65 resultados para Terrorists


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Abstract Background. In 2011, Alabama, neither a border state nor hold a significantly large Hispanic population, passed the most restrictive state immigration law, The Beason-Hammon Alabama Taxpayer and Citizen Protection Act, HB 56. This omnibus law was far-reaching in its restrictions, including, but not limited to, identification, public services, employment, housing, and law enforcement. Objectives. This research explores the dominant tropes present in the narrative surrounding the anti-immigration legislative activity in Alabama that created fertile ground for the passage of such a punitive immigration law. Methods. Newspaper articles from 2007 to 2011 in Alabama¿s Birmingham News and Press-Register, the two most circulated newspapers in the state, were attained from NewsLibrary.com, an online database of 5,311 newspapers and other news sources. Results. Seven dominant tropes were identified in the articles that pushed for anti-immigration policies. These tropes claimed (1) the US-Mexico border is not secure, (2) the federal government has failed to enact comprehensive immigration reform, (3) immigrants steal jobs, hurt the economy, and (4) burden public services, (5) immigrants are criminals and terrorists, (6) they refuse to assimilate and learn English, and (7) there has been a dramatic percent change in the Hispanic and illegal populations. These tropes cumulatively worked together to create anti-immigration sentiment that pushed for the passage of HB 56.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Finnish immigrants were recruited to work in the copper mines of Michigan by Boston capitalists intimately associated with Harvard. Boston capitalists defined the culture of capitalism in the United States. They extended their culture across the continent as they acquired mines and railroads. Finnish workers encountered Ivy League capitalism in Michigan, Minnesota, Idaho, Montana, Wyoming, Colorado, Utah and Arizona—often with the same interrelated group of capitalists. The two groups continually met in explosive confrontations in Montana, Michigan, Minnesota, and Arizona. To the Ivy League capitalists, Finns were terrorists who threatened the American social order. For the Finns, it was a war for social justice. In my presentation, I will trace the experience of Finnish workers in corporations controlled by Ivy League capitalists from the first strike at Calumet & Hecla in 1873 to the Red Scare of 1919-1921.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Terrorists, policy-makers, and terrorism scholars have long assumed that the mere threat of terrorist strikes affects societies that have experienced actual acts of terrorism. For this reason, most definitions of terrorism include the threat of violent political acts against civilians. But so far research has neither validated this conventional wisdom nor demonstrated how actual and mass-mediated threat messages by terrorists and terror alerts and threat assessments by government officials affect the public in targeted states. This paper fills the gap providing evidence that who conveys such messages matters and that mass-mediated threat messages by al Qaeda leaders and announced alerts and threat assessments by U.S. administration officials had a significant impact on the American public’s threat perceptions in the post-9/11 years.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This article analyzes the interaction between theories of radicalization and state responses to militancy in India. Focusing on the interpretation of the increased frequency of terrorist attacks in Indian metropolises in the last decade, the article examines the narratives surrounding those classified as terrorists in the context of rising Muslim militancy in the country. Different state agencies operate with different theories about the links between processes of radicalization and terrorist violence. The scenarios of radicalization underlying legislative efforts to prevent terrorism, the construction of motives by the police, and the interpretation of violence by the judiciary all rely on assumptions about radicalization and violence. Such narratives are used to explain terrorism both to security agencies and to the public; they inform the categories and scenarios of prevention. Prevention relies on detection of future deeds, planning, intentions, and even potential intentions. "Detection" of potential intentions relies on assumptions about specific dispositions. Identification of such dispositions in turn relies on the context-specific theories of the causes of militancy. These determine what "characteristics" of individuals or groups indicate potential threats and form the basis for their categorization as "potentially dangerous." The article explores the cultural contexts of theories of radicalization, focusing on how they are framed by societal understandings of the causes of deviance and the relation between the individual and society emerging in contemporary India. It examines the shift in the perception of threat and the categories of "dangerous others" from a focus on role to a focus on ascriptive identity.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The United Sates was founded on the principles of freedom. Events in recent history have threatened the freedoms we as individuals enjoy. Notably, changes to government legislation and policies regarding access to environmentally sensitive information following September 11, 2001, are troubling. The government has struggled with a difficult balancing act. The public has the right of access to information, yet, information some view as sensitive or dangerous must be kept out of the hands of terrorists. This project examines and discusses the information access debate within the United States and how to best provide the public environmentally sensitive information.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This dissertation examines novels that use terrorism to allegorize the threatened position of the literary author in contemporary culture. Allegory is a term that has been differently understood over time, but which has consistently been used by writers to articulate and construct their roles as authors. In the novels I look at, the terrorist challenge to authorship results in multiple deployments of allegory, each differently illustrating the way that allegory is used and authorship constructed in the contemporary American novel. Don DeLillo’s Mao II (1991), first puts terrorists and authors in an oppositional pairing. The terrorist’s ability to traffic in spectacle is presented as indicative of the author’s fading importance in contemporary culture and it is one way that terrorism allegorizes threats to authorship. In Philip Roth’s Operation Shylock (1993), the allegorical pairing is between the text of the novel and outside texts – newspaper reports, legal cases, etc. – that the novel references and adapts in order to bolster its own narrative authority. Richard Powers’s Plowing the Dark (1999) pairs the story of an imprisoned hostage, craving a single book, with employees of a tech firm who are creating interactive, virtual reality artworks. Focusing on the reader’s experience, Powers’s novel posits a form of authorship that the reader can take into consideration, but which does not seek to control the experience of the text. Finally, I look at two of Paul Auster’s twenty-first century novels, Travels in the Scriptorium (2007) and Man in the Dark (2008), to suggest that the relationship between representations of authors and terrorists changed after 9/11. Auster’s author-figures forward an ethics of authorship whereby novels can use narrative to buffer readers against the portrayal of violent acts in a culture that is suffused with traumatizing imagery.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

While there are currently very few lone actor terrorists among modern anarchists and within the contemporary extreme left, the present lack of extreme left wing lone actor terrorists does not signify a lack of interest in violent solutions within this particular milieu. As the author will show, twenty-flrst century anarchism has considerable potential for lone actor terrorism. It would be imprudent to conclude that this once important ideological source of lone actor terrorism will not reappear again.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The spectacular offensive by Islamic radicals in Iraq this June has led the country to the verge of collapse, and is another scene of the deep crisis in the Middle East, in which Turkey is entangled. The immediate consequence of this is a severe crisis of prestige after the kidnapping by terrorists of Turkish diplomats and Ankara’s inability to resolve the situation; in the long term consequences include escalation of the Kurdish problem, and a further increase in threats to the security of Turkey itself as well as the fundamental principles of its foreign policy. Both Ankara’s options and its political will to actively respond to the crisis are extremely limited. Yet again in recent years, the current crisis, the broader situation in the Middle East, and finally the position of Turkey in the region elude unambiguous assessments and forecasts – these are prevented by the scale and growth of the reappraisals and tensions in the region. The only undoubted fact is that Turkey is strategically and irreversibly entangled in the Middle East’s problems, which are an important factor affecting the transformation of the state which the ruling AKP is implementing; and in the near future, this state of affairs will only deepen.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The attack in Norway, like every attack with a major impact, should and will be carefully analyzed, both by police and by terrorists. If the Norwegian authorities have officially called for a technical evaluation of Counter-terrorism (CT) and rescue national services, many sensitive aspects still remain unsure.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Mode of access: Internet.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The nexus between terrorism and organised crime consists in a strategic alliance between two non-state actors, able to exploit illegal markets, threaten the security of individuals, and influence policy-making on a global level. Recent Europol reports have pointed towards the importance of studying the links between organised crime and terrorist groups, and have underlined that the nature and extent of these connections have seldom been addressed from an academic perspective. Considering the degree of dangerousness that both organised crime and terrorism currently represent in the world, the collusion between these two phenomena is of urgent contemporary interest. Basing itself on geographical case-studies, this edited volume aims at contributing to the existing literature in three ways: by enriching the empirical knowledge on the nature of the crime-terror nexus and its evolution; by exploring the impact of the nexus within different economic, political and societal contexts; and by expanding on its theoretical conceptualization.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The attempts at carrying out terrorist attacks have become more prevalent. As a result, an increasing number of countries have become particularly vigilant against the means by which terrorists raise funds to finance their draconian acts against human life and property. Among the many counter-terrorism agencies in operation, governments have set up financial intelligence units (FIUs) within their borders for the purpose of tracking down terrorists’ funds. By investigating reported suspicious transactions, FIUs attempt to weed out financial criminals who use these illegal funds to finance terrorist activity. The prominent role played by FIUs means that their performance is always under the spotlight. By interviewing experts and conducting surveys of those associated with the fight against financial crime, this study investigated perceptions of FIU performance on a comparative basis between American and non-American FIUs. The target group of experts included financial institution personnel, civilian agents, law enforcement personnel, academicians, and consultants. Questions for the interview and surveys were based on the Kaplan and Norton’s Balanced Scorecard (BSC) methodology. One of the objectives of this study was to help determine the suitability of the BSC to this arena. While FIUs in this study have concentrated on performance by measuring outputs such as the number of suspicious transaction reports investigated, this study calls for a focus on outcomes involving all the parties responsible for financial criminal investigations. It is only through such an integrated approach that these various entities will be able to improve performance in solving financial crime. Experts in financial intelligence strongly believed that the quality and timeliness of intelligence was more important than keeping track of the number of suspicious transaction reports. Finally, this study concluded that the BSC could be appropriately applied to the arena of financial crime prevention even though the emphasis is markedly different from that in the private sector. While priority in the private sector is given to financial outcomes, in this arena employee growth and internal processes were perceived as most important in achieving a satisfactory outcome.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Existing instrumental techniques must be adaptable to the analysis of novel explosives if science is to keep up with the practices of terrorists and criminals. The focus of this work has been the development of analytical techniques for the analysis of two types of novel explosives: ascorbic acid-based propellants, and improvised mixtures of concentrated hydrogen peroxide/fuel. In recent years, the use of these explosives in improvised explosive devices (IEDs) has increased. It is therefore important to develop methods which permit the identification of the nature of the original explosive from post-blast residues. Ascorbic acid-based propellants are low explosives which employ an ascorbic acid fuel source with a nitrate/perchlorate oxidizer. A method which utilized ion chromatography with indirect photometric detection was optimized for the analysis of intact propellants. Post-burn and post-blast residues if these propellants were analyzed. It was determined that the ascorbic acid fuel and nitrate oxidizer could be detected in intact propellants, as well as in the post-burn and post-blast residues. Degradation products of the nitrate and perchlorate oxidizers were also detected. With a quadrupole time-of-flight mass spectrometer (QToFMS), exact mass measurements are possible. When an HPLC instrument is coupled to a QToFMS, the combination of retention time with accurate mass measurements, mass spectral fragmentation information, and isotopic abundance patterns allows for the unequivocal identification of a target analyte. An optimized HPLC-ESI-QToFMS method was applied to the analysis of ascorbic acid-based propellants. Exact mass measurements were collected for the fuel and oxidizer anions, and their degradation products. Ascorbic acid was detected in the intact samples and half of the propellants subjected to open burning; the intact fuel molecule was not detected in any of the post-blast residue. Two methods were optimized for the analysis of trace levels of hydrogen peroxide: HPLC with fluorescence detection (HPLC-FD), and HPLC with electrochemical detection (HPLC-ED). Both techniques were extremely selective for hydrogen peroxide. Both methods were applied to the analysis of post-blast debris from improvised mixtures of concentrated hydrogen peroxide/fuel; hydrogen peroxide was detected on variety of substrates. Hydrogen peroxide was detected in the post-blast residues of the improvised explosives TATP and HMTD.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In the wake of the “9-11” terrorists' attacks, the U.S. Government has turned to information technology (IT) to address a lack of information sharing among law enforcement agencies. This research determined if and how information-sharing technology helps law enforcement by examining the differences in perception of the value of IT between law enforcement officers who have access to automated regional information sharing and those who do not. It also examined the effect of potential intervening variables such as user characteristics, training, and experience, on the officers' evaluation of IT. The sample was limited to 588 officers from two sheriff's offices; one of them (the study group) uses information sharing technology, the other (the comparison group) does not. Triangulated methodologies included surveys, interviews, direct observation, and a review of agency records. Data analysis involved the following statistical methods: descriptive statistics, Chi-Square, factor analysis, principal component analysis, Cronbach's Alpha, Mann-Whitney tests, analysis of variance (ANOVA), and Scheffe' post hoc analysis. ^ Results indicated a significant difference between groups: the study group perceived information sharing technology as being a greater factor in solving crime and in increasing officer productivity. The study group was more satisfied with the data available to it. As to the number of arrests made, information sharing technology did not make a difference. Analysis of the potential intervening variables revealed several remarkable results. The presence of a strong performance management imperative (in the comparison sheriff's office) appeared to be a factor in case clearances and arrests, technology notwithstanding. As to the influence of user characteristics, level of education did not influence a user's satisfaction with technology, but user-satisfaction scores differed significantly among years of experience as a law enforcement officer and the amount of computer training, suggesting a significant but weak relationship. ^ Therefore, this study finds that information sharing technology assists law enforcement officers in doing their jobs. It also suggests that other variables such as computer training, experience, and management climate should be accounted for when assessing the impact of information technology. ^