65 resultados para Terrorists
Resumo:
Maritime security has emerged as a critical legal and political issue in the contemporary world. Terrorism in the maritime domain is a major maritime security issue. Ten out of the 44 major terrorist groups of the world, as identified in the US Department of State’s Country Reports on Terrorism, have maritime terrorism capabilities. Prosecution of maritime terrorists is a politically and legally difficult issue, which may create conflicts of jurisdiction. Prosecution of alleged maritime terrorists is carried out by national courts. There is no international judicial institution for the prosecution of maritime terrorists. International law has therefore anticipated a vital role for national courts in this respect. The international legal framework for combating maritime terrorism has been elaborately examined in existing literature therefore this paper will only highlight the issues regarding the prosecution of maritime terrorists. This paper argues that despite having comprehensive intentional legal framework for the prosecution of maritime terrorists there is still some scopes for conflicts of jurisdiction particularly where two or more States are interested to prosecute the same offender. This existing legal problem has been further aggravated in the post September 11 era. Due to the political and security implications, States may show reluctance in ensuring the international law safeguards of alleged perpetrators in the arrest, detention and prosecution process. Nevertheless, international law has established a comprehensive system for the prosecution of maritime terrorists where national courts is the main forum of ensuring the international law safeguards of alleged perpetrators as well as ensuring the effective prosecution of maritime terrorists thereby playing an instrumental role in establishing a rule based system for combating maritime terrorism. Using two case studies, this paper shows that the role of national courts has become more important in the present era because there may be some situations where no State is interested to initiate proceedings in international forums for vindicating rights of an alleged offender even if there is a clear evidence of violation of international human rights law in the arrest, detention and prosecution process. This paper presents that despite some bottlenecks national courts are actively playing this critical role. Overall, this paper highlights the instrumental role of national courts in the international legal order.
Resumo:
In August 1971, the devolved Stormont administration in Northern Ireland introduced internment without trial of those suspected of involvement in IRA terrorism. Ever since, the policy has been regarded as an abject failure. This article will reassess many of the key questions about internment: why did the Northern Ireland government introduce it when it did? Why did the Westminster government agree to a measure without parallel in British peacetime history? Why did it fail, when it had worked before? Was internment always doomed, or only because it was badly implemented? What was the alternative? How does the liberal democratic state defend itself against violent subversion without itself resorting to brutality and violence? This article is based on archival research in Great Britain, Northern Ireland and the Republic of Ireland, and on interviews with former internees, politicians and civil servants, and former members of the security forces. It suggests that internment was a relatively humane and honest policy and might, in different circumstances, have spared Northern Ireland thirty years of murder and mayhem.
Resumo:
Resumen tomado de la publicaci??n
Resumo:
This article investigates the ideology of Al-Qaeda as perceived from within the network. Particular attention is paid to the ideological background of Al-Qaeda's intellectual leadership, its sociopolitical context and the nature of its recruits. The inner logic of the Al-Qaeda organisation advances an intellectual concept that is not based on the main schools of Islamic theology, but on a new ideological starting point that results from the application of Islamic principles to sociopolitical change. With its political goals reinforced by the teachings of the Quran, exemplified by the content and rhetoric of a recently discovered training manual, the organisation creates powerful imagery embedded in the collective consciousness of the Muslim community. Thus, the message provided by Al-Qaeda inspires its followers to commit violent acts of destruction while being fully convinced that they are fulfilling the ordained will of Allah.
Resumo:
Support among US citizens for severe interrogation has been recognized as drawing upon utilitarian as well as on retributive motivation (Carlsmith & Sood, 2009). Two studies were conducted to expand on these findings in a Swiss sample. In Study 1, participants rated the severity of different interrogation techniques, which were scaled to provide an alternative measure of interrogation severity. In Study 2, retributive motivation was manipulated by varying the terrorist past of a male suspect, and utilitarian motivation was manipulated by varying the probability that the suspect could provide valuable information. Additionally, we manipulated the suspect’s group membership. The results of the vignette study suggest that the number and severity of recommended interrogation techniques is mainly influenced by whether the suspect might provide valuable information. Whether the suspect had a terrorist past was an additional influence that, however, was primarily attributable to the suspect’s group membership: If the suspect belonged to the ingroup, participants’ harsher interrogation recommendations were affected by that person’s past, whereas recommendations were not significantly influenced by a terrorist past if the suspect was an outgroup member.
Resumo:
The nexus between terrorism and organised crime consists in a strategic alliance between two non-state actors, able to exploit illegal markets, threaten the security of individuals, and influence policy-making on a global level. Recent Europol reports have pointed towards the importance of studying the links between organised crime and terrorist groups, and have underlined that the nature and extent of these connections have seldom been addressed from an academic perspective. Considering the degree of dangerousness that both organised crime and terrorism currently represent in the world, the collusion between these two phenomena is of urgent contemporary interest. Basing itself on geographical case-studies, this edited volume aims at contributing to the existing literature in three ways: by enriching the empirical knowledge on the nature of the crime-terror nexus and its evolution; by exploring the impact of the nexus within different economic, political and societal contexts; and by expanding on its theoretical conceptualization.
Resumo:
Bomb attacks carried out by terrorists, targeting high occupancy buildings, have become increasingly common in recent times. Large numbers of casualties and property damage result from overpressure of the blast followed by failing of structural elements. Understanding the blast response of multi-storey buildings and evaluating their remaining life have therefore become important. Response and damage analysis of single structural components, such as columns or slabs, to explosive loads have been examined in the literature, but the studies on blast response and damage analysis of structural frames in multi-storey buildings is limited and this is necessary for assessing the vulnerability of them. This paper investigates the blast response and damage evaluation of reinforced concrete (RC) frames, designed for normal gravity loads, in order to evaluate their remaining life. Numerical modelling and analysis were carried out using the explicit finite element software, LS DYNA. The modelling and analysis takes into consideration reinforcement details together and material performance under higher strain rates. Damage indices for columns are calculated based on their residual and original capacities. Numerical results generated in the can be used to identify relationships between the blast load parameters and the column damage. Damage index curve will provide a simple means for assessing the damage to a typical multi-storey building RC frame under an external bomb circumstance.
Resumo:
Iconic and significant buildings are the common target of bombings by terrorists causing large numbers of casualties and extensive property damage. Recent incidents were external bomb attacks on multi-storey buildings with reinforced concrete frames. Under a blast load circumstance, crucial damage initiates at low level storeys in a building and may then lead to a progressive collapse of whole or part of the structure. It is therefore important to identify the critical initial influence regions along the height, width and depth of the building exposed to blast effects and the structure response in order to assess the vulnerability of the structure to disproportionate and progressive collapse. This paper discusses the blast response and the propagation of its effects on a two dimensional reinforced concrete (RC) frame, designed to withstand normal gravity loads. The explicit finite element code, LS DYNA is used for the analysis. A complete RC portal frame seven storeys by six bays is modelled with reinforcement details and appropriate materials to simulate strain rate effects. Explosion loads derived from standard manuals are applied as idealized triangular pressures on the column faces of the numerical models. The analysis reports the influence of blast propagation as displacements and material yielding of the structural elements in the RC frame. The effected regions are identified and classified according to the load cases. This information can be used to determine the vulnerability of multi-storey RC buildings to various external explosion scenarios and designing buildings to resist blast loads.
Resumo:
Speaker verification is the process of verifying the identity of a person by analysing their speech. There are several important applications for automatic speaker verification (ASV) technology including suspect identification, tracking terrorists and detecting a person’s presence at a remote location in the surveillance domain, as well as person authentication for phone banking and credit card transactions in the private sector. Telephones and telephony networks provide a natural medium for these applications. The aim of this work is to improve the usefulness of ASV technology for practical applications in the presence of adverse conditions. In a telephony environment, background noise, handset mismatch, channel distortions, room acoustics and restrictions on the available testing and training data are common sources of errors for ASV systems. Two research themes were pursued to overcome these adverse conditions: Modelling mismatch and modelling uncertainty. To directly address the performance degradation incurred through mismatched conditions it was proposed to directly model this mismatch. Feature mapping was evaluated for combating handset mismatch and was extended through the use of a blind clustering algorithm to remove the need for accurate handset labels for the training data. Mismatch modelling was then generalised by explicitly modelling the session conditions as a constrained offset of the speaker model means. This session variability modelling approach enabled the modelling of arbitrary sources of mismatch, including handset type, and halved the error rates in many cases. Methods to model the uncertainty in speaker model estimates and verification scores were developed to address the difficulties of limited training and testing data. The Bayes factor was introduced to account for the uncertainty of the speaker model estimates in testing by applying Bayesian theory to the verification criterion, with improved performance in matched conditions. Modelling the uncertainty in the verification score itself met with significant success. Estimating a confidence interval for the "true" verification score enabled an order of magnitude reduction in the average quantity of speech required to make a confident verification decision based on a threshold. The confidence measures developed in this work may also have significant applications for forensic speaker verification tasks.
Resumo:
Tracking/remote monitoring systems using GNSS are a proven method to enhance the safety and security of personnel and vehicles carrying precious or hazardous cargo. While GNSS tracking appears to mitigate some of these threats, if not adequately secured, it can be a double-edged sword allowing adversaries to obtain sensitive shipment and vehicle position data to better coordinate their attacks, and to provide a false sense of security to monitoring centers. Tracking systems must be designed with the ability to perform route-compliance and thwart attacks ranging from low-level attacks such as the cutting of antenna cables to medium and high-level attacks involving radio jamming and signal / data-level simulation, especially where the goods transported have a potentially high value to terrorists. This paper discusses the use of GNSS in critical tracking applications, addressing the mitigation of GNSS security issues, augmentation systems and communication systems in order to provide highly robust and survivable tracking systems.