Fake Terrorism: Examining Terrorist Groups' Resort to Hoaxing As a Mode of Attack

Total Page:16

File Type:pdf, Size:1020Kb

Fake Terrorism: Examining Terrorist Groups' Resort to Hoaxing As a Mode of Attack Fake Terrorism: Examining terrorist groups’ resort to hoaxing as a mode of attack by Nicole Alexandra Tishler A thesis submitted to the Faculty of Graduate and Postdoctoral Affairs in partial fulfillment of the requirements for the degree of Doctor of Philosophy in International Affairs Norman Paterson School of International Affairs Carleton University Ottawa, Ontario © 2017, Nicole Alexandra Tishler Abstract Little academic attention has been accorded to terrorism hoaxers—i.e. those perpetrators who use lies, benign materials and/or empty threats to give the impression that a terrorist act is or has been underway. This dissertation harnesses under-utilised terrorism events data to build a theory of hoaxes in pursuit of a dual aim: to provide a robust substantive answer to the empirical puzzle of why hoaxes are used, but not by all groups, and not all the time; and to evaluate the degree to which existing data can demystify the hoax phenomenon. The starting point is a rationalist framework for terrorist groups’ strategic logics, which emphasizes the relative costs and benefits of hoaxes in relation to serious terrorism activity. In the empirical theory-building chapters, probit regression and qualitative comparative analysis (QCA) are used to identify various organizational conditions that differentiate hoaxers from non-hoaxers, thereby indicating which strategic logics are plausibly at play, and in which contexts. A statistical cluster analysis demonstrates that there are five broad classes of hoaxing terrorist groups, which differ from one another along motivational, structural, and campaign contextual lines. While the unit of analysis throughout is the terrorist group, these analyses rely on cross- national terrorism events databases—predominantly ITERATE and the Monterey WMD Terrorism Database—to identify which groups never hoax, and which groups sometimes do. In the dissertation’s final section, earlier findings are tested against a new sample of terrorism perpetrators derived from the recently-released Canadian Incident Database (CIDB). Although the Canada-centric data reveals a biased under-reporting of hoax activity in the cross-national datasets, a QCA analysis of its perpetrators reveals roughly similar conditions differentiating hoaxers from non-hoaxers. The CIDB’s comprehensive events coverage is further exploited to test whether these organizational indicators and their associated hypothesized mechanisms hold, when campaign activities are evaluated at the event-level. A fine-grained analysis of event sequencing in Canada’s most prolific terrorism campaign (that of the Front de libération du Québec) corroborates a range of proposed strategic logics. The observational nature of available data is thus limited in its ability to clarify hoaxers’ strategic logics, which are both over-determined and equifinal. ii Acknowledgements My most heartfelt thanks go to my supervisor, Jeremy Littlewood, whose teaching and mentorship style I aspire to emulate in my own career. Over the past five years, you have given me free rein to pursue my intellectual whims, but your extensive knowledge and judicious advice have always kept me from straying too far. I am profoundly grateful for your support and guidance. To my advisor, Dane Rowlands: thank you for encouraging me to expand my methodological horizons, both at NPSIA and beyond. At risk of sounding platitudinous: this dissertation simply would not be what it is, were it not for your instrumental role in my education. And to my advisor, Stephanie Carvin: I will be forever grateful for your confidence in— and enthusiasm for—my research. You have always urged me to aim high, and I am a stronger scholar for it. I am indebted to each of you. My sincere thanks also go to Josh Kilberg: my role model for success in the NPSIA PhD program, and an invaluable source of data and advice in this project’s early days. Additionally, I am grateful for the generous funding support that this research has received from the Social Sciences and Humanities Research Council (SSHRC), the Province of Ontario (Ontario Graduate Scholarship), and the Canadian Network for Research on Terrorism, Security and Society (TSAS). Finally, I would like to thank my friends and family for their endless love and unwavering support. Mom and Dad: thank you for instilling in me a passion for learning and the tenacity to see this degree through to its end. This is for you. iii Table of Contents Abstract ..................................................................................................................... ii Acknowledgements ................................................................................................... iii Table of Contents ...................................................................................................... iv List of Tables ............................................................................................................ xii List of Figures .......................................................................................................... xiv List of Appendices ................................................................................................... xvi 1. Introduction ........................................................................................................ 1 1.1 Why fake terrorism deserves serious attention: Motivation and significance ...........3 1.1.1 The costs that hoaxes impose on society ................................................................... 5 1.1.2 Hoaxes’ implications for theories of terrorism ........................................................... 9 1.1.3 Hoaxes’ implications for the evaluation of serious terrorist activity ....................... 10 1.2 Available data: How we know what we know about hoaxes.................................. 11 1.2.1 Challenges with hoax data ........................................................................................ 14 1.3 Scope and methodological overview .................................................................... 19 1.3.1 Unit of analysis .......................................................................................................... 20 1.3.2 Dissertation outline .................................................................................................. 21 PART I: DEFINING HOAXES, CONCEPTUALLY AND EMPIRICALLY ................................. 27 2. Defining hoaxes: Key concepts .......................................................................... 27 2.1 Categories of hoaxes ............................................................................................ 27 iv v 2.2 What defines a terrorism hoax? ........................................................................... 29 2.3 Hoaxes versus related activities ............................................................................ 32 2.4 Hoaxes’ relationship with other terrorism tactics .................................................. 36 2.4.1 Research Note: Hoaxes as a “mode”—not a “tactic”—of terrorism ........................ 39 2.5 Conclusions on the concept of hoaxing ................................................................. 40 3. The scope and nature of terrorist hoax activities worldwide .............................. 42 3.1 When do hoaxes occur? ....................................................................................... 43 3.2 Where do hoaxes occur? ...................................................................................... 45 3.3 What kinds of hoaxes occur? ................................................................................ 51 3.3.1 Hoaxes as a mode of terrorism, revisited: Implications for coding .......................... 54 3.4 Who hoaxes? ....................................................................................................... 57 3.4.1 What else do hoaxers do? ........................................................................................ 59 3.5 Conclusions on the scope and nature of terrorist hoax activities worldwide .......... 62 4. Insights into hoax behaviour: Previous empirical research ................................. 63 4.1 How terrorists decide among tactics ..................................................................... 64 4.1.1 Rational choice .......................................................................................................... 65 4.1.1.1 The formal rational choice model and its applications to hoaxing .............................. 65 4.1.1.2 The strategic logic of terrorist (hoax) behaviour ......................................................... 67 4.1.1.3 The unitary actor assumption and principal-agent relationships ................................ 71 4.1.2 Ideology and group motivation ................................................................................ 73 4.2 The nature of violence ......................................................................................... 74 4.2.1 Lethality: Hoaxing’s inverse ...................................................................................... 74 4.2.1.1 Lethality and ideology .................................................................................................. 74 4.2.1.2 Lethality and group structure ...................................................................................... 76 vi 4.2.1.3 Lethality and group origins .......................................................................................... 77 4.2.2 Suicide terrorism: A conceptual
Recommended publications
  • In Defense of Cyberterrorism: an Argument for Anticipating Cyber-Attacks
    IN DEFENSE OF CYBERTERRORISM: AN ARGUMENT FOR ANTICIPATING CYBER-ATTACKS Susan W. Brenner Marc D. Goodman The September 11, 2001, terrorist attacks on the United States brought the notion of terrorism as a clear and present danger into the consciousness of the American people. In order to predict what might follow these shocking attacks, it is necessary to examine the ideologies and motives of their perpetrators, and the methodologies that terrorists utilize. The focus of this article is on how Al-Qa'ida and other Islamic fundamentalist groups can use cyberspace and technology to continue to wage war againstthe United States, its allies and its foreign interests. Contending that cyberspace will become an increasingly essential terrorist tool, the author examines four key issues surrounding cyberterrorism. The first is a survey of conventional methods of "physical" terrorism, and their inherent shortcomings. Next, a discussion of cyberspace reveals its potential advantages as a secure, borderless, anonymous, and structured delivery method for terrorism. Third, the author offers several cyberterrorism scenarios. Relating several examples of both actual and potential syntactic and semantic attacks, instigated individually or in combination, the author conveys their damagingpolitical and economic impact. Finally, the author addresses the inevitable inquiry into why cyberspace has not been used to its full potential by would-be terrorists. Separately considering foreign and domestic terrorists, it becomes evident that the aims of terrorists must shift from the gross infliction of panic, death and destruction to the crippling of key information systems before cyberattacks will take precedence over physical attacks. However, given that terrorist groups such as Al Qa'ida are highly intelligent, well-funded, and globally coordinated, the possibility of attacks via cyberspace should make America increasingly vigilant.
    [Show full text]
  • The Clinton Independent
    The Clinton Independent. VOL. XXXYII.-NO. 2 ST. JOHNS MICH. THURSDAY, OCTOBER 30, 1902. WHOLE NO.—1864 VOTE FOR THESE CHARLES BRITTON SUPERVISORS FINISHED INDETERMINATE SENTENCES. WILL NOT ACCEPT Voters Hass a Chance to Ex pros si Their 'Register! They *r* all Good Men mid Will Guard An Emu Township Farmer Lost Hla Life The Work of the October Meeting Last 2*«utlinents Thereon. A Courteous Invitation to “Divide the Your Intereeta Carefully. In a Singular Manner. Weak Wednesday. The Michigan board of corrections Time” In s Joint Disc union. Register! CHARLES We had hoped to have been able to and charities calls the attention of Oct. 22.1902. SCnOCH, Charles Britton, among the best the voters of the state to the import­ Of Ovid, candidate for sheriff on the known and most highly respected give to our readers this week the do­ C. C. Vaughan, Chairman Republi ­ ings of the supervisors at their Octo­ ance of a full and favorable vote on the can County Committee, at. Johns. Democratic ticket, is very popular farmers of Essex township, was killed amendment to the state constitution Recollect that if you have changed with the people of the county in which yesterday morning In a most singular ber meeting, but owing to the great Mich.; amount of work Imposed upon the us proposed by joint resolution of the Dear Sir—The Democratic County your place of residence from one ward he lives, ana will receive a hearty manner. legislature of 1901. The adoption of support from the voters regardless o! He had loaded on a long, heavy farm clerk, he was not able to prepare the Committee has a meeting advertised or voting precinct to another since the copy in full.
    [Show full text]
  • Proof That John Lennon Faked His Death
    return to updates Proof that John Lennon Faked his Death Mark Staycer or John Lennon? by Miles Mathis This has been a theory from the very beginning, as most people know, but all the proof I have seen up to now isn't completely convincing. What we normally see is a lot of speculation about the alleged shooting in December of 1980. Many discrepancies have indeed been found, but I will not repeat them (except for a couple in my endnotes). I find more recent photographic evidence to be far easier and quicker to compile—and more convincing at a glance, as it were—so that is what I will show you here. All this evidence is based on research I did myself. I am not repeating the work of anyone else and I take full responsibility for everything here. If it appeals to you, great. If not, feel free to dismiss it. That is completely up to you, and if you don't agree, fine. When I say “proof” in my title, I mean it is proof enough for me. I no longer have a reasonable doubt. This paper wouldn't have been possible if John had stayed well hidden, but as it turns out he still likes to play in public. Being a bit of an actor, and always being confident is his ability to manipulate the public, John decided to just do what he wanted to do, covering it just enough to fool most people. This he has done, but he hasn't fooled me. The biggest clues come from a little indie film from Toronto about Lennon called Let Him Be,* released in 2009, with clips still up on youtube as of 2014.
    [Show full text]
  • 0.GEMATRIA DATABASE.Pages
    GEMATRIA - DATABASE ! Bavarian Illuminati Est. May 1st, 1776} 5/01/1776 ! Scottish Rite Est. May 31, 1801 } 5/31/1801 Knights Templar ARRESTED on Oct. 13, 1307 } 10/12/1307 ! Knights Templar FOUNDED in Jerusalem, Israel: 1119 ! Skull & Bones 322 FOUNDED in 1832 at Yale University) (Russell Trust Association - Parent Organization) 322 references 322 BC ! Vatican City Est. February 11, 1929 (109 acres) ! One legend is that the numbers in the society's emblem ("322") represent "founded in '32, 2nd corps", referring to a first Corps in an unknown German university.[22][23] ! Convocation founded in 1539 (3rd Papal Bull) Jesuits founded in 1541 Copernicus of 1543 (Ball Earth) The Council of Trent founded in 1545 ! (Christopher Columbus) America discovered in 1492 (2 Papal Bulls) 1912 = Titanic sank 1913 = Federal Reserve Established 1914 = First World War 1917 = Bolshevik Communist Invasion ! Jewish Bolshevism, also known as Judeo-Bolshevism, is an antisemitic and anti-communist canard [citation needed] which alleges that the Jews were at the origin of the Russian Revolution and held the primary power among Bolsheviks. Similarly, the Jewish Communism theory implies that Jews have been dominating the Communist movements in the world. It is similar to the ZOG conspiracy theory, which asserts that Jews control world politics. The expressions have been used as a catchword for the assertion that Communism is a Jewish conspiracy. ! Hexagram = Star of David ! Pythagoras the Samian or Pythagoras of Samos (570-495 BC) was a mathematician, Ionian Greek
    [Show full text]
  • Burn It Down! Anarchism, Activism, and the Vancouver Five, 1967–1985
    Burn it Down! Anarchism, Activism, and the Vancouver Five, 1967–1985 by Eryk Martin M.A., University of Victoria, 2008 B.A. (Hons.), University of Victoria, 2006 Dissertation Submitted in Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy in the Department of History Faculty of Arts and Social Sciences © Eryk Martin 2016 SIMON FRASER UNIVERSITY Spring 2016 Approval Name: Eryk Martin Degree: Doctor of Philosophy (History) Title: Burn it Down! Anarchism, Activism, and the Vancouver Five, 1967–1985 Examining Committee: Chair: Dimitris Krallis Associate Professor Mark Leier Senior Supervisor Professor Karen Ferguson Supervisor Professor Roxanne Panchasi Supervisor Associate Professor Lara Campbell Internal Examiner Professor Gender, Sexuality, and Women’s Studies Joan Sangster External Examiner Professor Gender and Women’s Studies Trent University Date Defended/Approved: January 15, 2016 ii Ethics Statement iii Abstract This dissertation investigates the experiences of five Canadian anarchists commonly knoWn as the Vancouver Five, Who came together in the early 1980s to destroy a BC Hydro power station in Qualicum Beach, bomb a Toronto factory that Was building parts for American cruise missiles, and assist in the firebombing of pornography stores in Vancouver. It uses these events in order to analyze the development and transformation of anarchist activism between 1967 and 1985. Focusing closely on anarchist ideas, tactics, and political projects, it explores the resurgence of anarchism as a vibrant form of leftWing activism in the late tWentieth century. In addressing the ideological basis and contested cultural meanings of armed struggle, it uncovers Why and how the Vancouver Five transformed themselves into an underground, clandestine force.
    [Show full text]
  • Issue Terrorism: an Analysis of Trends in North America
    ISSUE TERRORISM: AN ANALYSIS OF TRENDS IN NORTH AMERICA Jesse L. Cale B.A., Mount Royal College, 2001 THESIS SUBMITTED IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF MASTER OF ARTS In the School of Criminology O Jesse L. Cale 2003 SIMON FRASER UNIVERSITY November 2003 All rights reserved. This work may not be reproduced in whole or in part, by photocopy or other means, without permission of the author. APPROVAL Name: Jesse L. Cale Degree: M.A. Title of Thesis: issue Terrorism: An Analysis of Trends in North America Examining Committee: Chair: Neil Madu, M.A. Raymon?! R. Corr o, m~ Senior Su~ervisorT William G. Glackman, Ph.D. Me&r Ronald Roesch, Ph.D. ~xternalExaminer Psychology Department Simon Fraser University Date Approved: \ q 7- Y\,?, -? ii PARTIAL COPYRIGHT LICENCE I hereby grant to Simon Fraser University the right to lend my thesis, project or extended essay (the title of which is shown below) to users of the Simon Fraser University Library, and to make partial or single copies only for such users or in response to a request from the library of any other university, or other educational institution, on its own behalf or for one of its users. I further agree that permission for multiple copying of this work for scholarly purposes may be granted by me or the Dean of Graduate Studies. It is understood that copying or publication of this work for financial gain shall not be allowed without my written permission. Title of Thesis/Project/Extended Essay Issue Terrorism: An Analysis of Trends in North America Name ABSTRACT I Issue motivated terrorism can be understood as an extreme, illegitimate, and often violent response to a controversial issue within a given society.
    [Show full text]
  • Transition in Canada’S Important Fossil Own Interests (To the Great Frustration Fulfilling, for the Greatest Number of Fuel Sectors (Page 16)
    in transition CANADIAN CENTRE FOR POLICY ALTERNATIVES JULY/AUGUST 2018 $6.95 Contributors Martin Adelaar is a retired Cynthia Khoo is a public of Technology (UOIT), and energy management interest lawyer who focuses one of the world’s foremost consultant and advocate on internet policy and digital authorities and renowned and a member of the Ottawa rights. Her column, Below the authors on hate crime. She is Renewable Energy Co- Fold, appears regularly in the Director of the newly formed Vol. 25, No. 2 operative. Monitor. Centre on Hate, Bias and ISSN 1198-497X Extremism at UOIT. Canada Post Publication 40009942 Frank Bayerl is a retired Marc Lee is a senior economist translator and regular with the British Columbia Roger Peters is a retired The Monitor is published six times volunteer at the CCPA’s office of the Canadian Centre environmental researcher, a year by the Canadian Centre for national office in Ottawa. for Policy Alternatives. consultant, writer and Policy Alternatives. Simon Enoch is Director of the Laura Macdonald is a professor advocate, and a founding The opinions expressed in the CCPA-Saskatchewan. in the department of political member of the Ottawa Monitor are those of the authors science and the Institute of Renewable Energy Co- and do not necessarily reflect Gerard Di Trolio writes Political Economy at Carleton operative. the views of the CCPA. about labour and politics. His articles have appeared in University, and co-investigator Peter G. Prontzos is Professor Please send feedback to RankandFile.ca, where he is an on the SSHRC-funded research Emeritus of Political Science at [email protected].
    [Show full text]
  • Intelligence Services Roles and Responsibilities in Good Security Sector Governance
    SSR BACKGROUNDER Intelligence Services Roles and responsibilities in good security sector governance About this series The SSR Backgrounders provide concise introductions to topics and concepts in good security sector governance (SSG) and security sector reform (SSR). The series summarizes current debates, explains key terms and exposes central tensions based on a broad range of international experiences. The SSR Backgrounders do not promote specific models, policies or proposals for good governance or reform but do provide further resources that will allow readers to extend their knowledge on each topic. The SSR Backgrounders are a resource for security governance and reform stakeholders seeking to understand but also to critically assess current approaches to good SSG and SSR. About this SSR Backgrounder This SSR Backgrounder explains the roles and responsibilities of intelligence services in good security sector governance (SSG). Intelligence services perform an essential security function by providing governments with timely and relevant information necessary to protect the security of states and their societies. Applying the principles of good SSG to intelligence services makes them both effective and accountable within a framework of democratic governance, the rule of law and respect for human rights. This SSR Backgrounder answers the following questions: What are intelligence services? Page 2 What do intelligence services do? Page 2 How is intelligence produced? Page 4 What intrusive legal powers do intelligence services hold?
    [Show full text]
  • Engaging Central Asia
    ENGAGING CENTRAL ASIA ENGAGING CENTRAL ASIA THE EUROPEAN UNION’S NEW STRATEGY IN THE HEART OF EURASIA EDITED BY NEIL J. MELVIN CONTRIBUTORS BHAVNA DAVE MICHAEL DENISON MATTEO FUMAGALLI MICHAEL HALL NARGIS KASSENOVA DANIEL KIMMAGE NEIL J. MELVIN EUGHENIY ZHOVTIS CENTRE FOR EUROPEAN POLICY STUDIES BRUSSELS The Centre for European Policy Studies (CEPS) is an independent policy research institute based in Brussels. Its mission is to produce sound analytical research leading to constructive solutions to the challenges facing Europe today. The views expressed in this report are those of the authors writing in a personal capacity and do not necessarily reflect those of CEPS or any other institution with which the authors are associated. This study was carried out in the context of the broader work programme of CEPS on European Neighbourhood Policy, which is generously supported by the Compagnia di San Paolo and the Open Society Institute. ISBN-13: 978-92-9079-707-4 © Copyright 2008, Centre for European Policy Studies. All rights reserved. No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means – electronic, mechanical, photocopying, recording or otherwise – without the prior permission of the Centre for European Policy Studies. Centre for European Policy Studies Place du Congrès 1, B-1000 Brussels Tel: 32 (0) 2 229.39.11 Fax: 32 (0) 2 219.41.51 e-mail: [email protected] internet: http://www.ceps.eu CONTENTS 1. Introduction Neil J. Melvin ................................................................................................. 1 2. Security Challenges in Central Asia: Implications for the EU’s Engagement Strategy Daniel Kimmage............................................................................................
    [Show full text]
  • Global Journal on Humanites & Social Sciences
    Global Journal on Humanites & Social Sciences Issue 4 (2016) 857-864 Selected Paper of 4rd World Congress of Administrative and Political Sciences, (APDOL-2015) 26-28 November 2015, Rome, Italy Security threats and challenges in the post-soviet Central Asia: religion-based extremism on case study of ISIS Fatima Kukeyeva*, IR Department, al-Farabi Kazakh National University, Karasai Batyr 95, Almaty, 050000, Kazakhstan Leila Delovarova, IR Department, al-Farabi Kazakh National University, Karasai Batyr 95, Almaty, 050000, Kazakhstan Tolganay Ormysheva, IR Department, al-Farabi Kazakh National University, Karasai Batyr 95, Almaty, 050000, Kazakhstan Yermek Chukubayev, IR Department, al-Farabi Kazakh National University, Karasai Batyr 95, Almaty, 050000, Kazakhstan Suggested Citation: Kukeyeva, F., Delovarova, L., Ormysheva, T. & Chukubayev, Y. (2016). Security threats and challenges in the post-soviet Central Asia: religion-based extremism on case study of ISIS, Global Journal on Humanites & Social Sciences. [Online]. 04, pp 857-864. Available from: http://sproc.org/ojs/index.php/pntsbs Received May 10, 2015; revised August 16, 2015; accepted September 16, 2015. Selection and peer review under responsibility of Prof. Dr. Andreea Iluzia IACOB ©2016 SciencePark Research, Organization & Counseling. All rights reserved. Abstract Nowadays the post-Soviet Central Asian countries face a broad range of security challenges and threats. Some of them are systemic in nature, while others occur sporadically. Many challenges and threats are coming from the outside the region, but the countries’ internal situation and background including historical, economic, social and political aspects. The reaction in the countries on religious-based radicalism and movements like ISIS is an ambiguous. The range and level of the threats and challenges depends on various reasons and different in all Central Asian countries.
    [Show full text]
  • Western Hemisphere Overview ______
    Western Hemisphere Overview ___________________________________________________________________________ “We stand firm in the fight against terrorism and firm in our conviction that a sustained and permanent victory depends upon the success of each individual country in the struggle for social cohesion. In projecting our security policy to become an axiom of the State, we conceive it to be inexorably linked to the constant improvement of the social conditions of our people.” Álvaro Uribe Vélez, President of Colombia 60th Session of the United Nations General Assembly September 17, 2005 ___________________________________________________________________________ Terrorism in the Western Hemisphere was primarily perpetrated in by narcoterrorist organizations based in Colombia and by the remnants of radical leftist Andean groups. With the exception of the United States and Canada, there are no known operational cells of Islamic terrorists in the hemisphere, although scattered pockets of ideological supporters and facilitators in South America and the Caribbean lent financial, logistical, and moral support to terrorist groups in the Middle East. Cuba remained a state sponsor of terrorism, while Venezuela virtually ceased its cooperation in the global war on terror, tolerating terrorists in its territory and seeking closer relations with Cuba and Iran, both state sponsors of terrorism. The threat of terrorist attack remained low in for most countries. Overall, governments took modest steps to improve their counterterrorism (CT) capabilities and tighten border security, but corruption, weak government institutions, ineffective or lacking interagency cooperation, weak or non-existent legislation, and reluctance to allocate sufficient resources limited the progress of many. Some countries, like Panama, Trinidad and Tobago, Jamaica, Mexico, and El Salvador, made serious prevention and preparedness efforts.
    [Show full text]
  • The Beatles on Film
    Roland Reiter The Beatles on Film 2008-02-12 07-53-56 --- Projekt: transcript.titeleien / Dokument: FAX ID 02e7170758668448|(S. 1 ) T00_01 schmutztitel - 885.p 170758668456 Roland Reiter (Dr. phil.) works at the Center for the Study of the Americas at the University of Graz, Austria. His research interests include various social and aesthetic aspects of popular culture. 2008-02-12 07-53-56 --- Projekt: transcript.titeleien / Dokument: FAX ID 02e7170758668448|(S. 2 ) T00_02 seite 2 - 885.p 170758668496 Roland Reiter The Beatles on Film. Analysis of Movies, Documentaries, Spoofs and Cartoons 2008-02-12 07-53-56 --- Projekt: transcript.titeleien / Dokument: FAX ID 02e7170758668448|(S. 3 ) T00_03 titel - 885.p 170758668560 Gedruckt mit Unterstützung der Universität Graz, des Landes Steiermark und des Zentrums für Amerikastudien. Bibliographic information published by Die Deutsche Bibliothek Die Deutsche Bibliothek lists this publication in the Deutsche Nationalbibliografie; detailed bibliographic data are available on the Internet at http://dnb.ddb.de © 2008 transcript Verlag, Bielefeld This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 3.0 License. Layout by: Kordula Röckenhaus, Bielefeld Edited by: Roland Reiter Typeset by: Roland Reiter Printed by: Majuskel Medienproduktion GmbH, Wetzlar ISBN 978-3-89942-885-8 2008-12-11 13-18-49 --- Projekt: transcript.titeleien / Dokument: FAX ID 02a2196899938240|(S. 4 ) T00_04 impressum - 885.p 196899938248 CONTENTS Introduction 7 Beatles History – Part One: 1956-1964
    [Show full text]