications - U.S
    CPS December 1994 - Publications - U.S. Census Bureau Publications You are here: Census.gov › Publications › Current Population Survey, December 1994: Lead Paint Survey E Publications Main Current Population Survey, December 1994: Lead Paint Survey E TECHNICAL DOCUMENTATION - CPS-94 Current Population Survey, December 1994: Lead Paint Survey [machine-readable data file] / conducted by the Bureau of the Census for the Department of Housing and Urban Development. --Washington: Bureau of the Census [producer and distributor], 1997. This file documentation consists of the following materials: Attachment 1 - Abstract Type of File: Microdata; unit of observation is individuals within housing units. Universe Description: The universe consists of all persons in the civilian noninstitutional population of the United States living in households. The probability sample selected to represent the universe consists of approximately 57,000 households. Subject-Matter Description: Data are provided on labor force activity for the week prior to the survey. Comprehensive data are available on the employment status, occupation, and industry of persons 15 years old and over. Also shown are personal characteristics such as age, sex, race, marital status, veteran status, household relationship, educational background, and Hispanic origin. The lead paint questions were asked for the household. They provide information on the current awareness of the health hazards associated with lead-based paint. Geographic Coverage: State of residence is uniquely identified as well as census geographic division and region. The 113 largest metropolitan areas (CMSA's or MSA's), 89 selected MSA's, 66 selected PMSA's, and 30 central cities in multi-central city MSA's or PMSA's also are uniquely identified.1 Within confidentiality restrictions, indicators are provided for MSA-PMSA/non-MSA-PMSA, central city/noncentral city, farm/non-farm, and MSA/CMSA size.
    [Show full text]