WorldWideScience

Sample records for terrorism event classification

  1. Terrorism as Media Event

    Directory of Open Access Journals (Sweden)

    2012-07-01

    Full Text Available Proving that terrorism should be seen as a media event (as defined by Dayan and Katzafter 9/11 and treated accordingly. We have turned to the work of Dayan and Katz and GeorgeGerbner’s for a definition of media events and of violence in the mass media. This paper is ahermeneutical interpretation of the concept of terrorism and its relation to communication. We haveput forward a better understanding of the complex concept of terrorism and its definitions in the massmedia context. Terrorism nowadays should always be defined within its inherent relation with themedia. The article is the first to define terrorism as media evenit in Dayan and Katz’s terms.

  2. Research on Visual Analysis Methods of Terrorism Events

    Science.gov (United States)

    Guo, Wenyue; Liu, Haiyan; Yu, Anzhu; Li, Jing

    2016-06-01

    Under the situation that terrorism events occur more and more frequency throughout the world, improving the response capability of social security incidents has become an important aspect to test governments govern ability. Visual analysis has become an important method of event analysing for its advantage of intuitive and effective. To analyse events' spatio-temporal distribution characteristics, correlations among event items and the development trend, terrorism event's spatio-temporal characteristics are discussed. Suitable event data table structure based on "5W" theory is designed. Then, six types of visual analysis are purposed, and how to use thematic map and statistical charts to realize visual analysis on terrorism events is studied. Finally, experiments have been carried out by using the data provided by Global Terrorism Database, and the results of experiments proves the availability of the methods.

  3. Event Classification using Concepts

    NARCIS (Netherlands)

    Boer, M.H.T. de; Schutte, K.; Kraaij, W.

    2013-01-01

    The semantic gap is one of the challenges in the GOOSE project. In this paper a Semantic Event Classification (SEC) system is proposed as an initial step in tackling the semantic gap challenge in the GOOSE project. This system uses semantic text analysis, multiple feature detectors using the BoW

  4. Management of the Extreme Events: Countering International Terrorism

    Directory of Open Access Journals (Sweden)

    Dr. Cristian Barna

    2011-12-01

    Full Text Available After the terrorism attacks of September 11, 2001, there is recognition by both the public and private sectors that one needs to rethink our strategy for dealing with these low probability but extreme consequence events. September 11, 2001 attacks against the United States raised numerous questions related to counter-terrorism, foreign policy, as well as national security in the United States and abroad. They also raised the fundamental question of who should pay for losses due to terrorism.The question of who should pay for terrorism risk prevention and sustainable coverage within a country is likely to be seen first as a matter of collective responsibility that each country has to consider – a societal choice

  5. Worrying about terrorism and other acute environmental health hazard events.

    Science.gov (United States)

    Greenberg, Michael; Babcock-Dunning, Lauren

    2012-04-01

    To better understand why some people worry more about terrorism compared with others, we measured how much US residents worried about a terrorist event in their area and examined the association of their fears with their concerns about acute and chronic hazards and other correlates. In 2008 (n = 600) and 2010 (n = 651), we performed a random-digit dialing national landline telephone survey. We asked about worries about terrorism and 5 other environmental health hazard issues. We also collected demographic and socioeconomic data. Only 15% worried "a great deal" about a terrorist event in their area and 18% to 33% were greatly concerned about other environmental issues. Fear about acute hazard events was a stronger predictor of a great deal of concern about terrorism than were age, race/ethnicity, gender, educational achievement, and other correlates. Those who worried most about acute environmental health hazard events were most likely to worry about terrorism. Also, those who were older, poorer, Blacks, or Latinos, or who lived in populous urban areas felt they were most vulnerable to terrorist attacks. We recommend methods to involve US citizens as part of disaster planning.

  6. Simple probabilistic method for relative risk evaluation of nuclear terrorism events

    International Nuclear Information System (INIS)

    Zhang Songbai; Wu Jun

    2006-01-01

    On the basis of the event-tree and probability analysis methods, a probabilistic method of nuclear terrorism risk was built, and the risk of terrorism events was analyzed. With the statistical data for and hypothetical data for relative events, the relative probabilities of the four kinds of nuclear terrorism events were obtained, as well as the relative risks of these four kinds of nuclear terrorism events were calculated by using this probabilistic method. The illustrated case show that the descending sequence of damages from the four kinds of nuclear terrorism events for single event is as following: nuclear explosive and improvised nuclear explosive, nuclear facility attacked, and 'dirty bomb'. Under the hypothetical condition, the descending sequence of possibilities for the four kinds of nuclear terrorism events is as following: 'dirty bomb', nuclear facility attacked, improvised nuclear explosive and nuclear explosive, but the descending sequence of risks is as following: 'dirty bomb', improvised nuclear explosive, nuclear facility attacked, and nuclear explosive . (authors)

  7. TOURISMOLOGICAL CLASSIFICATION OF SPORTING EVENTS

    Directory of Open Access Journals (Sweden)

    Željko Bjeljac

    2017-04-01

    Full Text Available Sporting events are programs, which are dominated by creative and complex facilities, primarily sports, but also recreation and entertainment. As such, they achieve tourism effects and goals and have a socio-economic importance for the city, region or state. Depending on the size and importance of sports event, sport has a different role in the context of promoting tourist destination, as well as different values. Each sport discipline has its own criteria by which athletes are ranked individually or as team. The subject of the research is to determine the criteria for the categorization of sporting events, in order to determine the importance of sporting events as an element of the tourist offer (individually or as part of a tourist destination. Also, this paper’s results present a comparative analysis of similar methodologies for the categorization of sporting events. Based on the research presented in the paper, there are four groups of criteria: economic, media, social and environmental. Together with this, paper gives the classification of traditional sporting events in the case of Serbia, dividing them in four groups.

  8. The nuclear and radiological terrorism events and the strategy to combat

    International Nuclear Information System (INIS)

    Wang Shanqiang

    2004-01-01

    The super-terrorism using large-scale antipersonnel weapons has become one real threat for the contemporary international society to face. The radioactive materials releasing from the nuclear and radiological terrorism events will cause the personnel dead and injured with mental state dismay, which break national official business, people life, society stability and economy development, and give mankind social result in endanger with large affect and have been concerned by the people all over the world. This paper analyzes the possible pattern and harmfulness of the nuclear and radiological terrorism events, at the same time puts forward the strategy to combat them according to their three categories and typical scenes. (author)

  9. Prior adversities predict posttraumatic stress reactions in adolescents following the Oslo Terror events 2011

    Science.gov (United States)

    Nordanger, Dag Ø.; Breivik, Kyrre; Haugland, Bente Storm; Lehmann, Stine; Mæhle, Magne; Braarud, Hanne Cecilie; Hysing, Mari

    2014-01-01

    Background Former studies suggest that prior exposure to adverse experiences such as violence or sexual abuse increases vulnerability to posttraumatic stress reactions in victims of subsequent trauma. However, little is known about how such a history affects responses to terror in the general adolescent population. Objective To explore the role of prior exposure to adverse experiences as risk factors for posttraumatic stress reactions to the Oslo Terror events. Method We used data from 10,220 high school students in a large cross-sectional survey of adolescents in Norway that took place seven months after the Oslo Terror events. Prior exposure assessed was: direct exposure to violence, witnessing of violence, and unwanted sexual acts. We explored how these prior adversities interact with well-established risk factors such as proximity to the events, perceived life threat during the terror events, and gender. Results All types of prior exposure as well as the other risk factors were associated with terror-related posttraumatic stress reactions. The effects of prior adversities were, although small, independent of adolescents’ proximity to the terror events. Among prior adversities, only the effect of direct exposure to violence was moderated by perceived life threat. Exposure to prior adversities increased the risk of posttraumatic stress reactions equally for both genders, but proximity to the terror events and perceived life threat increased the risk more in females. Conclusions Terror events can have a more destabilizing impact on victims of prior adversities, independent of their level of exposure. The findings may be relevant to mental health workers and others providing post-trauma health care. PMID:24872862

  10. Prior adversities predict posttraumatic stress reactions in adolescents following the Oslo Terror events 2011

    Directory of Open Access Journals (Sweden)

    Dag Ø. Nordanger

    2014-05-01

    Full Text Available Background: Former studies suggest that prior exposure to adverse experiences such as violence or sexual abuse increases vulnerability to posttraumatic stress reactions in victims of subsequent trauma. However, little is known about how such a history affects responses to terror in the general adolescent population. Objective: To explore the role of prior exposure to adverse experiences as risk factors for posttraumatic stress reactions to the Oslo Terror events. Method: We used data from 10,220 high school students in a large cross-sectional survey of adolescents in Norway that took place seven months after the Oslo Terror events. Prior exposure assessed was: direct exposure to violence, witnessing of violence, and unwanted sexual acts. We explored how these prior adversities interact with well-established risk factors such as proximity to the events, perceived life threat during the terror events, and gender. Results: All types of prior exposure as well as the other risk factors were associated with terror-related posttraumatic stress reactions. The effects of prior adversities were, although small, independent of adolescents’ proximity to the terror events. Among prior adversities, only the effect of direct exposure to violence was moderated by perceived life threat. Exposure to prior adversities increased the risk of posttraumatic stress reactions equally for both genders, but proximity to the terror events and perceived life threat increased the risk more in females. Conclusions: Terror events can have a more destabilizing impact on victims of prior adversities, independent of their level of exposure. The findings may be relevant to mental health workers and others providing post-trauma health care.

  11. Prior adversities predict posttraumatic stress reactions in adolescents following the Oslo Terror events 2011.

    Science.gov (United States)

    Nordanger, Dag Ø; Breivik, Kyrre; Haugland, Bente Storm; Lehmann, Stine; Mæhle, Magne; Braarud, Hanne Cecilie; Hysing, Mari

    2014-01-01

    Former studies suggest that prior exposure to adverse experiences such as violence or sexual abuse increases vulnerability to posttraumatic stress reactions in victims of subsequent trauma. However, little is known about how such a history affects responses to terror in the general adolescent population. To explore the role of prior exposure to adverse experiences as risk factors for posttraumatic stress reactions to the Oslo Terror events. We used data from 10,220 high school students in a large cross-sectional survey of adolescents in Norway that took place seven months after the Oslo Terror events. Prior exposure assessed was: direct exposure to violence, witnessing of violence, and unwanted sexual acts. We explored how these prior adversities interact with well-established risk factors such as proximity to the events, perceived life threat during the terror events, and gender. All types of prior exposure as well as the other risk factors were associated with terror-related posttraumatic stress reactions. The effects of prior adversities were, although small, independent of adolescents' proximity to the terror events. Among prior adversities, only the effect of direct exposure to violence was moderated by perceived life threat. Exposure to prior adversities increased the risk of posttraumatic stress reactions equally for both genders, but proximity to the terror events and perceived life threat increased the risk more in females. Terror events can have a more destabilizing impact on victims of prior adversities, independent of their level of exposure. The findings may be relevant to mental health workers and others providing post-trauma health care.

  12. Terrorism

    International Nuclear Information System (INIS)

    Rossnagel, A.

    1990-01-01

    The NPT should prevent the proliferation of nuclear weapons, as a contribution to the worldpeace. This aim is also threatened today by the nuclear actions of states and subnational groups. Such actions have occured in the past and are expected in the future. States and specific terrorist groups are able to acquire specific nuclear material by theft and to assault nuclear plants and transport. The main constraint, the deficit of motivation, could be dropped in the future for many reasons. Therefore nuclear terrorism is a 'real threat to civilization' and its probability is increasing. (orig.) [de

  13. Research issues in preparedness for mass casualty events, disaster, war, and terrorism.

    Science.gov (United States)

    Hinton Walker, Patricia; Garmon Bibb, Sandra C; Elberson, Karen L

    2005-09-01

    This article provides a perspective on the types of research questions that might be explored and strategies used in relation to disaster,terrorism, and mass casualty events. Research is addressed in the context of three areas of focus: issues related to the health care provider; issues affecting the patient, individual, family, and community; and issues related to the health care system.

  14. A pentatonic classification of extreme events

    International Nuclear Information System (INIS)

    Eliazar, Iddo; Cohen, Morrel H.

    2015-01-01

    In this paper we present a classification of the extreme events – very small and very large outcomes – of positive-valued random variables. The classification distinguishes five different categories of randomness, ranging from the very ‘mild’ to the very ‘wild’. In analogy with the common five-tone musical scale we term the classification ‘pentatonic’. The classification is based on the analysis of the inherent Gibbsian ‘forces’ and ‘temperatures’ existing on the logarithmic scale of the random variables under consideration, and provides a statistical-physics insight regarding the nature of these random variables. The practical application of the pentatonic classification is remarkably straightforward, it can be performed by non-experts, and it is demonstrated via an array of examples

  15. Unintentional drinking-water contamination events of unknown origin: surrogate for terrorism preparedness.

    Science.gov (United States)

    Winston, Gary; Leventhal, Alex

    2008-01-01

    Drinking-water is a direct conduit to many human receptors. An intentional attack (e.g. terrorism) on drinking-water systems can shock and disrupt elements of national infrastructures. We report on an unintentional drinking-water contamination event that occurred in Tel Aviv, Israel in July, 2001. Initially of unknown origin, this event involved risk management strategies used by the Ministry of Health for abating a potential public health crisis as might be envisaged of water contamination due to terrorism. In an abrupt event of unknown origin, public health officials need to be responsible for the same level of preparedness and risk communication. This is emphasized by comparison of management strategies between the Tel Aviv event and one of dire consequences that occurred in Camelford, England in 1988. From the onset of the Tel Aviv incident, the public health strategy was to employ the precautionary principle by warning residents of the affected region to not drink tap water, even if boiled. This strategy was in contrast to an earlier crisis that occurred in Camelford, England in 1988. An outcome of this event was heightened awareness that a water crisis can occur in peacetime and not only in association with terrorism. No matter how minor the contamination event or short-term the disruption of delivery of safe drinking-water, psychological, medical and public health impact could be significant.

  16. Statistical Property and Model for the Inter-Event Time of Terrorism Attacks

    Science.gov (United States)

    Zhu, Jun-Fang; Han, Xiao-Pu; Wang, Bing-Hong

    2010-06-01

    The inter-event time of terrorism attack events is investigated by empirical data and model analysis. Empirical evidence shows that it follows a scale-free property. In order to understand the dynamic mechanism of such a statistical feature, an opinion dynamic model with a memory effect is proposed on a two-dimensional lattice network. The model mainly highlights the role of individual social conformity and self-affirmation psychology. An attack event occurs when the order parameter indicating the strength of public opposition opinion is smaller than a critical value. Ultimately, the model can reproduce the same statistical property as the empirical data and gives a good understanding for the possible dynamic mechanism of terrorism attacks.

  17. Power quality event classification: an overview and key issues ...

    African Journals Online (AJOL)

    ... used for PQ events' classifications. Various artificial intelligent techniques which are used in PQ event classification are also discussed. Major Key issues and challenges in classifying PQ events are critically examined and outlined. Keywords: Power quality, PQ event classifiers, artificial intelligence techniques, PQ noise, ...

  18. Countermeasures and vaccination against terrorism using smallpox: pre-event and post-event smallpox vaccination and its contraindications.

    Science.gov (United States)

    Sato, Hajime

    2011-09-01

    Smallpox, when used as a biological weapon, presents a serious threat to civilian populations. Core components of the public health management of a terrorism attack using smallpox are: vaccination (ring vaccination and mass vaccination), adverse event monitoring, confirmed and suspected smallpox case management, contact management, identifying, tracing, monitoring contacts, and quarantine. Above all, pre-event and post-event vaccination is an indispensable part of the strategies. Since smallpox patients are most infectious from onset of the rash through the first 7-10 days of the rash, vaccination should be administered promptly within a limited time frame. However, vaccination can accompany complications, such as postvaccinial encephalitis, progressive vaccinia, eczema vaccinatum, and generalized vaccinia. Therefore, vaccination is not recommended for certain groups. Public health professionals, as well as physicians and government officials, should also be well equipped with all information necessary for appropriate and effective smallpox management in the face of such a bioterrorism attack.

  19. Crossing the Rubicon: making a case for refining the classification of Jihadist Terrorism

    OpenAIRE

    Hand, Robert Wayne

    2012-01-01

    This paper posits that our current understanding of Jihadist Terrorism as a monolithic sub-type of Political Terrorism is flawed and that as a result our governments counter this threat with inappropriately-adapted methods. The author argues: (A) There is a sub-type of Jihadist Terrorism that is more consistent with Walter’s ‘Military Terrorism’ or Feldman and Hinojosa’s ‘Guerrilla Warfare’ than within the typology of Political Terrorism; (B) The author-proposed sub-type of ‘War Terrorism’ s...

  20. Ten Years after the Danish Muhammad Cartoon News Stories: Terror and Radicalization as Predictable Media Events

    DEFF Research Database (Denmark)

    Hervik, Peter

    2018-01-01

    , radicalization as a “pre-terrorist” phase has become the lens through which the category “Muslims” has been represented in much media coverage. In this article, I argue that the dominant hegemonic understanding in Denmark that is based on a certain spatial–racial logic is not a passive production of knowledge......In the tenth year after Danish daily Jyllands-Posten published twelve cartoons, the Muhammad Cartoons, this media event—and the hegemonic understanding behind it—continues to be a discursive reference point for new controversies around national borders and racial boundaries. Then, since late 2010....... It keeps informing news coverage of media events as terror and thereby risking describing the hegemony more than adequately understanding the events at hand....

  1. Crossing the Rubicon: Making a Case for Refining the Classification of Jihadist Terrorism

    Directory of Open Access Journals (Sweden)

    Robert Wayne Hand

    2012-09-01

    Full Text Available This paper posits that our current understanding of Jihadist Terrorism as a monolithic sub-type of Political Terrorism is flawed and that as a result our governments counter this threat with inappropriately-adapted methods.  The author argues: (A There is a 'sub-type' of Jihadist Terrorism that is more consistent with Walter’s ‘Military Terrorism’ or Feldman and Hinojosa’s ‘Guerrilla Warfare’ than within the typology of Political Terrorism; (B The author-proposed sub-type of ‘War Terrorism’ should be accepted, examined, defined, and established; and (C Establishing the author’s sub-type will allow western democracies to devise better counter-terrorism strategies while protecting the civil liberties of their citizens.

  2. Terrorism in South Korea.

    Science.gov (United States)

    Wang, Soon Joo; Choi, Jin Tae; Arnold, Jeffrey

    2003-01-01

    South Korea has experienced > 30 suspected terrorism-related events since 1958, including attacks against South Korean citizens in foreign countries. The most common types of terrorism used have included bombings, shootings, hijackings, and kidnappings. Prior to 1990, North Korea was responsible for almost all terrorism-related events inside of South Korea, including multiple assassination attempts on its presidents, regular kidnappings of South Korean fisherman, and several high-profile bombings. Since 1990, most of the terrorist attacks against South Korean citizens have occurred abroad and have been related to the emerging worldwide pattern of terrorism by international terrorist organizations or deranged individuals. The 1988 Seoul Olympic Games provided a major stimulus for South Korea to develop a national emergency response system for terrorism-related events based on the participation of multiple ministries. The 11 September 2001 World Trade Center and Pentagon attacks and the 2001 United States of America (US) anthrax letter attacks prompted South Korea to organize a new national system of emergency response for terrorism-related events. The system is based on five divisions for the response to specific types of terrorist events, involving conventional terrorism, bioterrorism, chemical terrorism, radiological terrorism, and cyber-terrorism. No terrorism-related events occurred during the 2002 World Cup and Asian Games held in South Korea. The emergency management of terrorism-related events in South Korea is adapting to the changing risk of terrorism in the new century.

  3. Homegrown terrorism; the known unknown

    OpenAIRE

    Hinkkainen, Kaisa

    2012-01-01

    Homegrown terrorism has attracted significant attention following the 2004 Madrid and 2005 London bombings. Homegrown terrorism is usually thought to be a new phenomenon, with few observed events, and inherently distinct from transnational terrorism or the old domestic terrorism in Europe. However, little research has so far examined the alleged distinctiveness of homegrown terrorism empirically. I argue that homegrown terrorism shares many similarities with domestic and international terrori...

  4. Subsurface Event Detection and Classification Using Wireless Signal Networks

    Directory of Open Access Journals (Sweden)

    Muhannad T. Suleiman

    2012-11-01

    Full Text Available Subsurface environment sensing and monitoring applications such as detection of water intrusion or a landslide, which could significantly change the physical properties of the host soil, can be accomplished using a novel concept, Wireless Signal Networks (WSiNs. The wireless signal networks take advantage of the variations of radio signal strength on the distributed underground sensor nodes of WSiNs to monitor and characterize the sensed area. To characterize subsurface environments for event detection and classification, this paper provides a detailed list and experimental data of soil properties on how radio propagation is affected by soil properties in subsurface communication environments. Experiments demonstrated that calibrated wireless signal strength variations can be used as indicators to sense changes in the subsurface environment. The concept of WSiNs for the subsurface event detection is evaluated with applications such as detection of water intrusion, relative density change, and relative motion using actual underground sensor nodes. To classify geo-events using the measured signal strength as a main indicator of geo-events, we propose a window-based minimum distance classifier based on Bayesian decision theory. The window-based classifier for wireless signal networks has two steps: event detection and event classification. With the event detection, the window-based classifier classifies geo-events on the event occurring regions that are called a classification window. The proposed window-based classification method is evaluated with a water leakage experiment in which the data has been measured in laboratory experiments. In these experiments, the proposed detection and classification method based on wireless signal network can detect and classify subsurface events.

  5. Subsurface event detection and classification using Wireless Signal Networks.

    Science.gov (United States)

    Yoon, Suk-Un; Ghazanfari, Ehsan; Cheng, Liang; Pamukcu, Sibel; Suleiman, Muhannad T

    2012-11-05

    Subsurface environment sensing and monitoring applications such as detection of water intrusion or a landslide, which could significantly change the physical properties of the host soil, can be accomplished using a novel concept, Wireless Signal Networks (WSiNs). The wireless signal networks take advantage of the variations of radio signal strength on the distributed underground sensor nodes of WSiNs to monitor and characterize the sensed area. To characterize subsurface environments for event detection and classification, this paper provides a detailed list and experimental data of soil properties on how radio propagation is affected by soil properties in subsurface communication environments. Experiments demonstrated that calibrated wireless signal strength variations can be used as indicators to sense changes in the subsurface environment. The concept of WSiNs for the subsurface event detection is evaluated with applications such as detection of water intrusion, relative density change, and relative motion using actual underground sensor nodes. To classify geo-events using the measured signal strength as a main indicator of geo-events, we propose a window-based minimum distance classifier based on Bayesian decision theory. The window-based classifier for wireless signal networks has two steps: event detection and event classification. With the event detection, the window-based classifier classifies geo-events on the event occurring regions that are called a classification window. The proposed window-based classification method is evaluated with a water leakage experiment in which the data has been measured in laboratory experiments. In these experiments, the proposed detection and classification method based on wireless signal network can detect and classify subsurface events.

  6. Sleep Terrors (Night Terrors)

    Science.gov (United States)

    ... terrors or other family members Lead to safety concerns or injury Result in daytime symptoms of excessive sleepiness or problems functioning Continue beyond the teen years or start in adulthood Causes Sleep terrors ...

  7. A classification of event sequences in the influence network

    Science.gov (United States)

    Walsh, James Lyons; Knuth, Kevin H.

    2017-06-01

    We build on the classification in [1] of event sequences in the influence network as respecting collinearity or not, so as to determine in future work what phenomena arise in each case. Collinearity enables each observer to uniquely associate each particle event of influencing with one of the observer's own events, even in the case of events of influencing the other observer. We further classify events as to whether they are spacetime events that obey in the fine-grained case the coarse-grained conditions of [2], finding that Newton's First and Second Laws of motion are obeyed at spacetime events. A proof of Newton's Third Law under particular circumstances is also presented.

  8. Development of a software for predicting the effects of nuclear and radiological terrorism events in city areas

    International Nuclear Information System (INIS)

    Luo Lijuan; Chen Bo; Zhuo Weihai; Lu Shuyu

    2011-01-01

    Objective: To develop a new software system that can directly display the predicted results on an electronic map, in order to get a directly perceived understanding of the affected areas of nuclear and radiological terrorism events in city areas. Methods: Three scenarios of events including spreading radioactive materials, dirty bomb attack, and explosion or arson attacks on the radiation facilities were assumed. Gaussian diffusion model was employed to predict the spread and deposition of radioactive pollutants, and both the internal and external doses were estimated for the representative person by using the corresponding dose conversion factors. Through integration of the computing system and Mapinfo geographic information system (GIS), the predicted results were visually displayed on the electronic maps of a city. Results: The new software system could visually display the predicted results on the electronic map of a city, and the predicted results were consistent with those calculated by the similar software Hotspot®. The deviation between this system and Hotspot was less than 0.2 km for predicted isoplethic curves of dose rate downwind. Conclusions: The newly developed software system is of the practical value in predicting the effects of nuclear and radiological terrorism events in city areas. (authors)

  9. Strategies of psychological terrorism perpetrated by ETA's network: delimitation and classification.

    Science.gov (United States)

    Martín-Peña, Javier; Rodríguez-Carballeira, Alvaro; Escartín Solanelles, Jordi; Porrúa García, Clara; Willem Winkel, Frans

    2010-02-01

    This paper defines and analyzes the harassment perpetrated by ETA's terrorist network in the Basque Country, providing a taxonomy of its strategies of psychological violence. The usefulness of this taxonomy has been tested and contrasted by means of a content analysis of 19 testimonies of persons who were the victims of violence by the terrorist network. The taxonomy of strategies of psychological violence is made up of four dimensions that emphasize the actions on the context of the persons affected, and on their emotional state, cognitions, and behaviour. Results show the predominance of emotional and cognitive strategies. Intra-observer and inter-observer reliability analysis in coding showed a Cohen's Kappa coefficient of .92 and .87, respectively. The psychological violence analyzed in this study reflects a form of psychological terrorism that harasses and persecutes a specific sector of the population.

  10. Dimensional Representation and Gradient Boosting for Seismic Event Classification

    Science.gov (United States)

    Semmelmayer, F. C.; Kappedal, R. D.; Magana-Zook, S. A.

    2017-12-01

    In this research, we conducted experiments of representational structures on 5009 seismic signals with the intent of finding a method to classify signals as either an explosion or an earthquake in an automated fashion. We also applied a gradient boosted classifier. While perfect classification was not attained (approximately 88% was our best model), some cases demonstrate that many events can be filtered out as very high probability being explosions or earthquakes, diminishing subject-matter experts'(SME) workload for first stage analysis. It is our hope that these methods can be refined, further increasing the classification probability.

  11. Classification system for reporting events involving human malfunctions

    International Nuclear Information System (INIS)

    Rasmussen, J.; Pedersen, O.M.; Mancini, G.; Carnino, A.; Griffon, M.; Gagnolet, P.

    1981-03-01

    The report describes a set of categories for reporting industrial incidents and events involving human malfunction. The classification system aims at ensuring information adequate for improvement of human work situations and man-machine interface systems and for attempts to quantify ''human error'' rates. The classification system has a multifacetted non-hierarchial structure and its compatibility with Ispra's ERDS classification is described. The collection of the information in general and for quantification purposes are discussed. 24 categories, 12 of which being human factors oriented, are listed with their respective subcategories, and comments are given. Underlying models of human data processes and their typical malfunctions and of a human decision sequence are described. (author)

  12. Classification system for reporting events involving human malfunctions

    International Nuclear Information System (INIS)

    Rasmussen, J.; Pedersen, O.M.; Mancini, G.

    1981-01-01

    The report describes a set of categories for reporting industrial incidents and events involving human malfunction. The classification system aims at ensuring information adequate for improvement of human work situations and man-machine interface systems and for attempts to quantify ''human error'' rates. The classification system has a multifacetted non-hierarchical structure and its compatibility with Ispra's ERDS classification is described. The collection of the information in general and for quantification purposes are discussed. 24 categories, 12 of which being human factors-oriented, are listed with their respective subcategories, and comments are given. Underlying models of human data process and their typical malfuntions and of a human decision sequence are described. The work reported is a joint contribution to the CSNI Group of Experts on Human Error Data and Assessment

  13. Classification system for reporting events involving human malfunctions

    DEFF Research Database (Denmark)

    Rasmussen, Jens; Pedersen, O.M.; Mancini, G.

    1981-01-01

    The report describes a set of categories for reporting indus-trial incidents and events involving human malfunction. The classification system aims at ensuring information adequate for improvement of human work situations and man-machine interface systems and for attempts to quantify "human error......" rates. The classification system has a multifacetted non-hierarchical struc-ture and its compatibility with Isprals ERDS classification is described. The collection of the information in general and for quantification purposes are discussed. 24 categories, 12 of which being human factors oriented......, are listed with their respective subcategories, and comments are given. Underlying models of human data processes and their typical malfunc-tions and of a human decision sequence are described....

  14. Informing Ex Ante Event Studies with Macro-Econometric Evidence on the Structural and Policy Impacts of Terrorism.

    Science.gov (United States)

    Nassios, Jason; Giesecke, James A

    2018-04-01

    Economic consequence analysis is one of many inputs to terrorism contingency planning. Computable general equilibrium (CGE) models are being used more frequently in these analyses, in part because of their capacity to accommodate high levels of event-specific detail. In modeling the potential economic effects of a hypothetical terrorist event, two broad sets of shocks are required: (1) physical impacts on observable variables (e.g., asset damage); (2) behavioral impacts on unobservable variables (e.g., investor uncertainty). Assembling shocks describing the physical impacts of a terrorist incident is relatively straightforward, since estimates are either readily available or plausibly inferred. However, assembling shocks describing behavioral impacts is more difficult. Values for behavioral variables (e.g., required rates of return) are typically inferred or estimated by indirect means. Generally, this has been achieved via reference to extraneous literature or ex ante surveys. This article explores a new method. We elucidate the magnitude of CGE-relevant structural shifts implicit in econometric evidence on terrorist incidents, with a view to informing future ex ante event assessments. Ex post econometric studies of terrorism by Blomberg et al. yield macro econometric equations that describe the response of observable economic variables (e.g., GDP growth) to terrorist incidents. We use these equations to determine estimates for relevant (unobservable) structural and policy variables impacted by terrorist incidents, using a CGE model of the United States. This allows us to: (i) compare values for these shifts with input assumptions in earlier ex ante CGE studies; and (ii) discuss how future ex ante studies can be informed by our analysis. © 2017 Society for Risk Analysis.

  15. Event-Based User Classification in Weibo Media

    Directory of Open Access Journals (Sweden)

    Liang Guo

    2014-01-01

    Full Text Available Weibo media, known as the real-time microblogging services, has attracted massive attention and support from social network users. Weibo platform offers an opportunity for people to access information and changes the way people acquire and disseminate information significantly. Meanwhile, it enables people to respond to the social events in a more convenient way. Much of the information in Weibo media is related to some events. Users who post different contents, and exert different behavior or attitude may lead to different contribution to the specific event. Therefore, classifying the large amount of uncategorized social circles generated in Weibo media automatically from the perspective of events has been a promising task. Under this circumstance, in order to effectively organize and manage the huge amounts of users, thereby further managing their contents, we address the task of user classification in a more granular, event-based approach in this paper. By analyzing real data collected from Sina Weibo, we investigate the Weibo properties and utilize both content information and social network information to classify the numerous users into four primary groups: celebrities, organizations/media accounts, grassroots stars, and ordinary individuals. The experiments results show that our method identifies the user categories accurately.

  16. A Hierarchical Convolutional Neural Network for vesicle fusion event classification.

    Science.gov (United States)

    Li, Haohan; Mao, Yunxiang; Yin, Zhaozheng; Xu, Yingke

    2017-09-01

    Quantitative analysis of vesicle exocytosis and classification of different modes of vesicle fusion from the fluorescence microscopy are of primary importance for biomedical researches. In this paper, we propose a novel Hierarchical Convolutional Neural Network (HCNN) method to automatically identify vesicle fusion events in time-lapse Total Internal Reflection Fluorescence Microscopy (TIRFM) image sequences. Firstly, a detection and tracking method is developed to extract image patch sequences containing potential fusion events. Then, a Gaussian Mixture Model (GMM) is applied on each image patch of the patch sequence with outliers rejected for robust Gaussian fitting. By utilizing the high-level time-series intensity change features introduced by GMM and the visual appearance features embedded in some key moments of the fusion process, the proposed HCNN architecture is able to classify each candidate patch sequence into three classes: full fusion event, partial fusion event and non-fusion event. Finally, we validate the performance of our method on 9 challenging datasets that have been annotated by cell biologists, and our method achieves better performances when comparing with three previous methods. Copyright © 2017 Elsevier Ltd. All rights reserved.

  17. Event-based user classification in Weibo media.

    Science.gov (United States)

    Guo, Liang; Wang, Wendong; Cheng, Shiduan; Que, Xirong

    2014-01-01

    Weibo media, known as the real-time microblogging services, has attracted massive attention and support from social network users. Weibo platform offers an opportunity for people to access information and changes the way people acquire and disseminate information significantly. Meanwhile, it enables people to respond to the social events in a more convenient way. Much of the information in Weibo media is related to some events. Users who post different contents, and exert different behavior or attitude may lead to different contribution to the specific event. Therefore, classifying the large amount of uncategorized social circles generated in Weibo media automatically from the perspective of events has been a promising task. Under this circumstance, in order to effectively organize and manage the huge amounts of users, thereby further managing their contents, we address the task of user classification in a more granular, event-based approach in this paper. By analyzing real data collected from Sina Weibo, we investigate the Weibo properties and utilize both content information and social network information to classify the numerous users into four primary groups: celebrities, organizations/media accounts, grassroots stars, and ordinary individuals. The experiments results show that our method identifies the user categories accurately.

  18. Using discriminant analysis as a nucleation event classification method

    Directory of Open Access Journals (Sweden)

    S. Mikkonen

    2006-01-01

    Full Text Available More than three years of measurements of aerosol size-distribution and different gas and meteorological parameters made in Po Valley, Italy were analysed for this study to examine which of the meteorological and trace gas variables effect on the emergence of nucleation events. As the analysis method, we used discriminant analysis with non-parametric Epanechnikov kernel, included in non-parametric density estimation method. The best classification result in our data was reached with the combination of relative humidity, ozone concentration and a third degree polynomial of radiation. RH appeared to have a preventing effect on the new particle formation whereas the effects of O3 and radiation were more conductive. The concentration of SO2 and NO2 also appeared to have significant effect on the emergence of nucleation events but because of the great amount of missing observations, we had to exclude them from the final analysis.

  19. Nuclear terrorism and reality

    International Nuclear Information System (INIS)

    St Sauver, J.E.

    1983-01-01

    Unlike conventional terrorist violence, bona-fide nuclear terrorism is a self-publicizing phenomenon. It is a public event by the very scope of its impact. Apocalyptic and catastrophically destructive, a nuclear explosion is the ideal instrument of mass terror. Rational nuclear insurgents would not inform authorities that a nuclear device is about to be detonated. Advance warning of an impending nuclear explosion would reduce the maximum potential effectiveness of any response to such an event

  20. ALADDIN: a neural model for event classification in dynamic processes

    International Nuclear Information System (INIS)

    Roverso, Davide

    1998-02-01

    ALADDIN is a prototype system which combines fuzzy clustering techniques and artificial neural network (ANN) models in a novel approach to the problem of classifying events in dynamic processes. The main motivation for the development of such a system derived originally from the problem of finding new principled methods to perform alarm structuring/suppression in a nuclear power plant (NPP) alarm system. One such method consists in basing the alarm structuring/suppression on a fast recognition of the event generating the alarms, so that a subset of alarms sufficient to efficiently handle the current fault can be selected to be presented to the operator, minimizing in this way the operator's workload in a potentially stressful situation. The scope of application of a system like ALADDIN goes however beyond alarm handling, to include diagnostic tasks in general. The eventual application of the system to domains other than NPPs was also taken into special consideration during the design phase. In this document we report on the first phase of the ALADDIN project which consisted mainly in a comparative study of a series of ANN-based approaches to event classification, and on the proposal of a first system prototype which is to undergo further tests and, eventually, be integrated in existing alarm, diagnosis, and accident management systems such as CASH, IDS, and CAMS. (author)

  1. Automatic Seismic-Event Classification with Convolutional Neural Networks.

    Science.gov (United States)

    Bueno Rodriguez, A.; Titos Luzón, M.; Garcia Martinez, L.; Benitez, C.; Ibáñez, J. M.

    2017-12-01

    Active volcanoes exhibit a wide range of seismic signals, providing vast amounts of unlabelled volcano-seismic data that can be analyzed through the lens of artificial intelligence. However, obtaining high-quality labelled data is time-consuming and expensive. Deep neural networks can process data in their raw form, compute high-level features and provide a better representation of the input data distribution. These systems can be deployed to classify seismic data at scale, enhance current early-warning systems and build extensive seismic catalogs. In this research, we aim to classify spectrograms from seven different seismic events registered at "Volcán de Fuego" (Colima, Mexico), during four eruptive periods. Our approach is based on convolutional neural networks (CNNs), a sub-type of deep neural networks that can exploit grid structure from the data. Volcano-seismic signals can be mapped into a grid-like structure using the spectrogram: a representation of the temporal evolution in terms of time and frequency. Spectrograms were computed from the data using Hamming windows with 4 seconds length, 2.5 seconds overlapping and 128 points FFT resolution. Results are compared to deep neural networks, random forest and SVMs. Experiments show that CNNs can exploit temporal and frequency information, attaining a classification accuracy of 93%, similar to deep networks 91% but outperforming SVM and random forest. These results empirically show that CNNs are powerful models to classify a wide range of volcano-seismic signals, and achieve good generalization. Furthermore, volcano-seismic spectrograms contains useful discriminative information for the CNN, as higher layers of the network combine high-level features computed for each frequency band, helping to detect simultaneous events in time. Being at the intersection of deep learning and geophysics, this research enables future studies of how CNNs can be used in volcano monitoring to accurately determine the detection and

  2. Applications of Location Similarity Measures and Conceptual Spaces to Event Coreference and Classification

    Science.gov (United States)

    McConky, Katie Theresa

    2013-01-01

    This work covers topics in event coreference and event classification from spoken conversation. Event coreference is the process of identifying descriptions of the same event across sentences, documents, or structured databases. Existing event coreference work focuses on sentence similarity models or feature based similarity models requiring slot…

  3. Detection of invisible and crucial events: from seismic fluctuations to the war against terrorism

    Energy Technology Data Exchange (ETDEWEB)

    Allegrini, Paolo; Fronzoni, Leone; Grigolini, Paolo; Latora, Vito; Mega, Mirko S.; Palatella, Luigi E-mail: luigi.palatella@df.unipi.it; Rapisarda, Andrea; Vinciguerra, Sergio

    2004-04-01

    We argue that the recent discovery of the non-Poissonian statistics of the seismic main-shocks is a special case of a more general approach to the detection of the distribution of the time increments between one crucial but invisible event and the next. We make the conjecture that the proposed approach can be applied to the analysis of terrorist network with significant benefits for the Intelligence Community.

  4. Night Terrors in Children

    OpenAIRE

    Feferman, Irv

    1988-01-01

    Night terrors are a bizarre sleep disorder that affects young children. The child partially awakes during the night agitated, afraid and terrified, and cannot be consoled. These events, which may be related to emotional turmoil, are self-limiting. Psychiatric evaluation is indicated in certain cases, and drug therapy is almost never necessary. Parents should be reassured that night terrors are not dangerous and do not reflect any serious pathology.

  5. Socioconomic nature of terrorism

    Directory of Open Access Journals (Sweden)

    Valeriy Petrovich Chichkanov

    2013-12-01

    Full Text Available In the article, the theoretical and methodological foundations of investigation of the  socioeconomic nature of terrorism are considered. Hypothesis of research is the existence of methodological criteria of territory classification on the basis of external and internal terrorism. On the basis of the analysis of theoretical works of national and foreign authors, normative documents of state and international level the genesis of approaches to the understanding of the essence of modern terrorism, its contents, the subject-object relations and manifestation forms is received. As the result, according to the authors’ definition “terrorism” is understood as an ideology connected with deliberate violence or threats against the civilian population or property to influence on the government or the interstate organizations. In the work, the factors of development and spreading of terrorism in the Russian Federation’s regions are allocated and quantitatively proved. Weight parameters of the specified factors are determined. The methodological differentiation of the specified factors on factors of terrorism external (attacks from the outside and an internal form (distribution and realization of radical ideas within the region in the territory is the distinctive feature of the conducted research. During the research, the cluster analysis of a region is carried out to distribute of Russia’s regions according to the typological characteristic of the region of internal and external terrorism. The obtained data are verified in accordance with empirical data, the hypothesis of the existence of methodological criteria of the region classification on the basis of external and internal terrorism is proved.

  6. Psychiatry and terrorism.

    Science.gov (United States)

    Stoddard, Frederick J; Gold, Joel; Henderson, Schuyler W; Merlino, Joseph P; Norwood, Ann; Post, Jerrold M; Shanfield, Stephen; Weine, Stevan; Katz, Craig L

    2011-08-01

    Terrorism has dominated the domestic and international landscape since 9/11. Like other fields, psychiatry was not well prepared. With the 10th anniversary of the 9/11 attack approaching, it is timely to consider what can be done to prepare before the next event. Much has been learned to provide knowledge and resources. The roles of psychiatrists are challenged by what is known of the causes of, consequences of, and responses to terrorism. Reflecting on knowledge from before and since 9/11 introduces concepts, how individuals become terrorists, how to evaluate the psychiatric and behavioral effects of terrorism, and how to expand treatments, behavioral health interventions, public policy initiatives, and other responses for its victims. New research, clinical approaches, and policy perspectives inform strategies to reduce fear and cope with the aftermath. This article identifies the psychiatric training, skills and services, and ethical considerations necessary to prevent or reduce terrorism and its tragic consequences and to enhance resilience.

  7. Defining Terrorism.

    Science.gov (United States)

    Hoffman, Bruce

    1986-01-01

    Notes the lack of a concise meaning for the word terrorism. Develops a working definition which states that terrorism is the deliberate creation and exploitation of fear through violence or the threat of violence in the attainment of political objectives. (JDH)

  8. Against CBRN terrorism

    International Nuclear Information System (INIS)

    Inoue, Tadao

    2016-01-01

    Although CBRN (Chemical, Biological, Radiological, Nuclear) terrorism has seldom happened in recent terrorist attacks, a large number of victims would appear leading to disastrous situation if it arises. This paper discussed what CBRN terrorism is, why terrorists are interested in these weapons, and how to deal with these cases, with reference to the lessons learnt from the Tokyo subway sarin event, which occurred in Japan. It also outlined the features of CBRN terrorism and protective measures against it. CBRN terrorism is the terror activity using unusual weapons and agents such as chemicals, biological agents, radioactive substances, and nuclear weapons. As the reasons why terrorists are interested in CBRN weapons, there are such factors that raw materials are easy to obtain, manufacturing is not difficult, weapons are easy to transport, and indiscriminate and mass slaughter is possible when used. From the lessons from the Tokyo subway sarin event, the Tokyo Fire Department has been engaging in the following items: (1) strengthening knowledge and skills, (2) introduction of detection equipment, (3) construction and strengthening of decontamination system, (4) collaboration among firefighting - police - SDF - medical institutions, and (5) enhancing and strengthening organizational structure. Although protective measures vary depending on the type of chemical agent, biological agent, etc., it is important to prepare in daily life for detoxification, decontamination, evacuation, etc. (A.O.)

  9. Real-time detection and classification of anomalous events in streaming data

    Science.gov (United States)

    Ferragut, Erik M.; Goodall, John R.; Iannacone, Michael D.; Laska, Jason A.; Harrison, Lane T.

    2016-04-19

    A system is described for receiving a stream of events and scoring the events based on anomalousness and maliciousness (or other classification). The events can be displayed to a user in user-defined groupings in an animated fashion. The system can include a plurality of anomaly detectors that together implement an algorithm to identify low probability events and detect atypical traffic patterns. The atypical traffic patterns can then be classified as being of interest or not. In one particular example, in a network environment, the classification can be whether the network traffic is malicious or not.

  10. Linguistic spatial classifications of event domains in narratives of crime

    Directory of Open Access Journals (Sweden)

    Blake Stephen Howald

    2010-07-01

    Full Text Available Structurally, formal definitions of the linguistic narrative minimally require two temporally linked past-time events. The role of space in this definition, based on spatial language indicating where events occur, is considered optional and non-structural. However, based on narratives with a high frequency of spatial language, recent research has questioned this perspective, suggesting that space is more critical than may be readily apparent. Through an analysis of spatially rich serial criminal narratives, it will be demonstrated that spatial information qualitatively varies relative to narrative events. In particular, statistical classifiers in a supervised machine learning task achieve a 90% accuracy in predicting Pre-Crime, Crime, and Post-Crime events based on spatial (and temporal information. Overall, these results suggest a deeper spatial organization of discourse, which not only provides practical event resolution possibilities, but also challenges traditional formal linguistic definitions of narrative.

  11. The Newsworthiness of International Terrorism.

    Science.gov (United States)

    Weimann, Gabriel; Brosius, Hans-Bernd

    1991-01-01

    Investigates the newsworthiness of international terrorism. Relates the concept of deviance as a predictor of newsworthiness to the specific attributes of terrorist events and their impact on media selection (coverage or no coverage) and prominence of coverage. (SR)

  12. A rule-learning program in high energy physics event classification

    International Nuclear Information System (INIS)

    Clearwater, S.H.; Stern, E.G.

    1991-01-01

    We have applied a rule-learning program to the problem of event classification in high energy physics. The program searches for event classifications, i.e. rules, and effectively allows an exploration of many more possible classifications than is practical by a physicist. The program, RL4, is particularly useful because it can easily explore multi-dimensional rules as well as rules that may seem non-intuitive at first to the physicist. RL4 is also contrasted with other learning programs. (orig.)

  13. Cough event classification by pretrained deep neural network.

    Science.gov (United States)

    Liu, Jia-Ming; You, Mingyu; Wang, Zheng; Li, Guo-Zheng; Xu, Xianghuai; Qiu, Zhongmin

    2015-01-01

    Cough is an essential symptom in respiratory diseases. In the measurement of cough severity, an accurate and objective cough monitor is expected by respiratory disease society. This paper aims to introduce a better performed algorithm, pretrained deep neural network (DNN), to the cough classification problem, which is a key step in the cough monitor. The deep neural network models are built from two steps, pretrain and fine-tuning, followed by a Hidden Markov Model (HMM) decoder to capture tamporal information of the audio signals. By unsupervised pretraining a deep belief network, a good initialization for a deep neural network is learned. Then the fine-tuning step is a back propogation tuning the neural network so that it can predict the observation probability associated with each HMM states, where the HMM states are originally achieved by force-alignment with a Gaussian Mixture Model Hidden Markov Model (GMM-HMM) on the training samples. Three cough HMMs and one noncough HMM are employed to model coughs and noncoughs respectively. The final decision is made based on viterbi decoding algorihtm that generates the most likely HMM sequence for each sample. A sample is labeled as cough if a cough HMM is found in the sequence. The experiments were conducted on a dataset that was collected from 22 patients with respiratory diseases. Patient dependent (PD) and patient independent (PI) experimental settings were used to evaluate the models. Five criteria, sensitivity, specificity, F1, macro average and micro average are shown to depict different aspects of the models. From overall evaluation criteria, the DNN based methods are superior to traditional GMM-HMM based method on F1 and micro average with maximal 14% and 11% error reduction in PD and 7% and 10% in PI, meanwhile keep similar performances on macro average. They also surpass GMM-HMM model on specificity with maximal 14% error reduction on both PD and PI. In this paper, we tried pretrained deep neural network in

  14. Leveraging Long-term Seismic Catalogs for Automated Real-time Event Classification

    Science.gov (United States)

    Linville, L.; Draelos, T.; Pankow, K. L.; Young, C. J.; Alvarez, S.

    2017-12-01

    We investigate the use of labeled event types available through reviewed seismic catalogs to produce automated event labels on new incoming data from the crustal region spanned by the cataloged events. Using events cataloged by the University of Utah Seismograph Stations between October, 2012 and June, 2017, we calculate the spectrogram for a time window that spans the duration of each event as seen on individual stations, resulting in 110k event spectrograms (50% local earthquakes examples, 50% quarry blasts examples). Using 80% of the randomized example events ( 90k), a classifier is trained to distinguish between local earthquakes and quarry blasts. We explore variations of deep learning classifiers, incorporating elements of convolutional and recurrent neural networks. Using a single-layer Long Short Term Memory recurrent neural network, we achieve 92% accuracy on the classification task on the remaining 20K test examples. Leveraging the decisions from a group of stations that detected the same event by using the median of all classifications in the group increases the model accuracy to 96%. Additional data with equivalent processing from 500 more recently cataloged events (July, 2017), achieves the same accuracy as our test data on both single-station examples and multi-station medians, suggesting that the model can maintain accurate and stable classification rates on real-time automated events local to the University of Utah Seismograph Stations, with potentially minimal levels of re-training through time.

  15. Terrorism-related injuries versus road traffic accident-related trauma: 5 years of experience in Israel.

    Science.gov (United States)

    Peleg, Kobi; Savitsky, Bella

    2009-12-01

    Terrorism victims comprise the minority among trauma injured people, but this small population imposes a burden on the health care system. Thirty percent of the population injured in terrorist activities experienced severe trauma (injury severity score > or =16), more than half of them need a surgical procedure, and 25% of the population affected by terrorism had been admitted to intensive care. Furthermore, compared with patients with non-terrorism-related trauma, victims of terrorism often arrive in bulk, as part of a mass casualty event. This poses a sudden load on hospital resources and requires special organization and preparedness. The present study compared terrorism-related and road accident-related injuries and examined clinical characteristics of both groups of patients. This study is a retrospective study of all patients injured through terrorist acts and road traffic accidents from September 29, 2000 to December 31, 2005, and recorded in the Israel Trauma Registry. Data on the nature of injuries, treatment, and outcome were obtained from the registry. Medical diagnoses were extracted from the registry and classified based on International Classification of Diseases coding. Diagnoses were grouped to body regions, based on the Barell Injury Diagnosis Matrix. The study includes 2197 patients with terrorism-related injuries and 30,176 patients injured in road traffic accidents. All in all, 27% of terrorism-related casualties suffered severe to critical injuries, comparing to 17% among road traffic accident-related victims. Glasgow Coma Scale scores terrorism victims, in contrast with 7.4% among people injured on the roads. The terrorism victims had a significantly higher rate of use of intensive care facilities (24.2% vs 12.4%). The overall inpatient death rate was 6.0% among terrorism victims and 2.4% among those injured in road traffic accidents. Casualties from terrorist events are more severely injured and require more resources relative to casualties

  16. Radiation detectors for use in major public events: classification, requirements, main features, tests and lessons learned

    International Nuclear Information System (INIS)

    Souza, Elder Magalhães de

    2017-01-01

    Since September 11, 2001, we have entered a new terrorism era. The possibility of the use of lost/stolen radioactive materials increases the probability of a radiological threat. The real goal intended with the use of a Radiological Dispersal Device (RRD or dirty bomb) or a Radiation Exposure Device (RDE) could be psychological in nature. Panic in the venues and surrounding area would cause more deaths than the RDD itself, therefore these attempts could cause chaos, injury, fear and terror, the main target of terrorists. The response of the national authorities with the support and aid of the IAEA served as an increase of the capability of detection and identification of nuclear and radiological materials. But this response could not be limited only to the MPE, because if the country has radioactive or nuclear facilities they also should be considered in terms of theft, sabotage, illegal transfer, unauthorized access, and any other malicious acts. In 2007, Rio de Janeiro, received the first Brazilian Major Public Event in this new era. This was the first Brazilian operation which largely utilized detectors (personal radiations detectors -PRD- radiological identification detectors, -RID or RIID- and spectral radiations scanners, -backpacks-, HPGe detectors, car-borne and air-borne systems) to protect the venues, the athletes, the population and the environment. (author)

  17. Radiation detectors for use in major public events: classification, requirements, main features, tests and lessons learned

    Energy Technology Data Exchange (ETDEWEB)

    Souza, Elder Magalhães de, E-mail: elder@ird.gov.br [Instituto de Radioproteção e Dosimetria (DIRAD/IRD/CNEN-RJ), Rio de Janeiro, RJ (Brazil). Div. de Radiometria

    2017-07-01

    Since September 11, 2001, we have entered a new terrorism era. The possibility of the use of lost/stolen radioactive materials increases the probability of a radiological threat. The real goal intended with the use of a Radiological Dispersal Device (RRD or dirty bomb) or a Radiation Exposure Device (RDE) could be psychological in nature. Panic in the venues and surrounding area would cause more deaths than the RDD itself, therefore these attempts could cause chaos, injury, fear and terror, the main target of terrorists. The response of the national authorities with the support and aid of the IAEA served as an increase of the capability of detection and identification of nuclear and radiological materials. But this response could not be limited only to the MPE, because if the country has radioactive or nuclear facilities they also should be considered in terms of theft, sabotage, illegal transfer, unauthorized access, and any other malicious acts. In 2007, Rio de Janeiro, received the first Brazilian Major Public Event in this new era. This was the first Brazilian operation which largely utilized detectors (personal radiations detectors -PRD- radiological identification detectors, -RID or RIID- and spectral radiations scanners, -backpacks-, HPGe detectors, car-borne and air-borne systems) to protect the venues, the athletes, the population and the environment. (author)

  18. Terrorism and the behavioral sciences.

    Science.gov (United States)

    Schouten, Ronald

    2010-01-01

    Terrorism has existed for millennia and is a phenomenon well-known to many parts of the world. Americans were forced to recognize this phenomenon, and our vulnerability to it, by two sets of events in 2001: the attacks on New York City and Washington, DC, and the anthrax mailings that followed shortly thereafter. Psychiatry, psychology, and other behavioral and social sciences have been looked to for assistance in collecting and analyzing intelligence data, understanding terrorism, and developing strategies to combat terrorism. In addition to reviewing areas in which the behavioral sciences have made contributions in addressing this problem, this article discusses the developing roles for behavioral scientists in this field.

  19. Terrorism in Colombia.

    Science.gov (United States)

    Paredes Zapata, Gabriel Darío

    2003-01-01

    Colombia is a poor country that has been plagued by ongoing violence for more than 120 years. During the 1940s, subversive terrorist groups emerged in rural areas of the country when criminal groups came under the influence of Communism, and were later transformed into contemporary groups, such as the Ejercito de Liberacion Nacional (ELN) or National Liberation Army and Fuerzas Armadas Revolucionares de Colombia (FARC) or Revolutionary Armed Forces of Colombia). Paramilitary terrorist groups emerged in response to subversive groups and were later transformed into contemporary groups, such as the Autodefensas Unidas de Colombia (AUC) or United Self-Defense Forces of Colombia. Terrorism has placed an enormous burden on modern Colombia. From 1995 to 2002, 9,435 people were killed by terrorism-related events, of which 5,864 were killed by subversive terrorist activities and 3,571 were killed by paramilitary terrorist activities. In 2002, at least nineteen attacks produced 10 or more casualties, of which 18 were bombings. In 2002, terrorists killed at least 12 mayors, 71 legislators, and internally displaced 300,000 persons from their homes. Since terrorist groups in Colombia are typically supported by drug manufacturing and trafficking, it has been difficult at times to distinguish violence due to terrorism from violence due to illicit drug trafficking. Terrorism has also had a major adverse effect on the economy, with restricted travel, loss of economic resources, and lack of economic investment. In addition to political, military, and commercial targets, terrorists have specifically targeted healthcare infrastructure and personnel. At the national and local levels, much emergency planning and preparedness has taken place for terrorism-related events. The Centro Regulador de Urgencias (CRU) or Emergency Regulation Center in Bogota plays a major role in coordinating local prehospital and hospital emergency response in the capital city and the national level where

  20. Terrorism in Canada.

    Science.gov (United States)

    Kollek, Daniel

    2003-01-01

    This paper reviews terrorism in Canada, assessing the incidence and nature of terrorist activity, the potential targets of terrorist attacks, risk factors to Canadian nationals and institutions, and the responses of the Canadian government in dealing with the threat and the effectiveness of those responses. Despite the fact that there have been no recent high-profile terrorist events in Canada, this country has a serious terrorism problem, the key manifestation of which is the multitude of terrorist organizations that have designated Canada as a base of operations. In addition, Canadians have been attacked overseas and Canadian organizations, both local and abroad, are potential targets of terrorist activity. Canadian attempts to deal with terrorism through foreign and domestic policy have been ineffective, primarily because the policies have been poorly enforced. Until recently, terrorist organizations legally could raise funds in Canada, in direct contravention of international treaties signed by Canada. It is possible that the ineffectiveness in enforcing the anti-terrorism legislation stems from hope that placating terrorist organizations, and the countries that support them, will prevent Canada from becoming a target. Unfortunately evidence from other countries has shown this strategy to be ineffective.

  1. Machine learning algorithms for meteorological event classification in the coastal area using in-situ data

    Science.gov (United States)

    Sokolov, Anton; Gengembre, Cyril; Dmitriev, Egor; Delbarre, Hervé

    2017-04-01

    The problem is considered of classification of local atmospheric meteorological events in the coastal area such as sea breezes, fogs and storms. The in-situ meteorological data as wind speed and direction, temperature, humidity and turbulence are used as predictors. Local atmospheric events of 2013-2014 were analysed manually to train classification algorithms in the coastal area of English Channel in Dunkirk (France). Then, ultrasonic anemometer data and LIDAR wind profiler data were used as predictors. A few algorithms were applied to determine meteorological events by local data such as a decision tree, the nearest neighbour classifier, a support vector machine. The comparison of classification algorithms was carried out, the most important predictors for each event type were determined. It was shown that in more than 80 percent of the cases machine learning algorithms detect the meteorological class correctly. We expect that this methodology could be applied also to classify events by climatological in-situ data or by modelling data. It allows estimating frequencies of each event in perspective of climate change.

  2. Teaching Sexual History-Taking Skills Using the Sexual Events Classification System

    Science.gov (United States)

    Fidler, Donald C.; Petri, Justin Daniel; Chapman, Mark

    2010-01-01

    Objective: The authors review the literature about educational programs for teaching sexual history-taking skills and describe novel techniques for teaching these skills. Methods: Psychiatric residents enrolled in a brief sexual history-taking course that included instruction on the Sexual Events Classification System, feedback on residents'…

  3. Nuclear terrorism

    International Nuclear Information System (INIS)

    2002-01-01

    Recent reports of alleged terrorist plans to build a 'dirty bomb' have heightened longstanding concerns about nuclear terrorism. This briefing outlines possible forms of attack, such as: detonation of a nuclear weapon; attacks involving radioactive materials; attacks on nuclear facilities. Legislation addressing these risks and the UK's strategy for coping with them are also considered

  4. Episodic events in long-term geological processes: A new classification and its applications

    Directory of Open Access Journals (Sweden)

    Dmitry A. Ruban

    2018-03-01

    Full Text Available Long-term geological processes are usually described with curves reflecting continuous changes in the characteristic parameters through the geological history, and such curves can be employed directly for recognition of episodic (relatively long-term events linked to these changes. The episodic events can be classified into several categories according to their scale (ordinary and anomalous events, “shape” (positive, negative, and neutral events, and relation to long-term trend change (successive, interruptive, facilitative, stabilizing, transformative, increasing, and decreasing. Many types of these events can be defined depending on the combination of the above-mentioned patterns. Of course, spatial rank, duration, and origin can be also considered in description of these events. The proposed classification can be applied to events in some real long-term geological processes, which include global sea-level changes, biodiversity dynamics, lithospheric plate number changes, and palaeoclimate changes. Several case examples prove the usefulness of the classification. It is established that the Early Valanginian (Early Cretaceous eustatic lowstand (the lowest position of the sea level in the entire Cretaceous was negative, but ordinary and only interruptive event. In the other case, it becomes clear that the only end-Ordovician and the Permian/Triassic mass extinctions transformed the trends of the biodiversity dynamics (from increase to decrease and from decrease to increase respectively, and the only Cretaceous/Paleogene mass extinction was really anomalous event on the Phanerozoic biodiversity curve. The new palaeontological data are employed to reconstruct the diversity dynamics of brachiopods in Germany (without the Alps and the Swiss Jura Mountains. The further interpretation of the both diversity curves implies that the Early Toarcian mass extinction affected the regional brachiopod faunas strongly, but this event was only decreasing

  5. Event classification related to overflow of solvent containing uranium according to the INES scale (International Nuclear and Radiological Event Scale)

    International Nuclear Information System (INIS)

    Dourado, Eneida R.G.; Assis, Juliana T. de; Lage, Ricardo F.; Lopes, Karina B.

    2013-01-01

    This paper aims to frame the event overflow organic solvent rich in uranium, from a decanter of ore beneficiation plant, caused by the fall in the supply of electricity, according to the criteria established by the International Nuclear Event Scale and radiological (INES), facilitating the understanding of the occurrence and communication with the public regarding the radiation safety aspects involved. With the fall of electricity, routine procedures in situations of installation stop were performed, however, due to operational failure, the valve on the transfer line liquor was not closed. Thus, the mixer continued being fed with liquor, that led the consequent leakage of solvent loaded with uranium. It reached the drainage system, and the box of rainwater harvesting of the plant. However, immediately after the detection of the event, corrective actions were initiated and the overflow was contained. Regulatory agencies followed the removal of the solvent and on the results of the analysis of environmental monitoring, found that the event did not provide exposure to workers or any other impact. Therefore, comparing the characteristics of the event and the guidelines proposed by the INES scale, it is concluded that the classification of the event is below scale/level 0, confirming the absence of risk to the local population, workers and the environment

  6. EEG Channel Selection Using Particle Swarm Optimization for the Classification of Auditory Event-Related Potentials

    Directory of Open Access Journals (Sweden)

    Alejandro Gonzalez

    2014-01-01

    Full Text Available Brain-machine interfaces (BMI rely on the accurate classification of event-related potentials (ERPs and their performance greatly depends on the appropriate selection of classifier parameters and features from dense-array electroencephalography (EEG signals. Moreover, in order to achieve a portable and more compact BMI for practical applications, it is also desirable to use a system capable of accurate classification using information from as few EEG channels as possible. In the present work, we propose a method for classifying P300 ERPs using a combination of Fisher Discriminant Analysis (FDA and a multiobjective hybrid real-binary Particle Swarm Optimization (MHPSO algorithm. Specifically, the algorithm searches for the set of EEG channels and classifier parameters that simultaneously maximize the classification accuracy and minimize the number of used channels. The performance of the method is assessed through offline analyses on datasets of auditory ERPs from sound discrimination experiments. The proposed method achieved a higher classification accuracy than that achieved by traditional methods while also using fewer channels. It was also found that the number of channels used for classification can be significantly reduced without greatly compromising the classification accuracy.

  7. Event classification with the electronic detectors of the OPERA experiment using neural networks

    International Nuclear Information System (INIS)

    Hierholzer, Martin C.

    2012-02-01

    The OPERA experiment searches for ν μ ν τ oscillations in appearance mode. It uses the emulsion cloud chamber (ECC) technique for a high spatial resolution combined with on-line components for event localisation and muon identification. The analysis of events in an ECC detector takes considerable time, especially in case of ν τ /ν e candidate events. A ranking of events by a probability for being a ν τ /ν e event can speed up the analysis of the OPERA experiment. An algorithm for such an event ranking based on a classification-type neural network is presented in this thesis. Almost all candidate events can be found within the first 30% of the analysed events if the described ranking is applied. This event ranking is currently applied for testing purposes by the OPERA collaboration, a decision on a full application for the whole analysis is pending. A similar neural network is used for discrimination between neutral and charged current events. This is used to observe neutrino oscillations in disappearance mode with the on-line components of the OPERA detector by measuring the energy dependence of the fraction of neutral current interactions. The confidence level of the observed oscillation effect is 87%. Assuming full mixing, the mass splitting has been determined to vertical stroke Δm 2 32 vertical stroke =2.8 -1.7 +1.4 .10 -3 eV 2 .

  8. Real-time distributed fiber optic sensor for security systems: Performance, event classification and nuisance mitigation

    Science.gov (United States)

    Mahmoud, Seedahmed S.; Visagathilagar, Yuvaraja; Katsifolis, Jim

    2012-09-01

    The success of any perimeter intrusion detection system depends on three important performance parameters: the probability of detection (POD), the nuisance alarm rate (NAR), and the false alarm rate (FAR). The most fundamental parameter, POD, is normally related to a number of factors such as the event of interest, the sensitivity of the sensor, the installation quality of the system, and the reliability of the sensing equipment. The suppression of nuisance alarms without degrading sensitivity in fiber optic intrusion detection systems is key to maintaining acceptable performance. Signal processing algorithms that maintain the POD and eliminate nuisance alarms are crucial for achieving this. In this paper, a robust event classification system using supervised neural networks together with a level crossings (LCs) based feature extraction algorithm is presented for the detection and recognition of intrusion and non-intrusion events in a fence-based fiber-optic intrusion detection system. A level crossings algorithm is also used with a dynamic threshold to suppress torrential rain-induced nuisance alarms in a fence system. Results show that rain-induced nuisance alarms can be suppressed for rainfall rates in excess of 100 mm/hr with the simultaneous detection of intrusion events. The use of a level crossing based detection and novel classification algorithm is also presented for a buried pipeline fiber optic intrusion detection system for the suppression of nuisance events and discrimination of intrusion events. The sensor employed for both types of systems is a distributed bidirectional fiber-optic Mach-Zehnder (MZ) interferometer.

  9. Environmental terrorism

    International Nuclear Information System (INIS)

    Zirschky, J.

    1988-01-01

    Environmental terrorism is described as the deliberate use or threat of use of physical, chemical, nuclear, or bacteriological agents in the commission of a terrorist act; an act in which either the agent is delivered to a target population by use of an environmental medium (such as air, water, or soil) or the agent is used to render a natural resource unsuitable for a desired use. Among the recommendations for safeguarding against environmental terrorism are: changes in reporting requirements for chemical inventories and sensitive information such as security measures; development of effective emergency response plans; development of a public relations program to be implemented after an incident in which the goal of the terrorist is to discredit a particular company; and protection from liability for terrorist acts

  10. Workplace Preparedness for Terrorism

    National Research Council Canada - National Science Library

    Ursano, Robert J

    2006-01-01

    Comprehensive workplace preparedness for terrorism must address and integrate the psychological and behavioral aspects of terrorism preparedness and response in order to address issues of human continuity...

  11. Power Load Event Detection and Classification Based on Edge Symbol Analysis and Support Vector Machine

    Directory of Open Access Journals (Sweden)

    Lei Jiang

    2012-01-01

    Full Text Available Energy signature analysis of power appliance is the core of nonintrusive load monitoring (NILM where the detailed data of the appliances used in houses are obtained by analyzing changes in the voltage and current. This paper focuses on developing an automatic power load event detection and appliance classification based on machine learning. In power load event detection, the paper presents a new transient detection algorithm. By turn-on and turn-off transient waveforms analysis, it can accurately detect the edge point when a device is switched on or switched off. The proposed load classification technique can identify different power appliances with improved recognition accuracy and computational speed. The load classification method is composed of two processes including frequency feature analysis and support vector machine. The experimental results indicated that the incorporation of the new edge detection and turn-on and turn-off transient signature analysis into NILM revealed more information than traditional NILM methods. The load classification method has achieved more than ninety percent recognition rate.

  12. Attitudes and perceptions of urban African Americans of a "dirty bomb" radiological terror event: results of a qualitative study and implications for effective risk communication.

    Science.gov (United States)

    Bass, Sarah Bauerle; Greener, Judith R; Ruggieri, Dominique; Parvanta, Claudia; Mora, Gabriella; Wolak, Caitlin; Normile, Rebecca; Gordon, Thomas F

    2015-02-01

    Radiological terror presents a real threat, but little is known about how low-income, urban African Americans may respond to such threats. The aim of this study was to understand the unique challenges of this group and to explore their knowledge of what a "dirty bomb" is, their intended behaviors should one occur, and their barriers to complying with "shelter in place" recommendations. Thirty-seven 18-65-year-olds who were users of community centers in disadvantaged areas participated in 3 focus groups in Philadelphia. Results were analyzed by using the Krueger method of analyzing narrative text. The responses highlighted little knowledge or concern about a dirty bomb. Lack of trust in local authorities was expressed, with participants indicating that they did not feel their needs were addressed. While shelter in place was understood, most said they would still check on family or talk with others to get the "whole truth" because the most trusted information sources were neighbors and community leaders. Our results indicate that a risk communication intervention for urban minorities may support desirable behaviors in the event of a dirty bomb, but successful communication will require establishing a local leader as a spokesperson to convince people of the importance of sheltering in place.

  13. Detecting Terrorism Incidence Type from News Summary

    DEFF Research Database (Denmark)

    Nizamani, Sarwat; Memon, Nasrullah

    2012-01-01

    The paper presents the experiments to detect terrorism incidence type from news summary data. We have applied classification techniques on news summary data to analyze the incidence and detect the type of incidence. A number of experiments are conducted using various classification algorithms...... and results show that a simple decision tree classifier can learn incidence type with satisfactory results from news data....

  14. Victim countries of transnational terrorism: an empirical characteristics analysis.

    Science.gov (United States)

    Elbakidze, Levan; Jin, Yanhong

    2012-12-01

    This study empirically investigates the association between country-level socioeconomic characteristics and risk of being victimized in transnational terrorism events. We find that a country's annual financial contribution to the U.N. general operating budget has a positive association with the frequency of being victimized in transnational terrorism events. In addition, per capita GDP, political freedom, and openness to trade are nonlinearly related to the frequency of being victimized in transnational terrorism events. © 2012 Society for Risk Analysis.

  15. Terrorism in Peru.

    Science.gov (United States)

    Barrientos Hernandez, Dora H; Church, Adam L

    2003-01-01

    Two major domestic terrorist groups have plagued Peru over the past 20 years, the Sendero Luminoso or "Shining Path" (SL) and the Revolutionary Movement Túpac Amaru (MRTA). On 28 August 2003, the Peruvian Truth and Reconciliation Commission reported that an estimated 69,280 persons were killed in the internal conflict in Peru from 1980 to 2000. Most of the victims were farmers (56%), most attacks occurred in rural settings (79%), and the SL was responsible for most of the deaths (54%). Aggressive anti-terrorism efforts by police and military during this period, often at the expense of basic human rights, also contributed to this large burden of terrorism on Peru. During the 1990s, terrorist attacks in Peru had spread to its urban areas. On 17 December 1996, 22 members of MRTA took over the Japanese ambassador's residence in Lima, holding 72 hostages until the grounds were stormed by Peruvian special forces on 23 April 1997. Until recently, emergency planning and preparedness for terrorism-related events in Peru were largely underdeveloped. In the last five years, Peru has taken two key steps towards developing a mature emergency response system, with the establishment of the country's first emergency medicine residency training program and the construction of the first dedicated trauma center in Lima.

  16. A coupled classification - evolutionary optimization model for contamination event detection in water distribution systems.

    Science.gov (United States)

    Oliker, Nurit; Ostfeld, Avi

    2014-03-15

    This study describes a decision support system, alerts for contamination events in water distribution systems. The developed model comprises a weighted support vector machine (SVM) for the detection of outliers, and a following sequence analysis for the classification of contamination events. The contribution of this study is an improvement of contamination events detection ability and a multi-dimensional analysis of the data, differing from the parallel one-dimensional analysis conducted so far. The multivariate analysis examines the relationships between water quality parameters and detects changes in their mutual patterns. The weights of the SVM model accomplish two goals: blurring the difference between sizes of the two classes' data sets (as there are much more normal/regular than event time measurements), and adhering the time factor attribute by a time decay coefficient, ascribing higher importance to recent observations when classifying a time step measurement. All model parameters were determined by data driven optimization so the calibration of the model was completely autonomic. The model was trained and tested on a real water distribution system (WDS) data set with randomly simulated events superimposed on the original measurements. The model is prominent in its ability to detect events that were only partly expressed in the data (i.e., affecting only some of the measured parameters). The model showed high accuracy and better detection ability as compared to previous modeling attempts of contamination event detection. Copyright © 2013 Elsevier Ltd. All rights reserved.

  17. Towards the creation of a flexible classification scheme for voluntarily reported transfusion and laboratory safety events.

    Science.gov (United States)

    Whitehurst, Julie M; Schroder, John; Leonard, Dave; Horvath, Monica M; Cozart, Heidi; Ferranti, Jeffrey

    2012-05-18

    Transfusion and clinical laboratory services are high-volume activities involving complicated workflows across both ambulatory and inpatient environments. As a result, there are many opportunities for safety lapses, leading to patient harm and increased costs. Organizational techniques such as voluntary safety event reporting are commonly used to identify and prioritize risk areas across care settings. Creation of functional, standardized safety data structures that facilitate effective exploratory examination is therefore essential to drive quality improvement interventions. Unfortunately, voluntarily reported adverse event data can often be unstructured or ambiguously defined. To address this problem, we sought to create a "best-of-breed" patient safety classification for data contained in the Duke University Health System Safety Reporting System (SRS). Our approach was to implement the internationally recognized World Health Organization International Classification for Patient Safety Framework, supplemented with additional data points relevant to our organization. Data selection and integration into the hierarchical framework is discussed, as well as placement of the classification into the SRS. We evaluated the impact of the new SRS classification on system usage through comparisons of monthly average report rates and completion times before and after implementation. Monthly average inpatient transfusion reports decreased from 102.1 ± 14.3 to 91.6 ± 11.2, with the proportion of transfusion reports in our system remaining consistent before and after implementation. Monthly average transfusion report rates in the outpatient and homecare environments were not significantly different. Significant increases in clinical lab report rates were present across inpatient and outpatient environments, with the proportion of lab reports increasing after implementation. Report completion times increased modestly but not significantly from a practical standpoint. A

  18. Event classification with the electronic detectors of the OPERA experiment using neural networks

    Energy Technology Data Exchange (ETDEWEB)

    Hierholzer, Martin C.

    2012-02-15

    The OPERA experiment searches for {nu}{sub {mu}} <-> {nu}{sub {tau}} oscillations in appearance mode. It uses the emulsion cloud chamber (ECC) technique for a high spatial resolution combined with on-line components for event localisation and muon identification. The analysis of events in an ECC detector takes considerable time, especially in case of {nu}{sub {tau}}/{nu}{sub e} candidate events. A ranking of events by a probability for being a {nu}{sub {tau}}/{nu}{sub e} event can speed up the analysis of the OPERA experiment. An algorithm for such an event ranking based on a classification-type neural network is presented in this thesis. Almost all candidate events can be found within the first 30% of the analysed events if the described ranking is applied. This event ranking is currently applied for testing purposes by the OPERA collaboration, a decision on a full application for the whole analysis is pending. A similar neural network is used for discrimination between neutral and charged current events. This is used to observe neutrino oscillations in disappearance mode with the on-line components of the OPERA detector by measuring the energy dependence of the fraction of neutral current interactions. The confidence level of the observed oscillation effect is 87%. Assuming full mixing, the mass splitting has been determined to vertical stroke {delta}m{sup 2}{sub 32} vertical stroke =2.8{sub -1.7}{sup +1.4}.10{sup -3}eV{sup 2}.

  19. Can high-energy proton events in solar wind be predicted via classification of precursory structures?

    Energy Technology Data Exchange (ETDEWEB)

    Hallerberg, Sarah [Chemnitz University of Technology (Germany); Ruzmaikin, Alexander; Feynman, Joan [Jet Propulsion Laboratory, California Institute of Technology (United States)

    2011-07-01

    Shock waves in the solar wind associated with solar coronal mass ejections produce fluxes of high-energy protons and ions with energies larger than 10 MeV. These fluxes present a danger to humans and electronic equipment in space, and also endanger passengers of over-pole air flights. The approaches that have been exploited for the prediction of high-energy particle events so far consist in training artificial neural networks on catalogues of events. Our approach towards this task is based on the identification of precursory structures in the fluxes of particles. In contrast to artificial neural networks that function as a ''black box'' transforming data into predictions, this classification approach can additionally provide information on relevant precursory events and thus might help to improve the understanding of underlying mechanisms of particle acceleration.

  20. Modeling time-to-event (survival) data using classification tree analysis.

    Science.gov (United States)

    Linden, Ariel; Yarnold, Paul R

    2017-12-01

    Time to the occurrence of an event is often studied in health research. Survival analysis differs from other designs in that follow-up times for individuals who do not experience the event by the end of the study (called censored) are accounted for in the analysis. Cox regression is the standard method for analysing censored data, but the assumptions required of these models are easily violated. In this paper, we introduce classification tree analysis (CTA) as a flexible alternative for modelling censored data. Classification tree analysis is a "decision-tree"-like classification model that provides parsimonious, transparent (ie, easy to visually display and interpret) decision rules that maximize predictive accuracy, derives exact P values via permutation tests, and evaluates model cross-generalizability. Using empirical data, we identify all statistically valid, reproducible, longitudinally consistent, and cross-generalizable CTA survival models and then compare their predictive accuracy to estimates derived via Cox regression and an unadjusted naïve model. Model performance is assessed using integrated Brier scores and a comparison between estimated survival curves. The Cox regression model best predicts average incidence of the outcome over time, whereas CTA survival models best predict either relatively high, or low, incidence of the outcome over time. Classification tree analysis survival models offer many advantages over Cox regression, such as explicit maximization of predictive accuracy, parsimony, statistical robustness, and transparency. Therefore, researchers interested in accurate prognoses and clear decision rules should consider developing models using the CTA-survival framework. © 2017 John Wiley & Sons, Ltd.

  1. Early psychosocial interventions after disasters, terrorism and other shocking events: is there a gap between norms and practice in Europe?

    Science.gov (United States)

    Te Brake, Hans

    2013-01-01

    Background Internationally, several initiatives exist to describe standards for post-disaster psychosocial care. Objective This study explored the level of consensus of experts within Europe on a set of recommendations on early psychosocial intervention after shocking events (Dutch guidelines), and to what degree these standards are implemented into mental health care practice. Methods Two hundred and six (mental) health care professionals filled out a questionnaire to assess the extent to which they consider the guidelines’ scope and recommendations relevant and part of the regular practice in their own country. Forty-five European experts from 24 EU countries discussed the guidelines at an international seminar. Results The data suggest overall agreement on the standards although many of the recommendations appear not (yet) to be embedded in everyday practice. Conclusions Although large consensus exists on standards for early psychosocial care, a chasm between norms and practice appears to exist throughout the EU, stressing the general need for investments in guideline development and implementation. PMID:23393613

  2. Anti-Romani Terrorism in Europe

    Directory of Open Access Journals (Sweden)

    Mareš Miroslav

    2016-12-01

    Full Text Available This article analyzes terrorism against the Roma in Europe. It identifies acts of terrorism in violence that targets the largest stateless nation on the continent and categorizes this terrorism according to current research methods. Focusing on events in both Western and Eastern Europe, the article analyses and compares the most significant terrorist acts against the Roma of recent years. It concludes that anti-Romani terrorism is heterogeneous in terms of tactics, strategies, and ideological justification, yet can usually be subsumed into the broadly conceived category of far-right terrorism. The variety of attacks suggests that terrorist acts are an offshoot of the broad spectrum of anti-Romani activity, and are influenced by contemporary trends in inter-ethnic violence.

  3. Religiosity and reactions to terrorism.

    Science.gov (United States)

    Adamczyk, Amy; LaFree, Gary

    2015-05-01

    Although many of the world's most serious outbreaks of conflict and violence center on religion, social science research has had relatively little to say about religion's unique role in shaping individuals' attitudes about these events. In this paper we investigate whether Americans' religious beliefs play a central role in shaping attitudes toward the continuing threat of terrorism and their willingness to assist officials in countering these perceived threats. Our analysis of an original data collection of almost 1600 Americans shows that more religious respondents are more likely to express concerns about terrorism. However, this relationship is mediated by their level of conservatism. We also find that more religious respondents are more likely to claim that they will assist government officials in countering terrorism. This relationship remained even after accounting for conservatism, and people's general willingness to help police solve crimes like breaking and entering. Copyright © 2014 Elsevier Inc. All rights reserved.

  4. Terrorism and nuclear damage coverage

    International Nuclear Information System (INIS)

    Horbach, N. L. J. T.; Brown, O. F.; Vanden Borre, T.

    2004-01-01

    This paper deals with nuclear terrorism and the manner in which nuclear operators can insure themselves against it, based on the international nuclear liability conventions. It concludes that terrorism is currently not covered under the treaty exoneration provisions on 'war-like events' based on an analysis of the concept on 'terrorism' and travaux preparatoires. Consequently, operators remain liable for nuclear damage resulting from terrorist acts, for which mandatory insurance is applicable. Since nuclear insurance industry looks at excluding such insurance coverage from their policies in the near future, this article aims to suggest alternative means for insurance, in order to ensure adequate compensation for innocent victims. The September 11, 2001 attacks at the World Trade Center in New York City and the Pentagon in Washington, DC resulted in the largest loss in the history of insurance, inevitably leading to concerns about nuclear damage coverage, should future such assaults target a nuclear power plant or other nuclear installation. Since the attacks, some insurers have signalled their intentions to exclude coverage for terrorism from their nuclear liability and property insurance policies. Other insurers are maintaining coverage for terrorism, but are establishing aggregate limits or sublimits and are increasing premiums. Additional changes by insurers are likely to occur. Highlighted by the September 11th events, and most recently by those in Madrid on 11 March 2004, are questions about how to define acts of terrorism and the extent to which such are covered under the international nuclear liability conventions and various domestic nuclear liability laws. Of particular concern to insurers is the possibility of coordinated simultaneous attacks on multiple nuclear facilities. This paper provides a survey of the issues, and recommendations for future clarifications and coverage options.(author)

  5. Nuclear terrorism

    International Nuclear Information System (INIS)

    Watson, C.

    2005-01-01

    This article is aimed at those professional scientists and engineers who believe that issues of international peace and security are too important to be left to the politicians. Nuclear Terrorism is a hostile act (or a threat of such an act) involving nuclear materials (fissile or radioactive) performed by a terrorist, a term which covers a wide range of individuals. What they all have in common is that, for some reason they have become motivated to hurt or destroy sections of society which they have come to regard as the enemy; their motivation varies enormously. They also vary enormously in the extent and nature of their technical/scientific education. There are 'PhD terrorists' and 'Peasant terrorists', and they differ greatly in the threat that they represent, and the steps which can appropriately be taken to counter it. The most serious threat comes from the potential ability of terrorists to steal or manufacture nuclear weapons of mass destruction (e.g. capable of causing thousands of deaths). Unless the underlying causes of terrorism can be quickly removed, we have a duty to mankind to make terrorist access to such weapons, and to the nuclear materials which are their essential ingredients, as difficult as possible. Improvements in the arrangements for denying unauthorised access to radioactive material should be made such that the protective measures made are proportionate to the number of Curies at risk and the likelihood of a terrorist initiative. The preventative measures, sadly, need to take account of the possibility that the terrorist will use lethal force to access the material. (author)

  6. Classification of rainfall events for weather forecasting purposes in andean region of Colombia

    Science.gov (United States)

    Suárez Hincapié, Joan Nathalie; Romo Melo, Liliana; Vélez Upegui, Jorge Julian; Chang, Philippe

    2016-04-01

    This work presents a comparative analysis of the results of applying different methodologies for the identification and classification of rainfall events of different duration in meteorological records of the Colombian Andean region. In this study the work area is the urban and rural area of Manizales that counts with a monitoring hydro-meteorological network. This network is composed of forty-five (45) strategically located stations, this network is composed of forty-five (45) strategically located stations where automatic weather stations record seven climate variables: air temperature, relative humidity, wind speed and direction, rainfall, solar radiation and barometric pressure. All this information is sent wirelessly every five (5) minutes to a data warehouse located at the Institute of Environmental Studies-IDEA. With obtaining the series of rainfall recorded by the hydrometeorological station Palogrande operated by the National University of Colombia in Manizales (http://froac.manizales.unal.edu.co/bodegaIdea/); it is with this information that we proceed to perform behavior analysis of other meteorological variables, monitored at surface level and that influence the occurrence of such rainfall events. To classify rainfall events different methodologies were used: The first according to Monjo (2009) where the index n of the heavy rainfall was calculated through which various types of precipitation are defined according to the intensity variability. A second methodology that permitted to produce a classification in terms of a parameter β introduced by Rice and Holmberg (1973) and adapted by Llasat and Puigcerver, (1985, 1997) and the last one where a rainfall classification is performed according to the value of its intensity following the issues raised by Linsley (1977) where the rains can be considered light, moderate and strong fall rates to 2.5 mm / h; from 2.5 to 7.6 mm / h and above this value respectively for the previous classifications. The main

  7. NMD Classifier: A reliable and systematic classification tool for nonsense-mediated decay events.

    Directory of Open Access Journals (Sweden)

    Min-Kung Hsu

    Full Text Available Nonsense-mediated decay (NMD degrades mRNAs that include premature termination codons to avoid the translation and accumulation of truncated proteins. This mechanism has been found to participate in gene regulation and a wide spectrum of biological processes. However, the evolutionary and regulatory origins of NMD-targeted transcripts (NMDTs have been less studied, partly because of the complexity in analyzing NMD events. Here we report NMD Classifier, a tool for systematic classification of NMD events for either annotated or de novo assembled transcripts. This tool is based on the assumption of minimal evolution/regulation-an event that leads to the least change is the most likely to occur. Our simulation results indicate that NMD Classifier can correctly identify an average of 99.3% of the NMD-causing transcript structural changes, particularly exon inclusions/exclusions and exon boundary alterations. Researchers can apply NMD Classifier to evolutionary and regulatory studies by comparing NMD events of different biological conditions or in different organisms.

  8. Adverse events following cervical manipulative therapy: consensus on classification among Dutch medical specialists, manual therapists, and patients.

    Science.gov (United States)

    Kranenburg, Hendrikus A; Lakke, Sandra E; Schmitt, Maarten A; Van der Schans, Cees P

    2017-12-01

    To obtain consensus-based agreement on a classification system of adverse events (AE) following cervical spinal manipulation. The classification system should be comprised of clear definitions, include patients' and clinicians' perspectives, and have an acceptable number of categories. Design : A three-round Delphi study. Participants : Thirty Dutch participants (medical specialists, manual therapists, and patients) participated in an online survey. Procedure : Participants inventoried AE and were asked about their preferences for either a three- or a four-category classification system. The identified AE were classified by two analysts following the International Classification of Functioning, Disability and Health (ICF), and the International Classification of Diseases and Related Health Problems (ICD-10). Participants were asked to classify the severity for all AE in relation to the time duration. Consensus occurred in a three-category classification system. There was strong consensus for 16 AE in all severities (no, minor, and major AE) and all three time durations [hours, days, weeks]. The 16 AE included anxiety, flushing, skin rash, fainting, dizziness, coma, altered sensation, muscle tenderness, pain, increased pain during movement, radiating pain, dislocation, fracture, transient ischemic attack, stroke, and death. Mild to strong consensus was reached for 13 AE. A consensus-based classification system of AE is established which includes patients' and clinicians' perspectives and has three categories. The classification comprises a precise description of potential AE in accordance with internationally accepted classifications. After international validation, clinicians and researchers may use this AE classification system to report AE in clinical practice and research.

  9. Columbia Classification Algorithm of Suicide Assessment (C-CASA): classification of suicidal events in the FDA's pediatric suicidal risk analysis of antidepressants.

    Science.gov (United States)

    Posner, Kelly; Oquendo, Maria A; Gould, Madelyn; Stanley, Barbara; Davies, Mark

    2007-07-01

    To evaluate the link between antidepressants and suicidal behavior and ideation (suicidality) in youth, adverse events from pediatric clinical trials were classified in order to identify suicidal events. The authors describe the Columbia Classification Algorithm for Suicide Assessment (C-CASA), a standardized suicidal rating system that provided data for the pediatric suicidal risk analysis of antidepressants conducted by the Food and Drug Administration (FDA). Adverse events (N=427) from 25 pediatric antidepressant clinical trials were systematically identified by pharmaceutical companies. Randomly assigned adverse events were evaluated by three of nine independent expert suicidologists using the Columbia classification algorithm. Reliability of the C-CASA ratings and agreement with pharmaceutical company classification were estimated. Twenty-six new, possibly suicidal events (behavior and ideation) that were not originally identified by pharmaceutical companies were identified in the C-CASA, and 12 events originally labeled as suicidal by pharmaceutical companies were eliminated, which resulted in a total of 38 discrepant ratings. For the specific label of "suicide attempt," a relatively low level of agreement was observed between the C-CASA and pharmaceutical company ratings, with the C-CASA reporting a 50% reduction in ratings. Thus, although the C-CASA resulted in the identification of more suicidal events overall, fewer events were classified as suicide attempts. Additionally, the C-CASA ratings were highly reliable (intraclass correlation coefficient [ICC]=0.89). Utilizing a methodical, anchored approach to categorizing suicidality provides an accurate and comprehensive identification of suicidal events. The FDA's audit of the C-CASA demonstrated excellent transportability of this approach. The Columbia algorithm was used to classify suicidal adverse events in the recent FDA adult antidepressant safety analyses and has also been mandated to be applied to all

  10. Terrorism in South Africa.

    Science.gov (United States)

    MacFarlane, Campbell

    2003-01-01

    The Republic of South Africa lies at the southern tip of the African continent. The population encompasses a variety of races, ethnic groups, religions, and cultural identities. The country has had a turbulent history from early tribal conflicts, colonialisation, the apartheid period, and post-apartheid readjustment. Modern terrorism developed mainly during the apartheid period, both by activities of the state and by the liberation movements that continued to the time of the first democratic elections in 1994, which saw South Africa evolve into a fully representative democratic state with equal rights for all. Since 1994, terrorist acts have been criminal-based, evolving in the Cape Town area to political acts, largely laid at the feet of a predominantly Muslim organisation, People against Gangsterism and Drugs, a vigilant organisation allegedly infiltrated by Muslim fundamentalists. Along with this, has been terrorist activities, mainly bombings by disaffected members of white, right-wing groups. In the apartheid era, a Draconian series of laws was enacted to suppress liberation activities. After 1994, most of these were repealed and new legislation was enacted, particularly after the events of 11 September 2001; this legislation allows the government to act against terrorism within the constraints of a democratic system. Disaster management in South Africa has been largely local authority-based, with input from provincial authorities and Civil Defence. After 1994, attempts were made to improve this situation, and national direction was provided. After 11 September 2001, activity was increased and the Disaster Management Act 2002 was brought into effect. This standardized disaster management system at national, provincial, and local levels, also facilites risk assessment and limitation as well as disaster mitigation. The potential still exists for terrorism, mainly from right-wing and Muslim fundamentalist groups, but the new legislation should stimulate disaster

  11. Terrorism and Investigation Strategies

    OpenAIRE

    Muhammad Mustofa

    2005-01-01

    This paper discussed that, for successful implementation of the strategies in investigating terrorism, besides requiring professional skilled investigators, there are some additional requirements that need to be fulfilled. Effective and long term prevention of terrorism should be directed towards producing good social welfare and to minimize every condition that may be conducive to the emergence of terrorism, such as discrimination and marginalization.

  12. Understanding Contemporary Terrorism.

    Science.gov (United States)

    Mitchell, Thomas H.

    1989-01-01

    Discusses the issue of terrorism as it exists today and examines progress that has been made toward understanding its dimensions. Suggests how this subject can be explored in the classroom. Dispels misconceptions about terrorism by defining the term, and examines some causes of terrorism and strategies employed by terrorists. (KO)

  13. Terrorism as Communication.

    Science.gov (United States)

    Decker, Warren; Rainey, Daniel

    Terrorism has become not merely a political act, but a carefully designed and rhetorically sophisticated attempt at communication. What role should the communication scholar play in the investigation of terrorism? Specifically, there are six areas within which the communication scholar may actively contribute to an understanding of terrorism as…

  14. Classification

    Science.gov (United States)

    Clary, Renee; Wandersee, James

    2013-01-01

    In this article, Renee Clary and James Wandersee describe the beginnings of "Classification," which lies at the very heart of science and depends upon pattern recognition. Clary and Wandersee approach patterns by first telling the story of the "Linnaean classification system," introduced by Carl Linnacus (1707-1778), who is…

  15. Conversion of Continuous-Valued Deep Networks to Efficient Event-Driven Networks for Image Classification.

    Science.gov (United States)

    Rueckauer, Bodo; Lungu, Iulia-Alexandra; Hu, Yuhuang; Pfeiffer, Michael; Liu, Shih-Chii

    2017-01-01

    Spiking neural networks (SNNs) can potentially offer an efficient way of doing inference because the neurons in the networks are sparsely activated and computations are event-driven. Previous work showed that simple continuous-valued deep Convolutional Neural Networks (CNNs) can be converted into accurate spiking equivalents. These networks did not include certain common operations such as max-pooling, softmax, batch-normalization and Inception-modules. This paper presents spiking equivalents of these operations therefore allowing conversion of nearly arbitrary CNN architectures. We show conversion of popular CNN architectures, including VGG-16 and Inception-v3, into SNNs that produce the best results reported to date on MNIST, CIFAR-10 and the challenging ImageNet dataset. SNNs can trade off classification error rate against the number of available operations whereas deep continuous-valued neural networks require a fixed number of operations to achieve their classification error rate. From the examples of LeNet for MNIST and BinaryNet for CIFAR-10, we show that with an increase in error rate of a few percentage points, the SNNs can achieve more than 2x reductions in operations compared to the original CNNs. This highlights the potential of SNNs in particular when deployed on power-efficient neuromorphic spiking neuron chips, for use in embedded applications.

  16. Conversion of Continuous-Valued Deep Networks to Efficient Event-Driven Networks for Image Classification

    Directory of Open Access Journals (Sweden)

    Bodo Rueckauer

    2017-12-01

    Full Text Available Spiking neural networks (SNNs can potentially offer an efficient way of doing inference because the neurons in the networks are sparsely activated and computations are event-driven. Previous work showed that simple continuous-valued deep Convolutional Neural Networks (CNNs can be converted into accurate spiking equivalents. These networks did not include certain common operations such as max-pooling, softmax, batch-normalization and Inception-modules. This paper presents spiking equivalents of these operations therefore allowing conversion of nearly arbitrary CNN architectures. We show conversion of popular CNN architectures, including VGG-16 and Inception-v3, into SNNs that produce the best results reported to date on MNIST, CIFAR-10 and the challenging ImageNet dataset. SNNs can trade off classification error rate against the number of available operations whereas deep continuous-valued neural networks require a fixed number of operations to achieve their classification error rate. From the examples of LeNet for MNIST and BinaryNet for CIFAR-10, we show that with an increase in error rate of a few percentage points, the SNNs can achieve more than 2x reductions in operations compared to the original CNNs. This highlights the potential of SNNs in particular when deployed on power-efficient neuromorphic spiking neuron chips, for use in embedded applications.

  17. Automatic Classification of volcano-seismic events based on Deep Neural Networks.

    Science.gov (United States)

    Titos Luzón, M.; Bueno Rodriguez, A.; Garcia Martinez, L.; Benitez, C.; Ibáñez, J. M.

    2017-12-01

    Seismic monitoring of active volcanoes is a popular remote sensing technique to detect seismic activity, often associated to energy exchanges between the volcano and the environment. As a result, seismographs register a wide range of volcano-seismic signals that reflect the nature and underlying physics of volcanic processes. Machine learning and signal processing techniques provide an appropriate framework to analyze such data. In this research, we propose a new classification framework for seismic events based on deep neural networks. Deep neural networks are composed by multiple processing layers, and can discover intrinsic patterns from the data itself. Internal parameters can be initialized using a greedy unsupervised pre-training stage, leading to an efficient training of fully connected architectures. We aim to determine the robustness of these architectures as classifiers of seven different types of seismic events recorded at "Volcán de Fuego" (Colima, Mexico). Two deep neural networks with different pre-training strategies are studied: stacked denoising autoencoder and deep belief networks. Results are compared to existing machine learning algorithms (SVM, Random Forest, Multilayer Perceptron). We used 5 LPC coefficients over three non-overlapping segments as training features in order to characterize temporal evolution, avoid redundancy and encode the signal, regardless of its duration. Experimental results show that deep architectures can classify seismic events with higher accuracy than classical algorithms, attaining up to 92% recognition accuracy. Pre-training initialization helps these models to detect events that occur simultaneously in time (such explosions and rockfalls), increase robustness against noisy inputs, and provide better generalization. These results demonstrate deep neural networks are robust classifiers, and can be deployed in real-environments to monitor the seismicity of restless volcanoes.

  18. Application of information retrieval approaches to case classification in the vaccine adverse event reporting system.

    Science.gov (United States)

    Botsis, Taxiarchis; Woo, Emily Jane; Ball, Robert

    2013-07-01

    Automating the classification of adverse event reports is an important step to improve the efficiency of vaccine safety surveillance. Previously we showed it was possible to classify reports using features extracted from the text of the reports. The aim of this study was to use the information encoded in the Medical Dictionary for Regulatory Activities (MedDRA(®)) in the US Vaccine Adverse Event Reporting System (VAERS) to support and evaluate two classification approaches: a multiple information retrieval strategy and a rule-based approach. To evaluate the performance of these approaches, we selected the conditions of anaphylaxis and Guillain-Barré syndrome (GBS). We used MedDRA(®) Preferred Terms stored in the VAERS, and two standardized medical terminologies: the Brighton Collaboration (BC) case definitions and Standardized MedDRA(®) Queries (SMQ) to classify two sets of reports for GBS and anaphylaxis. Two approaches were used: (i) the rule-based instruments that are available by the two terminologies (the Automatic Brighton Classification [ABC] tool and the SMQ algorithms); and (ii) the vector space model. We found that the rule-based instruments, particularly the SMQ algorithms, achieved a high degree of specificity; however, there was a cost in terms of sensitivity in all but the narrow GBS SMQ algorithm that outperformed the remaining approaches (sensitivity in the testing set was equal to 99.06 % for this algorithm vs. 93.40 % for the vector space model). In the case of anaphylaxis, the vector space model achieved higher sensitivity compared with the best values of both the ABC tool and the SMQ algorithms in the testing set (86.44 % vs. 64.11 % and 52.54 %, respectively). Our results showed the superiority of the vector space model over the existing rule-based approaches irrespective of the standardized medical knowledge represented by either the SMQ or the BC case definition. The vector space model might make automation of case definitions for

  19. Classification

    DEFF Research Database (Denmark)

    Hjørland, Birger

    2017-01-01

    This article presents and discusses definitions of the term “classification” and the related concepts “Concept/conceptualization,”“categorization,” “ordering,” “taxonomy” and “typology.” It further presents and discusses theories of classification including the influences of Aristotle...... and Wittgenstein. It presents different views on forming classes, including logical division, numerical taxonomy, historical classification, hermeneutical and pragmatic/critical views. Finally, issues related to artificial versus natural classification and taxonomic monism versus taxonomic pluralism are briefly...

  20. Applying machine-learning techniques to Twitter data for automatic hazard-event classification.

    Science.gov (United States)

    Filgueira, R.; Bee, E. J.; Diaz-Doce, D.; Poole, J., Sr.; Singh, A.

    2017-12-01

    The constant flow of information offered by tweets provides valuable information about all sorts of events at a high temporal and spatial resolution. Over the past year we have been analyzing in real-time geological hazards/phenomenon, such as earthquakes, volcanic eruptions, landslides, floods or the aurora, as part of the GeoSocial project, by geo-locating tweets filtered by keywords in a web-map. However, not all the filtered tweets are related with hazard/phenomenon events. This work explores two classification techniques for automatic hazard-event categorization based on tweets about the "Aurora". First, tweets were filtered using aurora-related keywords, removing stop words and selecting the ones written in English. For classifying the remaining between "aurora-event" or "no-aurora-event" categories, we compared two state-of-art techniques: Support Vector Machine (SVM) and Deep Convolutional Neural Networks (CNN) algorithms. Both approaches belong to the family of supervised learning algorithms, which make predictions based on labelled training dataset. Therefore, we created a training dataset by tagging 1200 tweets between both categories. The general form of SVM is used to separate two classes by a function (kernel). We compared the performance of four different kernels (Linear Regression, Logistic Regression, Multinomial Naïve Bayesian and Stochastic Gradient Descent) provided by Scikit-Learn library using our training dataset to build the SVM classifier. The results shown that the Logistic Regression (LR) gets the best accuracy (87%). So, we selected the SVM-LR classifier to categorise a large collection of tweets using the "dispel4py" framework.Later, we developed a CNN classifier, where the first layer embeds words into low-dimensional vectors. The next layer performs convolutions over the embedded word vectors. Results from the convolutional layer are max-pooled into a long feature vector, which is classified using a softmax layer. The CNN's accuracy

  1. Unified framework for triaxial accelerometer-based fall event detection and classification using cumulants and hierarchical decision tree classifier.

    Science.gov (United States)

    Kambhampati, Satya Samyukta; Singh, Vishal; Manikandan, M Sabarimalai; Ramkumar, Barathram

    2015-08-01

    In this Letter, the authors present a unified framework for fall event detection and classification using the cumulants extracted from the acceleration (ACC) signals acquired using a single waist-mounted triaxial accelerometer. The main objective of this Letter is to find suitable representative cumulants and classifiers in effectively detecting and classifying different types of fall and non-fall events. It was discovered that the first level of the proposed hierarchical decision tree algorithm implements fall detection using fifth-order cumulants and support vector machine (SVM) classifier. In the second level, the fall event classification algorithm uses the fifth-order cumulants and SVM. Finally, human activity classification is performed using the second-order cumulants and SVM. The detection and classification results are compared with those of the decision tree, naive Bayes, multilayer perceptron and SVM classifiers with different types of time-domain features including the second-, third-, fourth- and fifth-order cumulants and the signal magnitude vector and signal magnitude area. The experimental results demonstrate that the second- and fifth-order cumulant features and SVM classifier can achieve optimal detection and classification rates of above 95%, as well as the lowest false alarm rate of 1.03%.

  2. Review and expectations of terror attack emergency rescue

    Directory of Open Access Journals (Sweden)

    De-wen WANG

    2012-03-01

    Full Text Available Ten years of anti-terror struggle since the 9/11 event has indicated adequately that terrorism is a global problem and international danger. Likewise, anti-terror emergency rescue is also an important task which will influence the safety and benefit of every country all over the world. This paper reviews the main progress and result of international anti-terror struggle in the last ten years, and also introduces the new characteristic of the international anti-terror activity. Besides that, this paper also brings forward the further consideration about the anti-terror emergency medical rescue and the researches remaining to be carried out. The latter includes: (1 to further perfect the high-efficient medical rescue command organization; (2 to further perfect the emergency medical rescue prearranged scheme; (3 to further perfect the construction of rescue system and rescue base after various types of terror attack; (4 to further promote the anti-terror consciousness in the public, and pay more attention to the prevention and investigation of the psychological disaster; (5 to further carry out the basic investigation on emergency medical rescue after various terror attack injuries (for example the types and characteristics of new injuries, pathophysiology and prevention and treatment of stress-psychological effect induced by terror attack, new high-efficient medical rescue measure and equipments, and so on.

  3. Cyber Warfare/Cyber Terrorism

    National Research Council Canada - National Science Library

    O'Hara, Timothy

    2004-01-01

    .... Section 1 concludes with a review of offensive and defensive cyber warfare concepts. Section 2 presents a general overview of cyber terrorism, including definitions of cyber terrorism and cyber terrorism support...

  4. Classification of Snowfall Events and Their Effect on Canopy Interception Efficiency in a Temperate Montane Forest.

    Science.gov (United States)

    Roth, T. R.; Nolin, A. W.

    2015-12-01

    Forest canopies intercept as much as 60% of snowfall in maritime environments, while processes of sublimation and melt can reduce the amount of snow transferred from the canopy to the ground. This research examines canopy interception efficiency (CIE) as a function of forest and event-scale snowfall characteristics. We use a 4-year dataset of continuous meteorological measurements and monthly snow surveys from the Forest Elevation Snow Transect (ForEST) network that has forested and open sites at three elevations spanning the rain-snow transition zone to the upper seasonal snow zone. Over 150 individual storms were classified by forest and storm type characteristics (e.g. forest density, vegetation type, air temperature, snowfall amount, storm duration, wind speed, and storm direction). The between-site comparisons showed that, as expected, CIE was highest for the lower elevation (warmer) sites with higher forest density compared with the higher elevation sites where storm temperatures were colder, trees were smaller and forests were less dense. Within-site comparisons based on storm type show that this classification system can be used to predict CIE.Our results suggest that the coupling of forest type and storm type information can improve estimates of canopy interception. Understanding the effects of temperature and storm type in temperate montane forests is also valuable for future estimates of canopy interception under a warming climate.

  5. Introduction to Teaching About Terrorism.

    Science.gov (United States)

    Totten, Sam

    1986-01-01

    Provides an historical and conceptual framework for understanding contemporary terrorism. Includes quotations from government officials, syndicated columnists, and scholars regarding terrorism and its effects on society. (JDH)

  6. A methodology for modeling regional terrorism risk.

    Science.gov (United States)

    Chatterjee, Samrat; Abkowitz, Mark D

    2011-07-01

    Over the past decade, terrorism risk has become a prominent consideration in protecting the well-being of individuals and organizations. More recently, there has been interest in not only quantifying terrorism risk, but also placing it in the context of an all-hazards environment in which consideration is given to accidents and natural hazards, as well as intentional acts. This article discusses the development of a regional terrorism risk assessment model designed for this purpose. The approach taken is to model terrorism risk as a dependent variable, expressed in expected annual monetary terms, as a function of attributes of population concentration and critical infrastructure. This allows for an assessment of regional terrorism risk in and of itself, as well as in relation to man-made accident and natural hazard risks, so that mitigation resources can be allocated in an effective manner. The adopted methodology incorporates elements of two terrorism risk modeling approaches (event-based models and risk indicators), producing results that can be utilized at various jurisdictional levels. The validity, strengths, and limitations of the model are discussed in the context of a case study application within the United States. © 2011 Society for Risk Analysis.

  7. Definitions of Cyber Terrorism

    NARCIS (Netherlands)

    Luiijf, H.A.M.

    2014-01-01

    The phrase cyber terror appeared for the first time in the mid-eighties. According to several sources, Barry C. Collin, a senior person research fellow of the Institute for Security and Intelligence in California, defined cyber terror at that time as “the convergence of cybernetics and terrorism”—an

  8. Female terrorism : a review

    NARCIS (Netherlands)

    Jacques, Karen; Taylor, Paul J.

    2009-01-01

    The sharp growth in the number of publications examining female involvement in terrorism has produced a valuable but un-integrated body of knowledge spread across many disciplines. In this paper, we bring together 54 publications on female terrorism and use qualitative and quantitative analyses to

  9. Latin America: Terrorism Issues

    National Research Council Canada - National Science Library

    Sullivan, Mark P

    2005-01-01

    .... In its annual report on worldwide terrorism, the State Department highlights threats in Colombia, Peru, and the tri-border region of Argentina, Brazil, and Paraguay. The State Department also has designated four terrorist groups (three in Colombia and one in Peru) as Foreign Terrorist Organizations, and Cuba has been listed as a state sponsor of terrorism since 1982.

  10. Terrorism and financial supervision

    NARCIS (Netherlands)

    Krans, Anatoli van der

    2005-01-01

    This article presents an analysis of how legislators on international, European and national level combat the financing of terrorism. The central question in this article is whether European regulations concerning the prevention of money laundering and the financing of terrorism, are effective,

  11. Sleep Terrors in Twins

    Directory of Open Access Journals (Sweden)

    J Gordon Millichap

    2008-12-01

    Full Text Available In an attempt to clarify the genetic and environmental causes of sleep terrors in childhood, reasearchers in Canada followed 390 pairs of monozygotic and dizygotic twins by assessing the frequency of sleep terrors at 18 and 30 months of age using a questionnaire administered to the biological mothers.

  12. Sleep Terrors in Twins

    OpenAIRE

    J Gordon Millichap

    2008-01-01

    In an attempt to clarify the genetic and environmental causes of sleep terrors in childhood, reasearchers in Canada followed 390 pairs of monozygotic and dizygotic twins by assessing the frequency of sleep terrors at 18 and 30 months of age using a questionnaire administered to the biological mothers.

  13. Behavioural aspects of terrorism.

    Science.gov (United States)

    Leistedt, Samuel J

    2013-05-10

    Behavioural and social sciences are useful in collecting and analysing intelligence data, understanding terrorism, and developing strategies to combat terrorism. This article aims to examine the psychopathological concepts of terrorism and discusses the developing roles for behavioural scientists. A systematic review was conducted of studies investigating behavioural aspects of terrorism. These studies were identified by a systematic search of databases, textbooks, and a supplementary manual search of references. Several fundamental concepts were identified that continue to influence the motives and the majority of the behaviours of those who support or engage in this kind of specific violence. Regardless of the psychological aspects and new roles for psychiatrists, the behavioural sciences will continue to be called upon to assist in developing better methods to gather and analyse intelligence, to understand terrorism, and perhaps to stem the radicalisation process. Copyright © 2013 Elsevier Ireland Ltd. All rights reserved.

  14. Classification of Single-Trial Auditory Events Using Dry-Wireless EEG During Real and Motion Simulated Flight

    Directory of Open Access Journals (Sweden)

    Daniel eCallan

    2015-02-01

    Full Text Available Application of neuro-augmentation technology based on dry-wireless EEG may be considerably beneficial for aviation and space operations because of the inherent dangers involved. In this study we evaluate classification performance of perceptual events using a dry-wireless EEG system during motion platform based flight simulation and actual flight in an open cockpit biplane to determine if the system can be used in the presence of considerable environmental and physiological artifacts. A passive task involving 200 random auditory presentations of a chirp sound was used for evaluation. The advantage of this auditory task is that it does not interfere with the perceptual motor processes involved with piloting the plane. Classification was based on identifying the presentation of a chirp sound versus silent periods. Evaluation of Independent component analysis and Kalman filtering to enhance classification performance by extracting brain activity related to the auditory event from other non-task related brain activity and artifacts was assessed. The results of permutation testing revealed that single trial classification of presence or absence of an auditory event was significantly above chance for all conditions on a novel test set. The best performance could be achieved with both ICA and Kalman filtering relative to no processing: Platform Off (83.4% vs 78.3%, Platform On (73.1% vs 71.6%, Biplane Engine Off (81.1% vs 77.4%, and Biplane Engine On (79.2% vs 66.1%. This experiment demonstrates that dry-wireless EEG can be used in environments with considerable vibration, wind, acoustic noise, and physiological artifacts and achieve good single trial classification performance that is necessary for future successful application of neuro-augmentation technology based on brain-machine interfaces.

  15. Containing Terrorism: A Dynamic Model

    Directory of Open Access Journals (Sweden)

    Giti Zahedzadeh

    2017-06-01

    Full Text Available The strategic interplay between counterterror measures and terror activity is complex. Herein, we propose a dynamic model to depict this interaction. The model generates stylized prognoses: (i under conditions of inefficient counterterror measures, terror groups enjoy longer period of activity but only if recruitment into terror groups remains low; high recruitment shortens the period of terror activity (ii highly efficient counterterror measures effectively contain terror activity, but only if recruitment remains low. Thus, highly efficient counterterror measures can effectively contain terrorism if recruitment remains restrained. We conclude that the trajectory of the dynamics between counterterror measures and terror activity is heavily altered by recruitment.

  16. Event classification and optimization methods using artificial intelligence and other relevant techniques: Sharing the experiences

    Science.gov (United States)

    Mohamed, Abdul Aziz; Hasan, Abu Bakar; Ghazali, Abu Bakar Mhd.

    2017-01-01

    Classification of large data into respected classes or groups could be carried out with the help of artificial intelligence (AI) tools readily available in the market. To get the optimum or best results, optimization tool could be applied on those data. Classification and optimization have been used by researchers throughout their works, and the outcomes were very encouraging indeed. Here, the authors are trying to share what they have experienced in three different areas of applied research.

  17. Nuclear terrorism - Threat or not?

    Science.gov (United States)

    Pomper, Miles A.; Tarini, Gabrielle

    2017-11-01

    A terrorist attack using nuclear or radiological materials is a low-probability event, but if executed, would lead to unprecedented socio-economic, material, and psychological disruption and damage. This chapter seeks to provide a sound assessment of the scope and nature of the threat by examining the different types of nuclear terrorism, each of which poses different risks, involves different barriers to success, and requires different terrorist capabilities. In addition, the chapter aims to provide an overview of the sources and nature of terrorists' motivations to employ a nuclear attack.

  18. Mass media as an Effective Tool for Prevention of Socio-psychological Factors in the Development of Terrorism

    Directory of Open Access Journals (Sweden)

    Yuri P. Zinchenko

    2009-01-01

    Full Text Available Recently mass media play crucial role in social counterterrorism activity. The article is devoted to analysis of possibilities of mass media in prevention of the development of terrorism. Socio-psychological factors of development of terrorism, including concept of “contributing events” as well as hypothesis “frustration-aggression” are studied. The psychological component of terrorism in three major attitudes is considered in the article: psychology of terrorism, psychology of counteraction to terrorism, and using mass media for prevention the development of terrorism. Specific features and the external factors promoting involving into terrorism are analysed. Role of mass media in covering the information about terrorism events is analysed from point of view related to prevention of development of terrorism. Some key recommendations on counterterrorism activity using mass media means are formulated.

  19. The impact of terrorism on children and adolescents: terror in the skies, terror on television.

    Science.gov (United States)

    Fremont, Wanda P; Pataki, Caroly; Beresin, Eugene V

    2005-07-01

    Terrorist attacks and their aftermath have had a powerful impact on children and their families. Media and television exposure of terrorist events throughout the world has increased during the past few years. There is increasing concern about the effects of this exposure on children who witness these violent images. To develop a proactive and strategic response to reactions of fear, clinicians, educators, and policy makers must understand the psychologic effects of media coverage of terrorism on children. Previous research has focused on media coverage of criminal violence and war. Recent studies have examined the effect of remote exposure of terrorist attacks and have shown a significant clinical impact on children and families.

  20. Night Terrors (For Parents)

    Science.gov (United States)

    ... you tried. A night terror is a sleep disruption that seems similar to a nightmare , but is ... to: reduce your child's stress create a bedtime routine that's simple and relaxing make sure your child ...

  1. Nightmares and Night Terrors

    Science.gov (United States)

    ... able to tell you what happened in the dream and why it was scary. Your child may have trouble going back to sleep. Your child might have the same dream again on other nights. What are night terrors? ...

  2. Nuclear proliferation and terrorism

    International Nuclear Information System (INIS)

    Anon.

    1977-01-01

    This section of the book, Part III, has two chapters (9 and 10). Chapter 9, Nuclear Power and Proliferation of Nuclear Weapons, is disucssed under these subjects: nuclear nonproliferation: origins and status; requirements for nuclear weapons manufacture; current nuclear programs and proliferation capabilities; encouraging decisions to forego weapons; arms control; safeguards; attitudes and expectations. Chapter 10, Nuclear Terrorism, discusses these areas: theft of nuclear materials; attacks on nuclear reactors; responding to nuclear terrorism; security and civil liberties

  3. A proposed universal medical and public health definition of terrorism.

    Science.gov (United States)

    Arnold, Jeffrey L; Ortenwall, Per; Birnbaum, Marvin L; Sundnes, Knut Ole; Aggrawal, Anil; Anantharaman, V; Al Musleh, Abdul Wahab; Asai, Yasufumi; Burkle, Frederick M; Chung, Jae Myung; Cruz-Vega, Felipe; Debacker, Michel; Della Corte, Francesco; Delooz, Herman; Dickinson, Garth; Hodgetts, Timothy; Holliman, C James; MacFarlane, Campbell; Rodoplu, Ulkumen; Stok, Edita; Tsai, Ming-Che

    2003-01-01

    The lack of a universally applicable definition of terrorism has confounded the understanding of terrorism since the term was first coined in 18th Century France. Although a myriad of definitions of terrorism have been advanced over the years, virtually all of these definitions have been crisis-centered, frequently reflecting the political perspectives of those who seek to define it. In this article, we deconstruct these previously used definitions of terrorism in order to reconstruct a definition of terrorism that is consequence-centered, medically relevant, and universally harmonized. A universal medical and public health definition of terrorism will facilitate clinical and scientific research, education, and communication about terrorism-related events or disasters. We propose the following universal medical and public definition of terrorism: The intentional use of violence--real or threatened--against one or more non-combatants and/or those services essential for or protective of their health, resulting in adverse health effects in those immediately affected and their community, ranging from a loss of well-being or security to injury, illness, or death.

  4. Adverse events after cervical spinal manipulative therapy: consensus based classification and definitions

    NARCIS (Netherlands)

    Dr. C.P. van der Schans; M. Schmitt; dr. S.E. Lakke; H.A. Kranenburg

    2015-01-01

    Cervical spinal manipulations (CSM) are frequently employed techniques to alleviate neck pain and headache. Minor and major complications following CSM have been described, though clear consensus on definition and the classification of the complications had not yet been achieved. As a result,

  5. Adverse events after cervical spinal manipulative therapy: consensus based classification and definitions

    NARCIS (Netherlands)

    Kranenburg, Rik; Jorna-Lakke, Sandra; Schmitt, M.A.; van der Schans, Cees

    2016-01-01

    Cervical spinal manipulations (CSM) are frequently employed techniques to alleviate neck pain and headache. Minor and major complications following CSM have been described, though clear consensus on definition and the classification of the complications had not yet been achieved. As a result,

  6. Classification of passive auditory event-related potentials using discriminant analysis and self-organizing feature maps.

    Science.gov (United States)

    Schönweiler, R; Wübbelt, P; Tolloczko, R; Rose, C; Ptok, M

    2000-01-01

    Discriminant analysis (DA) and self-organizing feature maps (SOFM) were used to classify passively evoked auditory event-related potentials (ERP) P(1), N(1), P(2) and N(2). Responses from 16 children with severe behavioral auditory perception deficits, 16 children with marked behavioral auditory perception deficits, and 14 controls were examined. Eighteen ERP amplitude parameters were selected for examination of statistical differences between the groups. Different DA methods and SOFM configurations were trained to the values. SOFM had better classification results than DA methods. Subsequently, measures on another 37 subjects that were unknown for the trained SOFM were used to test the reliability of the system. With 10-dimensional vectors, reliable classifications were obtained that matched behavioral auditory perception deficits in 96%, implying central auditory processing disorder (CAPD). The results also support the assumption that CAPD includes a 'non-peripheral' auditory processing deficit. Copyright 2000 S. Karger AG, Basel.

  7. Identifying Adverse Events Using International Classification of Diseases, Tenth Revision Y Codes in Korea: A Cross-sectional Study

    Directory of Open Access Journals (Sweden)

    Minsu Ock

    2018-01-01

    Full Text Available Objectives The use of administrative data is an affordable alternative to conducting a difficult large-scale medical-record review to estimate the scale of adverse events. We identified adverse events from 2002 to 2013 on the national level in Korea, using International Classification of Diseases, tenth revision (ICD-10 Y codes. Methods We used data from the National Health Insurance Service-National Sample Cohort (NHIS-NSC. We relied on medical treatment databases to extract information on ICD-10 Y codes from each participant in the NHIS-NSC. We classified adverse events in the ICD-10 Y codes into 6 types: those related to drugs, transfusions, and fluids; those related to vaccines and immunoglobulin; those related to surgery and procedures; those related to infections; those related to devices; and others. Results Over 12 years, a total of 20 817 adverse events were identified using ICD-10 Y codes, and the estimated total adverse event rate was 0.20%. Between 2002 and 2013, the total number of such events increased by 131.3%, from 1366 in 2002 to 3159 in 2013. The total rate increased by 103.9%, from 0.17% in 2002 to 0.35% in 2013. Events related to drugs, transfusions, and fluids were the most common (19 446, 93.4%, followed by those related to surgery and procedures (1209, 5.8% and those related to vaccines and immunoglobulin (72, 0.3%. Conclusions Based on a comparison with the results of other studies, the total adverse event rate in this study was significantly underestimated. Improving coding practices for ICD-10 Y codes is necessary to precisely monitor the scale of adverse events in Korea.

  8. The age of terrorism: to the problem statement

    Directory of Open Access Journals (Sweden)

    I. V. Yevtyagina

    2014-04-01

    Full Text Available In the present article analyzes the problem of terrorism. Historical essay on the topic helps clarify the concept of the term «terrorism», as well as its causes. The existing classification of terrorism reveals the different types and ways of influencing people by terrorists to achieve their goals. The author suggests the age classification, namely, adult and adolescence terrorism. Discussed in detail adolescence terrorism. The possible reasons for solutions to the problems teenagers violently. On the example of the terrorist act in Moscow school number 263 attempts to analyze the causal relationships aggressive behavior among adolescents in relation to their peers and teachers. Author shows the factors influencing the formation of the propensity to aggression (the terrorist behavior: the crisis of spirituality and morality, reducing cultural awareness, conflict resolution based on adults imitation, striving for leadership, using aggression, the substitution of the present reality of the computer world, acceptance of immoral behavior for conventional norm, plenty of scenes of cruelty and violence in the media, national intolerance. Also in the article are recommendations to prevent teenage terrorism, emphasizes the need for joint activities of the school psychologist, teachers, children and their parents.

  9. The universal legal framework against nuclear terrorism

    International Nuclear Information System (INIS)

    Gehr, W.

    2007-01-01

    After the events of September 11, the United Nations Security Council adopted Resolution 1373 (2001) which has been called the 'Counter-Terrorism Code' of the world, because it creates legal obligations for all 192 Member States of the United Nations. UN Security Council Resolutions 1373 (2001), 1540 (2004) and 1735 (2006) as well as a defined set of 13 global treaties constitute the universal legal framework against terrorism which must be implemented in a manner consistent with international human rights obligations. Basically, these 13 treaties as well as Resolution 1373 are international criminal law instruments. Within this universal legal framework, the framework against nuclear terrorism is constituted by Resolution 1540, the Convention on the Physical Protection of Nuclear Material (CPPNM) which entered into force in 1987, and the International Convention for the Suppression of Terrorist Bombings which is in force since 2001. These three legal instruments will be supplemented by the International Convention for the Suppression of Acts of Nuclear Terrorism, an amendment to the CPPNM and two Protocols amending the Convention for the Suppression of Unlawful Acts Against the Safety of Maritime Navigation and the Protocol for the Suppression of Unlawful Acts Against the Safety of Fixed Platforms Located on the Continental Shelf, once these instruments, all of which were adopted in 2005, enter into force. The Terrorism Prevention Branch (TPB) of the United Nations Office on Drugs and Crime (UNODC) assists countries which are in need of legislative assistance for the drafting of appropriate counter-terrorism laws that duly take into account the obligations contained in Resolution 1373, the United Nations sanctions against Al-Qaida and the Taliban as well as in the 13 universal conventions for the prevention and the suppression of terrorism, including the CPPNM and the new International Convention for the Suppression of Acts of Nuclear Terrorism. UNODC/TPB has also

  10. Station Set Residual: Event Classification Using Historical Distribution of Observing Stations

    Science.gov (United States)

    Procopio, Mike; Lewis, Jennifer; Young, Chris

    2010-05-01

    Analysts working at the International Data Centre in support of treaty monitoring through the Comprehensive Nuclear-Test-Ban Treaty Organization spend a significant amount of time reviewing hypothesized seismic events produced by an automatic processing system. When reviewing these events to determine their legitimacy, analysts take a variety of approaches that rely heavily on training and past experience. One method used by analysts to gauge the validity of an event involves examining the set of stations involved in the detection of an event. In particular, leveraging past experience, an analyst can say that an event located in a certain part of the world is expected to be detected by Stations A, B, and C. Implicit in this statement is that such an event would usually not be detected by Stations X, Y, or Z. For some well understood parts of the world, the absence of one or more "expected" stations—or the presence of one or more "unexpected" stations—is correlated with a hypothesized event's legitimacy and to its survival to the event bulletin. The primary objective of this research is to formalize and quantify the difference between the observed set of stations detecting some hypothesized event, versus the expected set of stations historically associated with detecting similar nearby events close in magnitude. This Station Set Residual can be quantified in many ways, some of which are correlated with the analysts' determination of whether or not the event is valid. We propose that this Station Set Residual score can be used to screen out certain classes of "false" events produced by automatic processing with a high degree of confidence, reducing the analyst burden. Moreover, we propose that the visualization of the historically expected distribution of detecting stations can be immediately useful as an analyst aid during their review process.

  11. Video event classification and image segmentation based on noncausal multidimensional hidden Markov models.

    Science.gov (United States)

    Ma, Xiang; Schonfeld, Dan; Khokhar, Ashfaq A

    2009-06-01

    In this paper, we propose a novel solution to an arbitrary noncausal, multidimensional hidden Markov model (HMM) for image and video classification. First, we show that the noncausal model can be solved by splitting it into multiple causal HMMs and simultaneously solving each causal HMM using a fully synchronous distributed computing framework, therefore referred to as distributed HMMs. Next we present an approximate solution to the multiple causal HMMs that is based on an alternating updating scheme and assumes a realistic sequential computing framework. The parameters of the distributed causal HMMs are estimated by extending the classical 1-D training and classification algorithms to multiple dimensions. The proposed extension to arbitrary causal, multidimensional HMMs allows state transitions that are dependent on all causal neighbors. We, thus, extend three fundamental algorithms to multidimensional causal systems, i.e., 1) expectation-maximization (EM), 2) general forward-backward (GFB), and 3) Viterbi algorithms. In the simulations, we choose to limit ourselves to a noncausal 2-D model whose noncausality is along a single dimension, in order to significantly reduce the computational complexity. Simulation results demonstrate the superior performance, higher accuracy rate, and applicability of the proposed noncausal HMM framework to image and video classification.

  12. Terrorism Risk Insurance: An Overview

    National Research Council Canada - National Science Library

    Webel, Baird

    2005-01-01

    .... Addressing this problem, Congress enacted the Terrorism Risk Insurance Act of 2002 (TRIA) to create a temporary program to share future insured terrorism losses with the property-casualty insurance industry and policyholders...

  13. Classification of Tattoo Complications in a Hospital Material of 493 Adverse Events.

    Science.gov (United States)

    Serup, Jørgen; Sepehri, Mitra; Hutton Carlsen, Katrina

    2016-01-01

    Tattooing is a global trend. Clinical knowledge of complications is based on case reports collected over a century. Larger cohorts reflecting complications associated with contemporary trends are lacking. The study was a retrospective review of a consecutive cohort of patients with tattoo complications diagnosed in the "Tattoo Clinic" of Bispebjerg University Hospital in Copenhagen, Denmark, from 2008 to 2015, based on patient history and systematic clinical examination. A total of 493 tattoo complications in 405 patients were studied. Overall, 184 (37%) presented allergic reactions with plaque elevation in 32.2%, excessive hyperkeratosis in 3.7%, and ulceration in 1.4%, predominantly observed in red tattoos and nuances of red; 66 (13%) presented papulo-nodular reactions, mainly observed in black tattoos (considered non-allergic) and due to pigment agglomeration; 53 (11%) had bacterial infections; 46 (9%) were psycho-social complications; 144 (30%) belonged to several specific diagnostic entities, including photosensitivity, pain syndrome, and lymphopathy. We found no cases of cutaneous or other malignancies. Sarcoidosis was primarily seen in black tattoos and was a common associated disease, found in 23 reactions (5%), compared to the background population. The study introduces a new concept of classification of tattoo complications based on simple tools such as patient history and objective findings supplemented with histology. The study reflects complications originating from presently used tattoo inks, often with organic pigments. The introduced classification has been submitted to the World Health Organisation (WHO) as a proposal to the 11th revision of the International Classification of Diseases. © 2016 S. Karger AG, Basel.

  14. THE PERCEIVED RISK OF TRAVELLING, WITH EMPHASIS ON TERRORISM

    OpenAIRE

    Stefanou, Areti

    2009-01-01

    Risk is an important factor when considering international tourism (Lepp and Gibson, 2003; Sonmez and Graefe, 1998b; 1998a; Sonmez, 1998), especially nowadays as a result of the increased magnitude and frequency of terrorism attacks when travelling. Such events have negatively affected individuals’ perceived risk in international travel, making terrorism risk a key element of the international travel scene. Perceived risk can influence a positive image, intention to travel to a particular des...

  15. Automatic Detection and Classification of Audio Events for Road Surveillance Applications

    Directory of Open Access Journals (Sweden)

    Noor Almaadeed

    2018-06-01

    Full Text Available This work investigates the problem of detecting hazardous events on roads by designing an audio surveillance system that automatically detects perilous situations such as car crashes and tire skidding. In recent years, research has shown several visual surveillance systems that have been proposed for road monitoring to detect accidents with an aim to improve safety procedures in emergency cases. However, the visual information alone cannot detect certain events such as car crashes and tire skidding, especially under adverse and visually cluttered weather conditions such as snowfall, rain, and fog. Consequently, the incorporation of microphones and audio event detectors based on audio processing can significantly enhance the detection accuracy of such surveillance systems. This paper proposes to combine time-domain, frequency-domain, and joint time-frequency features extracted from a class of quadratic time-frequency distributions (QTFDs to detect events on roads through audio analysis and processing. Experiments were carried out using a publicly available dataset. The experimental results conform the effectiveness of the proposed approach for detecting hazardous events on roads as demonstrated by 7% improvement of accuracy rate when compared against methods that use individual temporal and spectral features.

  16. Negative mood state enhances the susceptibility to unpleasant events: neural correlates from a music-primed emotion classification task.

    Directory of Open Access Journals (Sweden)

    Jiajin Yuan

    Full Text Available BACKGROUND: Various affective disorders are linked with enhanced processing of unpleasant stimuli. However, this link is likely a result of the dominant negative mood derived from the disorder, rather than a result of the disorder itself. Additionally, little is currently known about the influence of mood on the susceptibility to emotional events in healthy populations. METHOD: Event-Related Potentials (ERP were recorded for pleasant, neutral and unpleasant pictures while subjects performed an emotional/neutral picture classification task during positive, neutral, or negative mood induced by instrumental Chinese music. RESULTS: Late Positive Potential (LPP amplitudes were positively related to the affective arousal of pictures. The emotional responding to unpleasant pictures, indicated by the unpleasant-neutral differences in LPPs, was enhanced during negative compared to neutral and positive moods in the entire LPP time window (600-1000 ms. The magnitude of this enhancement was larger with increasing self-reported negative mood. In contrast, this responding was reduced during positive compared to neutral mood in the 800-1000 ms interval. Additionally, LPP reactions to pleasant stimuli were similar across positive, neutral and negative moods except those in the 800-900 ms interval. IMPLICATIONS: Negative mood intensifies the humans' susceptibility to unpleasant events in healthy individuals. In contrast, music-induced happy mood is effective in reducing the susceptibility to these events. Practical implications of these findings were discussed.

  17. Exploring human error in military aviation flight safety events using post-incident classification systems.

    Science.gov (United States)

    Hooper, Brionny J; O'Hare, David P A

    2013-08-01

    Human error classification systems theoretically allow researchers to analyze postaccident data in an objective and consistent manner. The Human Factors Analysis and Classification System (HFACS) framework is one such practical analysis tool that has been widely used to classify human error in aviation. The Cognitive Error Taxonomy (CET) is another. It has been postulated that the focus on interrelationships within HFACS can facilitate the identification of the underlying causes of pilot error. The CET provides increased granularity at the level of unsafe acts. The aim was to analyze the influence of factors at higher organizational levels on the unsafe acts of front-line operators and to compare the errors of fixed-wing and rotary-wing operations. This study analyzed 288 aircraft incidents involving human error from an Australasian military organization occurring between 2001 and 2008. Action errors accounted for almost twice (44%) the proportion of rotary wing compared to fixed wing (23%) incidents. Both classificatory systems showed significant relationships between precursor factors such as the physical environment, mental and physiological states, crew resource management, training and personal readiness, and skill-based, but not decision-based, acts. The CET analysis showed different predisposing factors for different aspects of skill-based behaviors. Skill-based errors in military operations are more prevalent in rotary wing incidents and are related to higher level supervisory processes in the organization. The Cognitive Error Taxonomy provides increased granularity to HFACS analyses of unsafe acts.

  18. Terrorism, Anti-Terrorism, and the Copycat Effect

    DEFF Research Database (Denmark)

    Jensen, Thomas

    that an increase in anti-terrorism makes it more likely that cells will plan small rather than large attacks. Furthermore, we see that an increase in anti-terrorism can make a terrorist attack more likely. Analyzing the problem of optimal anti-terrorism we see that the introduction of a copycat effect rationalizes...... an increase in the level of anti-terrorism after a large attack. Using this result we show how the copycat effect changes the dynamic pattern of terrorism attacks and what the long run consequences are...

  19. Irrational Rationality of Terrorism

    Directory of Open Access Journals (Sweden)

    Robert Nalbandov

    2013-12-01

    Full Text Available The present article deals with the ontological problem of applying the rational choice frameworks to the study of terrorism. It testing the application of the rational choice to the “old” (before the end of the Cold War and the “new” (after the end of the Cold War terrorisms. It starts with analyzing the fundamentals of rationality and applies it at two levels: the individual (actors and group (collective via two outlooks: tactical (short-term and strategic (long-term. The main argument of the article is that while the “old” terrorism can be explained by the rational choice theory its “new” version represents a substantial departure from rationality.

  20. Terrorism, Hegel, Honneth

    Directory of Open Access Journals (Sweden)

    Sinkwan Cheng

    2015-07-01

    Full Text Available My essay begins by analyzing how Hegel and Honneth’s theory of recognition would seem to lend support to insurgent terrorists’ struggle for the right to self-determination. Insurgent terrorism often looks like a concretization of what Honneth calls the moral protest of the oppressed launched against the dominating powers. Insurgent terrorism also bears affinity to the politics of recognition in the sense that it challenges the legitimacy and authority of the forces owned by the state, and seeks to gain public recognition instead for the legitimacy of their own cause. Precisely because what matters uppermost to terrorists is the gaining of recognition for their cause as just, terrorists are eager to seize the mass media as a means of spreading their ideas. My essay will end, however, by pointing out major differences between insurgent terrorism on the one hand, and Hegel and Honneth on the other.

  1. Terrorism and financial supervision

    Directory of Open Access Journals (Sweden)

    Anatoli van der Krans

    2005-12-01

    Full Text Available This article presents an analysis of how legislators on international, European and national level combat the financing of terrorism. The central question in this article is whether European regulations concerning the prevention of money laundering and the financing of terrorism, are effective, proportional and mutually harmonious. Now that many regulations in this field have been established by intra-national bodies, it is important to examine how these regulations are further elaborated in the respective national systems. This article gives a broad overview of legislative initiatives of the UN, USA, FATF, EU and Council of Europe. The Netherlands for numerous reasons serves as a legal example. It is concluded that measures taken or proposed to avoid or at least reduce the financing of terrorism are quite effective to prevent abuse of the financial system. On the other hand, these measures increase the risk of underground or illegal financing, which is even more difficult to control.

  2. Terrorism, Trust and Tourism

    DEFF Research Database (Denmark)

    Jensen, Susanne; Svendsen, Gert Tinggaard

    2017-01-01

    How does terrorism affect social trust and tourism? The rising number of terrorist attacks in Western Europe has caused safety problems not only for local citizens but also for tourists. In fact, terrorists challenge the formal violence monopoly of the state thus creating a sense of anarchy...... and distrust. Social trust is about trusting strangers, so when less predictable behaviour occurs in, a given country, people become more careful as they tend to trust most other people less. An interesting case for future research is Scandinavia as the level of terrorism is still low and, at the same time......, Scandinavia can record most social trust in the world meaning a competitive advantage when attracting tourists. Arguably, a double dividend is created from fighting terrorism, namely more social trust accumulated and more tourists attracted. Future research should therefore try to further test our model...

  3. Nuclear and Radiological Terrorism

    International Nuclear Information System (INIS)

    Cizmek, A.

    2003-01-01

    Radiological and nuclear terrorism is widely considered as a major if not ultimate terrorist threat for modern societies. Highly industrialized countries could be extremely sensitive to terrorist aggressions of this kind. Nuclear terrorism is often associated with nuclear proliferation. Strictly speaking, nuclear proliferation deals with the spread of nuclear weapons into states which doesn't posses them. But proliferation can also be understood as the spread of radioactive material or even nuclear explosives into the hands of non-state organizations, such as sub national terrorist or criminal organizations as well as any kind of extreme groups for sabotage, blackmail or any other destabilization or destruction purposes. New driving factors for nuclear terrorism which 'help' terrorists are: the consequence of the break down of the Soviet Union and 'easy' radioactive smuggling and black market. What is 'New terrorism'? In analyzing the treat, one has to start by posing several crucial questions such as 'do such groups or individuals have the skill to complete their aim'? 'Who are these groups and individuals', 'how they can be categorized', 'what is their motivation'? If analysis of the 'new terrorism' is one side of the coin, the other is just as daunting. Who, what, when, where and how would be targeted by 'new terrorism'? Although there are existing different reasons (religious and political/social), mainly the target is civilian population. In many instances the aim is to exert either political or economic pressure on authorities or both. Police, ambulance - first call response teams - local, regional and national authorities have a hard task still ahead of them. The upside is that industrialized nations have acknowledged the need to reassess where we are and what the risk is. The bottom line has to be 'who is likely to want to resort to such methods and what the likelihood of them succeeding would be. (author)

  4. Multi-modular neural networks for the classification of e+e- hadronic events

    International Nuclear Information System (INIS)

    Proriol, J.

    1994-01-01

    Some multi-modular neural network methods of classifying e + e - hadronic events are presented. We compare the performances of the following neural networks: MLP (multilayer perceptron), MLP and LVQ (learning vector quantization) trained sequentially, and MLP and RBF (radial basis function) trained sequentially. We introduce a MLP-RBF cooperative neural network. Our last study is a multi-MLP neural network. (orig.)

  5. Terror and Wellbeing

    DEFF Research Database (Denmark)

    Raffnsøe, Sverre

    Currently, terrorism provokes a widespread feeling of insecurity and global reactions to the terrorist attacks. This is not simply because it poses a substantial threat to society and to the lives of individual citizens. The relatively rare incidents of terrorism cause emotional overreaction...... because they challenge and intensify the contract that supersaturates today's society.In the welfare society one can observe the existence of a diffuse but widespread social contract, which has become the single most cohesive element in the social fabric. According the terms of this contract, we agree...

  6. Responding to nuclear terrorism. Chapter 3. Combating radiological terrorism - A multi-faceted challenge

    International Nuclear Information System (INIS)

    Wolf, A.; Yaar, I.

    2006-01-01

    In the twentieth century, radioactive sources have become extensively used in everyday life. These sources, in the hand of terror organizations, can become a threat to the security of civilized nations, causing severe disruption to normal life. On of the main challenges of the civilized world is to keep ahead of the terrorist organizations and take appropriate preventive measures in order to prevent and reduce to minimum the impact of their actions. In order to succeed, a joint and comprehensive effort has to be undertaken to address the scientific, technological, organizational, sociological, psychological and educational aspects of the radiological terrorism threat. In this paper, some of the main activities required for preventing radiological terror events, and the way in which a modular response plan can be prepared are discussed

  7. The human rights and the terrorism

    Directory of Open Access Journals (Sweden)

    Hamidreza Rafiei Fanood

    2016-12-01

    Full Text Available Regarding Human rights has been emphasized by governments through universal declaration human rights and its violations faced the global reaction in any case. From this perspective; the necessity of observing human rights against terrorism has been emphasized by many resolutions of the General Assembly, the Security Council and many regional resolutions. But, today especially after the September 11 events and America unilateral attacks by resorting to human rights and of course by considering the lack of international agreement on the norms, strategies and principles of human rights, the campaign against terrorism has started on the basis of its obligations, regardless to existing norms. So it would be said that today; the war against terrorism more than any other terrorist attacks threatens the security and human rights. However, human rights framework has never prevented effective and legitimate actions to the terrorist attacks. In other words; in the human right framework, there is no conflict with the campaign against terrorism, it emphasizes on identifying and fighting and even it guarantees the effectiveness of such a fight. As a result, Human rights violations at the expense of security, certainly associated with the destruction of both.

  8. Event classification related to overflow of solvent containing uranium according to the INES scale (International Nuclear and Radiological Event Scale); Classificacao do evento de transbordamento de solvente contendo uranio segundo a escala INES (International Nuclear and Radiological Event Scale)

    Energy Technology Data Exchange (ETDEWEB)

    Dourado, Eneida R.G.; Assis, Juliana T. de; Lage, Ricardo F., E-mail: cneida@inb.gov.br, E-mail: julianateixeira@inb.gov.br, E-mail: rlage@inb.gov.br [lndustrias Nucleares do Brasil S/A (CLISE.P/INB), Rio de Janeiro, RJ (Brazil). Coordenacao de Licenciamento Nuclear e Ambiental, Saude e Seguranca; Lopes, Karina B., E-mail: karina@inb.gov.br [lndustrias Nucleares do Brasil S/A (CPRAD/INB), Rio de Janeiro, RJ (Brazil). Coordenacao de Protecao Radiologica

    2013-11-01

    This paper aims to frame the event overflow organic solvent rich in uranium, from a decanter of ore beneficiation plant, caused by the fall in the supply of electricity, according to the criteria established by the International Nuclear Event Scale and radiological (INES), facilitating the understanding of the occurrence and communication with the public regarding the radiation safety aspects involved. With the fall of electricity, routine procedures in situations of installation stop were performed, however, due to operational failure, the valve on the transfer line liquor was not closed. Thus, the mixer continued being fed with liquor, that led the consequent leakage of solvent loaded with uranium. It reached the drainage system, and the box of rainwater harvesting of the plant. However, immediately after the detection of the event, corrective actions were initiated and the overflow was contained. Regulatory agencies followed the removal of the solvent and on the results of the analysis of environmental monitoring, found that the event did not provide exposure to workers or any other impact. Therefore, comparing the characteristics of the event and the guidelines proposed by the INES scale, it is concluded that the classification of the event is below scale/level 0, confirming the absence of risk to the local population, workers and the environment.

  9. Limits on neutrino oscillations in the CNGS neutrino beam and event classification with the OPERA detector

    Energy Technology Data Exchange (ETDEWEB)

    Ferber, Torben

    2012-09-15

    OPERA, the oscillation project with emulsion-tracking apparatus, is a long-baseline neutrino oscillation experiment. It combines an almost pure, high-energy {nu}{sub {mu}} beam produced at the SPS accelerator at CERN, Switzerland, with the OPERA neutrino detector located at a distance of about 730 km in the LNGS underground laboratory in Italy. By using a lead/photo emulsion target, {nu}{sub {tau}} charged current (CC) interactions of {nu}{sub {tau}} from {nu}{sub {mu}} {yields} {nu}{sub {tau}} oscillations can be observed on an event-by-event basis with very low background rates. Within this thesis, a {nu}{sub {mu}}{yields}{nu}{sub {mu}} disappearance search is described that uses a flux normalization. independent measurement of the CC event fraction as a function of the hadronic energy as measured by the electronic detectors of OPERA. This allows to derive limits on {nu}{sub {mu}}{yields}{nu}{sub {mu}} oscillations, complementary to the main {nu}{sub {tau}} appearance analysis. For maximal mixing, vertical stroke {Delta}m{sup 2}{sub 23} vertical stroke >4.4 x 10{sup -3} eV{sup 2} is excluded at 90% C.L. by the disappearance analysis. This thesis represents the first application of this method, including systematic uncertainties, in a long-baseline neutrino oscillation experiment.

  10. Limits on neutrino oscillations in the CNGS neutrino beam and event classification with the OPERA detector

    International Nuclear Information System (INIS)

    Ferber, Torben

    2012-09-01

    OPERA, the oscillation project with emulsion-tracking apparatus, is a long-baseline neutrino oscillation experiment. It combines an almost pure, high-energy ν μ beam produced at the SPS accelerator at CERN, Switzerland, with the OPERA neutrino detector located at a distance of about 730 km in the LNGS underground laboratory in Italy. By using a lead/photo emulsion target, ν τ charged current (CC) interactions of ν τ from ν μ → ν τ oscillations can be observed on an event-by-event basis with very low background rates. Within this thesis, a ν μ →ν μ disappearance search is described that uses a flux normalization. independent measurement of the CC event fraction as a function of the hadronic energy as measured by the electronic detectors of OPERA. This allows to derive limits on ν μ →ν μ oscillations, complementary to the main ν τ appearance analysis. For maximal mixing, vertical stroke Δm 2 23 vertical stroke >4.4 x 10 -3 eV 2 is excluded at 90% C.L. by the disappearance analysis. This thesis represents the first application of this method, including systematic uncertainties, in a long-baseline neutrino oscillation experiment.

  11. Event recognition in personal photo collections via multiple instance learning-based classification of multiple images

    Science.gov (United States)

    Ahmad, Kashif; Conci, Nicola; Boato, Giulia; De Natale, Francesco G. B.

    2017-11-01

    Over the last few years, a rapid growth has been witnessed in the number of digital photos produced per year. This rapid process poses challenges in the organization and management of multimedia collections, and one viable solution consists of arranging the media on the basis of the underlying events. However, album-level annotation and the presence of irrelevant pictures in photo collections make event-based organization of personal photo albums a more challenging task. To tackle these challenges, in contrast to conventional approaches relying on supervised learning, we propose a pipeline for event recognition in personal photo collections relying on a multiple instance-learning (MIL) strategy. MIL is a modified form of supervised learning and fits well for such applications with weakly labeled data. The experimental evaluation of the proposed approach is carried out on two large-scale datasets including a self-collected and a benchmark dataset. On both, our approach significantly outperforms the existing state-of-the-art.

  12. Who Prepares for Terrorism?

    Science.gov (United States)

    Bourque, Linda B.; Mileti, Dennis S.; Kano, Megumi; Wood, Michele M.

    2012-01-01

    The National Survey of Disaster Experiences and Preparedness (NSDEP) examined whether households in the United States have engaged in proactive preparedness and avoidance activities since September 11, 2001, and whether the activities reported were done because of terrorism, natural disasters, other reasons, or any combination of reasons. Reported…

  13. Militarized Maneuver Terrorism

    Science.gov (United States)

    2015-06-12

    striking the heart of the Indian tourism market and creating a siege in the Taj Mahal, it was certain to create a theater of terror. A drama played out... sport facilities, malls, movie theaters, and more. Grossman argues that American society has put forth enormous effort preparing and preventing harm to

  14. [Terrorism and human behavior].

    Science.gov (United States)

    Leistedt, S J

    2018-04-01

    Theories of religion are essential for understanding current trends in terrorist activities. The aim of this work is to clarify religion's role in facilitating terror and outline in parallel with recent theoretical developments on terrorism and human behaviour. Several databases were used such as PubCentral, Scopus, Medline and Science Direct. The search terms "terrorism", "social psychology", "religion", "evolution", and "cognition" were used to identify relevant studies in the databases. This work examines, in a multidimensional way, how terrorists employ these features of religion to achieve their goals. In the same way, it describes how terrorists use rituals to conditionally associate emotions with sanctified symbols that are emotionally evocative and motivationally powerful, fostering group solidarity, trust, and cooperation. Religious beliefs, including promised rewards in the afterlife, further serve to facilitate cooperation by altering the perceived payoffs of costly actions, including suicide bombing. The adolescent pattern of brain development is unique, and young adulthood presents an ideal developmental stage to attract recruits and enlist them in high-risk behaviors. This work offers insights, based on this translational analysis, concerning the links between religion, terrorism and human behavior. Copyright © 2017 L'Encéphale, Paris. Published by Elsevier Masson SAS. All rights reserved.

  15. Gender, education and terrorism

    Czech Academy of Sciences Publication Activity Database

    Malečková, Jitka; Stanišić, Dragana

    2014-01-01

    Roč. 5, č. 1 (2014), s. 40-65 ISSN 1759-5673 R&D Projects: GA ČR(CZ) GAP402/12/0510; GA MŠk(CZ) 7E08090 Institutional support: RVO:67985998 Keywords : international terrorism * women's education * public opinion Subject RIV: AH - Economics

  16. Epidemiology of terror-related versus non-terror-related traumatic injury in children.

    Science.gov (United States)

    Aharonson-Daniel, Limor; Waisman, Yehezkel; Dannon, Yehuda L; Peleg, Kobi

    2003-10-01

    In the past 2 years hundreds of children in Israel have been injured in terrorist attacks. There is a paucity of data on the epidemiology of terror-related trauma in the pediatric population and its effect on the health care system. The objective of this study was to review the accumulated Israeli experience with medical care to young victims of terrorism and to use the knowledge obtained to contribute to the preparedness of medical personnel for future events. Data on all patients who were younger than 18 years and were hospitalized from October 1, 2000, to December 31, 2001, for injuries sustained in a terrorist attack were obtained from the Israel National Trauma Registry. The parameters evaluated were patient age and sex, diagnosis, type, mechanism and severity of injury, interhospital transfer, stay in intensive care unit, duration of hospitalization, and need for rehabilitation. Findings were compared with the general pediatric population hospitalized for non-terror-related trauma within the same time period. During the study period, 138 children were hospitalized for a terror-related injury and 8363 for a non-terror-related injury. The study group was significantly older (mean age: 12.3 years [standard deviation: 5.1] v 6.9 years [standard deviation: 5.3]) and sustained proportionately more penetrating injuries (54% [n = 74] vs 9% [n = 725]). Differences were also noted in the proportion of internal injuries to the torso (11% in the patients with terror-related trauma vs 4% in those with non-terror-related injuries), open wounds to the head (13% vs 6%), and critical injuries (Injury Severity Score of 25+; 25% vs 3%). The study group showed greater use of intensive care unit facilities (33% vs 8% in the comparison group), longer median hospitalization time (5 days vs 2 days), and greater need for rehabilitative care (17% vs 1%). Terror-related injuries are more severe than non-terror-related injuries and increase the demand for acute care in children.

  17. Machine learning for radioxenon event classification for the Comprehensive Nuclear-Test-Ban Treaty

    Energy Technology Data Exchange (ETDEWEB)

    Stocki, Trevor J., E-mail: trevor_stocki@hc-sc.gc.c [Radiation Protection Bureau, 775 Brookfield Road, A.L. 6302D1, Ottawa, ON, K1A 1C1 (Canada); Li, Guichong; Japkowicz, Nathalie [School of Information Technology and Engineering, University of Ottawa, 800 King Edward Avenue, Ottawa, ON, K1N 6N5 (Canada); Ungar, R. Kurt [Radiation Protection Bureau, 775 Brookfield Road, A.L. 6302D1, Ottawa, ON, K1A 1C1 (Canada)

    2010-01-15

    A method of weapon detection for the Comprehensive nuclear-Test-Ban-Treaty (CTBT) consists of monitoring the amount of radioxenon in the atmosphere by measuring and sampling the activity concentration of {sup 131m}Xe, {sup 133}Xe, {sup 133m}Xe, and {sup 135}Xe by radionuclide monitoring. Several explosion samples were simulated based on real data since the measured data of this type is quite rare. These data sets consisted of different circumstances of a nuclear explosion, and are used as training data sets to establish an effective classification model employing state-of-the-art technologies in machine learning. A study was conducted involving classic induction algorithms in machine learning including Naive Bayes, Neural Networks, Decision Trees, k-Nearest Neighbors, and Support Vector Machines, that revealed that they can successfully be used in this practical application. In particular, our studies show that many induction algorithms in machine learning outperform a simple linear discriminator when a signal is found in a high radioxenon background environment.

  18. Bayesian Estimator for Angle Recovery: Event Classification and Reconstruction in Positron Emission Tomography

    International Nuclear Information System (INIS)

    Foudray, Angela M K; Levin, Craig S

    2007-01-01

    PET at the highest level is an inverse problem: reconstruct the location of the emission (which localize biological function) from detected photons. Ideally, one would like to directly measure an annihilation photon's incident direction on the detector. In the developed algorithm, Bayesian Estimation for Angle Recovery (BEAR), we utilized the increased information gathered from localizing photon interactions in the detector and developed a Bayesian estimator for a photon's incident direction. Probability distribution functions (PDFs) were filled using an interaction energy weighted mean or center of mass (COM) reference space, which had the following computational advantages: (1) a significant reduction in the size of the data in measurement space, making further manipulation and searches faster (2) the construction of COM space does not depend on measurement location, it takes advantage of measurement symmetries, and data can be added to the training set without knowledge and recalculation of prior training data, (3) calculation of posterior probability map is fully parallelizable, it can scale to any number of processors. These PDFs were used to estimate the point spread function (PSF) in incident angle space for (i) algorithm assessment and (ii) to provide probability selection criteria for classification. The algorithm calculates both the incident θ and φ angle, with ∼16 degrees RMS in both angles, limiting the incoming direction to a narrow cone. Feature size did not improve using the BEAR algorithm as an angle filter, but the contrast ratio improved 40% on average

  19. Machine learning for radioxenon event classification for the Comprehensive Nuclear-Test-Ban Treaty

    International Nuclear Information System (INIS)

    Stocki, Trevor J.; Li, Guichong; Japkowicz, Nathalie; Ungar, R. Kurt

    2010-01-01

    A method of weapon detection for the Comprehensive nuclear-Test-Ban-Treaty (CTBT) consists of monitoring the amount of radioxenon in the atmosphere by measuring and sampling the activity concentration of 131m Xe, 133 Xe, 133m Xe, and 135 Xe by radionuclide monitoring. Several explosion samples were simulated based on real data since the measured data of this type is quite rare. These data sets consisted of different circumstances of a nuclear explosion, and are used as training data sets to establish an effective classification model employing state-of-the-art technologies in machine learning. A study was conducted involving classic induction algorithms in machine learning including Naive Bayes, Neural Networks, Decision Trees, k-Nearest Neighbors, and Support Vector Machines, that revealed that they can successfully be used in this practical application. In particular, our studies show that many induction algorithms in machine learning outperform a simple linear discriminator when a signal is found in a high radioxenon background environment.

  20. Terrorism and disarmament

    International Nuclear Information System (INIS)

    2001-01-01

    In addressing the General Assembly at the opening of its debate on international terrorism (1 to 5 October 2001), the Secretary-General warned that a single attack involving a nuclear or biological weapon could kill millions. While the world was unable to prevent the II September attacks, there is much we can do to help prevent future terrorist acts carried out with weapons of mass destruction, he emphasized, calling for redoubled efforts to implement key treaties relating to those arms, closer cooperation among international organizations dealing with them, and tighter national legislation covering the exports of goods and technologies used in their production. Many representatives from all countries and all regions echoed the Secretary-General's sentiment during the debate. The general conclusion was that all countries could be affected in some form or another by such a fearful proposition, and all countries must work together to prevent it. To gain a greater understanding of the increased threat of international terrorism today, the Department for Disarmament Affairs sponsored a panel of high-level experts to discuss terrorism and its relationship to disarmament. Two leading experts from the Centre for the Study of Terrorism and Political Violence at the University of St. Andrews in Scotland, Professor Wilkinson and Dr. Gunaratna, put the attacks on the United States in an historical perspective, present some of the repercussions of the unprecedented scope of the attacks and give their views on how international institutions and agreements can assist in combating future acts of this kind. Mr Vladimir P Salov of the Russian Federation addresses the suppression of financing of terrorism and how Russia works towards that end. The IAEA has been trying for almost 50 years to safeguard nuclear materials from diversions to nuclear-weapon users and, in recent years, working more intensively on physical protection of nuclear material. Dr Nilsson's presentation

  1. Pathological responses to terrorism.

    Science.gov (United States)

    Yehuda, Rachel; Bryant, Richard; Marmar, Charles; Zohar, Joseph

    2005-10-01

    Many important gains have been made in understanding PTSD and other responses to trauma as a result of neuroscience-based observations. Yet there are many gaps in our knowledge that currently impede our ability to predict those who will develop pathologic responses. Such knowledge is essential for developing appropriate strategies for mounting a mental health response in the aftermath of terrorism and for facilitating the recovery of individuals and society. This paper reviews clinical and biological studies that have led to an identification of pathologic responses following psychological trauma, including terrorism, and highlights areas of future-research. It is important to not only determine risk factors for the development of short- and long-term mental health responses to terrorism, but also apply these risk factors to the prediction of such responses on an individual level. It is also critical to consider the full spectrum of responses to terrorism, as well as the interplay between biological and psychological variables that contribute to these responses. Finally, it is essential to remove the barriers to collecting data in the aftermath of trauma by creating a culture of education in which the academic community can communicate to the public what is and is not known so that survivors of trauma and terrorism will understand the value of their participation in research to the generation of useful knowledge, and by maintaining the acquisition of knowledge as a priority for the government and those involved in the immediate delivery of services in the aftermath of large-scale disaster or trauma.

  2. Assessment on Event Classification of One Steam Generator Tube Rupture in EU-APR

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Ji Hwan; Kim, Yong Soo [KHNP CRI, Daejeon (Korea, Republic of)

    2016-10-15

    The Fukushima Daiichi nuclear power plant accident showed the vulnerability of coping strategy to beyond design natural disaster such as beyond design earthquake and tsunami. In Korea, the government and industry performed comprehensive safety inspection on all domestic nuclear power plants against beyond design basis external events and fifty action items have been issued. In addition to post- Fukushima action items, the stress tests for all domestic nuclear power plants are on the way to enhance the safety of domestic nuclear power plants through finding the vulnerabilities in intentional stress conditions initiated by beyond design natural disaster. Recently, the stress tests for WOLSONG Unit 1 and KORI Unit 1 have been performed and their assessment results have been reviewed by Korean regulatory body. The assessment of the coping capability of KORI Unit 1 has been performed under simultaneous the extended loss of AC power and loss of ultimate heat sink initiated by beyond design natural disaster. It is concluded that KORI Unit 1 has the capability, in the event of loss of safety functions by beyond design natural disaster, to sufficiently cool down the reactor core without fuel damage, to keep pressure boundaries of the reactor coolant system in transient condition and to control containment and temperature to maintain the integrity of the containment buildings. The several additional items for safety improvement has been drawn to enhance the coping capability for loss of safety functions under beyond design natural disaster in addition to post Fukushima action items.

  3. Assessment on Event Classification of One Steam Generator Tube Rupture in EU-APR

    International Nuclear Information System (INIS)

    Kim, Ji Hwan; Kim, Yong Soo

    2016-01-01

    The Fukushima Daiichi nuclear power plant accident showed the vulnerability of coping strategy to beyond design natural disaster such as beyond design earthquake and tsunami. In Korea, the government and industry performed comprehensive safety inspection on all domestic nuclear power plants against beyond design basis external events and fifty action items have been issued. In addition to post- Fukushima action items, the stress tests for all domestic nuclear power plants are on the way to enhance the safety of domestic nuclear power plants through finding the vulnerabilities in intentional stress conditions initiated by beyond design natural disaster. Recently, the stress tests for WOLSONG Unit 1 and KORI Unit 1 have been performed and their assessment results have been reviewed by Korean regulatory body. The assessment of the coping capability of KORI Unit 1 has been performed under simultaneous the extended loss of AC power and loss of ultimate heat sink initiated by beyond design natural disaster. It is concluded that KORI Unit 1 has the capability, in the event of loss of safety functions by beyond design natural disaster, to sufficiently cool down the reactor core without fuel damage, to keep pressure boundaries of the reactor coolant system in transient condition and to control containment and temperature to maintain the integrity of the containment buildings. The several additional items for safety improvement has been drawn to enhance the coping capability for loss of safety functions under beyond design natural disaster in addition to post Fukushima action items

  4. The state of US trauma systems: public perceptions versus reality--implications for US response to terrorism and mass casualty events.

    Science.gov (United States)

    Champion, Howard R; Mabee, Marcia S; Meredith, J Wayne

    2006-12-01

    Injury has long been identified as the number one killer of Americans under the age of 34, and establishment of regional trauma systems and centers incorporating primary, secondary, and tertiary care and injury-prevention strategies has proved to be a vital element in reducing injury-related sequelae, deaths, and even costs. Despite these facts, trauma system development has not been given priority for funding in many local and state governments and only intermittently at the federal level. Consequently, many of the nation's trauma centers are strapped for funds to provide emergency care to their patients. In response to a 2002 Health Resources and Services Administration (HRSA) report, which identified public support as a key element in the success of trauma system development in states and communities across the United States, a Harris Interactive study was undertaken in the fall of 2004 to determine the public's attitudes, awareness, and knowledge concerning the nature and availability of trauma care and systems of trauma care. Results of the poll were contrasted with current data on the state of US trauma systems to determine the degree of correspondence. Results of the poll indicated that fully 61% of the American public does not know that injury is the leading cause of death for those aged 1 to 34, and most believe that a trauma system is in place in every state. Almost two-thirds of the American public is confident of receiving the best medical care in the event of serious injury and would be seriously concerned if no trauma center were nearby. But only eight states have fully developed trauma systems, and most states have no federal funding or infrastructure in place for managing the aftermath of a natural disaster or terrorist event. These and other objective data reveal the mismatch between public perceptions and reality. Although almost 90% of Americans believe that state trauma systems and hospitals should have a coordinated trauma response, this has

  5. Acquisition and classification of static single-event upset cross section for SRAM-based FPGAs

    International Nuclear Information System (INIS)

    Yao Zhibin; Fan Ruyu; Guo Hongxia; Wang Zhongming; He Baoping; Zhang Fengqi; Zhang Keying

    2011-01-01

    In order to evaluate single event upsets (SEUs) in SRAM-based FPGAs and to find the sensitive resource in configuration memory, a heavy ions irradiation experiment was carried out on a Xilinx FPGAs device XCV300PQ240. The experiment was conducted to gain the static SEU cross section and classify the SEUs in configurations memory according to different resource uses. The results demonstrate that the inter-memory of SRAM-based FPGAs is extremely sensitive to heavy-ion-induced SEUs. The LUT and routing resources are the main source of SEUs in the configuration memory, which covers more than 97.46% of the total upsets. The SEU sensitivity of various resources is different. The IOB control bit and LUT elements are more sensitive,and more attention should be paid to the LUT elements in radiation hardening,which account for a quite large proportion of the configuration memory. (authors)

  6. Nuclear Terrorism and its Confrontation

    International Nuclear Information System (INIS)

    Al Barody, M.M.

    2006-01-01

    The whole world first knew nuclear terrorism during the second world war through the use of excessive violence that to terror exercised by one country against another, as was carried out by USA when it exploded two nuclear bombs over Hiroshima and Nagasaki t the end of the war. there are numerous types of nuclear terrorism that can be performed by individuals or organized groups for achieving political or social objectives. the definition of the term t errorism i s correlated with u sing means capable of creating a case of public dnger . that property exists in all types of direct or indirect nuclear terrorism . the present study is divided into two chapters. Chapter one deals with nuclear terrorism and consists of two sections , the first deals with the identification of the nature of nuclear terrorism an the second deals with organize nuclear terrorism on the international level. Chapter two deals with the confrontation of nuclear terrorism in two sections. the first deals with the role of the state in combating against nuclear terrorism nd the second deals with combating against nuclear terrorism on the international level. while internally it is confronted through promulgation of legislations that deal with the protection against nuclear terrorism as well as the national legal instruments for protection of nuclear materials and installation and combating illicit trafficking of nuclear materials, confrontation of nuclear terrorism on the international level is carried out through the promulgation of international convention such as that on suppression of actions of nuclear terrorism which shall be opened for signature on sept.14 -2005 according to the recommendation the general assembly of the united nations in its 59 t h session

  7. Development of a Classification Scheme for Examining Adverse Events Associated with Medical Devices, Specifically the DaVinci Surgical System as Reported in the FDA MAUDE Database.

    Science.gov (United States)

    Gupta, Priyanka; Schomburg, John; Krishna, Suprita; Adejoro, Oluwakayode; Wang, Qi; Marsh, Benjamin; Nguyen, Andrew; Genere, Juan Reyes; Self, Patrick; Lund, Erik; Konety, Badrinath R

    2017-01-01

    To examine the Manufacturer and User Facility Device Experience Database (MAUDE) database to capture adverse events experienced with the Da Vinci Surgical System. In addition, to design a standardized classification system to categorize the complications and machine failures associated with the device. Overall, 1,057,000 DaVinci procedures were performed in the United States between 2009 and 2012. Currently, no system exists for classifying and comparing device-related errors and complications with which to evaluate adverse events associated with the Da Vinci Surgical System. The MAUDE database was queried for events reports related to the DaVinci Surgical System between the years 2009 and 2012. A classification system was developed and tested among 14 robotic surgeons to associate a level of severity with each event and its relationship to the DaVinci Surgical System. Events were then classified according to this system and examined by using Chi-square analysis. Two thousand eight hundred thirty-seven events were identified, of which 34% were obstetrics and gynecology (Ob/Gyn); 19%, urology; 11%, other; and 36%, not specified. Our classification system had moderate agreement with a Kappa score of 0.52. Using our classification system, we identified 75% of the events as mild, 18% as moderate, 4% as severe, and 3% as life threatening or resulting in death. Seventy-seven percent were classified as definitely related to the device, 15% as possibly related, and 8% as not related. Urology procedures compared with Ob/Gyn were associated with more severe events (38% vs 26%, p tool with moderate inter-rater agreement that can be used to better understand device-related adverse events. The majority of robotic related events were mild but associated with the device.

  8. Object-Based Land Use Classification of Agricultural Land by Coupling Multi-Temporal Spectral Characteristics and Phenological Events in Germany

    Science.gov (United States)

    Knoefel, Patrick; Loew, Fabian; Conrad, Christopher

    2015-04-01

    Crop maps based on classification of remotely sensed data are of increased attendance in agricultural management. This induces a more detailed knowledge about the reliability of such spatial information. However, classification of agricultural land use is often limited by high spectral similarities of the studied crop types. More, spatially and temporally varying agro-ecological conditions can introduce confusion in crop mapping. Classification errors in crop maps in turn may have influence on model outputs, like agricultural production monitoring. One major goal of the PhenoS project ("Phenological structuring to determine optimal acquisition dates for Sentinel-2 data for field crop classification"), is the detection of optimal phenological time windows for land cover classification purposes. Since many crop species are spectrally highly similar, accurate classification requires the right selection of satellite images for a certain classification task. In the course of one growing season, phenological phases exist where crops are separable with higher accuracies. For this purpose, coupling of multi-temporal spectral characteristics and phenological events is promising. The focus of this study is set on the separation of spectrally similar cereal crops like winter wheat, barley, and rye of two test sites in Germany called "Harz/Central German Lowland" and "Demmin". However, this study uses object based random forest (RF) classification to investigate the impact of image acquisition frequency and timing on crop classification uncertainty by permuting all possible combinations of available RapidEye time series recorded on the test sites between 2010 and 2014. The permutations were applied to different segmentation parameters. Then, classification uncertainty was assessed and analysed, based on the probabilistic soft-output from the RF algorithm at the per-field basis. From this soft output, entropy was calculated as a spatial measure of classification uncertainty

  9. Posttraumatic responses to the July 22, 2011 Oslo Terror among Norwegian high school students

    NARCIS (Netherlands)

    Nordanger, Dag Ø; Hysing, Mari; Posserud, Maj-Britt; Lundervold, Astri Johansen; Jakobsen, Reidar; Olff, Miranda; Stormark, Kjell Morten

    2013-01-01

    The July 22, 2011, Oslo Terror was defined as a national disaster. Former studies on terror attacks and mass shootings have shown elevated levels of posttraumatic complaints both in direct victims and in general populations. Little is known about how such extreme events in a generally safe society

  10. Cyber Terrorism: A Study of the Extent of Coverage in Computer Security Textbooks

    Science.gov (United States)

    Prichard, Janet J.; MacDonald, Laurie E.

    2004-01-01

    On September 11th, 2001 the United States experienced the largest terrorist attack in its history. This event caused many government agencies to review their security practices and procedures. It also has raised awareness of other avenues that terrorists might pursue to achieve their goals, including cyber terrorism. Cyber terrorism can be…

  11. Terror.com

    DEFF Research Database (Denmark)

    Nissen, Thomas Elkjer

    En stor del af terrorens formål er at skabe frygt. Frygt for gentagelse af terror handlinger og dermed opnåelsen af en psykologisk effekt på mennesker eller grupper af mennesker med henblik på at ændre deres holdninger eller adfærd. Et af de primære midler til at opnå denne psykologiske effekt er......, udover terror handlingerne selv, propaganda som opfølgning på terrorhandlinger for at forøge effekten af disse. Eller propaganda som slet og ret har til formål at skabe frygt og usikkerhed. Traditionelt set har meget af spredningen af terrorpropaganda beroet på, at medierne omtalte terrorhandlingerne og...

  12. Terrorism, war, and peace

    Directory of Open Access Journals (Sweden)

    JÜRGEN STOLZENBER

    2006-01-01

    Full Text Available The article tries first to analyse the different use of the concept of war made by George W. Bush with reference to the terrorist attack of 09/11 and to the invasion of Afghanistan. In order to do this, the paper will start from an analysis of the concept of terrorism itself and from the question whether terrorist acts can be designed as acts of war. It turns secondly to the more philosophical aspects of the question of terrorism, war and peace, starting from questions about the applicability of just war theories to the so called “war on terrorism” and discussing finally what is called “The Kantian Project”, that is the Kantian arguments for the establishment of “eternal peace” among the states of the world.

  13. Lone-actor Terrorism and Impulsivity.

    Science.gov (United States)

    Meloy, J Reid; Pollard, Jeffrey W

    2017-11-01

    In some recent cases of lone-actor terrorism, there is evidence the subject acted impulsively, often in response to a triggering event which contained a loss and humiliation. Evidence suggests the subjects acted precipitously, despite planning and preparation carried out in the preceding weeks or months, and their attacks failed to include the often considerable preparation that had been done. The pathway became a runway. The authors recommend the traditional assessment of impulsivity in persons of concern for lone acts of terrorism, as well as other proximal warning behaviors for targeted violence. Both indirect and direct assessment guidelines are proposed, with an emphasis upon self-report, psychological testing, collateral data gathering, and historical records. © 2017 American Academy of Forensic Sciences.

  14. Chechen Female Suicide Terrorism

    Science.gov (United States)

    2017-06-01

    Farhana Ali describes terrorism against an occupier as an attempt to achieve freedom from tyranny.66 Recruiters encourage women to resist for a...fringe phenomenon and insurgents are all around you.’”71 O’Rourke also acknowledges the freedom and relaxed inspection women are afforded.72 Bloom and...lives as Moscow controlled the land and people. Suspicious of Islam and of religion in general, the Soviets forbade its practice, fearing expansion.110

  15. Chinas Response to Terrorism

    Science.gov (United States)

    2016-06-01

    regulations regarding terrorism and related activities (e.g., the 2006 Anti- Money iv Laundering Law), most notably the 2015 Counterterrorism... Money Laundering ASEAN Association for Southeast Asian Nations CASS Chinese Academy of Social Sciences CCP Chinese Communist Party CICIR China...the Financing of Terrorism” in 2006, and passed a new law governing money laundering in an effort to restrict access to funds available to terrorists

  16. Psychology of Terrorism

    Science.gov (United States)

    2007-12-14

    and logistic support. 160. Kfir, N. (2002). Understanding suicidal terror through humanistic and existential psychology. C. E. Stout (Ed), The...anomie or for an existential vacuum, which may drive other individuals to drifting or to entering the drug culture. - To understand the differences...any group of prisoners is by definition ‘survivalist’, yet that of the Red Brigades has evolved through three phases ‘social’, ‘ existential ’ and

  17. Terrorism: A Selected Bibliography.

    Science.gov (United States)

    1984-07-30

    Terrorism, Outraged World Seeks an Answer." U. News and World Report, September 18, 1972, p. 16. Arendt , Hannah . Crisis of the Republic. N. Y., Harcourt...Brace Jovanovich, 1972. Arendt , Hannah , On Violence. N. Y. Harcourt, Brace and World, 1970. Arendt , Hannah . On Revolutions. N. Y., Viking Press, 1965... Arendt , Hannah . "Reflections on Violence." Journal of International Affairs, 23:1, 1969. "Are the Skies Really Friendly?" Proposed Theories of Relief for

  18. New FIGO and Swedish intrapartum cardiotocography classification systems incorporated in the fetal ECG ST analysis (STAN) interpretation algorithm: agreements and discrepancies in cardiotocography classification and evaluation of significant ST events.

    Science.gov (United States)

    Olofsson, Per; Norén, Håkan; Carlsson, Ann

    2018-02-01

    The updated intrapartum cardiotocography (CTG) classification system by FIGO in 2015 (FIGO2015) and the FIGO2015-approached classification by the Swedish Society of Obstetricians and Gynecologist in 2017 (SSOG2017) are not harmonized with the fetal ECG ST analysis (STAN) algorithm from 2007 (STAN2007). The study aimed to reveal homogeneity and agreement between the systems in classifying CTG and ST events, and relate them to maternal and perinatal outcomes. Among CTG traces with ST events, 100 traces originally classified as normal, 100 as suspicious and 100 as pathological were randomly selected from a STAN database and classified by two experts in consensus. Homogeneity and agreement statistics between the CTG classifications were performed. Maternal and perinatal outcomes were evaluated in cases with clinically hidden ST data (n = 151). A two-tailed p ST events, heterogeneities were significant and agreements moderate to almost perfect (STAN2007 vs. FIGO2015 0.86, 0.72; STAN2007 vs. SSOG2017 0.92, 0.84; FIGO2015 vs. SSOG2017 0.94, 0.87). Significant ST events occurred more often combined with STAN2007 than with FIGO2015 classification, but not with SSOG2017; correct identification of adverse outcomes was not significantly different between the systems. There are discrepancies in the classification of CTG patterns and significant ST events between the old and new systems. The clinical relevance of the findings remains to be shown. © 2017 The Authors. Acta Obstetricia et Gynecologica Scandinavica published by John Wiley & Sons Ltd on behalf of Nordic Federation of Societies of Obstetrics and Gynecology (NFOG).

  19. ADDRESSING THE SPECTRE OF CYBER TERRORISM: A COMPARATIVE PERSPECTIVE

    Directory of Open Access Journals (Sweden)

    Fawzia Cassim

    2012-08-01

    Full Text Available This article looks at the definition of cyber terrorism and terrorist use of the Internet. The article evaluates cyber terrorist threats facing countries such as the United States of America, the United Kingdom, India and South Africa. The article also examines measures introduced by the respective governments in these countries to counteract cyber terrorist threats. Finally, the article will propose a way forward to counteract such possible threats in the future.The face of terrorism is changing. The convergence of the physical and virtual worlds has resulted in the creation of a “new threat” called cyber terrorism. Cyber terrorism is one of the recognised cyber crimes. The absence of suitable legal frameworks to address cyber terrorism at national and regional levels, the lack of adequate safeguards, the lack of cyber security strategies and the pre-occupation of countries with internal factors have all contributed to the creation of an environment that can be easily infiltrated by cyber terrorists. The horrific events of 9/11 provided the impetus for many countries to introduce anti-terrorist legislation. The United States of America, United Kingdom, India and South Africa have introduced legislation to address the threat of cyber terrorism.

  20. Inter-observer agreement of canine and feline paroxysmal event semiology and classification by veterinary neurology specialists and non-specialists

    DEFF Research Database (Denmark)

    Packer, Rowena M A; Berendt, Mette; Bhatti, Sofie

    2015-01-01

    neurology specialists and non-specialists) on the description and classification of videos depicting paroxysmal events, without knowing any results of diagnostic workup. An online questionnaire study was conducted, where participants watched 100 videos of dogs and cats exhibiting paroxysmal events...... low levels of agreement described here highlight the need for further discussions between neurology experts regarding classifying and describing epileptic seizures, and additional training of non-specialists to facilitate accurate diagnosis. There is a need for diagnostic tools (e...

  1. A Taxonomy of Terror - About the Effect of Different Kinds of Terror on Risk Perceptions

    OpenAIRE

    Wolff, Katharina; Larsen, Svein

    2016-01-01

    Terrorism is an increasing problem; still, research systematically investigating the impact of varying kinds of terrorism is scarce. The present investigation uses hypothetical scenarios to look at effects of diverging sorts of terrorism on risk perceptions in a student- and a tourist sample. Two characteristics of terrorism were varied systematically: frequency (whether terrorism hits a destination where terrorism is frequent or infrequent) and degree of organization (whether terrorism is co...

  2. Domestic Violence as Everyday Terrorism

    DEFF Research Database (Denmark)

    Cooper-Cunningham, Dean

    2016-01-01

    Seeing bride kidnapping and domestic violence as everyday terrorism unpacks the political nature of so-called “private” phenomena and how they reify patriarchal society.......Seeing bride kidnapping and domestic violence as everyday terrorism unpacks the political nature of so-called “private” phenomena and how they reify patriarchal society....

  3. Terrorism, forgiveness and restorative justice

    NARCIS (Netherlands)

    Pemberton, A.

    2014-01-01

    This paper is intended to enhance understanding of the complexities of restorative justice in cases of terrorism from a victimological perspective. It does so first by analysing what separates terrorism from other forms of crime. The author argues that the main distinction concerns the peculiarly

  4. Considering threats of nuclear terrorism

    International Nuclear Information System (INIS)

    Sato, Satoshi

    2013-01-01

    Anti-terrorism measures of nuclear power station in Japan consisted of three physical protection areas separated into limited access area, protected area with disposition of riot police riding in special guard vehicle, and inner area. Drilling of measures to protect against terrorism had been conducted based on design basis threat (DBT) and effectiveness of anti-terrorism measures corresponding with updated DBT had been evaluated by the inspection. Since nuclear power station had been target of terrorism using bomb, aircraft or military operation in overseas countries, anti-terrorism measures of nuclear power station in Japan should be paid more attention so as to overcome their weakness supported by Government's commitments like United States. (T. Tanaka)

  5. Insurability of Terrorism Risks

    International Nuclear Information System (INIS)

    Harbruecker, D.

    2006-01-01

    Until 2001 losses caused by terrorist attacks have been covered under fire policies worldwide with two exceptions: Spain and UK where major and multiple losses caused by ETA and IRA had led to specific insurance solutions. The September 11, 2001 attacks on the World Trade Centre have changed the world in many aspects. This includes the insurance industry, which was compelled to exclude terrorism from coverage and to offer special solutions for extra premium. Nuclear power plants have been repeatedly called targets for terrorists as their destruction could cause a large catastrophe and more victims than the September 2001 attacks. How does the insurance industry respond? (author)

  6. 31 CFR 594.311 - Terrorism.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Terrorism. 594.311 Section 594.311... ASSETS CONTROL, DEPARTMENT OF THE TREASURY GLOBAL TERRORISM SANCTIONS REGULATIONS General Definitions § 594.311 Terrorism. The term terrorism means an activity that: (a) Involves a violent act or an act...

  7. Modern terrorism: concept and approach analysis

    OpenAIRE

    CHAIKA ALEXANDER VIKTOROVICH

    2015-01-01

    The problem of modern terrorism as an image of counterculture environment is considered. The analysis of concepts and approaches of foreign and native authors, specialists of terrorism problem research was conducted. Separate features of the modern terrorism are considered and emphasized. The author drew conceptual conclusions on the basis of dialectical approach to modern terrorism counterculture phenomenon research.

  8. Are Economic Development and Education Improvement Associated with Participation in Transnational Terrorism?

    Science.gov (United States)

    Elbakidze, L; Jin, Y H

    2015-08-01

    Using transnational terrorism data from 1980 to 2000, this study empirically examines the relationships between frequency of participation in transnational terrorism acts and economic development and education improvement. We find an inverse U-shaped association between the frequency of various nationals acting as perpetrators in transnational terrorism acts and per capita income in their respective home countries. As per capita incomes increase from relatively low levels, frequencies of participation in transnational terrorism increase. However, at sufficiently higher levels of per capita income, further increase in per capita income is negatively associated with the rate of participation in transnational terrorism. Education improvement from elementary to secondary is positively correlated with frequency of participation in transnational terrorism events, whereas further improvement from secondary to tertiary level is negatively correlated with participation in transnational terrorism. We also find that citizens of countries with greater openness to international trade, lower degree of income inequality, greater economic freedom, larger proportion of population with tertiary education, and less religious prevalence participate in transnational terrorism events less frequently. © 2015 Society for Risk Analysis.

  9. Crisis Response Interoperability System: Enabling Multi-National and Multi-Agency Defence Against Terrorism

    National Research Council Canada - National Science Library

    Roy, Jean; Dessureault, Dany; Letourneau, Francois

    2004-01-01

    We live in an increasingly interconnected, complex and often dangerous world, and recent events have moved the issues of anti- and counter-terrorism, national/public security, and collective emergency...

  10. Single trial classification for the categories of perceived emotional facial expressions: an event-related fMRI study

    Science.gov (United States)

    Song, Sutao; Huang, Yuxia; Long, Zhiying; Zhang, Jiacai; Chen, Gongxiang; Wang, Shuqing

    2016-03-01

    Recently, several studies have successfully applied multivariate pattern analysis methods to predict the categories of emotions. These studies are mainly focused on self-experienced emotions, such as the emotional states elicited by music or movie. In fact, most of our social interactions involve perception of emotional information from the expressions of other people, and it is an important basic skill for humans to recognize the emotional facial expressions of other people in a short time. In this study, we aimed to determine the discriminability of perceived emotional facial expressions. In a rapid event-related fMRI design, subjects were instructed to classify four categories of facial expressions (happy, disgust, angry and neutral) by pressing different buttons, and each facial expression stimulus lasted for 2s. All participants performed 5 fMRI runs. One multivariate pattern analysis method, support vector machine was trained to predict the categories of facial expressions. For feature selection, ninety masks defined from anatomical automatic labeling (AAL) atlas were firstly generated and each were treated as the input of the classifier; then, the most stable AAL areas were selected according to prediction accuracies, and comprised the final feature sets. Results showed that: for the 6 pair-wise classification conditions, the accuracy, sensitivity and specificity were all above chance prediction, among which, happy vs. neutral , angry vs. disgust achieved the lowest results. These results suggested that specific neural signatures of perceived emotional facial expressions may exist, and happy vs. neutral, angry vs. disgust might be more similar in information representation in the brain.

  11. Working with Children Who Have Experienced War, Terrorism, and Disaster

    Science.gov (United States)

    Webster, Paula Sunanon; Harris, Yvette R.

    2009-01-01

    In this article, the authors provide an overview of the consequences of war, terrorism, and disaster on children's physical, social, emotional, and cognitive development. Next, they discuss the "resiliency promoting" strategies that adults who work with children may employ prior to and after a catastrophic event. The article concludes with…

  12. Violation of human rights to combat terrorism.

    OpenAIRE

    2012-01-01

    LL.B. No one definition of terrorism has gained universal acceptance. The lack of agreement on a definition of terrorism has been a major obstacle to meaningful international countermeasures to combat terrorism. There are 12 International Conventions related to terrorism and an explicit definition is still missing. Many states have tried to define terrorism and none of these definitions has been implemented, either by the United Nations or these states. There are many International Convent...

  13. Racionalidad del terror

    Directory of Open Access Journals (Sweden)

    Sauquillo, Julián

    2012-06-01

    Full Text Available Contemporary terrorism is not an ancestral, irrational, oriental, phenomenon. Nor is it a fanatical reaction of the religions that vindicate a backward society as against the developed societies of the first world. The terrorism of today is a thoroughly modern phenomenon: one of the worst monstrosities of modern society, supplied with rational planning of objectives. A captious interpretation of the Islamic religion endows terrorism with a universal projection among the multitudinous audience of the discontented with the might of that diffuse power that we know as the developed Western world. Al Qaeda does not hesitate to present its war against the West as «a war without quarter» lasting until the infidel Christians are eliminated and the world is subjugated to Islam In the meantime, in a similar conflictive sense, the theoretical campaign of Samuel Huntington across the entire planet responds with a paradigmatic post-cold war, capable of inflaming the international conflict, in a sense no less belligerent with the Anti-Occident than that employed by the radical Imams. As has been pointed out by Amartya Sen, to give priority in this way to the religious identity, the response of the West to international terrorism in calling it «islamic terrorism» is very clumsy, as it magnifies the importance of the religious authorities in detriment to governmental ways and means in the solving of problems.

    El terrorismo contemporáneo no es un fenómeno ancestral, irracional y oriental. Tampoco es una reacción fanática de las religiones que reivindican una sociedad atrasada frente a las sociedades desarrolladas del primer mundo. El terrorismo actual es un fenómeno plenamente moderno: uno de los peores engendros de la sociedad moderna, dotado de una planificación racional de objetivos. Una interpretación capciosa de la religión islámica dota al terrorismo de una proyección universal entre la numerosa audiencia de descontentos con el poder

  14. 77 FR 74685 - Chemical Facility Anti-Terrorism Standards (CFATS) Chemical-Terrorism Vulnerability Information...

    Science.gov (United States)

    2012-12-17

    ... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2012-0057] Chemical Facility Anti-Terrorism Standards (CFATS) Chemical- Terrorism Vulnerability Information (CVI) AGENCY: National Protection and...: Comments that include trade secrets, confidential commercial or financial information, Chemical-terrorism...

  15. Bio-Terrorism Threat and Casualty Prevention

    Energy Technology Data Exchange (ETDEWEB)

    NOEL,WILLIAM P.

    2000-01-01

    The bio-terrorism threat has become the ''poor man's'' nuclear weapon. The ease of manufacture and dissemination has allowed an organization with only rudimentary skills and equipment to pose a significant threat with high consequences. This report will analyze some of the most likely agents that would be used, the ease of manufacture, the ease of dissemination and what characteristics of the public health response that are particularly important to the successful characterization of a high consequence event to prevent excessive causalities.

  16. Events

    Directory of Open Access Journals (Sweden)

    Igor V. Karyakin

    2016-02-01

    Full Text Available The 9th ARRCN Symposium 2015 was held during 21st–25th October 2015 at the Novotel Hotel, Chumphon, Thailand, one of the most favored travel destinations in Asia. The 10th ARRCN Symposium 2017 will be held during October 2017 in the Davao, Philippines. International Symposium on the Montagu's Harrier (Circus pygargus «The Montagu's Harrier in Europe. Status. Threats. Protection», organized by the environmental organization «Landesbund für Vogelschutz in Bayern e.V.» (LBV was held on November 20-22, 2015 in Germany. The location of this event was the city of Wurzburg in Bavaria.

  17. Coping with the threat of terrorism: a review.

    Science.gov (United States)

    Maguen, Shira; Papa, Anthony; Litz, Brett T

    2008-01-01

    Terrorism creates a ripple of fear and uncertainty. Although most individuals are resilient and recover over time, a minority remains functionally and psychologically impaired. In this paper, we examine research on coping strategies employed in the aftermath of terrorist events, theories and empirical findings related to appraisal processes that influence individuals' primary attributions of risk, and normative processes that shape secondary appraisals, which predict specific coping behaviors. We also describe individual diatheses and factors promoting resilience that may influence coping and functioning in the face of terrorism. Finally, we offer suggestions for future research.

  18. The threat of nuclear terrorism: Assessment and preventive action

    International Nuclear Information System (INIS)

    Nilsson, A.

    2001-01-01

    In the light of the events of 11 September, the General Conference requested the IAEA Director General to review thoroughly the activities and programmes of the Agency with a view to strengthening the Agency's work relevant to preventing acts of terrorism involving nuclear materials and other radioactive materials. That review is ongoing and the results will be presented in March to the Board of Governors, including proposals for revisions and updates on relevant programmes. It is underlined that preventing nuclear terrorism requires cooperation between States and with international organizations. The problem must be addressed in a comprehensive manner. The international community should therefore strive for strong, comprehensive, internationally accepted security systems

  19. Animal rights and environmental terrorism

    Directory of Open Access Journals (Sweden)

    Steve Cooke

    2013-09-01

    Full Text Available Many paradigmatic forms of animal rights and environmental activism have been classed as terrorism both in popular discourse and in law. This paper argues that the labelling of many violent forms of direct action carried out in the name of animal rights or environmentalism as ‘terrorism’ is incorrect. Furthermore, the claim is also made that even those acts which are correctly termed as terrorism are not necessarily wrongful acts. The result of this analysis is to call into question the terms of public debate and the legitimacy of anti-terrorism laws targeting and punishing radical activism.

  20. The Concept of (Global Terrorism and Conspiracy Theory as Media Discourse

    Directory of Open Access Journals (Sweden)

    Neda Radulović

    2016-09-01

    Full Text Available Despite the urgency and growing interest in a subject, there is no unifying definition of terrorism. A large number of studies could be seen as integral part of ‘counter-terrorism’ strategies- as set of practices to prevent and defeat terrorism. Lisa Stampnitzky’s research looked into the discourse of terrorism experts and argued that the concept of terrorism is a social construct, thus revealing further structure that facilitated it. Aim of this paper is to compare the concept of terrorism as media discourse- a form of legitimate expert interpretation, with conspiracy theory as a form of illegitimate, para-institutional form of interpretation. Noting the commonplaces of the two: defined as an afterthought, both being designated and not self-described notions, featuring a plot that precedes the event- this paper will look at these discourses, the way they relate to (and intersect each other, and try to trace their manifestations.

  1. Development of a new cause classification method considering plant ageing and human errors for adverse events which occurred in nuclear power plants and some results of its application

    International Nuclear Information System (INIS)

    Miyazaki, Takamasa

    2007-01-01

    The adverse events which occurred in nuclear power plants are analyzed to prevent similar events, and in the analysis of each event, the cause of the event is classified by a cause classification method. This paper shows a new cause classification method which is improved in several points as follows: (1) the whole causes are systematically classified into three major categories such as machine system, operation system and plant outside causes, (2) the causes of the operation system are classified into several management errors normally performed in a nuclear power plant, (3) the content of ageing is defined in detail for their further analysis, (4) human errors are divided and defined by the error stage, (5) human errors can be related to background factors, and so on. This new method is applied to the adverse events which occurred in domestic and overseas nuclear power plants in 2005. From these results, it is clarified that operation system errors account for about 60% of the whole causes, of which approximately 60% are maintenance errors, about 40% are worker's human errors, and that the prevention of maintenance errors, especially worker's human errors is crucial. (author)

  2. Potential for nuclear terrorism

    International Nuclear Information System (INIS)

    Jenkins, B.M.

    1977-05-01

    The question of whether or not terrorists will ''go nuclear'' is discussed. It is possible, although there is no historical evidence that any criminal or terrorist group ever made any attempt to acquire nuclear material for use in an explosive or dispersal device. In terms of intentions, psychotics are potential nuclear terrorists, but in terms of capabilities, they are the farthest away from being able to acquire a nuclear weapon. The history of nuclear incidents in the U.S. and abroad is reviewed. As the nuclear industry expands, the number of low-level incidents (bomb threats, pilferage, etc.) will increase also, but not necessarily escalate to more serious incidents. Terrorists may ''go nuclear'' solely for the publicity value; nuclear hoaxes may be attenpted. Nuclear terrorism seems more attractive as a threat than as an action. But the nature of the threat may change in the future, and the danger of imitation of a successful nuclear terrorist act is pointed out

  3. Terror explosive injuries: a comparison of children, adolescents, and adults.

    Science.gov (United States)

    Jaffe, Dena H; Peleg, Kobi

    2010-01-01

    We sought to characterize injuries and outcomes from terror explosions with specific attention to children (0-10 years) and adolescents (11-15 years) compared to adults (16-45 years). Terror explosions target vulnerable populations and result in multidimensional injuries that may vary according to age group. The relative dearth of information regarding terror-related injuries among children inhibits proper preparedness and optimum management during such an event. A retrospective study was performed using data from the national Israel Trauma Registry (October 2000 to December 2005). Included were civilians and nonactive military personnel hospitalized as a result of a terror explosion. During the 5.3-year study period, 49 children (0-10 years), 65 adolescents (11-15 years), and 723 adults (16-45 years) were hospitalized from terror explosions. Children were more likely than adults to sustain severe injuries (27% vs. 12%) and traumatic brain injury (35% vs. 20%) and less likely to sustain injuries to their extremities (35% vs. 57%) or open wounds (39% vs. 59%) (P profile was similar to that of adults, however, adolescents presented with less internal injuries, more contusions, and superficial wounds to extremities and were more likely to require surgery for mild to moderate wounds. Differences in hospital utilization and outcomes by age groups were observed when data were stratified by injury severity. Compared to adults, children, and adolescents exposed to terror explosions present with different injuries and hospital utilization and outcomes. These results further confirm that preparedness of a pediatric healthcare system is essential for effective management in the event of a future mass casualty incident.

  4. Paramilitary Terrorism: A Neglected Threat

    National Research Council Canada - National Science Library

    Tallen, Jr, George W

    2007-01-01

    Fixation upon WMD terrorism, reinforced by the recurring need to manage the consequences of other manmade or natural disasters, has conditioned the homeland security community to focus upon prevention...

  5. Cyber-Terrorism: Modem Mayhem

    National Research Council Canada - National Science Library

    White, Kenneth

    1998-01-01

    .... The arrival of the information age has created a new menace cyber terrorism. This threat recognizes no boundaries, requires minimal resources to mount an attack, and leaves no human footprint at ground zero...

  6. The Czech National Action Plan on Combating Terrorism: Political and Legal Point of Outcome in Responding to CBRNE-Terrorism

    International Nuclear Information System (INIS)

    Matousek, J.

    2007-01-01

    After the events of September 2001 starting new era in the global terrorism, pursuant to the UN Security Council Resolutions 1368, 1373, and 1377 (2001), new security threats were identified and needs to fight against international terrorism were stressed. In the Czech Republic, a complex approach and broad institutional co-operation including inputs of scientific research (including authors involvement) to analyse endangered critical infrastructures and respective countermeasures had led to strengthening national measures in implementing respective international agreements dealing with WMD non-proliferation under deepening the co-operation within EU and NATO. The concrete complex programme of harmonised effort of all state organs in combating international terrorism resulted in the Czech National Action Plan on Combating Terrorism (2002). This (yearly updated) binding political document (issued by the Czech Government) identifies threats to all sectors of society and contains agreed harmonised active measures to be undertaken by involved organisations and institutions in all aspects of prevention, repression, protection, rescue and recovery for cases of terrorist attacks. The contents and respective measures are presented and discussed in detail with special emphasis on the aspects of CBRNE terrorism and role of Integrated Rescue System.(author)

  7. Intelligence and the prevention of nuclear terrorism

    International Nuclear Information System (INIS)

    Despres, J.

    1987-01-01

    The paper first defines intelligence and nuclear terrorism and analyzes the nature of the problem from both a specifically US and a more generally Western viewpoint. As used here, intelligence refers broadly to the collection and reporting of information, the production of assessments, and the presentation of judgments by intelligence specialists who work for public and national security authorities. Intelligence encompasses the entire range of investigative and reporting activities at all levels of government - from local police units to allied military commands - that could contribute to the discovery and disarming of nuclear terrorists. Nuclear terrorism, in contrast, refers only to credible threats or acts of extreme violence by forces outside the direct control of any state through false threats or actual use of a nuclear bomb. This definition excludes other highly menacing or damaging activities involving nuclear materials, facilities, weapons, or phobias such as poisoning the air or water supplies with radioactive substances; stealing nuclear materials, sabotaging nuclear powerplants, occupying a facility or seizing a vehicle with nuclear weapons, or inflaming public fears in the event of a nuclear accident. These events can be extremely frightening, as in the case of public reactions throughout Europe to the nuclear accident at Chernobyl in the Ukraine. However, their potential destructiveness and exploitability by terrorists do not match the threat of nuclear explosion

  8. Advancing against nuclear terrorism

    International Nuclear Information System (INIS)

    Allison, G.

    2006-01-01

    Meeting a day before the summit, Bush and Putin announced a new Global Initiative to Combat Nuclear Terrorism; a plan for multiple, multilateral guaranteed suppliers of nuclear fuel to States that forgo building their own enrichment plants; and a Civil Nuclear Agreement that will lift restrictions on cooperation between the two countries in developing peaceful nuclear power. Each of these initiatives provides a framework for dozens of specific actions that can measurably reduce the risk of terrorists acquiring a nuclear weapon. The significance of the Global Initiative against Nuclear Terrorism lies not only in its substance but in Russia's visible joint ownership of the Initiative. After years in which Washington lectured Moscow about this threat, Putin's joint leadership in securing nuclear material worldwide should give added impetus to this undertaking inside Russia as well. Globally, this initiative calls for work plans in five arenas: prevention, detection, disruption, mitigation of consequences after an attack, and strengthening domestic laws and export controls against future A.Q. Khans. The guaranteed nuclear fuel supply tightens the noose around Iran as it seeks to exploit a loophole in the global Nuclear Non-Proliferation Treaty. By guaranteeing States that six separate international suppliers will provide backup guarantees against interruption of supply for any reason other that breech of commitments under the NPT, this proposal eliminates Iran's excuse for Natanz-the enrichment plant it is rushing to finish today. This system for supply will be subject to the supervision by the IAEA, which will also have nuclear fuel reserves that allow it to be a supplier of last resort. The Civil Nuclear Agreement will allow joint research on next-generation, proliferation-proof reactors, including technologies where Russian science is the best in the world. It will permit sale to Russia of US technologies that can improve the safety and efficiency of Russian nuclear

  9. 75 FR 75904 - Global Terrorism Sanctions Regulations; Terrorism Sanctions Regulations; Foreign Terrorist...

    Science.gov (United States)

    2010-12-07

    ... Terrorism Sanctions Regulations; Terrorism Sanctions Regulations; Foreign Terrorist Organizations Sanctions... Foreign Assets Control (``OFAC'') of the U.S. Department of the Treasury is amending the Global Terrorism Sanctions Regulations (``GTSR'') and the Terrorism Sanctions Regulations (``TSR'') to expand the scope of...

  10. Basic Research Needs for Countering Terrorism

    Energy Technology Data Exchange (ETDEWEB)

    Stevens, W.; Michalske, T.; Trewhella, J.; Makowski, L.; Swanson, B.; Colson, S.; Hazen, T.; Roberto, F.; Franz, D.; Resnick, G.; Jacobson, S.; Valdez, J.; Gourley, P.; Tadros, M.; Sigman, M.; Sailor, M.; Ramsey, M.; Smith, B.; Shea, K.; Hrbek, J.; Rodacy, P.; Tevault, D.; Edelstein, N.; Beitz, J.; Burns, C.; Choppin, G.; Clark, S.; Dietz, M.; Rogers, R.; Traina, S.; Baldwin, D.; Thurnauer, M.; Hall, G.; Newman, L.; Miller, D.; Kung, H.; Parkin, D.; Shuh, D.; Shaw, H.; Terminello, L.; Meisel, D.; Blake, D.; Buchanan, M.; Roberto, J.; Colson, S.; Carling, R.; Samara, G.; Sasaki, D.; Pianetta, P.; Faison, B.; Thomassen, D.; Fryberger, T.; Kiernan, G.; Kreisler, M.; Morgan, L.; Hicks, J.; Dehmer, J.; Kerr, L.; Smith, B.; Mays, J.; Clark, S.

    2002-03-01

    To identify connections between technology needs for countering terrorism and underlying science issues and to recommend investment strategies to increase the impact of basic research on efforts to counter terrorism.

  11. Biotypologies of Terrorism

    Directory of Open Access Journals (Sweden)

    Joseph Pugliese

    2011-04-01

    Full Text Available The International Association of Chiefs of Police (IACP document, ‘Training Keys #581: Suicide (Homicide Bombers: Part 1,’ is designed to assist law enforcement authorities in the pre-emptive capture of prospective suicide bombers. In this essay, Pugliese focuses on the training key to examine the manner in which essentialised biotypologies are mobilised and reproduced within the context of the so-called ‘war on terror.’ The use of biotypologies by both the military and law enforcement agencies reproduces a disciplinary biopolitical regime premised on normative conceptualisations of race, gender and bodily behaviour. Pugliese discusses these regimes in the context of the US Department of Defense and its advocacy of ‘identity dominance’ through the development of new technologies such as gait signature biometrics. Situated in this context, he shows how biotypologies of targeted subjects are instrumental in fomenting cultural panics concerning the Arab and/or Muslim and/or figure ‘of Middle Eastern appearance’.

  12. Global initiatives to prevent nuclear terrorism

    International Nuclear Information System (INIS)

    2010-01-01

    The fight against nuclear and radiological terrorism - someone to blow up a nuclear weapon or spread radioactive material as a 'dirty bomb' that act of terrorism - is one of the most serious threats to international security. The Global Initiative to prevent nuclear terrorism is a Norwegian-sponsored initiative that is aimed directly at combating terrorism by non-state actors. NRPA follow up Norwegian measures, including in Kazakhstan, and verifies that they are implemented and functioning as intended. (AG)

  13. Bringing the State Back into Terrorism Studies

    OpenAIRE

    Blakeley, Ruth

    2007-01-01

    Orthodox terrorism studies tend to focus on the activities of illiberal nonstate actors against the liberal democratic states in the North. It thus excludes state terrorism, which is one of a number of repressive tools that great powers from the North have used extensively in the global South in\\ud the service of foreign policy objectives. I establish the reasons for the absence of state terrorism from orthodox accounts of terrorism and argue that critical–normative approaches could help to o...

  14. Understanding Terrorism from an Economic perspective

    OpenAIRE

    Haldar, Tanushree

    2013-01-01

    Terrorism has emerged as a major threat to the contemporary society. Nation States are reliant on their counter-terrorism laws for checking terrorism and deterring terrorists. To understand the effectiveness of these counter terrorism laws, it is important to first understand the behaviour of terrorists, so as to comprehend what actions can dissuade terrorist’s behaviour and decision to propagate violence. This paper will first look at behaviour of terrorist in decision making from an economi...

  15. Defining and Distinguishing Traditional and Religious Terrorism

    OpenAIRE

    Gregg, Heather S.

    2014-01-01

    The article of record may be found at: http://dx.doi.org/10.1080/23296151.2016.1239978 thus offering few if any policy options for counterterrorism measures. This assumption about religious terrorism stems from two challenges in the literature: disproportionate attention to apocalyptic terrorism, and a lack of distinction between religious terrorism and its secular counterpart. This article, therefore, aims to do four things: define and differentiate religiously motivated terrorism from tr...

  16. Mass Media and Terrorism: Deconstructing the Relationship

    OpenAIRE

    Prayudi, Prayudi

    2008-01-01

    Issue of terrorism came to surface in this early twenty first century through a number ofacts violence that have killed hundreds and injured thousands of people. At the same time, theseevents have been dominated the mass media contents. Principally, mass media and issue ofterrorism are inseparable. This paper examines the relationship between mass media and terrorism.It is done through the deconstruction of the concept of terrorism and how terrorism isunderstood as a communicational process. ...

  17. Nuclear terrorism: Facts and fiction

    International Nuclear Information System (INIS)

    Kamp, K.H.

    1994-01-01

    The study tries to assess the risk of nuclear terrorism in the light of recent developments in the area of nuclear weapons proliferation, and to develop suggestions of how to cope with existing challenges. First of all the term of ''nuclear terrorism'' is defined and differentiated from other forms of nuclear crimes. In a second step the attempt is made to compile the findings and assessments of the past on the problem of nuclear terrorism. Since, as a rule, a threat potential is composed of 'intentions' and 'capabilities', a third part is dedicated to terrorist intentions and studies the degree of probability of terrorists considering nuclear weapons an appropriate means for their aims. In connection with 'capabilities' it is scrutinized whether terrorist groups will be able at all to procure, design or initiate nuclear warheads. This leads to the question as to which consequences result from nuclear safety shortcomings - in particular in Russia - with a view to nuclear terrorism. Based on the preceding considerations, several proposals for coping with the danger of nuclear terrorism are made. (orig./HP) [de

  18. Classification of radiation-hazardous objects by the ecological risk rate, based on the concept of the International Nuclear Event Scale (INES)

    International Nuclear Information System (INIS)

    Vetrov, V.A.

    2003-01-01

    The principal categories of the radiation-hazardous objects (RHO) (nuclear fuel cycle plants (NFC including NPP); ships with nuclear engine units and appropriate service facilities; units related with nuclear weapons (design, manufacture, storage, etc.); contaminated territories in the result nuclear accidents and nuclear facilities tests; civil enterprises using the radioactive sources) with real accident risk from radioactive substances (RS) release into environment are considered. For assessment of the ecological risk rate from RHO the International Nuclear Event Scale implemented by IAEA for NPP use is suggested. By opinion of the specialists the INES criteria could be used for radiation events assessment to other RHO that gives possibility for RHO arrangement by the potential hazard rate for environment in the case of accident. For RHO qualitative classification the main parameters assessment influencing on radioactive release risk (amount (total activity) of radioactive substances; possibility of chain reaction development; strength of technological parameters, etc.) was suggested. On the base of the INES all above-listed RHO kinds in the case of accident could be conditionally separated into three categories: 1. most radiation dangerous objects, on which could be severe and serious radiation accidents (corresponding to 4-7 INES levels); 2. RHO on which there is risk for accidents accompanying with RS release (accidents up to 4 INES level). 3. RHO without practical possibility for event (incidents - not higher 3 INES level). Introduction of suggested classification gives possibility for RHO safety control requirements rationalizing to radiation monitoring purposes for both RHO and the local systems

  19. An Empirical Analysis of the Economic Impact of Federal Terrorism Reinsurance

    OpenAIRE

    Jeffrey R. Brown; J. David Cummins; Christopher M. Lewis; Ran Wei

    2004-01-01

    This paper examines the role of the federal government in the market for terrorism reinsurance. We investigate the stock price response of affected industries to a sequence of thirteen events culminating in the enactment of the Terrorism Risk Insurance Act (TRIA) of 2002. In the industries most likely to be affected by TRIA banking, construction, insurance, real estate investment trusts, transportation, and public utilities the stock price effect was primarily negative. The Act was at best va...

  20. Fighting terrorism in Africa: Benchmarking policy harmonization

    Science.gov (United States)

    Asongu, Simplice A.; Tchamyou, Vanessa S.; Minkoua N., Jules R.; Asongu, Ndemaze; Tchamyou, Nina P.

    2018-02-01

    This study assesses the feasibility of policy harmonization in the fight against terrorism in 53 African countries with data for the period 1980-2012. Four terrorism variables are used, namely: domestic, transnational, unclear and total terrorism dynamics. The empirical evidence is based on absolute beta catch-up and sigma convergence estimation techniques. There is substantial absence of catch-up. The lowest rate of convergence in terrorism is in landlocked countries for regressions pertaining to unclear terrorism (3.43% per annum for 174.9 years) while the highest rate of convergence is in upper-middle-income countries in domestic terrorism regressions (15.33% per annum for 39.13 years). After comparing results from the two estimation techniques, it is apparent that in the contemporary era, countries with low levels of terrorism are not catching-up their counterparts with high levels of terrorism. As a policy implication, whereas some common policies may be feasibly adopted for the fight against terrorism, the findings based on the last periodic phase (2004-2012) are indicative that country-specific policies would better pay-off in the fight against terrorism than blanket common policies. Some suggestions of measures in fighting transnational terrorism have been discussed in the light of an anticipated surge in cross-national terrorism incidences in the coming years.

  1. Comparative analysis of early adverse events of pelvic organ prolapse repair with or without transvaginal mesh using Clavien-Dindo classification.

    Science.gov (United States)

    Besser, Limor; Schwarzman, Polina; Mastrolia, Salvatore A; Rotem, Reut; Leron, Elad; Yohay, David; Weintraub, Adi Y

    2018-04-10

    To assess adverse events following surgical repair of pelvic organ prolapse (POP) with or without the use of transvaginal mesh. The present retrospective study was conducted among women who underwent surgical POP repair at Soroka University Medical Center, Beer Sheva, Israel, between January 1, 2013, and December 31, 2015. Patients underwent anterior and posterior colporrhaphy either with transvaginal mesh (Elevate Prolapse Repair System; American Medical Systems, Minnetonka, MN, USA) or without transvaginal mesh (native tissue repair). Perioperative adverse events were assessed using the Clavien-Dindo classification; multivariate regression models were constructed to predict minor and major adverse events. There were 111 women included; 35 were treated with transvaginal mesh, and 76 underwent native tissue repair. Women undergoing native tissue repair had a lower mean grade of cystocele (P=0.023) and a higher rate of urinary stress incontinence (P=0.017) than patients treated with transvaginal mesh. The duration of surgery (P=0.002), duration of hospitalization (Ptransvaginal mesh was not associated with increased odds of major or minor adverse events (P>0.05 for all models examined). Perioperative and postoperative adverse events were comparable regardless of the operative approach. © 2018 International Federation of Gynecology and Obstetrics.

  2. Epidemiological patterns of suicide terrorism in the civilian Pakistani population.

    Science.gov (United States)

    Bhatti, Junaid Ahmad; Mehmood, Amber; Shahid, Muhammad; Bhatti, Sajjad Akbar; Akhtar, Umbreen; Razzak, Junaid Abdul

    2011-09-01

    In this study, we assessed the epidemiological patterns of suicide terrorism in the civilian population of Pakistan. Information about suicide terrorism-related events, deaths and injuries was extracted from the South-Asian Terrorism Portal (SATP) for the period from 2002 to October 2009. Of 198 events, civilians were involved in 194 events. Civilians accounted for 74.1% (N = 2017) of those who died and 93.8% (N = 6129) of those who were injured. In nine districts, mortality rates were more than one death per 100,000 inhabitants per year. The yearly trend showed a shift of attack targets from foreigners and sectarian targets in 2002-2005 to security forces or general public in 2006-2009. Attacks on public installations (mosques) or political gatherings resulted in a significantly greater (P ≤ 0.02) number of deaths (22 vs. 8) and injuries (59 vs. 24) per event compared with security installations. These results show that prevention might focus on political negotiation with armed groups and that appropriate measures should be taken to protect mosques and political gatherings.

  3. Chinese Cambodian Memory Work: Racial Terror and the Spaces of Haunting and Silence

    OpenAIRE

    Tea, Angela

    2014-01-01

    This thesis explores the terror and horror produced in the reification of ethnic classification and racial categorization of Chinese in Cambodia and its hauntings through memory works. This research relies on the memoirs of Luong Ung-Lai and Loung Ung and a performance piece by Jolie Chea. These cultural productions engages in the hauntings of memory and takes into consideration spaces of silence.

  4. Terrorism and mental health in the rural Midwest.

    Science.gov (United States)

    Hawley, Suzanne R; Ablah, Elizabeth; Hawley, Gary C; Cook, David J; Orr, Shirley A; Molgaard, Craig A

    2006-01-01

    Since the terrorist attacks of 11 September 2001, the amount of terrorism preparedness training has increased substantially. However, gaps continue to exist in training for the mental health casualties that result from such events. Responders must be aware of the mental health effects of terrorism and how to prepare for and buffer these effects. However, the degree to which responders possess or value this knowledge has not been studied. Multi-disciplinary terrorism preparedness training for healthcare professionals was conducted in Kansas in 2003. In order to assess knowledge and attitudes related to mental health preparedness training, post-test surveys were provided to 314 respondents 10 months after completion of the training. Respondents returned 197 completed surveys for an analysis response rate of 63%. In general, the results indicated that respondents have knowledge of and value the importance of mental health preparedness issues. The respondents who reported greater knowledge or value of mental health preparedness also indicated significantly higher ability levels in nationally recognized bioterrorism competencies (p mental health components to be incorporated into terrorism preparedness training. Further studies to determine the most effective mental health preparedness training content and instruction modalities are needed.

  5. The Impact of Terrorism on the Tourism Sector of Lithuania

    Directory of Open Access Journals (Sweden)

    Arvydas Survila

    2017-09-01

    Full Text Available Practically every day there are terrorist attacks executed somewhere. For this reason, the need to reveal the impact of terrorism on tourism sector of Lithuania and how well it is ready for this challenge occurs. The analysis of scientific literature and secondary data was used as well as two surveys (qualitative and quantitative were carried out. Since the possibility of a terrorist attack in Lithuania is trivial, the research focuses on the Lithuanian outbound tourism sector. The survey of interaction between terrorism and tourism and impact of terrorism to tourism in different countries is provided. It is worth emphasising that tourists become the victims of not only preplanned but also of individual terrorist attacks. Events of recent several years have caused the emergence of the terrorist tourism, when people with radical attitudes travel to, e.g., Syria. Despite the various attacks and subsequent dips in tourism the world of travel and hospitality has entered a new era of growth and transformation. The purpose of the research was to identify how Lithuanian tourists and experts perceive dangers and whether this affect their choice of trips and what measures can reduce the impact of terrorist attacks on tourism. Both the Lithuanian tourists and experts understand that the threat from terrorism has been growing, nevertheless the comparison with other surveys can lead to the statement that there is a specific tourist market in Lithuania which is characteristic of courage, inflexibility in terms of price and poor perception of possible threats.

  6. Filling Terrorism Gaps: VEOs, Evaluating Databases, and Applying Risk Terrain Modeling to Terrorism

    Energy Technology Data Exchange (ETDEWEB)

    Hagan, Ross F. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States)

    2016-08-29

    This paper aims to address three issues: the lack of literature differentiating terrorism and violent extremist organizations (VEOs), terrorism incident databases, and the applicability of Risk Terrain Modeling (RTM) to terrorism. Current open source literature and publicly available government sources do not differentiate between terrorism and VEOs; furthermore, they fail to define them. Addressing the lack of a comprehensive comparison of existing terrorism data sources, a matrix comparing a dozen terrorism databases is constructed, providing insight toward the array of data available. RTM, a method for spatial risk analysis at a micro level, has some applicability to terrorism research, particularly for studies looking at risk indicators of terrorism. Leveraging attack data from multiple databases, combined with RTM, offers one avenue for closing existing research gaps in terrorism literature.

  7. Epidemiology of international terrorism involving fatal outcomes in developed countries (1994-2003).

    Science.gov (United States)

    Wilson, Nick; Thomson, George

    2005-01-01

    We aimed to describe the public health burden and epidemiology of international terrorism (i.e. involving foreign nationals) with fatal outcomes in developed countries. Data was abstracted from a United States Department of State database for 21 'established market economy' countries and 18 'former socialist economies of Europe' for 1994-2003. To put the findings in a wider context, comparisons were made with WHO data on all homicides for each country. A total of 32 international terrorist attacks causing fatalities were identified over the 10-year period. These resulted in 3299 deaths, giving a crude annual mortality rate of 0.3 per million population. The mortality burden attributable to international terrorism in these countries was 208 times less than that attributable to other homicide. Even for the country with the highest mortality burden from international terrorism (the United States), this ratio was 60. There was no statistically significant trend in the number of attacks over time, but the attack severity (in terms of deaths per attack) was higher in the latter part of the 10-year period. A number of limitations with this data set were identified. If a more rigorous definition of 'international terrorism' was used, then this would substantially reduce the total number of such attacks defined in this way. In conclusion, there is a need for better quality data and improved classification systems for describing international terrorism. Nevertheless, the available data indicates that the mortality burden from international terrorism in developed countries is small compared to that from other homicide.

  8. Defining and Distinguishing Secular and Religious Terrorism

    Directory of Open Access Journals (Sweden)

    Heather S. Gregg

    2014-04-01

    Full Text Available Religious terrorism is typically characterised as acts of unrestrained, irrational and indiscriminant violence, thus offering few if any policy options for counterterrorism measures. This assumption about religious terrorism stems from two challenges in the literature: disproportionate attention to apocalyptic terrorism, and a lack of distinction between religious terrorism and its secular counterpart. This article, therefore, aims to do four things: define and differentiate religiously motivated terrorism from traditional terrorism; investigate three goals of religious terrorism (fomenting the apocalypse, creating a religious government, and establishing a religiously pure state; consider the role of leadership and target selection of religious terrorists; and, finally, suggest a range of counterterrorism strategies based on these observations.

  9. Gender Imbalance and Terrorism in Developing Countries

    Science.gov (United States)

    Younas, Javed

    2016-01-01

    This article investigates whether gender imbalance may be conducive to domestic terrorism in developing countries. A female-dominated society may not provide sufficient administration, law, or order to limit domestic terrorism, especially since societies in developing countries primarily turn to males for administration, policing, and paramilitary forces. Other economic considerations support female imbalance resulting in grievance-generated terrorism. Because male dominance may also be linked to terrorism, empirical tests are ultimately needed to support our prediction. Based on panel data for 128 developing countries for 1975 to 2011, we find that female gender imbalance results in more total and domestic terrorist attacks. This female gender imbalance does not affect transnational terrorism in developing countries or domestic and transnational terrorism in developed countries. Further tests show that gender imbalance affects terrorism only when bureaucratic institutions are weak. Many robustness tests support our results. PMID:28232755

  10. Gender Imbalance and Terrorism in Developing Countries.

    Science.gov (United States)

    Younas, Javed; Sandler, Todd

    2017-03-01

    This article investigates whether gender imbalance may be conducive to domestic terrorism in developing countries. A female-dominated society may not provide sufficient administration, law, or order to limit domestic terrorism, especially since societies in developing countries primarily turn to males for administration, policing, and paramilitary forces. Other economic considerations support female imbalance resulting in grievance-generated terrorism. Because male dominance may also be linked to terrorism, empirical tests are ultimately needed to support our prediction. Based on panel data for 128 developing countries for 1975 to 2011, we find that female gender imbalance results in more total and domestic terrorist attacks. This female gender imbalance does not affect transnational terrorism in developing countries or domestic and transnational terrorism in developed countries. Further tests show that gender imbalance affects terrorism only when bureaucratic institutions are weak. Many robustness tests support our results.

  11. The contribution of the vaccine adverse event text mining system to the classification of possible Guillain-Barré syndrome reports.

    Science.gov (United States)

    Botsis, T; Woo, E J; Ball, R

    2013-01-01

    We previously demonstrated that a general purpose text mining system, the Vaccine adverse event Text Mining (VaeTM) system, could be used to automatically classify reports of an-aphylaxis for post-marketing safety surveillance of vaccines. To evaluate the ability of VaeTM to classify reports to the Vaccine Adverse Event Reporting System (VAERS) of possible Guillain-Barré Syndrome (GBS). We used VaeTM to extract the key diagnostic features from the text of reports in VAERS. Then, we applied the Brighton Collaboration (BC) case definition for GBS, and an information retrieval strategy (i.e. the vector space model) to quantify the specific information that is included in the key features extracted by VaeTM and compared it with the encoded information that is already stored in VAERS as Medical Dictionary for Regulatory Activities (MedDRA) Preferred Terms (PTs). We also evaluated the contribution of the primary (diagnosis and cause of death) and secondary (second level diagnosis and symptoms) diagnostic VaeTM-based features to the total VaeTM-based information. MedDRA captured more information and better supported the classification of reports for GBS than VaeTM (AUC: 0.904 vs. 0.777); the lower performance of VaeTM is likely due to the lack of extraction by VaeTM of specific laboratory results that are included in the BC criteria for GBS. On the other hand, the VaeTM-based classification exhibited greater specificity than the MedDRA-based approach (94.96% vs. 87.65%). Most of the VaeTM-based information was contained in the secondary diagnostic features. For GBS, clinical signs and symptoms alone are not sufficient to match MedDRA coding for purposes of case classification, but are preferred if specificity is the priority.

  12. The Contribution of the Vaccine Adverse Event Text Mining System to the Classification of Possible Guillain-Barré Syndrome Reports

    Science.gov (United States)

    Botsis, T.; Woo, E. J.; Ball, R.

    2013-01-01

    Background We previously demonstrated that a general purpose text mining system, the Vaccine adverse event Text Mining (VaeTM) system, could be used to automatically classify reports of an-aphylaxis for post-marketing safety surveillance of vaccines. Objective To evaluate the ability of VaeTM to classify reports to the Vaccine Adverse Event Reporting System (VAERS) of possible Guillain-Barré Syndrome (GBS). Methods We used VaeTM to extract the key diagnostic features from the text of reports in VAERS. Then, we applied the Brighton Collaboration (BC) case definition for GBS, and an information retrieval strategy (i.e. the vector space model) to quantify the specific information that is included in the key features extracted by VaeTM and compared it with the encoded information that is already stored in VAERS as Medical Dictionary for Regulatory Activities (MedDRA) Preferred Terms (PTs). We also evaluated the contribution of the primary (diagnosis and cause of death) and secondary (second level diagnosis and symptoms) diagnostic VaeTM-based features to the total VaeTM-based information. Results MedDRA captured more information and better supported the classification of reports for GBS than VaeTM (AUC: 0.904 vs. 0.777); the lower performance of VaeTM is likely due to the lack of extraction by VaeTM of specific laboratory results that are included in the BC criteria for GBS. On the other hand, the VaeTM-based classification exhibited greater specificity than the MedDRA-based approach (94.96% vs. 87.65%). Most of the VaeTM-based information was contained in the secondary diagnostic features. Conclusion For GBS, clinical signs and symptoms alone are not sufficient to match MedDRA coding for purposes of case classification, but are preferred if specificity is the priority. PMID:23650490

  13. Relative risk perception for terrorism: implications for preparedness and risk communication.

    Science.gov (United States)

    Caponecchia, Carlo

    2012-09-01

    Terrorism presents a significant risk that is often approached at public policy, infrastructure, or emergency management level. Public perceptions of the likelihood of terrorist events, and how this may relate to individual preparedness, are not always extensively examined. The tendency to think that negative events are less likely to happen to oneself than to the average person is known as optimism bias. Optimism bias is relevant to perceptions of terrorism, because it is thought to be related to a reduction in precaution use. Using an online survey of 164 participants, this study aimed to determine whether Sydney residents thought they had a lower likelihood of experiencing terrorist events than other Australians. Significant optimism bias was observed for witnessing terrorist events, but not for personally experiencing terrorist events. In addition, Sydney residents tended to think that terrorist attacks were more likely to occur in Sydney than another major Australian city in the next five years. At the same time, household and workplace preparedness for terrorism was quite low, as was awareness of emergency strategies in the central business district. Perceptions of high likelihood of terrorism happening in one's own city, yet low preparedness present a challenge for risk communication and emergency management strategies. The diversity of possible terrorist targets, and the simple plans that can moderate the effects of a disaster may need to be emphasized in future anti-terrorism initiatives. © 2012 Society for Risk Analysis.

  14. Miserere. Aesthetics of Terror

    Directory of Open Access Journals (Sweden)

    Antonio Incampo

    2011-10-01

    Full Text Available I say: “Oh, what a beautiful surrealist picture!” With quite precise awareness: this páthos, these emotions of mine do not stem from our common sense. An aesthetic judgment is founded on an immediate subjective intuition: an emotion or a free feeling of a single subject towards an object. A universal sense, possibly. Some judgments of ours in ethics and in law are no different from our perceptions in front of art. It would be the same for a hypothetical sentence of the judge that concluded with these words: “I acquit Arsenio Lupin because of his magnificent handlebar moustache like that of Guy de Maupassant”. Everyone would think intuitively that it is an unfair sentence. Is there aesthetics of terror? The case that the article intends to examine is that of the famous kidnapping and murder of the Italian statesman Aldo Moro by the “Brigate Rosse” [Red Brigades] (1978. The method used here consists in studying the image of the kidnapping as iconic documentation of reality, and, above all, as an ethical-legal judgment about the terrorist crime. Moro was photographed during his kidnapping. There are at least two pictures. Both constitute an extraordinary source for a judgment on the basis of an image. In both of them, Aldo Moro is pictured in front of a Red Brigades banner during the captivity. In what sense do these pictures document an aesthetic judgment concerning the “case Moro”? The answer can be found in a remarkable iconic coincidence of these pictures with a masterpiece by Georges Rouault (Paris 1871-1958 devoted to the theme of the “Ecce Homo”. The Gospel in the “Ecce Homo” scene (John: 19, 4-5 narrates how Pontius Pilate wanted to arouse the compassion of the people with a scourging and the exposure of Jesus to the crowd. The plate under consideration is entitled “Qui ne se grime pas?” [Who does not have a painted face?] and is a key work in Rouault’s suite of prints Miserere, dated for 1923.

  15. A dynamical model of terrorism

    Directory of Open Access Journals (Sweden)

    Firdaus Udwadia

    2006-01-01

    Full Text Available This paper develops a dynamical model of terrorism. We consider the population in a given region as being made up of three primary components: terrorists, those susceptible to both terrorist and pacifist propaganda, and nonsusceptibles, or pacifists. The dynamical behavior of these three populations is studied using a model that incorporates the effects of both direct military/police intervention to reduce the terrorist population, and nonviolent, persuasive intervention to influence the susceptibles to become pacifists. The paper proposes a new paradigm for studying terrorism, and looks at the long-term dynamical evolution in time of these three population components when such interventions are carried out. Many important features—some intuitive, others not nearly so—of the nature of terrorism emerge from the dynamical model proposed, and they lead to several important policy implications for the management of terrorism. The different circumstances in which nonviolent intervention and/or military/police intervention may be beneficial, and the specific conditions under which each mode of intervention, or a combination of both, may be useful, are obtained. The novelty of the model presented herein is that it deals with the time evolution of terrorist activity. It appears to be one of the few models that can be tested, evaluated, and improved upon, through the use of actual field data.

  16. Applying Intermediate Microeconomics to Terrorism

    OpenAIRE

    Charles Anderton; John Carter

    2004-01-01

    The authors show how microeconomic concepts and principles are applicable to the study of terrorism. The utility maximization model provides insights into both terrorist resource allocation choices and government counterterrorism efforts, while basic game theory helps characterize the strategic interdependencies among terrorists and governments.

  17. Applying Intermediate Microeconomics to Terrorism

    Science.gov (United States)

    Anderton, Charles H.; Carter, John R.

    2006-01-01

    The authors show how microeconomic concepts and principles are applicable to the study of terrorism. The utility maximization model provides insights into both terrorist resource allocation choices and government counterterrorism efforts, and basic game theory helps characterize the strategic interdependencies among terrorists and governments.…

  18. Terrorism and its centuries challenges

    Directory of Open Access Journals (Sweden)

    Jonida Drogu

    2018-03-01

    Full Text Available The goal of this article is to portray how to better understand the epistemic differences of terminology used for terrorism and how people’s lives have been and are still affected by this undefined violence. By collecting some diary information from 20people about their perception about terrorism attaches we will analyze some of overall countries and Saudi Arabia’s commitment in fighting this century’s challenge. Fighting radical religious beliefs in the Kingdom is an immense challenge. The true Islamic faith is in large contrast to those individuals and entities whose actions are centered on the intentional misrepresentation or the degradation of the teachings of Islam. The base of this data will indicate the progress within Saudi Arabia, its position in the world prospect and its impact in society since it remains a robust construction even now days, even thought, a lot has been done. The first signs provided in this analysis start with the beginning of the new century, when a strong attack happened just days before it began. Some important indicators such as terrorism founding, or money charities caused many changes in Saudi Arabia as a leading power, in the war against terrorism in Middle East.

  19. Terrorism and the Press: A Study of the War on Terrorism, Islamophobia, and Al Jazeera

    Directory of Open Access Journals (Sweden)

    Chao-Chen Lin

    2017-10-01

    Full Text Available This paper focuses on the subject of terrorism neglected in Taiwan and discusses the role of news media in reporting terrorism. Based on a literature review and in-depth interview, this research looks to restore the fact of reporting on 911 and terrorism from Al Jazeera and surveys the intense relationship with U.S. This paper argues to rethink Islamophobia and terrorism by exploring the different definitions of terrorism between the West and Middle East. Arab journalists need to report on terrorism and face the danger from it.

  20. Terrorism and emergency preparedness in state and territorial public health departments--United States, 2004.

    Science.gov (United States)

    2005-05-13

    After the events of September 11, 2001, federal funding for state public health preparedness programs increased from $67 million in fiscal year (FY) 2001 to approximately $1 billion in FY 2002. These funds were intended to support preparedness for and response to terrorism, infectious disease outbreaks, and other public health threats and emergencies. The Council of State and Territorial Epidemiologists (CSTE) assessed the impact of funding on epidemiologic capacity, including terrorism preparedness and response, in state health departments in November 2001 and again in May 2004, after distribution of an additional $1 billion in FY 2003. This report describes the results of those assessments, which indicated that increased funding for terrorism preparedness and emergency response has rapidly increased the number of epidemiologists and increased capacity for preparedness at the state level. However, despite the increase in epidemiologists, state public health officials estimate that 192 additional epidemiologists, an increase of 45.3%, are needed nationwide to fully staff terrorism preparedness programs.

  1. The radiobiology of nuclear and radiological terrorism

    International Nuclear Information System (INIS)

    Moulder, J.E.

    2003-01-01

    The events of the last several years have focused attention on the possibility of nuclear (radiological) terrorism, and on the implications of such terrorist threats for radiation biology and for radiation accident preparedness. This review will discuss the consequences of exposure to radiation doses in the 1-12 Sv range, as doses in this range pose a risk of acute effects, but are potentially survivable. The consequences of exposures of limited tissue volumes to doses above 12 Sv have been researched because of applicability to cancer therapy, while exposure to doses below 1 Sv has been researched because of nuclear fallout and space exploration issues. Except for research aimed at protection of members of the armed forces, the intervening dose range has received relatively little attention. Currently we have only a limited clinical ability to deal with the consequences of radiation exposures in this range, but focused research on radiation biodosimetry and pharmacological treatments for radiation injuries could rapidly expand such capabilities. This review will also discuss the potential weaknesses in most of the current programs for dealing with radiation accidents or nuclear terrorism. These weaknesses include: the absence of widespread radiation biodosimetry capabilities, lack of robust radiation detection equipment by many first responders, lack of clinical development of radiation protection and treatment strategies, and lack of training in radiation medicine by most health care and disaster response personnel. If a major radiation accident or terrorist event occurs, this lack of preparation will be compounded by widespread public fear of 'radiation'. Copyright (2003) Australasian Radiation Protection Society Inc

  2. Severity Classification of a Seismic Event based on the Magnitude-Distance Ratio Using Only One Seismological Station

    Directory of Open Access Journals (Sweden)

    Luis Hernán Ochoa Gutiérrez

    2014-07-01

    Full Text Available Seismic event characterization is often accomplished using algorithms based only on information received at seismological stations located closest to the particular event, while ignoring historical data received at those stations. These historical data are stored and unseen at this stage. This characterization process can delay the emergency response, costing valuable time in the mitigation of the adverse effects on the affected population. Seismological stations have recorded data during many events that have been characterized by classical methods, and these data can be used as previous "knowledge" to train such stations to recognize patterns. This knowledge can be used to make faster characterizations using only one three-component broadband station by applying bio-inspired algorithms or recently developed stochastic methods, such as kernel methods. We trained a Support Vector Machine (SVM algorithm with seismograph data recorded by INGEOMINAS's National Seismological Network at a three-component station located near Bogota, Colombia. As input model descriptors, we used the following: (1 the integral of the Fourier transform/power spectrum for each component, divided into 7 windows of 2 seconds and beginning at the P onset time, and (2 the ratio between the calculated logarithm of magnitude (Mb and epicentral distance. We used 986 events with magnitudes greater than 3 recorded from late 2003 to 2008. The algorithm classifies events with magnitude-distance ratios (a measure of the severity of possible damage caused by an earthquake greater than a background value. This value can be used to estimate the magnitude based on a known epicentral distance, which is calculated from the difference between P and S onset times. This rapid (< 20 seconds magnitude estimate can be used for rapid response strategies. The results obtained in this work confirm that many hypocentral parameters and a rapid location of a seismic event can be obtained using a few

  3. A Lifespan Perspective on Terrorism: Age Differences in Trajectories of Response to 9/11

    Science.gov (United States)

    Scott, Stacey B.; Poulin, Michael J.; Silver, Roxane Cohen

    2013-01-01

    A terrorist attack is an adverse event characterized by both an event-specific stressor and concern about future threats. Little is known about age differences in responses to terrorism. This longitudinal study examined generalized distress, posttraumatic stress responses, and fear of future attacks following the September 11, 2001 (9/11)…

  4. Nonlinear Methodologies for Identifying Seismic Event and Nuclear Explosion Using Random Forest, Support Vector Machine, and Naive Bayes Classification

    Directory of Open Access Journals (Sweden)

    Longjun Dong

    2014-01-01

    Full Text Available The discrimination of seismic event and nuclear explosion is a complex and nonlinear system. The nonlinear methodologies including Random Forests (RF, Support Vector Machines (SVM, and Naïve Bayes Classifier (NBC were applied to discriminant seismic events. Twenty earthquakes and twenty-seven explosions with nine ratios of the energies contained within predetermined “velocity windows” and calculated distance are used in discriminators. Based on the one out cross-validation, ROC curve, calculated accuracy of training and test samples, and discriminating performances of RF, SVM, and NBC were discussed and compared. The result of RF method clearly shows the best predictive power with a maximum area of 0.975 under the ROC among RF, SVM, and NBC. The discriminant accuracies of RF, SVM, and NBC for test samples are 92.86%, 85.71%, and 92.86%, respectively. It has been demonstrated that the presented RF model can not only identify seismic event automatically with high accuracy, but also can sort the discriminant indicators according to calculated values of weights.

  5. 78 FR 16698 - Chemical Facility Anti-Terrorism Standards (CFATS) Chemical-Terrorism Vulnerability Information...

    Science.gov (United States)

    2013-03-18

    ... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2012-0057] Chemical Facility Anti-Terrorism Standards (CFATS) Chemical- Terrorism Vulnerability Information (CVI) AGENCY: National Protection and... notice is also soliciting comments concerning the Information Collection Request, Chemical Facility Anti...

  6. Current Issues Concerning Korea’s Anti-Terrorism Programs

    Science.gov (United States)

    2011-06-10

    Terrorism. New York: Columbia University Press, 1998. Laitin, David. Hegemony and Culture : Politics and Religious Change Among the Yoruba . Chicago...such improvements might take. Definitions Terrorism: Definitions of terrorism differ among nations and organizations, because the social and cultural

  7. Approaches to Political Violence and Terrorism in former Yugoslavia

    OpenAIRE

    Bieber, Florian

    2003-01-01

    Discusses political violence and terrorism in Yugoslavia caused by ethnic nationalism in the 1990s. Kinds of political conflict; Comparison of political violence with war and terrorism in Yugoslavia; Concept of terrorism and its presence in Southeastern Europe.

  8. Dismantling Terrorism: Developing Actionable Solutions for Today's Plague of Violence

    National Research Council Canada - National Science Library

    Scott, Frances K

    2007-01-01

    .... The bibliography is divided into the following sections: causes and origins of terrorism, geographical distribution of terrorist groups, terrorist financing, terrorist groups and networks, the psychology of terrorism, prevention of terrorism, remedies...

  9. The effects of high-frequency oscillations in hippocampal electrical activities on the classification of epileptiform events using artificial neural networks

    Science.gov (United States)

    Chiu, Alan W. L.; Jahromi, Shokrollah S.; Khosravani, Houman; Carlen, Peter L.; Bardakjian, Berj L.

    2006-03-01

    The existence of hippocampal high-frequency electrical activities (greater than 100 Hz) during the progression of seizure episodes in both human and animal experimental models of epilepsy has been well documented (Bragin A, Engel J, Wilson C L, Fried I and Buzsáki G 1999 Hippocampus 9 137-42 Khosravani H, Pinnegar C R, Mitchell J R, Bardakjian B L, Federico P and Carlen P L 2005 Epilepsia 46 1-10). However, this information has not been studied between successive seizure episodes or utilized in the application of seizure classification. In this study, we examine the dynamical changes of an in vitro low Mg2+ rat hippocampal slice model of epilepsy at different frequency bands using wavelet transforms and artificial neural networks. By dividing the time-frequency spectrum of each seizure-like event (SLE) into frequency bins, we can analyze their burst-to-burst variations within individual SLEs as well as between successive SLE episodes. Wavelet energy and wavelet entropy are estimated for intracellular and extracellular electrical recordings using sufficiently high sampling rates (10 kHz). We demonstrate that the activities of high-frequency oscillations in the 100-400 Hz range increase as the slice approaches SLE onsets and in later episodes of SLEs. Utilizing the time-dependent relationship between different frequency bands, we can achieve frequency-dependent state classification. We demonstrate that activities in the frequency range 100-400 Hz are critical for the accurate classification of the different states of electrographic seizure-like episodes (containing interictal, preictal and ictal states) in brain slices undergoing recurrent spontaneous SLEs. While preictal activities can be classified with an average accuracy of 77.4 ± 6.7% utilizing the frequency spectrum in the range 0-400 Hz, we can also achieve a similar level of accuracy by using a nonlinear relationship between 100-400 Hz and <4 Hz frequency bands only.

  10. How terrorism news reports increase prejudice against outgroups: A terror management account

    NARCIS (Netherlands)

    Das, E.; Bushman, B.J.; Bezemer, M.D.; Kerkhof, P.; Vermeulen, I.E.

    2009-01-01

    Three studies tested predictions derived from terror management theory (TMT) about the effects of terrorism news on prejudice. Exposure to terrorism news should confront receivers with thoughts about their own death, which, in turn, should increase prejudice toward outgroup members. Non-Muslim

  11. On Welfare and Terror: Social Welfare Policies and Political-Economic Roots of Terrorism

    Science.gov (United States)

    Burgoon, Brian

    2006-01-01

    This article argues that social welfare policies may reduce international and domestic terrorism. Social policies likely affect terrorism in offsetting ways but, on balance, should diminish preferences for terrorism by reducing economic insecurity, inequality, poverty, and religious-political extremism. Thus, countries with more generous welfare…

  12. International terrorism in the age of globalization

    OpenAIRE

    Aksoy, Ece

    2002-01-01

    Cataloged from PDF version of article. This thesis analyzes the concept of terrorism in the age of globalization. Terrorism, which has been motivated by ideological, religious and national reasons, has added to its concern issues like inequality, injustice, dissatisfaction and antiglobalist movements, due to development and technology in the world. In order to clarify this shift in the policy, the concepts of terrorism and globalization are first explained as distinct issues...

  13. Art, Terrorism and the Negative Sublime

    Directory of Open Access Journals (Sweden)

    Arnold Berleant

    2009-01-01

    Full Text Available The range of the aesthetic has expanded to cover not only a wider range of objects and situations of daily life but also to encompass the negative. This includes terrorism, whose aesthetic impact is central to its use as a political tactic. The complex of positive and negative aesthetic values in terrorism are explored, introducing the concept of the sublime as a negative category to illuminate the analysis and the distinctive aesthetic of terrorism.

  14. FIGHTING OF WESTERN INTELLIGENCE WITH ISLAMIC TERRORISM

    OpenAIRE

    Asadi NEJMAH

    2015-01-01

    The state of Israel even prior to its establishment, faces, in daily life, terrorist organizations that want to destroy it. Terrorism and terrorist acts as implied from the original meaning of the word – fear, anxiety, terror, are meant to plant fear amongst the attacked public and bring about its demoralization and confusion, and disruption of routine life. Occasionally it is performed also as an act of revenge in a blood circle of violence. A substantial part of terrorism weapons is the ext...

  15. Classification of Rotor Induced Shearing Events in the Near Wake of a Wind Turbine Array Boundary Layer

    Science.gov (United States)

    Smith, Sarah; Viggiano, Bianca; Ali, Naseem; Cal, Raul Bayoan

    2017-11-01

    Flow perturbation induced by a turbine rotor imposes considerable turbulence and shearing effects in the near wake of a turbine, altering the efficiency of subsequent units within a wind farm array. Previous methods have characterized near wake vorticity of a turbine and recovery distance of various turbine array configurations. This study aims to build on previous analysis with respect to a turbine rotor within an array and develop a model to examine stress events and energy contribution in the near wake due to rotational effects. Hot wire anemometry was employed downstream of a turbine centrally located in the third row of a 3x3 array. Data considered points planar to the rotor and included simultaneous streamwise and wall-normal velocities as well as concurrent streamwise and transverse velocities. Conditional analysis of Reynolds stresses induced by the rotor agree with former near wake research, and examination of stresses in terms of streamwise and transverse velocity components depicts areas of significant rotational effects. Continued analysis includes spectral decomposition and conditional statistics to further characterize shearing events at various points considering the swept area of the rotor.

  16. Youth Exposed to Terrorism: the Moderating Role of Ideology.

    Science.gov (United States)

    Slone, Michelle; Shur, Lia; Gilady, Ayelet

    2016-05-01

    The present review examines the moderating role of ideology on the effects of war, armed conflict, and terrorism on youth. Ideology is an important factor given the central role played by religio-political ideology and nationalism in present-day conflicts. Ideologies or worldviews represent cognitive frameworks that imbue the traumatic situation with meaning and order. Analysis of the pool of studies identified three categories of ideologically based moderating factors, each representing an aspect of social construction of traumatic events, namely, religion, political ideology, and self-concept. The two closely related categories of religion and politico-religious beliefs showed both positive and negative effects on psychological and psychiatric outcomes among youth. The third category of different aspects of self-concept yielded consistently positive moderating effects. The mechanisms by which each category of ideology moderates effects of exposure to war, armed conflict, and terrorism are discussed, and research and clinical implications are presented.

  17. Hospitals: Soft Target for Terrorism?

    Science.gov (United States)

    De Cauwer, Harald; Somville, Francis; Sabbe, Marc; Mortelmans, Luc J

    2017-02-01

    In recent years, the world has been rocked repeatedly by terrorist attacks. Arguably, the most remarkable were: the series of four coordinated suicide plane attacks on September 11, 2001 on buildings in New York, Virginia, and Pennsylvania, USA; and the recent series of two coordinated attacks in Brussels (Belgium), on March 22, 2016, involving two bombings at the departure hall of Brussels International Airport and a bombing at Maalbeek Metro Station located near the European Commission headquarters in the center of Brussels. This statement paper deals with different aspects of hospital policy and disaster response planning that interface with terrorism. Research shows that the availability of necessary equipment and facilities (eg, personal protective clothing, decontamination rooms, antidotes, and anti-viral drugs) in hospitals clearly is insufficient. Emergency teams are insufficiently prepared: adequate and repetitive training remain necessary. Unfortunately, there are many examples of health care workers and physicians or hospitals being targeted in both political or religious conflicts and wars. Many health workers were kidnapped and/or killed by insurgents of various ideology. Attacks on hospitals also could cause long-term effects: hospital units could be unavailable for a long time and replacing staff could take several months, further compounding hospital operations. Both physical and psychological (eg, posttraumatic stress disorder [PTSD]) after-effects of a terrorist attack can be detrimental to health care services. On the other hand, physicians and other hospital employees have shown to be involved in terrorism. As data show that some offenders had a previous history with the location of the terror incident, the possibility of hospitals or other health care services being targeted by insiders is discussed. The purpose of this report was to consider how past terrorist incidents can inform current hospital preparedness and disaster response planning

  18. Obamas Fortsatte Krig mod Terror

    DEFF Research Database (Denmark)

    Ulrich, Philip Christian

    2013-01-01

    Kronikken argumenterer for at den type overvågningsskandaler som er fulgt i kølvandet på Edward Snowdens afsløringer blot er et symptom på den nye fase af krigen mod terror som Obama administrationen har ønsket at føre USA ind i. Den nye fase vil være præget af mere efterretningsvirksomhed snarere...

  19. Technology Against Terrorism: Structuring Security

    Science.gov (United States)

    1992-01-01

    nesses (e.g., Ford, Coca - Cola , American Airlines, " Destruction of Pan American Flight 103 over American Express, Holiday Inn, Citibank, ChaseDesruin...network, involving links between many clandestine, undeclared war. governments. Cases in which a consortium of gov- State sponsorship refers to the...Syria has setup centers constitutes concrete and convincing evidence of in Syria itself, in Lebanon’s Beka’a Valley (which is sponsorship of terrorism.𔄁

  20. National Counterterrorism Center: 2007 Report on Terrorism

    National Research Council Canada - National Science Library

    2008-01-01

    ...." While NCTC keeps statistics on the annual number of incidents of "terrorism," its ability to track the specific groups responsible for each attack involving killings, kidnappings, and injuries...

  1. The failure of international action against terrorism.

    Science.gov (United States)

    Suter, Keith

    2006-01-01

    Progress on the so-called 'War on Terrorism' is slow. There is no agreed definition of terrorism and no consistent government policy in respect of it. Consideration of terrorism ignores the role of some governments in what could be regarded as terrorist activity, often with the connivance of others for reasons of political expediency. The special case of suicide terrorism is discussed in detail. It is concluded that the world is now exposed to a new form of warfare, and that even with new military thinking this could continue for perhaps decades to come.

  2. Terrorism: some philosophical and ethical dilemmas

    OpenAIRE

    Stojanov, Trajce; Unsal, Zeynep

    2017-01-01

    Philosophers weren`t thinking a lot about terrorism before the terrorist attacks in the United States on 11 September 2001. Or even when they were thinking the main concern was how to deal with terrorism. But after this attack terrorism was high on the philosophical agenda mainly manifested as an ethical problem. The key concern was: can terrorism be morally justified? That is the issue we are dealing in this paper too. But, the answer of this question largely depends on the treatment of t...

  3. Against acts of nuclear terrorism

    International Nuclear Information System (INIS)

    Heller, W.

    2007-01-01

    The Act on the International Convention of the United Nations of April 13, 2005 on Combating Acts of Nuclear Terrorism was promulgated in the German Federal Gazette and entered into force one day later. The Convention expresses the deep concern about the worldwide escalation of all kinds and manifestations of acts of terrorism. What was true in April 2005 (the year the UN convention was adopted) is even more true today. At the same time, however, the Convention recognizes the right of all nations to develop and use nuclear power for peaceful purposes, acknowledging their justified interest in the possible benefits of the peaceful uses of nuclear power. As the Convention was signed in German still during the term of office of the Red-Green government, this passage is a remarkable acceptance of the realities of the world and past peaceful uses of nuclear power in Germany. Whether or not the convention will become an effective instrument to be used against acts of nuclear terrorism and threats depends on its entering into force after deposition of 22 ratification documents, and on as many states as possible acceding to it. Irrespective of these aspects, action in the spirit of the Convention should be taken now, criminal law should be adapted, and international cooperation should be improved and strengthened. (orig.)

  4. Technical considerations in nuclear terrorism

    International Nuclear Information System (INIS)

    Velardo, G.

    2007-01-01

    Nuclear terrorism is an evil application of nuclear energy, in the same way that chemical and biological terrorism could be considered as the evil side of chemistry and biology. This paper presents two effects of nuclear terrorism. First, dirty bombs or radioactive bombs or radiological dispersion devices (RDDs), and second, crude atom bombs or improvised nuclear devices (INDs). The paper analyses as well the probabilities of an attack, its biological effects and nuclear risk. Experiments carried out so far indicate that the lethal effects produced by RDDs are likely the same that the effects produced by the chemical explosive used in the bomb. These type of bombs are rather bounded to generate panic and have implicit a high cost of decontamination. It will be described the measures to be adopted. INDs will be also considered. Uranium INDs by gun-method are more feasible to be made. They can be disassembled and their components transported to the target place. Plutonium INDs by the implosion-method are complex and required high precision technology. Their disassembly is very difficult

  5. Comparing Civilian Support for Terrorism

    Directory of Open Access Journals (Sweden)

    Srobana Bhattacharya

    2017-06-01

    Full Text Available Terrorism is an extreme form of political violence, that is inherently abhorrent in nature. Yet, it continues to attain enough support to continue and survive. The recent proliferation of Islamic State and its ever increasing domestic and international civilian support base urges immediate attention to this question. While most research holds that provision of public goods by terrorist groups is the primary cause for high levels of civilian support, I argue that, terrorist groups are more interested in resource extraction rather than resource provision. Additionally, these studies pay scant attention to existing resource structure, especially territorial and political control to explain terrorist-civilian interaction. This paper emphasizes the bi-directional nature of this interaction – a. perception of civilians by the terrorist group and b. terrorist group’s perception of the civilians. To analyze levels of civilian support for terrorism, I compare fifteen terrorist groups using qualitative comparative analysis and show how territory, political competition, ethnicity, target selection and organizational structure combine to explain conditions that lead terrorist groups to include or exclude civilian population for support. Based on the variance in support networks of terrorist groups, counter-terrorism policies should also differ. High civilian support indicates the need to use non-military methods to decrease the appeal of terrorist groups. However, terrorist groups with more diffused and multiple support structures need more collaborative and coercive measures to intercept all the possible links to the main group.

  6. Terrorism threats and preparedness in Canada: the perspective of the Canadian public.

    Science.gov (United States)

    Gibson, Stacey; Lemyre, Louise; Clément, Mélanie; Markon, Marie-Pierre L; Lee, Jennifer E C

    2007-06-01

    Although Canada has not experienced a major terrorist attack, an increased global pending threat has put preparedness at the top of the Canadian government's agenda. Given its strong multicultural community and close proximity to the recently targeted United States, the Canadian experience is unique. However, minimal research exists on the public's reactions to terrorism threats and related preparedness strategies. In order for response initiatives to be optimally effective, it is important that the public's opinions regarding terrorism and preparedness be considered. This qualitative study examined perceptions of terrorism threats among Canadians living in Central and Eastern Canada (N = 75) in the fall of 2004. Conceptualizations of terrorism threat, psychosocial impacts, and sense of preparedness were explored in a series of qualitative interviews. Findings revealed that the majority of Canadians did not feel overly threatened by terrorist attacks, due in part to a perception of terrorist threats as related to global sociopolitical events and a positive Canadian identity. In addition, while most respondents did not feel they were individually affected by the threat of terrorism, there was some concern regarding larger societal impacts, such as increased paranoia, discrimination, and threats to civil liberties. Participants' views on preparedness focused largely on the utility of emergency preparedness strategies and the factors that could mitigate or inhibit preparedness at the individual and institutional levels, with a specific focus on education. Finally, the significant relevance of these findings in shaping terrorism preparedness, both in Canada and generally, is discussed.

  7. A social-cognitive perspective of terrorism risk perception and individual response in Canada.

    Science.gov (United States)

    Lee, Jennifer E C; Lemyre, Louise

    2009-09-01

    The volume of research on terrorism has increased since the events of September 11, 2001. However, efforts to develop a contextualized model incorporating cognitive, social-contextual, and affective factors as predictors of individual responses to this threat have been limited. Therefore, the aim of this study was to evaluate a series of hypotheses drawn from such a model that was generated from a series of interviews with members of the Canadian public. Data of a national survey on perceived chemical, biological, radiological, nuclear, and explosives (CBRNE) terrorism threat and preparedness were analyzed. Results demonstrated that worry and behavioral responses to terrorism, such as individual preparedness, information seeking, and avoidance behaviors, were each a function of cognitive and social-contextual factors. As an affective response, worry about terrorism independently contributed to the prediction of behavioral responses above and beyond cognitive and social-contextual factors, and partially mediated the relationships of some of these factors with behavioral responses. Perceived coping efficacy emerged as the cognitive factor associated with the most favorable response to terrorism. Hence, findings highlight the importance of fostering a sense of coping efficacy to the effectiveness of strategies aimed at improving individual preparedness for terrorism.

  8. The Need for Regulation of Cyber Terrorism Phenomena in Line With Principles of International Criminal Law

    Directory of Open Access Journals (Sweden)

    Enver BUÇAJ

    2017-03-01

    Full Text Available This paper scrutinizes and highlights imminent need to regulate cyber terrorism pheromone in line with principle of international law. In so doing, this paper intends to ascertain legal basis to regulate cyber terrorism at international level. It explains the normative conduct by drawing on adjustments of certain member states of European Union as well as from none-European member states. Particular attention will be given as to how Kosovo has addressed cyber terrorism within its legal framework of criminal acts. The paper also addresses practical consequences of cyber terrorism in context of cyber-attacks events in attempt to establish legal basis for its prevention and punishment of cyber criminals wherever it happens. The author articulates its arguments by examining the presumed threats as a result of cyber terrorism activities, as well as based on well-known cyber terrorist behaviors and constant literature that insinuate that cyber-attacks are imminent threats. Lastly, as there is neither a particular treaty nor State practices, the author considers of utmost importance to spell out different views and statistics alluding that the need to regulate cyber terrorism in line with principle of international criminal law is a necessity.

  9. The Need for Regulation of Cyber Terrorism Phenomena in Line With Principles of International Criminal Law

    Directory of Open Access Journals (Sweden)

    Enver Buçaj

    2017-03-01

    Full Text Available This paper scrutinizes and highlights imminent need to regulate cyber terrorism phenomena in line with the principle of international law. In so doing, this paper intends to ascertain legal basis to regulate cyber terrorism at international level. It explains the normative conduct by drawing on adjustments of certain member states of European Union as well as from none European member states. Particular attention will be given as to how Kosovo has addressed cyber terrorism within its legal framework of criminal acts. The paper also addresses practical consequences of cyber terrorism in the context of cyber attacks events in attempt to establish a legal basis for its prevention and punishment of cyber criminals wherever it happens. The author articulates its arguments by examining the presumed threats as a result of cyber terrorism activities, as well as based on well-known cyber terrorist behaviors and constant literature that insinuate that cyber attacks are imminent threats. Lastly, as there is neither a particular treaty nor State practices, the author considers of utmost importance to spell out different views and statistics alluding that the need to regulate cyber terrorism in line with principle of international criminal law is a necessity.

  10. Terrorism and the Press: A Study of the War on Terrorism, Islamophobia, and Al Jazeera

    OpenAIRE

    Chao-Chen Lin

    2017-01-01

    This paper focuses on the subject of terrorism neglected in Taiwan and discusses the role of news media in reporting terrorism. Based on a literature review and in-depth interview, this research looks to restore the fact of reporting on 911 and terrorism from Al Jazeera and surveys the intense relationship with U.S. This paper argues to rethink Islamophobia and terrorism by exploring the different definitions of terrorism between the West and Middle East. Arab journalists need to report on te...

  11. Health implications of radiological terrorism: Perspectives from Israel

    Directory of Open Access Journals (Sweden)

    Hagby Moti

    2009-01-01

    Full Text Available September 11 th events taught us, members of the medical community, that we need to prepared for the worst. Nuclear terror is no longer science fiction. Radiological weapons of mass terror come in three flavors: The first one is nuclear. Since 1992, there have been six known cases of highly enriched uranium or plutonium being intercepted by authorities as it passed in or out of the former Soviet Union. Constructing a nuclear fission weapon requires high-level expertise, substantial facilities, and lots of money. All three of which would be difficult, although not impossible, for a terrorist group to pull off without state support. However, terrorists could carry out potential mass destruction without sophisticated weaponry by targeting nuclear facilities using conventional bombs or hijacked aircrafts. Terror attacks could also carry out mass panic and radioactive contamination of people and environment by dispersal of radioactive materials with or without the use of conventional explosive devices. Most medical and para-medical personnel are not familiar with CBRN terror and radiation casualties. To lessen the impact of those potential attacks and provide care for the greatest number of potential survivors, the community as a whole - and the medical community in particular - must acquire the knowledge of the various signs and symptoms of exposure to irradiation and radioactive contamination as well as have a planned response once such an attack has occurred. Based on knowledge of radiation hazards, medical emergency planers should analyze the risks of each scenario, offer feasible solutions and translate them into internationally accepted plans that would be simple to carry out once such an attack took place. The planned response should be questioned and tested by drills. Those drills should check the triage, evacuation routes, decontamination posts, evacuation centers and receiving hospitals. It is crucial that the drill will consist of

  12. Risks of mortality and morbidity from worldwide terrorism: 1968-2004.

    Science.gov (United States)

    Bogen, Kenneth T; Jones, Edwin D

    2006-02-01

    Worldwide data on terrorist incidents between 1968 and 2004 gathered by the RAND Corporation and the Oklahoma City National Memorial Institute for the Prevention of Terrorism (MIPT) were assessed for patterns and trends in morbidity/mortality. Adjusted data analyzed involve a total of 19,828 events, 7,401 "adverse" events (each causing >or= 1 victim), and 86,568 "casualties" (injuries), of which 25,408 were fatal. Most terror-related adverse events, casualties, and deaths involved bombs and guns. Weapon-specific patterns and terror-related risk levels in Israel (IS) have differed markedly from those of all other regions combined (OR). IS had a fatal fraction of casualties about half that of OR, but has experienced relatively constant lifetime terror-related casualty risks on the order of 0.5%--a level 2 to 3 orders of magnitude more than those experienced in OR that increased approximately 100-fold over the same period. Individual event fatality has increased steadily, the median increasing from 14% to 50%. Lorenz curves obtained indicate substantial dispersion among victim/event rates: about half of all victims were caused by the top 2.5% (or 10%) of harm-ranked events in OR (or IS). Extreme values of victim/event rates were approximated fairly well by generalized Pareto models (typically used to fit to data on forest fires, sea levels, earthquakes, etc.). These results were in turn used to forecast maximum OR- and IS-specific victims/event rates through 2080, illustrating empirically-based methods that could be applied to improve strategies to assess, prevent, and manage terror-related risks and consequences.

  13. The Politics of Terror: Rereading "Harry Potter"

    Science.gov (United States)

    Strimel, Courtney B.

    2004-01-01

    This article claims that J. K. Rowling's "Harry Potter" series, with its use of magic, frightening storylines, and character ambiguity is beneficial to children who are dealing with issues related to terror and terrorism. The author explains that the scenarios presented in Rowling's series teach children strategies for coping with both physical…

  14. War on Terror - war on democracy?

    DEFF Research Database (Denmark)

    Bondebjerg, Ib

    2009-01-01

    En sammenlignende analyse af dokumentarfilm fra USA, England og Danmark som har behandlet krigen mod terror og krigene i Afghanistan og Irak......En sammenlignende analyse af dokumentarfilm fra USA, England og Danmark som har behandlet krigen mod terror og krigene i Afghanistan og Irak...

  15. Youth, Terrorism and Education: Britain's Prevent Programme

    Science.gov (United States)

    Thomas, Paul

    2016-01-01

    Since the 7/7 bombings of July 2005, Britain has experienced a domestic terror threat posed by a small minority of young Muslims. In response, Britain has initiated "Prevent," a preventative counter-terrorism programme. Building on previous, general critiques of Prevent, this article outlines and critically discusses the ways in which…

  16. Terrorism as a Social and Legal Phenomenon

    Science.gov (United States)

    Serebrennikova, Anna; Mashkova, Yekaterina

    2017-01-01

    This article examines the concept of terrorism as a social and legal phenomenon, its international legal and criminal-legal characteristics. Highlighted are the main aspects of cooperation of the states and the international community to counter terrorist activities. Terrorism as a social phenomenon is determined by paragraph 1 of article 3 of the…

  17. Dirty hands : Government torture and terrorism

    NARCIS (Netherlands)

    Daxecker, U.

    2017-01-01

    Existing research suggests that the use of harsh repression can exacerbate the incidence and duration of terrorism. Micro- and macro-level analyses have shown that coercive government responses to terrorism can radicalize sympathizers, increase recruitment, and undermine community support for

  18. Terrorism and poverty: double trouble for macroeconomic ...

    African Journals Online (AJOL)

    This article investigates poverty and terrorism as allies in hindering economic growth in African countries. This study uses data for 22 African countries from 1970 to 2013 i.e. 44 years. Data for terrorism, poverty and national income is taken from GTD and WDI. Panel cointegration techniques of dynamic fixed effect, mean ...

  19. CCM: A Text Classification Method by Clustering

    DEFF Research Database (Denmark)

    Nizamani, Sarwat; Memon, Nasrullah; Wiil, Uffe Kock

    2011-01-01

    In this paper, a new Cluster based Classification Model (CCM) for suspicious email detection and other text classification tasks, is presented. Comparative experiments of the proposed model against traditional classification models and the boosting algorithm are also discussed. Experimental results...... show that the CCM outperforms traditional classification models as well as the boosting algorithm for the task of suspicious email detection on terrorism domain email dataset and topic categorization on the Reuters-21578 and 20 Newsgroups datasets. The overall finding is that applying a cluster based...

  20. Analysing Terrorism from a Systems Thinking Perspective

    Directory of Open Access Journals (Sweden)

    Lukas Schoenenberger

    2014-02-01

    Full Text Available Given the complexity of terrorism, solutions based on single factors are destined to fail. Systems thinking offers various tools for helping researchers and policy makers comprehend terrorism in its entirety. We have developed a semi-quantitative systems thinking approach for characterising relationships between variables critical to terrorism and their impact on the system as a whole. For a better understanding of the mechanisms underlying terrorism, we present a 16-variable model characterising the critical components of terrorism and perform a series of highly focused analyses. We show how to determine which variables are best suited for government intervention, describing in detail their effects on the key variable—the political influence of a terrorist network. We also offer insights into how to elicit variables that destabilise and ultimately break down these networks. Because we clarify our novel approach with fictional data, the primary importance of this paper lies in the new framework for reasoning that it provides.

  1. Mediating Trust in Terrorism Coverage

    DEFF Research Database (Denmark)

    Mogensen, Kirsten

    crisis. While the framework is presented in the context of television coverage of a terror-related crisis situation, it can equally be used in connection with all other forms of mediated trust. Key words: National crisis, risk communication, crisis management, television coverage, mediated trust.......Mass mediated risk communication can contribute to perceptions of threats and fear of “others” and/or to perceptions of trust in fellow citizens and society to overcome problems. This paper outlines a cross-disciplinary holistic framework for research in mediated trust building during an acute...

  2. International safeguards and nuclear terrorism

    International Nuclear Information System (INIS)

    Moglewer, S.

    1987-01-01

    This report provides a critical review of the effectiveness of International Atomic Energy Agency (IAEA) safeguards against potential acts of nuclear terrorism. The author argues that IAEA safeguards should be made applicable to deterring diversions of nuclear materials from civil to weapons purposes by subnational groups as well as by nations. Both technical and institutional factors are considered, and suggestions for organizational restructuring and further technical development are made. Awareness of the necessity for effective preventive measures is emphasized, and possible directions for further effort are suggested

  3. 31 CFR 596.310 - Terrorism List Government.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Terrorism List Government. 596.310... OF FOREIGN ASSETS CONTROL, DEPARTMENT OF THE TREASURY TERRORISM LIST GOVERNMENTS SANCTIONS REGULATIONS General Definitions § 596.310 Terrorism List Government. The term Terrorism List Government...

  4. The enigma of lone wolf terrorism: an assessment

    NARCIS (Netherlands)

    Spaaij, R.

    2010-01-01

    Lone wolf terrorism remains an ambiguous and enigmatic phenomenon. The boundaries of lone wolf terrorism are fuzzy and arbitrary. This article aims to define and analyze the main features and patterns of lone wolf terrorism in fifteen countries. Lone wolf terrorism is shown to be more prevalent in

  5. 75 FR 45563 - Terrorism Risk Insurance Program; Final Netting

    Science.gov (United States)

    2010-08-03

    ... DEPARTMENT OF THE TREASURY 31 CFR Part 50 RIN 1505-AC24 Terrorism Risk Insurance Program; Final... Title I of the Terrorism Risk Insurance Act of 2002 (``TRIA'' or ``the Act''), as amended by the Terrorism Risk Insurance Extension Act of 2005 (``Extension Act'') and the Terrorism Risk Insurance Program...

  6. 6 CFR 27.400 - Chemical-terrorism vulnerability information.

    Science.gov (United States)

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Chemical-terrorism vulnerability information. 27... FACILITY ANTI-TERRORISM STANDARDS Other § 27.400 Chemical-terrorism vulnerability information. (a... that constitute Chemical-terrorism Vulnerability Information (CVI), as defined in § 27.400(b). The...

  7. Through the Looking Glass: The Role of Ethnicity and Affiliation in Responses to Terrorism in the Media.

    Science.gov (United States)

    Shoshani, Anat; Slone, Michelle

    2016-01-01

    This study examined whether attitudinal and emotional responses to broadcasts of images of terrorist events differ according to ethnic group (Jewish and Arab Israelis) and outgroup affiliation during an intense wave of terrorism that occurred in Israel during 2015. Participants were 118 Jewish and 110 Arab-Israelis adults randomly allocated to a terrorism or criminal violence television broadcast. State anxiety, state anger, stereotypes, and negative attitudes toward an adversary were examined prior and subsequent to the media exposure. Findings showed significant increases in anxiety, anger, stereotypes, and negative adversary perceptions in the terrorism exposure group compared to only anxiety increases in the criminal violence exposure. In the terrorism exposure group, Jewish participants showed greater increases in negative adversary perceptions of the Palestinians than Arab Israeli participants, but both groups showed similar significant increases in levels of anxiety and anger. Exposure to broadcasts of terrorism increased willingness to negotiate with the adversary among the Arab participants, but not among the Jewish participants. In the terrorism exposure group, both Jewish and Arab Israelis with high affiliation with the Palestinian cause showed less increases in stereotypes than those with low affiliation. Findings emphasize the role of ethnicity and outgroup affiliation in responses to media exposure to terrorism images.

  8. Deterring and Dissuading Nuclear Terrorism

    Directory of Open Access Journals (Sweden)

    John J. Klein

    2012-01-01

    Full Text Available While nuclear deterrence theory may be well-suited to dealing with nuclear-armed states, its suitability for deterring nuclear terrorism has frequently been questioned since 9/11. While terrorist organizations do not necessarily act uniformly or according to the same underlying beliefs, many of the most aggressive organizations are motivated by an ideology that embraces martyrdom and an apocalyptic vision.1 This ideology may be based on religion or a desire to overthrow a government. Consequently, terrorists motivated by ideology who intend to use a stolen or improvised nuclear device against the United States or its interests may not care about the resulting military repercussions following a nuclear attack. In such a scenario, some strategists think a terrorist organization's leadership may prove "undeterrable" by traditional military means. Nevertheless, deterrence is still a critical element in U.S. national strategy to prevent a nuclear attack. Furthermore, deterrence combined with dissuasion works to reduce the likelihood of nuclear terrorism being used against the United States, while also mitigating the consequences should such an act actually occur.

  9. Helping Students Cope in an Age of Terrorism: Strategies for School Counselors

    Science.gov (United States)

    Chibbaro, Julia S.; Jackson, C. Marie

    2006-01-01

    School counselors experience unique challenges as they struggle to provide students with coping skills geared to the outside world including acts of terrorism. School-aged students in the United States are one of the most vulnerable populations in the event of a terrorist act. This article offers a review of the current and most relevant…

  10. Terrorism and global security: The nuclear threat

    International Nuclear Information System (INIS)

    Beres, L.R.

    1987-01-01

    In the seven years since this book was first published, the threat of nuclear terrorism has increased dramatically. The enormous destructive potential of nuclear technology inevitably raises the specter of the use of nuclear explosives or radioactivity by insurgent groups. The author explores the political bases of terrorism by considering the factors that might foster nuclear terrorism, the forms it could take, and the probable consequences of such acts. New to this edition is the author's examination of the essential distinctions between lawful insurgencies and terrorism, as well as his analysis of the impact of recent U.S. foreign policy. The author explores the United State's all-consuming rivalry with the Soviet Union, arguing that it has created an atmosphere ripe for anti-U.S. terrorism and that the only viable option for the super-powers is cooperation in an effort to control terrorist activities. He also discusses the ''Reagan doctrine,'' which he believes has increased the long-term threat of nuclear terrorism against the U.S. by its continuing support of authoritarian regimes and by its active opposition to Marxist regimes such as those in Nicaragua and Angola. The book concludes by presenting the first coherent strategy for countering nuclear terrorism-embracing both technological and behavioral measures. The proposal includes policies for deterrence and situation management on national and international scales and emphasizes the logic of a major reshaping of world order

  11. FATF in Combating the Financing of Terrorism

    Directory of Open Access Journals (Sweden)

    Kristina Slavikovna Melkumyan

    2014-01-01

    Full Text Available The article examines the FATF specific approach to the problem of terrorism financing. The FATF essence, content of the activity and influence levers are also analyzed within the article. It is shown that the FATF has reviewed the problem of terrorism financing in the broadest perspective, having engaged simultaneously and consistently mechanisms for combating money laundering and terrorism financing. The Task Force has greatly contributed to building of the world counter-terrorism financing system through forming the legal and institutional basis as well as through interaction with all the possible participants and actors of world politics in this area. Moreover, the FATF has succeeded in geographical expansion of the FATF influence from the original 16 to187 jurisdictions by promotion of FATF-style regional bodies establishment. Particular attention is drawn to the unique features of the FATF Recommendations in comparison with the earlier issued sources of international law, which define the international counter-terrorism financing regime. The author believes that one of the advantages of the FATF as an institute within the counter-terrorism financing system among others is the informal status of the FATF, which provides its flexibility and high ability to respond quickly and in a timely manner to evolving nature of money laundering and terrorism financing as well as emerging threats.

  12. Countermeasure for terrorism-new field of radiation protection

    International Nuclear Information System (INIS)

    Ye Changqing

    2003-01-01

    The workers on radiation protection have been confronted with a new task-countering terrorism. The description and level of various threats threats, the potential consequences and occurrence probability of different nuclear and radiation attack events, and the responses to these threats (crisis and consequence) are introduced at two levels. At the level of crisis management, some approaches to mitigation, the works done by International Atomic Energy Agency and the tendency in United States are also presented. At the level of consequence management, the essential practices submitted by National Council on Radiation Protection and Measurements of America are listed. Finally the domest ic progress in this area is introduced too. (authors)

  13. Comparison of maintenance worker's human error events occurred at United States and domestic nuclear power plants. The proposal of the classification method with insufficient knowledge and experience and the classification result of its application

    International Nuclear Information System (INIS)

    Takagawa, Kenichi

    2008-01-01

    Human errors by maintenance workers in U.S. nuclear power plants were compared with those in Japanese nuclear power plants for the same period in order to identify the characteristics of such errors. As for U.S. events, cases which occurred during 2006 were selected from the Nuclear Information Database of the Institute to Nuclear Safety System while Japanese cases that occurred during the same period, were extracted from the Nuclear Information Archives (NUCIA) owned by JANTI. The most common cause of human errors was insufficient knowledge or experience' accounting for about 40% for U.S. cases and 50% or more of cases in Japan. To break down 'insufficient knowledge', we classified the contents of knowledge into five categories; method', 'nature', 'reason', 'scope' and 'goal', and classified the level of knowledge into four categories: 'known', 'comprehended', 'applied' and analytic'. By using this classification, the patterns of combination of each item of the content and the level of knowledge were compared. In the U.S. cases, errors due to 'insufficient knowledge of nature and insufficient knowledge of method' were prevalent while three other items', 'reason', scope' and 'goal' which involve work conditions among the contents of knowledge rarely occurred. In Japan, errors arising from 'nature not being comprehended' were rather prevalent while other cases were distributed evenly for all categories including the work conditions. For addressing insufficient knowledge or experience', we consider that the following approaches are valid: according to the knowledge level which is required for the work, the reflection of knowledge on the procedure or education materials, training and confirmation of understanding level, virtual practice and instruction of experience should be implemented. As for the knowledge on the work conditions, it is necessary to enter the work conditions in the procedure and education materials while conducting training or education. (author)

  14. Terrorism and the adolescent: a review.

    Science.gov (United States)

    Abo, Alyssa; Zalsman, Gil

    2003-01-01

    In recent years suicide bombings have became a part of life in Israel. Adolescents seem to be more vulnerable to the issues of life and death since they have to choose psychologically whether to live or die ("the fourth organizer"). The reaction to terrorism in this age group is unique. After September 11th, a great interest on the subject has arisen in the United States and some new data has been gathered. One of the important messages is that terrorism does not simply equal trauma. The aim of this article is to review current literature on emotional reaction, impact, and therapeutic strategies to terrorism in the adolescent population.

  15. American Jihadist Terrorism: Combating a Complex Threat

    Science.gov (United States)

    2010-12-07

    Goodnough, and Liz Robbins , “Mass. Man Arrested in Terrorism Case,” The New York Times, October 21, 2009, http://www.nytimes.com/2009/10/22/us...Abby Goodnough and Liz Robbins , “Mass. Man Arrested in Terrorism Case,” The New York Times, October 21, 2009, http://www.nytimes.com/ 2009/10/22/us...July 8, 2009); Tony Allen-Mills, “FBI ‘Lured Dimwits’ into Terror Plot,” The Sunday Times, London, May 24, 2009, http://www.timesonline.co.uk/tol/news

  16. The threat of nuclear terrorism

    International Nuclear Information System (INIS)

    Maerli, M.

    2001-01-01

    Full text: There have always been enormous gaps between the potential of a weapon and the abilities and/or the will to employ it by terrorists. New means and methods of violence with unknown outcomes could be less appealing for sub-national groups. Conventional 'off the shelf' weaponry is thus likely to remain the major tools for traditional terrorists. However, the analysis show that while the risk of nuclear terrorism may be remote, it should not and cannot be excluded. Rigorous standards and means the protection, control and accounting of fissile materials are thus needed. 'Nuclear terrorism' can be defined as acts of violence and destruction where the means applied are nuclear devices, or threats of use of such means, to create a condition of fear, to get attention, or to blackmail to have wider effect on others than the directly targeted victim(s). Nuclear terrorism is a subset of radiological terrorism, were the means (or threats) applied are radioactive substances. While being distinctly dissimilar in terms of technical approaches and damage potentials, many of the features with regards to public threat perception are likely to be similar. No non-state actors have ever deployed or used a nuclear device, and the number of (publicly known) nuclear bomb treats has been limited. However, there is a disturbing interest among some terrorist organizations in acquiring nuclear weapon capabilities, probably for tactical purposes. The biological and chemical programs of the Japanese 'Aum Shinrikyo' cult that culminated in the Tokyo metro attack is highly publicized. Less well-known is the nuclear weapon program of the group. Nuclear material was acquired from the sect's properties in Australia and markets were explored to purchase nuclear technology via straw trading companies. Another highly profiled terrorist group with obvious nuclear intentions is the 'Al- Qa'ida', the group of bin Laden. The recent trail for the bombings of the U.S. embassies in Nairobi, Kenya

  17. Protection against nuclear terrorism: the IAEA response

    International Nuclear Information System (INIS)

    Dodd, B.

    2002-01-01

    Full text: As a result of the events of 11 September 2001, the International Atomic Energy Agency (IAEA) identified possible threats from acts of nuclear terrorism. A report to the Board of Governors in November 2001 summarized the IAEA's ongoing work in areas relevant to the prevention and mitigation of the consequences of such acts and outlined proposals for a number of new and/or enhanced activities. Four main threats were addressed: theft of a nuclear weapon; acquisition of nuclear material; acquisition of other radioactive material; and violent acts against nuclear facilities. These proposals have been further refined and the new plan was approved in principle at the March 2002 board meeting. In the beginning, implementation will be dependent on member state contributions to a voluntary fund. Proposed new or enhanced activities are grouped into eight areas: I. Physical protection of nuclear material and nuclear facilities; II. Detection of malicious activities involving nuclear and other radioactive materials; III. State systems for nuclear material accountancy and control; IV. Security of radioactive material other than nuclear material; V. Assessment of safety/security related vulnerability of nuclear facilities; VI. Response to malicious acts, or threats thereof; VII. Adherence to and implementation of international agreements, guidelines and recommendations; VIII. Nuclear security co-ordination and information management. After an overview, this paper focuses on activity area IV, which deals with the radiological terrorism issues involving radioactive sources. A strategy for evaluation of the IAEA's role is presented, covering an analysis of the likely threats and possible scenarios. This leads to an assessment of the most desirable sources from a terrorist's viewpoint. The strategy then examines how terrorists might acquire such sources and attempts to determine the best ways to prevent their acquisition. Further activities are proposed to prevent the use

  18. Spiritually Sensitive Social Work with Victims of Natural Disasters and Terrorism.

    Science.gov (United States)

    Benson, Perry W; Furman, Leola Dyrud; Canda, Edward R; Moss, Bernard; Danbolt, Torill

    2016-07-01

    As a primary intervention, raising the topics of faith and religion with individuals traumatised by terrorism and/or natural disasters can be daunting for social workers, because victims often enter the helping relationship with feelings of helplessness, loss of personal control and of doubt about their relationships, environment, and their cultural and belief systems. Just as clients benefit from knowledge and awareness in the aftermath of a traumatic event, insights gleaned from traumatic experiences and from research can be useful for social workers grappling with the challenges associated with designing and deploying appropriate helping strategies with victims of disaster and terrorism. This article draws on extant literature and survey research, to explore how social workers might ethically assess clients' spiritual perspectives and incorporate helping activities that support clients' recovery, in the context of a spiritually sensitive helping relationship with victims of disaster and terrorism.

  19. The Tipping Point: Biological Terrorism

    Directory of Open Access Journals (Sweden)

    Scott Cary

    2009-01-01

    Full Text Available This article presents a strategic, operational, and tactical analysis of information currently available on the state of bio-weapons development by non-state actors, primarily Islamist jihadists. It discusses the evidence supporting a practical assessment that non-state actors have begun to acquire, and in the near-term intend to employ, bio-weapons. A pathogen and method of attack specifically designed to achieve the strategic goals of jihadists are presented as functional examples of the problem of the emerging global bio-weapons threat.Is a terrorist attack utilizing biological weapons a real threat? If so, is there a way to predict the circumstances under which it might happen or how it might be conducted? This article explores what is known and cannot be known about these questions, and will examine the threat of biological terrorism in the context of the strategic goals, operational methods, and tactical intentions of Islamist terrorists.

  20. [Chemical weapons and chemical terrorism].

    Science.gov (United States)

    Nakamura, Katsumi

    2005-10-01

    Chemical Weapons are kind of Weapons of Mass Destruction (WMD). They were used large quantities in WWI. Historically, large quantities usage like WWI was not recorded, but small usage has appeared now and then. Chemical weapons are so called "Nuclear weapon for poor countrys" because it's very easy to produce/possession being possible. They are categorized (1) Nerve Agents, (2) Blister Agents, (3) Cyanide (blood) Agents, (4) Pulmonary Agents, (5) Incapacitating Agents (6) Tear Agents from the viewpoint of human body interaction. In 1997 the Chemical Weapons Convention has taken effect. It prohibits chemical weapons development/production, and Organization for the Prohibition of Chemical Weapons (OPCW) verification regime contributes to the chemical weapons disposal. But possibility of possession/use of weapons of mass destruction by terrorist group represented in one by Matsumoto and Tokyo Subway Sarin Attack, So new chemical terrorism countermeasures are necessary.

  1. Terrorism, Forgiveness and Restorative Justice

    Directory of Open Access Journals (Sweden)

    Antony Pemberton

    2014-07-01

    Full Text Available This paper is intended to enhance understanding of the complexities of restorative justice in cases of terrorism from a victimological perspective. It does so first by analysing what separates terrorism from other forms of crime. The author argues that the main distinction concerns the peculiarly public nature of terrorism, in which the attack on the direct victims is intended to influence a (far larger group of so-called vicarious victims. This means that the public is likely to experience terrorist attacks as attacks on themselves. As a consequence the public can feel entitled to processes of forgiveness which in turn can conflict with the direct victims’ own experience. To illuminate this issue the paper proposes a novel distinction in third party forgiveness processes: between public forgiveness, i.e. forgiveness relating to the public wrongfulness inherent in crime, and vicarious forgiveness, i.e. the public’s experience of forgiveness itself. The complexities for restorative justice after terrorism can be then be viewed in terms of the tensions between the direct victims’ private and the publics’ vicarious forgiveness processes. Este artículo pretende facilitar la comprensión de las complejidades de la justicia restaurativa en casos de terrorismo desde una perspectiva victimológica. Lo hace primero mediante el análisis de lo que separa el terrorismo de otras formas de delincuencia. El autor sostiene que la distinción principal se refiere a la naturaleza pública específica del terrorismo, ya que mediante el ataque a las víctimas directas se pretende influir en el grupo (mucho más grande de las llamadas víctimas vicarias. Esto significa que es probable que el público sienta los ataques terroristas como ataques contra ellos mismos. De esta forma, el público puede sentirse con derecho sobre los procesos de perdón, lo que, a su vez, puede entrar en conflicto con la propia experiencia de las víctimas directas. Para iluminar

  2. Fighting Terrorism With Strategy: Revisiting Competing Visions

    National Research Council Canada - National Science Library

    Schluckebier, Thomas

    2002-01-01

    ... the threat of international terrorism requires America to make a grand strategic choice, This paper examines those choices by presenting four post-Cold War strategy options neo-isolationism, selective...

  3. Combatting Terrorism: A New National Strategy

    National Research Council Canada - National Science Library

    Hoover, Bruce

    1997-01-01

    .... Conducted by organized, highly trained, and technologically sophisticated paramilitary units, terrorism is in fact a form of warfare waged against the United States and its allies. But current U.S...

  4. U.S.-EU Cooperation Against Terrorism

    National Research Council Canada - National Science Library

    Archick, Kristin

    2005-01-01

    The September 11, 2001 terrorist attacks gave new momentum to European Union (EU) initiatives to improve law enforcement cooperation against terrorism both among its 25 member states and with the United States...

  5. U.S.-EU Cooperation Against Terrorism

    National Research Council Canada - National Science Library

    Archick, Kristin

    2006-01-01

    The September 11, 2001, terrorist attacks gave new momentum to European Union (EU) initiatives to improve law enforcement cooperation against terrorism both among its 25 member states and with the United States...

  6. On Teaching About Terrorism: A Conceptual Approach.

    Science.gov (United States)

    Kleg, Milton

    1986-01-01

    Recommends the use of conceptual mapping, case studies, and springboards to discussion and inquiry as viable approaches to the study of terrorism in secondary classrooms. Provides numerous examples of conceptual maps. (JDH)

  7. Islamic Law and Terrorism in Indonesia

    Directory of Open Access Journals (Sweden)

    Ramlani Lina Sinaulan

    2016-03-01

    Full Text Available Jihād and terrorism are not the same. In the context of sharia that implementation of the jihād has parameters measured with a layer of ethics based on the commands Al Quran and the Hadith of Prophet and the explanation the Ulama. Muslims in Indonesia views that the essentially not much different from the views on jihād and terror in other Islamic countries, especially the Middle East. In the context of Islamic law, jihād has multi spectral studies, but none of these studies that equate the meaning of jihād with terrorism, or none of them agreed that acts of terror as has been demonstrated by radical groups that are part of the concept Islam.

  8. Nazi terror system and its practical use

    OpenAIRE

    Anvar M. Mamadaliev; Leon М. Bagdasaryan

    2011-01-01

    The article tells about reasons and consequences of Adolf Hitler’s terror. Special attention is attached to mechanism of Nazi dictatorship and its ideological bases, set in Hitler’s work ‘My Struggle’, the 25 Point Program.

  9. Why is terrorism a man's business?

    Science.gov (United States)

    Möller-Leimkühler, Anne Maria

    2018-04-01

    Terrorism, whether it is group-related or performed as lone actor terrorism, is a predominantly male phenomenon. Generally and throughout history, young males have been the main protagonists of criminal and political violence.This article aims to contribute, from different perspecives, to the question of what makes young men violent. These include neurobiological aspects, such as sex differences in the brain that predispose males to physical aggression and violence; gender role aspects, with regard to aggression and violence being basic components for demonstrating and reconstructing masculinity; demographic aspects of male youth bulges as potential breeding grounds for terrorism; aspects of group dynamics and identity fusion in the process of radicalization; and psychosocial characteristics of lone actor terrorists, which differ from group-related terrorists.It is concluded that in addition to ideological, political, economic, regional, demographic, or psychosocial causes, experiences of threatened masculinity may be an underlying factor and driving force for terrorism.

  10. State of terror: women at risk

    Directory of Open Access Journals (Sweden)

    The Karen Women’s Organisation

    2008-04-01

    Full Text Available Two reports researched and written by the Karen Women’sOrganisation – Shattering Silences in 2004 and State ofTerror in 20071 – document the wide range of humanrights abuses against Burmese women and girls.

  11. State of terror: women at risk

    OpenAIRE

    The Karen Women’s Organisation

    2008-01-01

    Two reports researched and written by the Karen Women’sOrganisation – Shattering Silences in 2004 and State ofTerror in 20071 – document the wide range of humanrights abuses against Burmese women and girls.

  12. Terrorism and National Security: Issues and Trends

    National Research Council Canada - National Science Library

    Perl, Raphael

    2003-01-01

    .... Another trend is toward terrorism that is religiously or ideologically motivated. Radical Islamic fundamentalist groups, or groups using religion as a pretext, pose terrorist threats of varying kinds to U.S...

  13. Terrorism and National Security: Issues and Trends

    National Research Council Canada - National Science Library

    Perl, Raphael

    2005-01-01

    .... Another trend is toward terrorism that is religiously or ideologically motivated. Radical Islamic fundamentalist groups, or groups using religion as a pretext, pose terrorist threats of varying kinds to U.S...

  14. Empirical scaling law connecting persistence and severity of global terrorism

    Science.gov (United States)

    Gao, Jianbo; Fang, Peng; Liu, Feiyan

    2017-09-01

    Terrorism and counterterrorism have both been evolving rapidly. From time to time, there have been debates on whether the new terrorism is evolutionary or revolutionary. Such debate often becomes more heated after major terrorist activities, such as the terrorist attacks on September 11, 2001 and the November 13, 2015 coordinated Paris terror attack. Using country-wide terrorism data since 1970, we show that there exist scaling laws governing the continuity and persistence of world-wide terrorism, with the long-term scaling parameter for each country closely related to its yearly global terrorism index. This suggests that the new terrorism is more accurately considered evolutionary. It is further shown that the imbalance in the seesaw of terrorism and counterterrorism is not only responsible for the scaling behavior found here, but also provides new means of quantifying the severity of the global terrorism.

  15. On immorality of terrorism and war

    OpenAIRE

    Čičovački Predrag

    2003-01-01

    The author first analyzes differences and similarities between war and terrorism and then argues that both are deeply immoral. Their differences are far less significant that their similarities, the main one of which consists in the denial of the view that every human life is equally worthy. This denial opens a way for an inhuman and violent treatment of those (enemies, others) who are not as valuable as we are, which characterizes both terrorism and war. Besides having such unacceptable mora...

  16. Epistemological failures : everyday terrorism in the west

    OpenAIRE

    Gentry, Caron Eileen

    2016-01-01

    This article attempts to problematize the disparate level of attention paid to similar violences globally, whereby violence against women in the developing world is seen as a security concern to the West and yet violence against women in the West is minimized or ignored. It will do this first by demonstrating that everyday violences, better known as everyday terrorism, in the West are subjugated knowledges within Terrorism Studies. To demonstrate this, Half the Sky, Sex and World Peace, and T...

  17. Potential for nuclear terrorism: a discussion

    International Nuclear Information System (INIS)

    Kellen, K.

    1987-01-01

    Because there has never been an incident of nuclear terrorism, the author is reduced to informed speculation. The past cannot be used to extrapolate into the future. For terrorists as for nations, the domain of nuclear attack represents are unprecedented quantum leap, one that groups think carefully about. Terrorists will consider many factors, including the public climate, because they are not psychotics operating in a vacuum (though groups may include psychotic individuals). Rather, they are people involved in a reciprocal political and psychological relationship with the rest of the world. In reaching some assessment of the potential for nuclear terrorism, there is an immense number of variables to deal with, beginning with the many types of terrorists and terrorism, including nuclear. They can, however, look at individual terrorist groups - a their compositions, capabilities, motivations, and modus operandi - and reach some conclusions. The author first looks at the possible forms nuclear terrorism might take and at the severity of the consequences. A strict distinction must be made between nuclear terrorism where nuclear things are the means (for example, a nuclear device) and nuclear terrorism where nuclear things are the target (for example, nuclear power stations), or where they are both such as a nuclear weapon thrown at a nuclear power station. 2 tables

  18. Terrorism in Pakistan: a behavioral sciences perspective.

    Science.gov (United States)

    Nizami, Asad Tamizuddin; Rana, Mowadat Hussain; Hassan, Tariq Mahmood; Minhas, Fareed Aslam

    2014-01-01

    This article reviews the behavioral science perspectives of terrorism in Pakistan. It can be argued that Pakistan has gained worldwide attention for "terrorism" and its role in the "war against terrorism". The region is well placed geopolitically for economic successes but has been plagued by terrorism in various shapes and forms. A behavioral sciences perspective of terrorism is an attempt to explain it in this part of the world as a complex interplay of historical, geopolitical, anthropological and psychosocial factors and forces. Drawing from theories by Western scholars to explain the behavioral and cognitive underpinnings of a terrorist mind, the authors highlight the peculiarities of similar operatives at individual and group levels. Thorny issues related to the ethical and human right dimensions of the topic are visited from the unique perspective of a society challenged by schisms and divergence of opinions at individual, family, and community levels. The authors have attempted to minimize the political descriptions, although this cannot be avoided entirely, because of the nature of terrorism. Copyright © 2014 John Wiley & Sons, Ltd.

  19. Preventing nuclear terrorism: responses to terrorist grievances

    International Nuclear Information System (INIS)

    Beres, L.R.

    1987-01-01

    The US is vulnerable to nuclear terrorism, despite the presence of physical security and other measures. Although these measures are important, they are insufficient to prevent or deter terrorism. What, then, is the answer? The author feels it lies in a hitherto neglected dimension of terrorism: its underlying political grievances. The principal grievance that potential terrorists have against the US concerns misguided elements of US foreign policy. These elements are moving the US on a seemingly inexorable collision course with terrorism and, more than likely, with nuclear terrorism. The US represents a serious threat to many people and groups who feel directly the effects of a foreign policy mired in strident anti-Sovietism: opponents of the US-NATO Euromissile deployments, populations seeking to secure their human rights from repressive regimes supported by the US, and governments seeking self-determination but embattled by insurgents backed by US arms, equipment, and advisers. In many cases, the US foreign policy stance in one country has aroused suspicion and anger within the region as a whole. The collision course need not be inevitable. The US can take a number of steps in the political arena that would greatly reduce the threat of nuclear terrorism

  20. Sleep terrors antecedent is common in adolescents with migraine

    Directory of Open Access Journals (Sweden)

    Libânia Melo Nunes Fialho

    2013-02-01

    Full Text Available Migraines and sleep terrors (STs are highly prevalent disorders with striking similarities. The aim of this study was to evaluate the effect of the antecedent of STs by comparing adolescents suffering from migraines with healthy controls in a large consecutive series. METHODS: All patients were subjected to a detailed headache questionnaire and were instructed to keep a headache diary during a two-month period. The age range was 10 to 19 years. The diagnosis of STs was defined according to the International Classification of Sleep Disorders. RESULTS: A total of 158 participants were evaluated. Of these participants, 50 suffered from episodic migraines (EMs, 57 had chronic migraines (CMs and 51 were control subjects (CG. Participants who had a history of STs had significantly more migraines than participants who did not. CONCLUSIONS: Migraine is strongly associated with a history of STs in the adolescent population independent of demographics and pain intensity.

  1. Cultures of Violence and Acts of Terror: Applying a Legitimation-Habituation Model to Terrorism

    Science.gov (United States)

    Mullins, Christopher W.; Young, Joseph K.

    2012-01-01

    Although uniquely positioned to provide insight into the nature and dynamics of terrorism, overall the field of criminology has seen few empirically focused analyses of this form of political violence. This article seeks to add to the understanding of terror through an exploration of how general levels of violence within a given society influence…

  2. Terrorism as a process: a critical review of Moghaddam's "Staircase to Terrorism".

    Science.gov (United States)

    Lygre, Ragnhild B; Eid, Jarle; Larsson, Gerry; Ranstorp, Magnus

    2011-12-01

    This study reviews empirical evidence for Moghaddam's model "Staircase to Terrorism," which portrays terrorism as a process of six consecutive steps culminating in terrorism. An extensive literature search, where 2,564 publications on terrorism were screened, resulted in 38 articles which were subject to further analysis. The results showed that while most of the theories and processes linked to Moghaddam's model are supported by empirical evidence, the proposed transitions between the different steps are not. These results may question the validity of a linear stepwise model and may suggest that a combination of mechanisms/factors could combine in different ways to produce terrorism. © 2011 The Authors. Scandinavian Journal of Psychology © 2011 The Scandinavian Psychological Associations.

  3. The normalisation of terror: the response of Israel's stock market to long periods of terrorism.

    Science.gov (United States)

    Peleg, Kobi; Regens, James L; Gunter, James T; Jaffe, Dena H

    2011-01-01

    Man-made disasters such as acts of terrorism may affect a society's resiliency and sensitivity to prolonged physical and psychological stress. The Israeli Tel Aviv stock market TA-100 Index was used as an indicator of reactivity to suicide terror bombings. After accounting for factors such as world market changes and attack severity and intensity, the analysis reveals that although Israel's financial base remained sensitive to each act of terror across the entire period of the Second Intifada (2000-06), sustained psychological resilience was indicated with no apparent overall market shift. In other words, we saw a 'normalisation of terror' following an extended period of continued suicide bombings. The results suggest that investors responded to less transitory global market forces, indicating sustained resilience and long-term market confidence. Future studies directly measuring investor expectations and reactions to man-made disasters, such as terrorism, are warranted. © 2011 The Author(s). Disasters © Overseas Development Institute, 2011.

  4. Personal experience in professional narratives: the role of helpers' families in their work with terror victims.

    Science.gov (United States)

    Shamai, Michal

    2005-06-01

    This article describes research on the narratives of social workers who help terror victims, focusing on the relationship between the helpers' families and their work. Qualitative analysis of three training groups of social workers who are responsible for helping in the event of terror attacks in different parts of Israel, and of three debriefing groups for social workers after terror attacks, reveals that the helpers' families play a role in the narratives constructed by the helpers. Two main themes were identified. The first centers on the interaction between work and the family, and shows that in the situation of a terror attack, the conflict between the two disappears and the family often serves as a support system for the helpers. The second theme refers to the family dimension alone, and focuses on the dichotomy between vitality and loss. The way that family life events affect helpers'professional intervention is described. The findings are discussed in light of Conservation of Resources Theory, the fight-flight response to threat, and the concept of the family as a source of safety and risk taking.

  5. Terrorism cover in France for property damage including nuclear risks

    International Nuclear Information System (INIS)

    Stanislas, A.

    2004-01-01

    The obligation to include terrorism cover in all Property Damage policies issued on the French Market is ruled by an Act of 1986 and introduced under Section R 126-2 of the French Code of Insurance. This section stipulates that Property Damage policies must provide cover for damage resulting from acts of terrorism, with the same deductible and the same limit than that of the other damage covered in the policy. Soon after the dramatic events of September 11, 2001 in the United States and although reinsurers worldwide restricted their offer of capacities, French insurers recognized that they had to maintain this global cover for the benefit of their insurers. After difficult discussions between insurers, reinsurers, brokers, risk managers and representatives of the State, the creation of a new Pool, backed with a State guarantee, was decided in less than three months. Effective January 1, 2002 and called Gestion d'Assurance et de Reassurance des Risques Attentats et Actes de Terrorisme (GAREAT), the Pool offers a multiple layers stop-loss cover for Property Damage only, i.e. excluding TPL policies. Considering that nuclear risks should be treated in the same way as other industrial risks, it was decided that they would be covered by GAREAT as well. In the meantime, by a Decree of December 28, 2001 modifying Section R 126-2, a special provision, aiming at reducing the limit and thus the price of this cover, was introduced in the Code. The purpose of this paper is to expose the present situation applying through GAREAT and, after two years of operation to discuss future developments, including other sources of capacity for the coverage of acts of terrorism in nuclear risks insurance.(author)

  6. Modeling a Strategy for the War on Terrorism

    National Research Council Canada - National Science Library

    Henderson, Darral

    2002-01-01

    .... This paper discusses a strategy for conducting the war on terrorism in terms of a system and how that strategy must be adjusted over the long-term to compensate for fluctuating components of the war on terrorism...

  7. Israel's Counter-Terrorism Strategy and its Effectiveness

    National Research Council Canada - National Science Library

    Smith, Jerry D

    2005-01-01

    This thesis analyzes Israeli counter-terrorism strategy and its effectiveness. Because of ongoing suicide attacks from Palestinian and other terrorist organizations, Israel will continue to have an aggressive counter-terrorism strategy...

  8. VALIDATION GUIDELINES FOR LABORATORIES PERFORMING FORENSIC ANALYSIS OF CHEMICAL TERRORISM

    Science.gov (United States)

    The Scientific Working Group on Forensic Analysis of Chemical Terrorism (SWGFACT) has developed the following guidelines for laboratories engaged in the forensic analysis of chemical evidence associated with terrorism. This document provides a baseline framework and guidance for...

  9. 174 THE MORALITY OF SUICIDE TERRORISM AND BOKO HARAM ...

    African Journals Online (AJOL)

    User

    philosophically consider the moral implication of suicide terrorism with particular .... define terrorism is political rather than theoretical. Brian Berkey (2010) is of ..... elements of relativism to the concept of morality because an. Islamic cleric who ...

  10. Global Risk of Nuclear Terrorism

    Directory of Open Access Journals (Sweden)

    Emily Diez

    2010-01-01

    Full Text Available The emergence of nuclear terrorism, a threat that President Obama called "the gravest danger we face," has signaled a paradigm shift in international security. Since the collapse of the Soviet Union, sensitive nuclear technologies and materials have become increasingly available. Globalization and the inadequate enforcement of treaties and export controls have allowed the proliferation of nuclear weapons materials. Today, international terrorist organizations seek to employ weapons of mass destruction (WMD as a means to influence national policies around the world. AlQaida spokesman Suleiman Abu Gheith declared that in order to balance the injustices that have been inflicted on the Muslim population worldwide, al-Qaida's new objective is "to kill 4 million Americans–2 million of them children." As political scientist Graham Allison notes, this could be achieved with either 1,334 attacks similar in magnitude to those of 9/11, or one nuclear bomb.Building a nuclear program is an arduous task that requires tacit knowledge, the recruitment of nuclear scientists, engineers, and machinists, and the resources and time to obtain nuclear materials and components. While it is unlikely that terrorist organizations have the capacity to develop full-fledged programs in the near term, terrorist development and acquisition of nuclear weapons remains a long-term threat that requires international action.

  11. Civil liberties and nuclear terrorism

    International Nuclear Information System (INIS)

    Goldberg, S.

    1987-01-01

    The importance of preventing nuclear terrorism is so great that it is easy to believe that the usual concern with civil liberties must take a back seat. But it is precisely when emergencies are invoked that the authors must not forget the importance of freedoms. Emergency powers are easily abused, and, even in the absence of abuse, mistakes can be made. It is hard to understand why they care about civil liberties if every suspect is guilty, every wiretap is necessary, and every search is justified. But sometimes suspects are innocent, wiretaps are used for political ends, and searches disrupt lives to no end. Civil liberties do not exist in a vacuum. If society is destroyed, civil liberties are likely to be destroyed as well. Virtually every legal doctrine this study addresses involves a recognition that individual rights must be balanced against valid social needs. The civil liberties focus on here fall under the general headings of freedom of speech and association, privacy, due process rights for suspects, and freedom from unreasonable searches and seizures. One essential point applied to all these areas: although a counterterrorist activity is legal, that does not mean the activity has no impact on civil liberties. It may be legal, for example, to have a massive federal police force that provides hundreds of guards for every shipment of plutonium. Even so, that procedure still raises civil liberties concerns, since many Americans would feel less free in a society of that type

  12. Reducing the risk of nuclear terrorism

    International Nuclear Information System (INIS)

    Hibbs, R.

    2005-01-01

    Full text: The March 2005 'International conference on nuclear security, global directions for the future' noted that nuclear terrorism is one of the greatest threats to society. Eminent members of a multi-national panel stated that there is no one principal activity to reduce the risk of nuclear terrorism and that a combination of activities is required. This paper seeks to identify those activities by analyzing the elements that comprise the risk of nuclear terrorism. For the purpose of the analysis, risk is the product of the probability of a terrorist attack (A p ), the success of a terrorist act (S p ) and the consequence (C) of the attack: R=A p * S p * C. The paper examines each of these three elements of risk with the objective of identifying what we are doing and what else we could be doing to reduce risk. It takes into consideration some historic catastrophes, examines how they might have been prevented or their consequences reduced, and if there are lessons that are applicable to reducing the risk of nuclear terrorism. The paper demonstrates that we have concentrated on only one of the three elements of risk and offer suggestions for diminishing the risk of nuclear terrorism by addressing all the elements. (author)

  13. The 'war on terror"and international law

    NARCIS (Netherlands)

    Duffy, Helen

    2013-01-01

    The thesis analyses international law and practice in relation to terrorism and counter-terrorism in the post 9/11 environment. It finds terrorism to be a term of acute and wide-ranging political significance yet one which is not defined under generally accepted treaty or customary international

  14. 75 FR 30106 - Terrorism Risk Insurance Program; Litigation Management Submissions

    Science.gov (United States)

    2010-05-28

    ... DEPARTMENT OF THE TREASURY Terrorism Risk Insurance Program; Litigation Management Submissions... U.S.C. 3506(c)(2)(A)). Currently, the Terrorism Risk Insurance Program Office is seeking comments... or by mail (if hard copy, preferably an original and two copies) to: Terrorism Risk Insurance Program...

  15. 76 FR 19909 - International Terrorism Victim Expense Reimbursement Program

    Science.gov (United States)

    2011-04-11

    ... 1121-AA78 International Terrorism Victim Expense Reimbursement Program AGENCY: Office of Justice... promulgating this interim-final rule for its International Terrorism Victim Expense Reimbursement Program... international terrorism. DATES: Effective date: This interim-final rule is effective April 11, 2011. Comment...

  16. 15 CFR 742.8 - Anti-terrorism: Iran.

    Science.gov (United States)

    2010-01-01

    ... 15 Commerce and Foreign Trade 2 2010-01-01 2010-01-01 false Anti-terrorism: Iran. 742.8 Section... BASED CONTROLS § 742.8 Anti-terrorism: Iran. (a) License Requirements. (1) A license is required for anti-terrorism purposes to export or reexport to Iran any item for which AT column 1 or AT column 2 is...

  17. 15 CFR 742.19 - Anti-terrorism: North Korea.

    Science.gov (United States)

    2010-01-01

    ... 15 Commerce and Foreign Trade 2 2010-01-01 2010-01-01 false Anti-terrorism: North Korea. 742.19...-CCL BASED CONTROLS § 742.19 Anti-terrorism: North Korea. (a) License Requirements. (1) All items on... anti-terrorism reasons require a license for export or reexport to North Korea. This includes all items...

  18. 15 CFR 742.9 - Anti-terrorism: Syria.

    Science.gov (United States)

    2010-01-01

    ... 15 Commerce and Foreign Trade 2 2010-01-01 2010-01-01 false Anti-terrorism: Syria. 742.9 Section... BASED CONTROLS § 742.9 Anti-terrorism: Syria. (a) License requirements. (1) If AT Column 1 of the... required for export and reexport to Syria for anti-terrorism purposes. (2) The Secretary of State has...

  19. A Study of Terrorism Emergency Preparedness Policies in School Districts

    Science.gov (United States)

    Umoh, Emmanuel

    2013-01-01

    The threat of terrorism is a concern in public facilities including schools. This study focused on school districts in a southwestern state. Terrorism emergency preparedness policies are well-documented as measures to protect students and staff in school districts from terrorism threats and vulnerabilities. However, those threats and…

  20. 75 FR 58468 - Terrorism Risk Insurance Program; Program Loss Reporting

    Science.gov (United States)

    2010-09-24

    ... DEPARTMENT OF THE TREASURY Terrorism Risk Insurance Program; Program Loss Reporting AGENCY: Departmental Offices, Terrorism Risk Insurance Program Office, Treasury. ACTION: Notice and request for... 1995, Public Law 104-13 (44 U.S.C. 3506(c)(2)(A)). Currently, the Terrorism Risk Insurance Program...

  1. International Terrorism and Mental Health: Recent Research and Future Directions

    Science.gov (United States)

    Fischer, Peter; Ai, Amy L.

    2008-01-01

    International terrorism has become a major global concern. Several studies conducted in North America and Europe in the aftermath of terrorist attacks reveal that international terrorism represents a significant short-term and long-term threat to mental health. In the present article, the authors clarify the concept and categories of terrorism and…

  2. BIOLOGICAL TERRORISM: THE NOTION, ESSENCE AND MAIN AREAS OF COUNTER

    Directory of Open Access Journals (Sweden)

    Julia Sarankina

    2016-10-01

    Full Text Available The article issued theoretical and practice problems of combating terrorism in current conditions, in particular, analyzes the concept of bio-terrorism as a form of terrorism, we investigate its nature, characteristics, and also referred to the major directions of countering.

  3. Understanding and Teaching the Semantics of Terrorism: An Alternative Perspective.

    Science.gov (United States)

    Long, Kenneth J.

    1990-01-01

    Critiques conventional definitions of terrorism. Advocates sensitizing students to the semantics of terrorism and teaching skepticism of leaders who manipulate such concepts. Recommends using historical case studies to clarify issues, inform students about state and state-sponsored terrorism, and challenge students' preconceptions. Includes a…

  4. Turkish Elementary School Students' Perceptions of Local and Global Terrorism

    Science.gov (United States)

    Aricak, Tolga; Bekci, Banu; Siyahhan, Sinem; Martinez, Rebecca

    2008-01-01

    Introduction: Historically, terrorism has occurred in various regions of the world and has been considered a local problem until the September, 11 terrorist attacks on the United States in 2001. After 9/11, terrorism has become a global concern. The definition of terrorism has changed from a violent act of a group of local people against their…

  5. Gamma-neutron pagers make revolution in combating nuclear terrorism

    International Nuclear Information System (INIS)

    Stavrov, A.; Kagan, L.; Antonovski, A.

    2002-01-01

    Full text: After the events of September 11, 2001 it became quite evident that to combat terrorism, nuclear terrorism including, comprehensive measures able to prevent acts of terrorism are required. One of the important factors that ensure solving this task is technical means that allow early detection of tolls of terrorism. All the aforesaid is especially true for means of detection of radioactive materials. One of the most effective and convenient instruments designed for detection of radioactive materials, including nuclear materials, are gamma-neutron pagers that are instruments of the new generation developed in the last year. These pagers are sensitive, small and rugged monitors designed for detection of special nuclear materials and other radioactive materials by their gamma and/or neutron radiation. This detection is based on a comparison of the radiation intensity of an object and a background. These instruments will immediately inform an individual about the presence of a radioactive source by audible, visual, or vibration alarm. They are easy-to-operate instruments and a user does not need to be an expert in nuclear physics or radiation protection. A pager may be worn in pocket or on a belt ensuring the radiation protection of an individual. This instrument operates in automatic mode during a labor shift. It is provided with a non-volatile memory to store information about a history of operation: date and time when an instrument is turned on/off; the time and radiation levels, gamma and/or neutron, that exceed the alarm threshold; the current values of the count rate, etc. This information can be transmitted to a PC. These instruments can be used as the first level alarming devices at sites where installation of fixed monitors is impossible or inexpedient. Pagers are relatively inexpensive, sensitive and small instruments. Therefore it is advised that each person involved in control of goods transportation, vehicles and people uses such instruments. A

  6. On immorality of terrorism and war

    Directory of Open Access Journals (Sweden)

    Čičovački Predrag

    2003-01-01

    Full Text Available The author first analyzes differences and similarities between war and terrorism and then argues that both are deeply immoral. Their differences are far less significant that their similarities, the main one of which consists in the denial of the view that every human life is equally worthy. This denial opens a way for an inhuman and violent treatment of those (enemies, others who are not as valuable as we are, which characterizes both terrorism and war. Besides having such unacceptable moral implications with regards to the treatment of other human beings, a further common and troubling implication of terrorism and war consists in the fact that dehumanization of others leads also to a dehumanization of ourselves. .

  7. Reframing domestic violence as torture or terrorism

    Directory of Open Access Journals (Sweden)

    Marcus Isabel

    2014-01-01

    Full Text Available This paper focuses on the analysis of the phenomenon of domestic violence and the distinctive features for which is it may be recognized as a specific form of torture and/or terrorism at home. The author provides an overview of the scientific debate among feminist authors on this conception which has given rise to an innovative approach to understanding the concept of domestic violence. Underscoring the substantive similarity of domestic violence with the acts of torture and/or terrorism, the author urges for state action arguing that domestic violence as a form of gender-based violence should be approached by applying the same logic and strategies which are employed in response to traditional torture and terrorism.

  8. Terrorism reports: The tip of the iceberg.

    Science.gov (United States)

    Ellenberg, Eytan; Taragin, Mark; Bar-On, Zvia; Cohen, Osnat; Ostfeld, Ishay

    2017-01-01

    Medical impact of terror is a public health issue as the threat is growing all over the world. Our objective was to compare the number of injured and incidents in the three different databases and reports [Global Terrorism Database (GTD), Israeli Security Agency (ISA) and National Insurance Institute (NII)] in Israel. Retrospective study. Analyses of three different databases (GTD, ISA and NII) and basic comparison. The victims reimbursed for medical expenses are the largest population. The number of injured as described by GTD and ISA database are less important. The 2010-2013 years are marked by more incidents recognized in Israel vs GTD assessment (except in 2014). The number of victims being reimbursed for medical and mental health services is radically different from the GTD and the ISA reports. Public Health specialists should be advised of this phenomenon to deliver their right approach (including mental health) to growing threat and develop new definition of victim of terror.

  9. Nuclear Law: A Key Against Nuclear Terrorism

    International Nuclear Information System (INIS)

    Cardozo, P.

    2004-01-01

    The role of the legal instruments in the war against nuclear terrorism. Control of radioactive sources. Elements of Nuclear Law: Definition: it is the body of special legislation that regulates the pacific uses of nuclear energy and the conduct of the persons engaged in activities related to fissionable materials and ionizing radiation . Objective: to provide a legal framework in order to protect individuals , property and the environment against the harmful effects of the use of nuclear energy and ionising radiation. Principles of nuclear energy legislation: safety principle, exclusively operator responsibility, authorization, independence of the regulatory body, inspections and enforcement, nuclear damage compensation, international cooperation. National regulatory infrastructure. Establishment of special law in Emergency Preparedness for nuclear or radiological disaster. IAEA Conventions. Transportation of nuclear material. IAEA regulations on radioactive material. Compensation for nuclear damage. Nuclear safety, security and terrorism. International and domestic instruments. Anti terrorism acts. International agreements on Safety Cooperation. (Author)

  10. Terrorism and Other Threats to Civilization

    Science.gov (United States)

    Garwin, Richard L.

    2014-07-01

    In the Seminars on Planetary Emergencies, we have for more than a decade had a strong focus on terrorism, and, indeed, on megaterrorism. We realized early that there was much that could be achieved to mitigate the consequences of terrorists' acts, and so our original PMP, ably chaired by Kamal, was split into PMP-MTA (Mitigation of Terrorists Acts) and PMP-Motivation of Terrorism. Clearly, terrorism doesn't just happen, but is performed by people, either relatively spontaneously or in an organized fashion. I will not presume to report on the considerations and accomplishments of our colleagues, chaired by John Alderdice, who have studied terrorist motivations and worked hard to eliminate such motivations...

  11. TOURISM AND TERRORISM: A WORLDWIDE PERSPECTIVE

    Directory of Open Access Journals (Sweden)

    Cristina Elena ALBU

    2016-03-01

    Full Text Available We live in a society marked by major changes in the tourism field. Tourist destinations make all possible efforts to best promote their tourist offer and attract as different tourist categories as there might be. However, these tourist destinations are sometimes associated with terrorist attacks that can turn a famous tourist area into a highly avoided one. Terrorism may be permanently detrimental to a tourist destination on both social and economic levels. The purpose of this paper is to highlight the impact that terrorist attacks have on tourism around the globe. The research method used for the achievement of this article is documentary research. Through the proportions and forms that it has taken, terrorism has become one of the more and more active and threatening calamities that affect the international community. For some organizations, terrorism has become a means of solving their political, cultural and religious problems, taking tourism as a niche through which they can carry out their targets.

  12. Optimal Physical Protection against Nuclear Terrorism

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Doyoung; Kim, ChangLak [KEPCO International Nuclear Graduate School, Ulsan (Korea, Republic of)

    2014-10-15

    There is no attempt with nuclear weapons to attack any places for terror or military victory since the atomic bombs dropped in Hiroshima and Nagasaki. People have obviously experienced horrible destructive power of nuclear weapons and continuously remembered a terrible tragedy, lots of organizations and experts express their concerns about the nuclear terrorism and try to interchange opinions for prevention of deadly weapons. The purpose of this paper is to provide the information of nuclear terrorism and what the potential risk of Republic of Korea is and how to do the efficient physical protection. Terror is from the old French terreur, which is derived from Latin verb terror meaning 'great fear'. This is a policy to suppress political opponents through using violence and repression. Many scholars have been proposed, there is no consensus definition of the term 'terrorism.' In 1988, a proposed academic consensus definition: 'Terrorism is an anxiety-inspiring method of repeated violent action, employed by (semi-) clandestine individual, group or state actors, for idiosyncratic, criminal or political reasons, whereby - in contrast to assassination - the direct targets of violence are not the main targets. The immediate human victims of violence are generally chosen randomly (targets of opportunity) or selectively (representative or symbolic targets) from a target population, and serve as message generators. These attacks showed that particular terrorists groups sought to cause heavy casualties and extreme terrorists were spontaneously prepared to make sacrifices for completion of that ultimate goal. Creation of nuclear weapons was like opening Pandora's box. Barack Obama has called nuclear terrorism 'the greatest danger we face'. Nuclear terror is one of the lethal risks. Using nuclear weapons or materials from terrorist groups is a fatal catastrophe to a targeting state though there is no accident similar like that. South

  13. Optimal Physical Protection against Nuclear Terrorism

    International Nuclear Information System (INIS)

    Lee, Doyoung; Kim, ChangLak

    2014-01-01

    There is no attempt with nuclear weapons to attack any places for terror or military victory since the atomic bombs dropped in Hiroshima and Nagasaki. People have obviously experienced horrible destructive power of nuclear weapons and continuously remembered a terrible tragedy, lots of organizations and experts express their concerns about the nuclear terrorism and try to interchange opinions for prevention of deadly weapons. The purpose of this paper is to provide the information of nuclear terrorism and what the potential risk of Republic of Korea is and how to do the efficient physical protection. Terror is from the old French terreur, which is derived from Latin verb terror meaning 'great fear'. This is a policy to suppress political opponents through using violence and repression. Many scholars have been proposed, there is no consensus definition of the term 'terrorism.' In 1988, a proposed academic consensus definition: 'Terrorism is an anxiety-inspiring method of repeated violent action, employed by (semi-) clandestine individual, group or state actors, for idiosyncratic, criminal or political reasons, whereby - in contrast to assassination - the direct targets of violence are not the main targets. The immediate human victims of violence are generally chosen randomly (targets of opportunity) or selectively (representative or symbolic targets) from a target population, and serve as message generators. These attacks showed that particular terrorists groups sought to cause heavy casualties and extreme terrorists were spontaneously prepared to make sacrifices for completion of that ultimate goal. Creation of nuclear weapons was like opening Pandora's box. Barack Obama has called nuclear terrorism 'the greatest danger we face'. Nuclear terror is one of the lethal risks. Using nuclear weapons or materials from terrorist groups is a fatal catastrophe to a targeting state though there is no accident similar like that. South

  14. Classifying Classifications

    DEFF Research Database (Denmark)

    Debus, Michael S.

    2017-01-01

    This paper critically analyzes seventeen game classifications. The classifications were chosen on the basis of diversity, ranging from pre-digital classification (e.g. Murray 1952), over game studies classifications (e.g. Elverdam & Aarseth 2007) to classifications of drinking games (e.g. LaBrie et...... al. 2013). The analysis aims at three goals: The classifications’ internal consistency, the abstraction of classification criteria and the identification of differences in classification across fields and/or time. Especially the abstraction of classification criteria can be used in future endeavors...... into the topic of game classifications....

  15. Terrorism: a public health threat with a trauma system response.

    Science.gov (United States)

    Jacobs, Lenworth M; Burns, Karyl J; Gross, Ronald I

    2003-12-01

    The threat of mass casualties and widespread infectious disease caused by terrorism is now a challenge for our government and public health system. Funds have been granted to the states by the Centers for Disease Control and Prevention and the Health Resources and Services Administration to establish bioterrorism preparedness and response capabilities. Hartford Hospital has been designated as a Center of Excellence for Bioterrorism Preparedness by the Commissioner of the Connecticut Department of Public Health. The Center of Excellence has implemented strategies to prepare for a possible bioterrorist attack. A unique model that combines epidemiology and traumatology is being used to guide the preparedness activities. Although the focus of the grant from the Connecticut Department of Public Health is bioterrorism, the application of the model can apply to preparation for all terrorist events. Implementation of strategies indicates that bioterrorism preparedness is well underway. Similar initiatives should be achievable by other trauma systems throughout the country. A Center of Excellence for Bioterrorism Preparedness in Connecticut is successfully modifying a trauma system to meet the challenge of a new public health threat, terrorism.

  16. A false dichotomy? Mental illness and lone-actor terrorism.

    Science.gov (United States)

    Corner, Emily; Gill, Paul

    2015-02-01

    We test whether significant differences in mental illness exist in a matched sample of lone- and group-based terrorists. We then test whether there are distinct behavioral differences between lone-actor terrorists with and without mental illness. We then stratify our sample across a range of diagnoses and again test whether significant differences exist. We conduct a series of bivariate, multivariate, and multinomial statistical tests using a unique dataset of 119 lone-actor terrorists and a matched sample of group-based terrorists. The odds of a lone-actor terrorist having a mental illness is 13.49 times higher than the odds of a group actor having a mental illness. Lone actors who were mentally ill were 18.07 times more likely to have a spouse or partner who was involved in a wider movement than those without a history of mental illness. Those with a mental illness were more likely to have a proximate upcoming life change, more likely to have been a recent victim of prejudice, and experienced proximate and chronic stress. The results identify behaviors and traits that security agencies can utilize to monitor and prevent lone-actor terrorism events. The correlated behaviors provide an image of how risk can crystalize within the individual offender and that our understanding of lone-actor terrorism should be multivariate in nature.

  17. [Terrorism, public health and health services].

    Science.gov (United States)

    Arcos González, Pedro; Castro Delgado, Rafael; Cuartas Alvarez, Tatiana; Pérez-Berrocal Alonso, Jorge

    2009-01-01

    Today the terrorism is a problem of global distribution and increasing interest for the international public health. The terrorism related violence affects the public health and the health care services in an important way and in different scopes, among them, increase mortality, morbidity and disability, generates a context of fear and anxiety that makes the psychopathological diseases very frequent, seriously alters the operation of the health care services and produces important social, political and economic damages. These effects are, in addition, especially intense when the phenomenon takes place on a chronic way in a community. The objective of this paper is to examine the relation between terrorism and public health, focusing on its effects on public health and the health care services, as well as to examine the possible frames to face the terrorism as a public health concern, with special reference to the situation in Spain. To face this problem, both the public health systems and the health care services, would have to especially adapt their approaches and operational methods in six high-priority areas related to: (1) the coordination between the different health and non health emergency response agencies; (2) the reinforcement of the epidemiological surveillance systems; (3) the improvement of the capacities of the public health laboratories and response emergency care systems to specific types of terrorism as the chemical or biological terrorism; (3) the mental health services; (4) the planning and coordination of the emergency response of the health services; (5) the relations with the population and mass media and, finally; (6) a greater transparency in the diffusion of the information and a greater degree of analysis of the carried out health actions in the scope of the emergency response.

  18. Posttraumatic responses to the July 22, 2011 Oslo Terror among Norwegian high school students.

    Science.gov (United States)

    Nordanger, Dag Ø; Hysing, Mari; Posserud, Maj-Britt; Lundervold, Astri Johansen; Jakobsen, Reidar; Olff, Miranda; Stormark, Kjell Morten

    2013-12-01

    The July 22, 2011, Oslo Terror was defined as a national disaster. Former studies on terror attacks and mass shootings have shown elevated levels of posttraumatic complaints both in direct victims and in general populations. Little is known about how such extreme events in a generally safe society such as Norway would affect an adolescent population. This study examines posttraumatic stress reactions and changes in worldview in relationship to risk factors among 10,220 high school students using data from the ung@hordaland survey. One out of 5 respondents knew someone directly exposed, 55.7% experienced the events to some extent as threatening to their own or their close ones' lives, and 79.9% reported their worldview to be changed. For posttraumatic stress disorder (PTSD) DSM IV criteria, 0.8% reported substantial symptoms of reexperiencing (Criterion B), 4.9% of avoidance (Criterion C), and 1.1% of hyperarousal (Criterion D). Greater personal proximity to the events, higher levels of perceived life threat, and being a female or an immigrant predicted higher levels of PTSD symptom distress. Results indicate that the terror events made a deep impression on Norwegian adolescents, but without causing markedly elevated levels of PTSD symptomatology in the general young population. Copyright © 2013 International Society for Traumatic Stress Studies.

  19. Oil terrorism-militancy link: Mediating role of moral disengagement in emergency and crisis management.

    Science.gov (United States)

    Mafimisebi, Oluwasoye Patrick; Thorne, Sara

    2015-01-01

    The controversial issues of terrorism and militancy have generated contemporary interests and different interpretations have emerged on how to combat and manage these dangerous events. This study widens understanding of moral disengagement mechanism application in the perpetuation of inhumanities within the context of oil terrorist and militant behaviors. The research findings and model are explicit on how people form moral evaluations of agents who are forced to make morally relevant decisions over times in context of crisis situations. Quite crucially, understanding the context of terrorism and militancy provides policymakers, emergency and crisis managers better analysis and response to such events. The research fundamental purpose was to investigate the mediating role of moral disengagement on delinquency of oil terrorism and militancy; and considered implications for emergency and crisis management practices. The study found that situational-induced crises such as oil terrorism and militancy were sufficient to account for an individual's misdeeds and unethical or inhumane decisions made under frustration and agitation may be perceived as less indicative of one's fundamental character. Findings suggest that more repugnant delinquencies could have been committed in the name of justice than in the name of injustice, avenues for future research. In context, the result of the moral disengagement scale shows that morality of delinquency (oil terrorism and militancy) is accomplished by cognitively redefining the morality of such acts. The main finding is that people in resistance movements are rational actors making rational choices. The authors argue that theorists, policymakers, and practitioners must give meaningful attention to understanding the multidimensional nature of emergency, crisis and disaster management for better strength of synthesis between theory and practice. The research is concluded by thorough examination of the implication and limitations for

  20. State health policy for terrorism preparedness.

    Science.gov (United States)

    Ziskin, Leah Z; Harris, Drew A

    2007-09-01

    State health policy for terrorism preparedness began before the terrorist attacks on September 11, 2001, but was accelerated after that day. In a crisis atmosphere after September 11, the states found their policies changing rapidly, greatly influenced by federal policies and federal dollars. In the 5 years since September 11, these state health policies have been refined. This refinement has included a restatement of the goals and objectives of state programs, the modernization of emergency powers statutes, the education and training of the public health workforce, and a preparation of the health care system to better care for victims of disasters, including acts of terrorism.

  1. Television Journalism During Terror Attacks

    DEFF Research Database (Denmark)

    Mogensen, Kirsten

    hours after the events on September 11, 2001, and on semi-structured personal interviews with 37 journalists who covered the events for ABC, CBS, NBC, CNN, MSNBC and FOX News. In accordance with legal and moral philosopher Alf Ross, each of the norms was expressed as a directive in the interviews...

  2. Television journalism during terror attacks

    DEFF Research Database (Denmark)

    Mogensen, Kirsten

    2008-01-01

    after the events on September 11, 2001, and on semi-structured personal interviews with 37 journalists who covered the events for ABC, NBC, CBS, CNN, MSNBC and FOX News. In accordance with legal and moral philosopher Alf Ross, each of the norms was expressed as a directive in the interviews and also...

  3. Childhood reactions to terrorism-induced trauma: a review of the past 10 years.

    Science.gov (United States)

    Fremont, Wanda P

    2004-04-01

    To summarize the literature about the clinical presentation and treatment interventions of childhood reactions to terrorism-induced trauma. The literature on children's responses to terrorist activities was reviewed. Over the past 10 years, more research has emerged on the subject of terrorism in children. Many of the effects of terrorism-induced trauma are similar to the effects of natural and man-made trauma. Children's responses include acute stress disorder, posttraumatic stress disorder, anxiety, depression, regressive behaviors, separation problems, sleep difficulties, and behavioral problems. However, several aspects of terrorist attacks result in unique stressors and reactions and pose specific challenges for treatment. The unpredictable, indefinite threat of terrorist events, the profound effect on adults and communities, and the effect of extensive terrorist-related media coverage exacerbates underlying anxieties and contributes to a continuous state of stress and anxiety. Intervention strategies include early community-based interventions, screening of children at risk, triage and referral, and trauma-loss-focused treatment programs. Advances have been made in the research of childhood reactions to terrorism-induced trauma. Further research is needed to identify children at risk and to determine the long-term impact on children's development. Although the preliminary results of interventions developed to help children are promising, outcome data have not been examined, and further research is needed to evaluate their effectiveness.

  4. The Role of Russia in the International Anti-terrorism Cooperation

    Directory of Open Access Journals (Sweden)

    Айказ Акопович Уранян

    2016-12-01

    Full Text Available This article examines the role of Russia in the international anti-terrorism cooperation. The author analyzes Russian anti-terrorist activities since the war in Chechnya in 1990s till nowadays. The article notes that the state performs regularly with useful profile initiatives on the world arena and operates within the framework of the international law in the decision making process and during the operations. Particular attention is paid to the events that occurred in 2015, when Russia began a struggle against terrorism in Syria, becoming the only state that carries out anti-terrorist actions according to the official handling of the legitimate president of Syria: the author evaluates the data of events and makes forecast on the development of the situation in the foreseeable future.

  5. Confronting the risks of terrorism: making the right decisions

    International Nuclear Information System (INIS)

    John Garrick, B.; Hall, James E.; Kilger, Max; McDonald, John C.; O'Toole, Tara; Probst, Peter S.; Rindskopf Parker, Elizabeth; Rosenthal, Robert; Trivelpiece, Alvin W.; Van Arsdale, Lee A.; Zebroski, Edwin L.

    2004-01-01

    This report offers a methodology for assessing, quantitatively, the risks of terrorism. The purpose of the methodology is to support effective decision making to combat terrorism. The emphasis is on terrorist attacks that could have catastrophic consequences. The perspective taken is that in order to make the right decisions about combating terrorism, their needs to be a systematic means of assessing the likelihood of such attacks. A process of implementation of the decisions resulting from risk assessment is essential. That process includes (1) an understanding of the nature of the threat, (2) an information system linked directly to 'intelligence' on terrorism, and (3) organizational structures that can take timely, coordinated, and effective actions. There must also be sound evidence that the methodology can be successfully applied. A description of the nature of terrorism, a terrorism risk assessment methodology, information requirements to fight terrorism, and recommendations for successful implementation is what this report is about

  6. The Changing Nonlinear Relationship between Income and Terrorism

    Science.gov (United States)

    Enders, Walter; Hoover, Gary A.

    2014-01-01

    This article reinvestigates the relationship between real per capita gross domestic product (GDP) and terrorism. We devise a terrorism Lorenz curve to show that domestic and transnational terrorist attacks are each more concentrated in middle-income countries, thereby suggesting a nonlinear income–terrorism relationship. Moreover, this point of concentration shifted to lower income countries after the rising influence of the religious fundamentalist and nationalist/separatist terrorists in the early 1990s. For transnational terrorist attacks, this shift characterized not only the attack venue but also the perpetrators’ nationality. The article then uses nonlinear smooth transition regressions to establish the relationship between real per capita GDP and terrorism for eight alternative terrorism samples, accounting for venue, perpetrators’ nationality, terrorism type, and the period. Our nonlinear estimates are shown to be favored over estimates using linear or quadratic income determinants of terrorism. These nonlinear estimates are robust to additional controls. PMID:28579636

  7. Entering the Black Hole: The Taliban, Terrorism, and Organised Crime

    Directory of Open Access Journals (Sweden)

    Matthew D. Phillips

    2014-09-01

    Full Text Available 'Cooperation and imitation among crime and terror groups in recent years has given rise to a crime-terror nexus. A linear conceptualisation of a crime-terror spectrum, suggests that complete convergence of crime and terror in a failed state can give rise to a ‘black hole.’ Theoretical models of the crime-terror nexus, however, do not specify the means by which a crime-terror group enters this black hole state, yet others do not. Using the Taliban movement as a case study, this article presents a theoretical extension of black hole theory, using organisation-level characteristics to merge black hole theory with the crime-terror continuum.'

  8. The Dilution of Terrorism - Internship report at the International Center for Terrorism Studies

    OpenAIRE

    Bærentzen, Marc Theis

    2012-01-01

    The focus of this report will be how theory and methodology is a necessary mean for an academic understanding of terrorism, using different theories and examples to substantiate my argument. Terrorism has become a diluted concept that is used in a variety of ways to define violence against civilians. But is this enough to claim that we are dealing with a terrorist threat? In academic work these kind of reflections are important to the drawn conclusion. The problematic issue of an absent metho...

  9. 9/11 and the War on Terror in Curricula and in State Standards Documents. CIRCLE Fact Sheet

    Science.gov (United States)

    Stoddard, Jeremy; Hess, Diana

    2011-01-01

    This Fact Sheet reports findings from an ongoing study of the representation of 9/11 and terrorism in curricula, textbooks, and state standards documents. The study was conducted in three stages. The first two stages focused on how supplemental curricula and best-selling social studies textbooks published between 2002-2010 present the events of…

  10. Historical Roots of Terrorism and Challenges to Turkey’s Territorial Sovereignty

    Science.gov (United States)

    2014-09-01

    Roth, et al., ―The Kurdish Workers Party (PKK) as Criminal Syndicate : Funding Terrorism through Organized Crime, A Case Study,‖ Studies in Conflict...extracting it from the surrounding historical events. In 1998, Turkish columnist Zulfu Livaneli posited: ―Even in the worst days of the war, [Atatürk] did...efficacy of repressing the Kurdish identity. For example, as the tide was beginning to turn in 1995, a columnist for the Turkish daily newspaper

  11. Counter-terrorism and the protection of civilians: Armed non-state actors

    OpenAIRE

    Munive, Jairo; Somer, Jonathan

    2015-01-01

    Recent events in the Middle East present the latest and undoubtedly not the last challenge to international engagement with armed non-state actors. Over the last many years international humanitarian law has increasingly regulated the behaviour of armed non-state actors with regard to the protection of civilians. At the same time, counter-terror measures have increasingly addressed such conduct, as well as controlled the extent to which other actors may interact with armed non-state actors. Y...

  12. On complex adaptive systems and terrorism

    International Nuclear Information System (INIS)

    Ahmed, E.; Elgazzar, A.S.; Hegazi, A.S.

    2005-01-01

    Complex adaptive systems (CAS) are ubiquitous in nature. They are basic in social sciences. An overview of CAS is given with emphasize on the occurrence of bad side effects to seemingly 'wise' decisions. Hence application to terrorism is given. Some conclusions on how to deal with this phenomena are proposed

  13. IAEA Nuclear Security Programme Combating Nuclear Terrorism

    International Nuclear Information System (INIS)

    2010-01-01

    IAEA Plans of activities include, General Conference in September 2001 which reviewed activities relevant to preventing nuclear terrorism and proposed master plan. The Board of Governors approved new Nuclear Security Plan for the next four years. Three activity areas are; - needs assessment, analysis and coordination, prevention and detection and response.

  14. Probabilistic risk analysis and terrorism risk.

    Science.gov (United States)

    Ezell, Barry Charles; Bennett, Steven P; von Winterfeldt, Detlof; Sokolowski, John; Collins, Andrew J

    2010-04-01

    Since the terrorist attacks of September 11, 2001, and the subsequent establishment of the U.S. Department of Homeland Security (DHS), considerable efforts have been made to estimate the risks of terrorism and the cost effectiveness of security policies to reduce these risks. DHS, industry, and the academic risk analysis communities have all invested heavily in the development of tools and approaches that can assist decisionmakers in effectively allocating limited resources across the vast array of potential investments that could mitigate risks from terrorism and other threats to the homeland. Decisionmakers demand models, analyses, and decision support that are useful for this task and based on the state of the art. Since terrorism risk analysis is new, no single method is likely to meet this challenge. In this article we explore a number of existing and potential approaches for terrorism risk analysis, focusing particularly on recent discussions regarding the applicability of probabilistic and decision analytic approaches to bioterrorism risks and the Bioterrorism Risk Assessment methodology used by the DHS and criticized by the National Academies and others.

  15. Cyber terrorism prevention and counteraction workshop review

    NARCIS (Netherlands)

    Pastukhov, O.M.

    2011-01-01

    A NATO Advanced Training Course (ATC ) on Cyber Terrorism Prevention and Counteraction workshop, held in Kiev on September 27-29, 2010, allowed the participants to share their experiences with experts from Ukraine, a Partnership for Peace country. The participants exchanged their ideas on the ways

  16. News Framing in a Time of Terror

    DEFF Research Database (Denmark)

    Jørndrup, Hanne

    2016-01-01

    the attacks at the Charlie Hebdo office in Paris in January 2015. This article analyses how the Danish television channel DR1 framed the attacks in the newscast from the first shot at Krudttønden and for the following week. Furthermore, the analysis will discuss how the framing of the shooting as a “terror...

  17. The Nature Terrorism Reports on Social Networks

    Directory of Open Access Journals (Sweden)

    James Okolie-Osemene

    2015-12-01

    Full Text Available As new tools of communication, an in-depth study of social networking in the era of global terrorism is attempted in this article. This emerging tradition of information sharing is driven by social media technology which has greatly revolutionalised communication in all sectors. The article explored the information sharing relevance of new technologies in the age of terrorism and counterterrorism. It focused on how social networks are increasingly utilised by different groups. In terms of methodology, the study extracted and utilised positive, negative and neutral posts, updates, tweets and reports on social networks through different individual and organisational media accounts and blogs, and analysed the data qualitatively. Findings show that despite being used by extremist groups in promoting their political agenda, social networks are also useful in promoting positive perceptions that society has about Muslims in the era of terrorism, emphasising that Muslims are not terrorists. Through the instrumentality of social media, users are able to map the trends of terrorism and responses from stakeholders in government and security sector in curbing the menace. Given their capacity to reach a wider audience, breaking cultural and religious barriers, social networks serve as early warning signs and make it possible for people to share new ideas on possible ways of curbing the proliferation of terrorist organisations.

  18. EU’s Role in Fighting Terrorism

    Directory of Open Access Journals (Sweden)

    Jana Maftei

    2009-06-01

    Full Text Available International terrorism, a phenomenon with constant development, is today acertainty and has dramatically marked the beginning of this century and millennium. Thisproblem has reached a global dimension and it represents a concern to the entire internationalcommunity. Over the time, numerous international and regional regulations have been framed, inorder to prevent and combat terrorism. The European Union condemns terrorist acts andrecognizes the central role of the United Nations, in fighting against terrorism and promotingsecurity, as well as the contribution of the new NATO in what concerns the defense and securitypromotion. Europe has to act more firmly in order to consolidate the defense against terrorismand the European Union’s borders. At the same time, the European Union considers that only aconcerted and firm action from all the states and the major actors on the international scenewould lead to the identification of the solutions which can contribute to the efficient fight againstterrorism and, by these means, provide for the international peace and security. The proportion ofthe danger terrorism represents has turned the fight against this phenomenon in an internationalcommunity’s desideratum.

  19. Teaching about Terrorism: Lessons Learned at SWOTT

    Science.gov (United States)

    Miller, Gregory D.

    2009-01-01

    This article discusses some of the challenges and lessons for teaching undergraduate-level courses related to terrorism. The author outlines some of the primary issues that instructors can expect to face, and provides strategies for dealing with several of these challenges. The goal is to relay useful information to those teaching, or planning to…

  20. Delineating Concept Meanings: The Case of Terrorism.

    Science.gov (United States)

    Kleg, Milton; Mahlios, Marc

    1990-01-01

    Presents a teacher-initiated model for reaching class consensus on the meaning of confusing or interchangeable concepts in social studies classrooms. Illustrates the model by delineating terrorism. Shows procedural steps that involve students in self and small group interviews where definitions are clarified until consensus is reached. Suggests…

  1. Indicators of Terrorism Vulnerability in Africa

    Science.gov (United States)

    2015-03-26

    security. The relation, if any, to terrorism is explored. The data comes from the World Bank database. Gender Equality. How a country treats women and the...55 Gender Equality...method to evaluate poverty is based upon income inequality . This ap- proach is based upon the belief that poverty is relative, individuals only feel

  2. Nazi terror system and its practical use

    Directory of Open Access Journals (Sweden)

    Anvar M. Mamadaliev

    2011-02-01

    Full Text Available The article tells about reasons and consequences of Adolf Hitler’s terror. Special attention is attached to mechanism of Nazi dictatorship and its ideological bases, set in Hitler’s work ‘My Struggle’, the 25 Point Program.

  3. Political Ideology and Psychological Symptoms Following Terror

    Science.gov (United States)

    Laufer, Avital; Solomon, Zahava

    2010-01-01

    The article examines the associations between political ideology and level of psychological symptoms in youth exposed to terror attacks. The study included 2,999 7th to 10th graders from various parts of Israel. Political ideology was examined in two ways: (a) as a content dimension: "political stand"--holding right, centrist, or left…

  4. Updates in the War against Terrorism.

    Science.gov (United States)

    Strickland, Lee S.

    2002-01-01

    Provides an update of new court cases related to Part IV of the series on Information and the War Against Terrorism. Discusses civil liberties versus security involving the legality of mandatory commercial use of biometrics as identification; and communication of privileged information between a person and his or her attorney. (LRW)

  5. Association between Terror Attacks and Suicide Attempts

    Science.gov (United States)

    Weizman, Tal; Yagil, Yaron; Schreiber, Shaul

    2009-01-01

    Based on Durkheim's "Control theory," we explored the association between frequency of terror attacks in Israel and the frequency of suicide attempts admitted to the Emergency Room of a major general hospital in Tel-Aviv (1999-2004). Analysis of the six-year study period as a whole revealed no significant correlation between the…

  6. European nuclear safeguards and terrorism: a personal perspective

    International Nuclear Information System (INIS)

    Jacchia, E.

    1987-01-01

    This analysis is divided into two parts that, in the authors view, deal with two fundamentally different types of terrorism: national and state sponsored. The information is drawn from his experience and recollections of data and events. In terms of potential access to nuclear and chemical materials, the most dangerous possibility is the state-sponsored terrorist group, and it poses a difficult situation. The sponsor state may or may not be a member of the NPT and may or may not have accepted IAEA safeguards. Even if it had accepted them, given the technical and political limitations on the agency's activities, it is almost impossible for the IAEA to guarantee that illegal transfers do not occur

  7. Investigation of incidents of terrorism involving commercial aircraft.

    Science.gov (United States)

    Clark, M A; Wagner, G N; Wright, D G; Ruehle, C J; McDonnell, E W

    1989-07-01

    Deaths resulting from terrorism involving aircraft have occurred incident to hijackings as well as bombings. Passengers or groups of passengers have been chosen by terrorists as the recipients of violence based on citizenship, religion, and political beliefs. They have usually been segregated from other passengers and subsequently mistreated and/or murdered. Thorough documentation of the injuries of victims is essential to the investigation of such atrocities; a medicolegal autopsy correlated with a scene investigation is of paramount importance. Aircraft bombings can create extremely sensitive political situations and public demands for quick resolution. The autopsy of victims in such circumstances, if properly conducted, can yield invaluable trace evidence leading to the identification of the explosive device. The examination of any surviving victims as well as the aircraft is also critical in reconstructing the event. Deaths occurring as the result of in-flight aircraft bombings can produce injuries by five different mechanisms, viz. blast, shrapnel, decompression, impact with the aircraft, and ground impact.

  8. Nuclear terrorism and legal protection of environment

    International Nuclear Information System (INIS)

    Ahmad-zada, Z.; Aliev, D.

    2003-01-01

    Full text: For the last years the terrorism has significantly changed. If 20-30 years ago terrorists would kidnap famous politicians or hijack planes, but at this stage they switched to massive destruction of innocent people. Now the problem of struggle against nuclear terrorism becomes very actual problem. The nuclear terrorism is meant as an opportunity of accomplishment of act of terrorism with use of the nuclear weapon, or accomplishment of explosions on atomic power stations and other objects of an atomic energy. Threats to nuclear objects become more and more often and appreciable. In the world there were some similar cases of threat to nuclear objects from the part of terrorists, and also cases of use by terrorists of nuclear, chemical and bacteriological substances. These cases testify to real threat of use by terrorists of the weapon of mass destruction. It is natural, that accomplishment of acts of terrorism on these objects can lead to ecological catastrophe and can put an irreparable loss to an environment and process of social development. Up to the middle of sixtieth years of twentieth century protection of an environment was not put forward as an independent political problem, and its scientific substantiation has not been developed enough as a diversified, complex, global problem. Only dynamical development in seventieth - eightieth years of scientific bases of global problems has allowed to allocate the rules of law concerning to protection of an environment, into special group. International legal protection of ecology was precisely allocated now in system of the general international law as independent, specific sphere of regulation. The principle of inadmissibility of radioactive pollution of environment covers both military, and peace area of use of nuclear power. Formation and the statement of this special principle of International law of the Environment takes place in two ways - contractual and usual, with observance by the states of

  9. Relative Risk Appraisal, the September 11 Attacks, and Terrorism-Related Fears

    Science.gov (United States)

    Marshall, Randall D.; Bryant, Richard A.; Amsel, Lawrence; Suh, Eun Jung; Cook, Joan M.; Neria, Yuval

    2013-01-01

    There are now replicated findings that posttraumatic stress disorder (PTSD) symptoms related to the September 11, 2001, attacks occurred in large numbers of persons who did not fit the traditional definition of exposure to a traumatic event. These data are not explained by traditional epidemiologic “bull’s eye” disaster models, which assume the psychological effects are narrowly, geographically circumscribed, or by existing models of PTSD onset. In this article, the authors develop a researchable model to explain these and other terrorism-related phenomena by synthesizing research and concepts from the cognitive science, risk appraisal, traumatic stress, and anxiety disorders literatures. They propose the new term relative risk appraisal to capture the psychological function that is the missing link between the event and subjective response in these and other terrorism-related studies to date. Relative risk appraisal highlights the core notion from cognitive science that human perception is an active, multidimensional process, such that for unpredictable societal threats, proximity to the event is only one of several factors that influence behavioral responses. Addressing distortions in relative risk appraisal effectively could reduce individual and societal vulnerability to a wide range of adverse economic and ethnopolitical consequences to terrorist attacks. The authors present ways in which these concepts and related techniques can be helpful in treating persons with September 11– or terrorism-related distress or psychopathology. PMID:17516775

  10. The Cost of Biological Terrorism.

    Science.gov (United States)

    Coffey

    1997-01-01

    Most Americans are or will be facing a threat more real than crimes or terrorism-it is the threat of cancer. Indeed, one-fourth of all Americans alive today will ultimately die from cancer. Yet the level of funding for cancer research in 1998 and beyond remains in doubt. The Senate Appropriations Committee has proposed a higher funding figure than the House and the difference will be resolved in negotiations this September. President Clinton has recommended a meager 2.5% increase in spending on cancer. This sum is simply not enough. Although Americans may fool themselves into thinking the government has been at war against cancer, the current funding ceiling for the National Institutes of Health (NIH) budget demonstrates that this so-called offensive is little more than a skirmish. Careful scrutiny of this budget reveals that every time a citizen pays ten dollars in taxes, only one penny goes to cancer research. What the government is spending in cancer research would not buy or maintain two stealth bombers-hardly evidence of a major military strike. For those of us fighting the deadly scourge of cancer, the 1,550 Americans killed each day by this disease are painful and enduring casualties. Imagine five fully loaded jumbo jets crashing with no survivors on the same day. These headlines would generate fast and effective calls for funding for improved safety regulations, and yet cancer takes this number of lives daily-and in one year more lives than all the U.S. combat fatalities in this century. And yet there is a virtual silence as Congress meets to determine the level of monies to direct to cancer research efforts which might halt this carnage. In the past, medical research stopped the horrors of pain associated with amputations and operations conducted without anesthesia, and research stopped the epidemic of polio and the massive deaths from typhoid fever. Soon research will stop the deaths from AIDS. Will cancer be prevented or cured within your lifetime? It

  11. 75 FR 18850 - National Protection and Programs Directorate; Chemical Facility Anti-Terrorism Standards...

    Science.gov (United States)

    2010-04-13

    ... Directorate; Chemical Facility Anti-Terrorism Standards Personnel Surety Program AGENCY: National Protection...-terrorism Vulnerability Information (CVI), Sensitive Security Information (SSI), or Protected Critical... . SUPPLEMENTARY INFORMATION: Program Description The Chemical Facility Anti-Terrorism Standards (CFATS), 6 CFR...

  12. 75 FR 30106 - Terrorism Risk Insurance Program; Recordkeeping Requirements for Insurers Compensated Under the...

    Science.gov (United States)

    2010-05-28

    ... DEPARTMENT OF THE TREASURY Terrorism Risk Insurance Program; Recordkeeping Requirements for... Budget. The Terrorism Risk Insurance Program Office within the Department of the Treasury is soliciting... original and two copies) to: Terrorism Risk Insurance Program, Public Comment Record, Suite 2100...

  13. Legislating for Terrorism: The Philippines’ Human Security Act 2007

    Directory of Open Access Journals (Sweden)

    Pauline E. Eadie

    2011-11-01

    Full Text Available In February 2007 the Philippine Senate passed the Human Security Act (HSA otherwise known as Republic Act No. 9372: An Act to Secure the State and Protect our People From Terrorism. Philippine Senate Minority Leader Aquilino Q. Pimentel Jr. was heavily involved in the final drafting of the HSA. He gave it its final name shortly before the Senate Chamber passed it into law. Previously the Act had been known by various titles including ‘An Act to Deter and Punish Acts of Terrorism and for Other Purposes’ (Senate Bill No. 2137 and ‘An Act to Define and Punish the Crime of Terrorism, the Crime of Conspiracy to Commit Terrorism, and the Crime of Proposal to Commit Terrorism, and for Other Purposes (Senate Bill No. 2187. Thus the Human Security Act exists as an instrument of counter terrorism as opposed to human security policy.

  14. Terrorism as Genocide: Killing with “Intent”

    Directory of Open Access Journals (Sweden)

    Ashlie Perry

    2012-07-01

    Full Text Available It is plausible that terrorism can manifest itself as a form of genocide. Using Raphael Lemkin’s definition of genocide and the UN Genocide Convention’s definition of genocide, non-state and state terrorism are assessed as a form of genocide. Commonalities found in the definitions of both genocide and terrorism supports the argument. The psychology of terrorism and Lemkin’s psychology of genocide describe similar motivations of perpetrators. The September 11th attacks and the U.S. invasion of Iraq are used as case studies to illustrate that terrorism can result in genocide or genocidal acts. Framing acts of terrorism as genocide allows for prosecution in international courts and brings a new perspective to the concept of killing with intent.

  15. A Fear Management Approach to Counter-Terrorism

    Directory of Open Access Journals (Sweden)

    Tinka Veldhuis

    2012-02-01

    Full Text Available Spreading fear is the essence of terrorism. Terrorists exploit fear by terrorising the target audience into concessions. Understanding how feelings of fear influence the way people feel, think and act is therefore an important starting point to explore how individuals and societies can learn how to cope with fear of terrorism. In this Policy Brief, Research Fellows Prof. Dr. Edwin Bakker and Dr. Tinka Veldhuis explore the dynamics of fear in response to terrorism, and emphasise the importance of integrating initiatives to manage fear of terrorism and reduce its negative consequences into overarching counter-terrorism strategies. It argues that societies can benefit greatly from promoting resilience and a fear management approach to counter-terrorism.

  16. Terrorism Research Centres: 100 Institutes, Programs and Organisations in the Field of Terrorism, Counter-Terrorism, Radicalisation and Asymmetric Warfare Studies

    Directory of Open Access Journals (Sweden)

    Benjamin Freedman

    2010-12-01

    Full Text Available Who is doing research – academic and otherwise – on terrorism? The field of terrorism research is broad and ever-expanding. Governments sponsor intelligence-driven analytical research agencies. Commercial intelligence firms like Jane’s, sell their research to corporate and governmental clients. There are think tanks likeRAND, which work closely with government agencies. An increasing number of universities house terrorism research centres, the oldest one being the Centre for the Study of Terrorism and Political Violence at the University of St. Andrews. Then there are virtual networks, such as the Terrorism Research Initiative (TRI, that try to create synergies between a wide array of researchers and topics.

  17. Medical mitigation model: quantifying the benefits of the public health response to a chemical terrorism attack.

    Science.gov (United States)

    Good, Kevin; Winkel, David; VonNiederhausern, Michael; Hawkins, Brian; Cox, Jessica; Gooding, Rachel; Whitmire, Mark

    2013-06-01

    The Chemical Terrorism Risk Assessment (CTRA) and Chemical Infrastructure Risk Assessment (CIRA) are programs that estimate the risk of chemical terrorism attacks to help inform and improve the US defense posture against such events. One aspect of these programs is the development and advancement of a Medical Mitigation Model-a mathematical model that simulates the medical response to a chemical terrorism attack and estimates the resulting number of saved or benefited victims. At the foundation of the CTRA/CIRA Medical Mitigation Model is the concept of stock-and-flow modeling; "stocks" are states that individuals progress through during the event, while "flows" permit and govern movement from one stock to another. Using this approach, the model is able to simulate and track individual victims as they progress from exposure to an end state. Some of the considerations in the model include chemical used, type of attack, route and severity of exposure, response-related delays, detailed treatment regimens with efficacy defined as a function of time, medical system capacity, the influx of worried well individuals, and medical countermeasure availability. As will be demonstrated, the output of the CTRA/CIRA Medical Mitigation Model makes it possible to assess the effectiveness of the existing public health response system and develop and examine potential improvement strategies. Such a modeling and analysis capability can be used to inform first-responder actions/training, guide policy decisions, justify resource allocation, and direct knowledge-gap studies.

  18. A national survey of terrorism preparedness training among pediatric, family practice, and emergency medicine programs.

    Science.gov (United States)

    Martin, Shelly D; Bush, Anneke C; Lynch, Julia A

    2006-09-01

    Domestic terrorism is a real threat focusing on a need to engage in effective emergency preparedness planning and training. Front-line physicians are an important component of any emergency preparedness plan. Potential victims of an attack include children who have unique physiologic and psychological vulnerabilities in disasters. Front-line providers need to have adequate training to effectively participate in local planning initiatives and to recognize and treat casualties including children. The goal of the survey was to assess the current state of terrorism preparedness training, including child victims, by emergency medicine, family practice, and pediatric residency programs in the United States and to assess methods of training and barriers to establishing effective training. A survey was e-mailed to a comprehensive list of all US pediatric, family practice, and emergency medicine residency programs 3 times between September 2003 and January 2004. The survey measured the perceived risk of terrorist attack, level of training by type of attack, level of training regarding children, method of training, and barriers to training. Overall, 21% of programs responded (46 of 182 pediatric, 75 of 400 family practice, and 29 of 125 emergency medicine programs). Across all of the event types, emergency medicine programs were more likely to report adequate/comprehensive training. However, terrorism preparedness funding, these data suggest that we are failing to provide adequate training to front-line providers who may care for children in a catastrophic domestic terrorist event.

  19. 15 CFR 742.10 - Anti-terrorism: Sudan.

    Science.gov (United States)

    2010-01-01

    ... 15 Commerce and Foreign Trade 2 2010-01-01 2010-01-01 false Anti-terrorism: Sudan. 742.10 Section...-CCL BASED CONTROLS § 742.10 Anti-terrorism: Sudan. (a) License requirements. (1) If AT column 1 or AT... ECCN, a license is required for export to Sudan for anti-terrorism purposes. 1 AT column 1 refers to...

  20. On the origin of domestic and international terrorism

    OpenAIRE

    Kis-Katos, Krisztina; Liebert, Helge; Schulze, Günther G.

    2010-01-01

    We analyze the determinants of the origin of domestic and international terrorism in a large panel data set of 159 countries spanning from 1970 to 2007. We show that terror increases with GDP per capita, a higher POLITY score measuring a more open and competitive political system and experiences of domestic conflict, anarchy and regime transitions. Our evidence thus contradicts the notion that terrorism is rooted in economic deprivation or that strongly autocratic regimes breed more terrorist...

  1. Systems Approach to Terrorism: Countering the Terrorist Training Subsystem

    Science.gov (United States)

    2006-12-01

    37 Albert Bandura , “Mechanisms of Moral Disengagement” in Origins of Terrorism ed. Walter Reich, (Washington D.C.: Woodrow...52 Albert Bandura , “Mechanisms of Moral Disengagement” in Origins of Terrorism ed. Walter Reich (Washington D.C.: Woodrow Wilson Center...Hitler?” in Mass Hate: the Global Rise of Genocide and Terror (New York , London: Plennium Press), p.165 55 Albert Bandura p.45 56 Ibid. 32 As

  2. Mortise terrorism on the main pipelines

    Science.gov (United States)

    Komarov, V. A.; Nigrey, N. N.; Bronnikov, D. A.; Nigrey, A. A.

    2018-01-01

    The research aim of the work is to analyze the effectiveness of the methods of physical protection of main pipelines proposed in the article from the "mortise terrorism" A mathematical model has been developed that made it possible to predict the dynamics of "mortise terrorism" in the short term. An analysis of the effectiveness of physical protection methods proposed in the article to prevent unauthorized impacts on the objects under investigation is given. A variant of a video analytics system has been developed that allows detecting violators with recognition of the types of work they perform at a distance of 150 meters in conditions of complex natural backgrounds and precipitation. Probability of detection is 0.959.

  3. Psychological consequences caused by nuclear terrorism

    International Nuclear Information System (INIS)

    Peyankov, I.

    2009-01-01

    The psychological consequences caused by eventual nuclear terrorist act are believed to be some of the most: serious. in this article are presented the issues concerning psychological effects as psychological suffering, alteration of risk estimation, changes of individual and social behavior, etc. The most common psychological consequences as a result of the most popular large-scale nuclear accidents in Chernobyl, TMI (USA), Goiania (Brazil) are described. Some of the main factors, such as sex, age, health status, social status and etc, are analyzed. These factors determine the expression of psychological reactions provoked by nuclear accidents or eventual act of nuclear terrorism. In addition, the main precautions to cope with psychological consequences caused by nuclear terrorism are listed

  4. Children exposed to war/terrorism.

    Science.gov (United States)

    Shaw, Jon A

    2003-12-01

    This paper reviews the prevalence of psychological morbidities in children who have been exposed to war-related traumas or terrorism as well as the diversity of war-related casualties and their associated psychological responses. The psychological responses to war-related stressors are categorized as (1) little or no reaction, (2) acute emotional and behavioral effects, and (3) long-term effects. Specific categories of war-related casualties discussed include refugee status, traumatic bereavement, effects of parental absence, and child soldiers. Psychological responses associated with terrorism and bioterrorism are presented. Lastly, mediators of the psychological response to war-related stressors are discussed, to include exposure effects, gender effects, parental, family and social factors, and child-specific factors. Children exposed to war-related stressors experience a spectrum of psychological morbidities including posttraumatic stress symptomatology, mood disorders, externalizing and disruptive behaviors, and somatic symptoms determined by exposure dose effect. Specific questions for future research are identified.

  5. Investigating the Aftermath of Terror: Fundamental Outcomes, Methodological Choices, and Future Directions.

    Science.gov (United States)

    Gradus, Jaimie L; Marx, Brian P; Sloan, Denise M

    2016-06-01

    Acts of terrorism are becoming increasingly common throughout the world. These events represent a significant public health concern given the associated health consequences. Although it is clear that terrorist attacks have mental and physical health sequelae, the exact nature and prevalence of these consequences are unclear. Epidemiological research can play an important role in better understanding the mental and physical impact of terrorist attacks. In this editorial, we highlight recent epidemiological research on these terrorism-related health outcomes. We also provide suggestions for how future studies can build on the existing literature and describe ways in which epidemiological methods can be harnessed to extend the current literature. Lastly, we offer recommendations on how to best prepare communities for the aftermath of terrorist attacks, highlighting secondary intervention and prevention strategies. Overall, multilevel strategies are needed to adequately cope with the growing rise of terrorist acts, and these strategies will have to be reassessed as the nature of terrorist attacks changes.

  6. Deconstruction of Jihad Radicalism in Islamic Law: A Conceptual Proposal to Combat Isis Terrorism in Indonesia

    Directory of Open Access Journals (Sweden)

    Warkum Sumitro, SH, MH

    2015-02-01

    Full Text Available Islamic State of Iran and Syria (ISIS has become a global movement that penetrates into Indonesia. This movement leads back to the trauma of Indonesian nation to a series of destructive events of terrorism in the country. The meaning of jihad in Islam is hijacked by ISIS activists into violence and war against western infidels in their perspective. They do not care if their target is civilian or military. Meanwhile, the actual concept of jihad in Islam is essential jihad, namely jihad by striving earnestly to improve the quality of individual and community. A wrong interpretation of jihad can not only be solved by force because enforcement effort through violence leaves an endless conflict between terrorists and law enforcer. One conceptual proposal in combating terrorism in Indonesia is by deconstructing the perspective of the physical jihad into essential jihad.

  7. The impact of resource loss on Holocaust survivors facing war and terrorism in Israel

    Science.gov (United States)

    Dekel, R.; Hobfoll, S. E.

    2009-01-01

    We examined the distress level of 102 Holocaust survivors in Israel during a recent period of continuous exposure of the Israeli population to terror and the threat of missile attack. Based on the Conservation of Resources (COR) theory, we explored the contribution of losses suffered during the Holocaust and of current loss of resources due to terror attacks on their distress level. Twenty one percent of the sample had probable PTSD and high psychological distress levels in general. Current loss of psychosocial resources contributed significantly to survivors’ current PTSD symptomatology and general psychological distress, above the contribution of the previous Holocaust-related loss. Our findings support COR theory, which states that traumatic events are associated with ongoing and often rapid loss of resources. Resource loss, in turn, is associated with higher distress levels. Moreover, current loss of resources compounds the impact of earlier resource losses incurred during the Holocaust. PMID:17453549

  8. The psychological effects of cyber terrorism

    OpenAIRE

    Gross, Michael L.; Canetti, Daphna; Vashdi, Dana R.

    2016-01-01

    When ordinary citizens think of cyber threats, most are probably worried about their passwords and banking details, not a terrorist attack. The thought of a shooting in a mall or a bombing at an airport is probably more frightening than a cyber breach. Yet terrorists aim for mental as well as physical destruction, and our research has found that, depending on who the attackers and the victims are, the psychological effects of cyber threats can rival those of traditional terrorism.

  9. Reconceptualizing the Global War on Terror

    Science.gov (United States)

    2009-03-26

    when the label war is assigned, the population logically applies, either consciously or subconsciously , the fundamental assumptions of warfare in a...the Nation.” 26 42 Pace, National Military Strategic Plan for the War on Terrorism, 7. 43 Robert Gates, “A Balanced Strategy: Reprogramming the...Balanced Strategy: Reprogramming the Pentagon for a New Age.” 48 Clark A. Murdock et al., Beyond Goldwater-Nichols: Defense Reform for a New Strategic

  10. Terror? Tilkald pædagogikken!

    DEFF Research Database (Denmark)

    Holm, Claus

    2016-01-01

    Har vi at gøre med terror, radikalisering og voldelig ekstremisme, så tilkalder vi politiet. Men politiets metoder er ikke nok. Pædagogikken må i brug. Hvilken pædagogik? Diskontinuitetens pædagogik! Det er navnet på den type af pædagogik, der kan skabe modstandskraft mod radikalisering. Men har vi...

  11. The psychological effects of cyber terrorism

    Science.gov (United States)

    Gross, Michael L.; Canetti, Daphna; Vashdi, Dana R.

    2016-01-01

    When ordinary citizens think of cyber threats, most are probably worried about their passwords and banking details, not a terrorist attack. The thought of a shooting in a mall or a bombing at an airport is probably more frightening than a cyber breach. Yet terrorists aim for mental as well as physical destruction, and our research has found that, depending on who the attackers and the victims are, the psychological effects of cyber threats can rival those of traditional terrorism. PMID:28366962

  12. Prevent: A Fragmented Counter-Terrorism Strategy

    Science.gov (United States)

    2015-05-21

    ethnicity, religion, class, gender , language, accent, dress, political ideology or any combination of these factors may serve to delineate the sub...against another. Lack of parity in resourcing compounds the issue of a community that is securitize in nature. Complex adaptive systems theory... Parity in emphasis would not only garnish a greater level of community trust for all forms of terrorism, but it would deemphasize the need of the current

  13. Nurturer, Victim, Seductress: Gendered Roles in Terrorism

    Science.gov (United States)

    2018-04-20

    Becomes Her: The Changing Roles of Women’s Role in Terror." Georgetown Journal of International Affairs, Winter/Spring 2010: 91-98. ———. Dying to Kill...ORGANIZATION NAME(S) AND ADDRESS(ES) 8. PERFORMING ORGANIZATION . REPORT NUMBER Joint Forces Staff College Joint Advanced Warflghting School 7800 Hampton Blvd...STAFF COLLEGE JOINT ADVANCED WARFIGHTING SCHOOL Nurturer, Victim, Seductress: Gendered Roles in

  14. The psychological effects of cyber terrorism.

    Science.gov (United States)

    Gross, Michael L; Canetti, Daphna; Vashdi, Dana R

    2016-01-01

    When ordinary citizens think of cyber threats, most are probably worried about their passwords and banking details, not a terrorist attack. The thought of a shooting in a mall or a bombing at an airport is probably more frightening than a cyber breach. Yet terrorists aim for mental as well as physical destruction, and our research has found that, depending on who the attackers and the victims are, the psychological effects of cyber threats can rival those of traditional terrorism.

  15. Airpower versus Terrorism: Three Case Studies

    Science.gov (United States)

    2007-03-01

    Equipment includes 45 armoured personnel carriers (APC) one Lockheed Jetstar, two Mi-8s, two Mi-17s, and roughly 40,000 small arms. These include automatic...President George Bush is acting against terrorism. We will act the same way.”127 Sensing his ability to play the underdog , Arafat claimed early...tinians as the weak and downtrodden underdog . Thus, the image of the powerful IDF being used against poorly armed Palestinians is a powerful

  16. Universal patterns underlying ongoing wars and terrorism

    OpenAIRE

    Spagat, M; Johnson, N. F; Restrepo, J. A; Becerra, O; Bohórquez, J. C; Restrepo, E. M; Zarama, R

    2006-01-01

    we report a remarkable universality in the patterns of violence in three high profile ongoing wars, and in global terrorism. Our results suggest that these quite different conflict arenas currently feature a common type of enemy, i.e. the various insurgent forces are beginning to operate in a similar way regardles of their underlying idealogies, motivations and the terrain in which they operate. We provide a microscopic theory to explain our main observations. This theory treats the insurgent...

  17. The effect of terrorism on public confidence : an exploratory study.

    Energy Technology Data Exchange (ETDEWEB)

    Berry, M. S.; Baldwin, T. E.; Samsa, M. E.; Ramaprasad, A.; Decision and Information Sciences

    2008-10-31

    A primary goal of terrorism is to instill a sense of fear and vulnerability in a population and to erode confidence in government and law enforcement agencies to protect citizens against future attacks. In recognition of its importance, the Department of Homeland Security includes public confidence as one of the metrics it uses to assess the consequences of terrorist attacks. Hence, several factors--including a detailed understanding of the variations in public confidence among individuals, by type of terrorist event, and as a function of time--are critical to developing this metric. In this exploratory study, a questionnaire was designed, tested, and administered to small groups of individuals to measure public confidence in the ability of federal, state, and local governments and their public safety agencies to prevent acts of terrorism. Data were collected from the groups before and after they watched mock television news broadcasts portraying a smallpox attack, a series of suicide bomber attacks, a refinery bombing, and cyber intrusions on financial institutions that resulted in identity theft and financial losses. Our findings include the following: (a) the subjects can be classified into at least three distinct groups on the basis of their baseline outlook--optimistic, pessimistic, and unaffected; (b) the subjects make discriminations in their interpretations of an event on the basis of the nature of a terrorist attack, the time horizon, and its impact; (c) the recovery of confidence after a terrorist event has an incubation period and typically does not return to its initial level in the long-term; (d) the patterns of recovery of confidence differ between the optimists and the pessimists; and (e) individuals are able to associate a monetary value with a loss or gain in confidence, and the value associated with a loss is greater than the value associated with a gain. These findings illustrate the importance the public places in their confidence in government

  18. Estimation of Radiological Terrorism Risk by Administrative Districts

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Suk Hoon; Kim, Ju Youl [Seoul National Univ., Seoul (Korea, Republic of); Yoo, Ho Sik [Korea Institute of Nuclear Nonproliferation and Control, Daejeon (Korea, Republic of)

    2008-10-15

    Since the 9/11 attack in USA, the threat of terrorism across the world has dramatically increased. Accordingly, estimating terrorism risk has become an essential part of catastrophe risk strategies throughout the world. There are many forms of terrorism. Recently, the prospect of the radiological terrorist attack using the radioactive material is considered as one of the most serious threats. The aim of this paper is to assess the radiological terrorism risk by administrative districts based on the parameters that imply threat, vulnerability, and consequences of terrorist attacks.

  19. How to fight terrorism? Political and strategic aspects.

    Science.gov (United States)

    Vad, Erich

    2018-04-01

    "Fighting terrorism is like eating soup with a fork" (Shimon Peres). Peres's quote symbolically captures the key problem of countering terrorism. 9/11 proved to be a hallmark in the global perception of modern terrorism. The following questions form the framework of the present essay: What is the essence of modern terrorism? How did it develop during the past two decades? Who are the key players within the terror framework? What are the root causes for global terrorism? How are we to deal appropriately with the global phenomenon of terrorism? Are there any solutions (short-, medium-, long-term) to terrorism? If yes, where do we have to look for them? The underlying essay provides a strategic overview of antiterrorism policy that is based on the author's years-long experience as a high-level expert and advisor within the security policy framework. For this reason, citations are expressly not included. The key target audience comprises laypersons interested in the phenomenon of global terrorism and its social interplay.

  20. Estimation of Radiological Terrorism Risk by Administrative Districts

    International Nuclear Information System (INIS)

    Kim, Suk Hoon; Kim, Ju Youl; Yoo, Ho Sik

    2008-01-01

    Since the 9/11 attack in USA, the threat of terrorism across the world has dramatically increased. Accordingly, estimating terrorism risk has become an essential part of catastrophe risk strategies throughout the world. There are many forms of terrorism. Recently, the prospect of the radiological terrorist attack using the radioactive material is considered as one of the most serious threats. The aim of this paper is to assess the radiological terrorism risk by administrative districts based on the parameters that imply threat, vulnerability, and consequences of terrorist attacks

  1. Future Roles of Air and Space Power in Combatting Terrorism

    National Research Council Canada - National Science Library

    McAlpine, Mark

    1997-01-01

    .... The political, economic, and informational instruments of power play primary roles in addressing and eliminating the root causes behind terrorism attacks, but the military instrument will prevent...

  2. The chemical and biological weapon terrorism by the Aum Shnirikyo

    International Nuclear Information System (INIS)

    Furukawa, K.

    2009-01-01

    The Aum Shinrikyo, an obscure cult religious group, attacked the Tokyo subways employing sarin gas in March 1995, which was viewed as a mark of a new era in terrorism. The Aum Shinrikyo remains the one empirical example of a religiously motivated cult with an affluent amount of financial and human resources and motivations to use unconventional weapons. The Aum Shinrikyo's leaders included the scientific elite of a young generation as well as former Yakuza members who had close ties with organized crime networks. Aum succeeded in establishing an extensive network to procure weapons, material, and drug, primarily in Russia but also other countries including the United States and even North Korea. Despite the fact that the law enforcement authority had already obtained various pieces of information that reasonably indicated that Aum was producing sarin by late 1994, the law enforcement authority became too cautious to advance its investigation to arrest Aum members until it was too late. Japan's experience with the Aum Shinrikyo's threats provides valuable insights for democratic governments seeking to thwart the deadly plans of religiously motivated non-state actors. It reveals the tremendous difficulties for a democratic society to confront the terrorists who were willing to pursue their deadly 'divine' objectives, especially when the society had no experience to encounter such a threat. This presentation will explain the chemical and biological weapon programs of the Aum Shinrikyo, especially focusing on the following elements: Intention and capability of the Aum Shinrikyo; Weapon systems and mode of attacks, including their target selections; The lessons learned from this case for the prevention and crisis/consequence management n the event of CBW terrorism. The views expressed here are those of the author and do not represent those of the Research Institute for Science and Technology for Society or its research sponsors.(author)

  3. Body and Terror: Women’s Bodies as Victims and Perpetrators of Terror

    Directory of Open Access Journals (Sweden)

    Parvin Sultana

    2014-07-01

    Full Text Available Bodies are vulnerable because they are intrinsically linked to death. Bodies are social and they are embedded with meaning. They cannot be extracted from their specific contexts. The nation is also often equated with body politic. As a result individual bodies become the site of security/ insecurity depending on the social location of bodies. Within this discourse, this article tries to locate the bodies of women. It will look at the bodies of women as victims of terror as well as perpetrators of terror. It will try to understand if in these differentiated roles, women are able to break away from stereotypes or are still caught in heteronormative narratives. Keywords: Body, Suicide Bombers, Victims, Ethnic Conflict, Terrorism.

  4. The Revised Academic Consensus Definition of Terrorism

    Directory of Open Access Journals (Sweden)

    Alex P. Schmid

    2012-05-01

    Full Text Available Terrorism is a contested concept. While there are many national and regional definitions, there is no universal legal definition approved by the General Assembly of the United Nations (the one proposed by the Security Council in Res. 1566 (2004 is non-binding, lacking legal authority in international law. The Ad Hoc Committee on Terrorism of the 6th (legal Committee of the General Assembly has, with some interruptions, been trying to reach a legal definition since 1972 - but in vain. In the absence of a legal definition, attempts have been made since the 1980s to reach agreement on an academic consensus definition. The latest outcome is the revised definition reprinted below. It is the result of three rounds of consultations among academics and other professionals. A description how it was arrived at can be found on pp. 39 - 98 of Alex P. Schmid (Ed.. The Routledge Handbook of Terrorism Research. London and New York: Routledge, 2011. The same volume also contains 260 other definitions compiled by Joseph J. Easson and Alex P. Schmid on pp. 99 -200.

  5. KENYA’S OIL PIPELINE AND TERRORISM

    Directory of Open Access Journals (Sweden)

    E.O.S.ODHIAMBO

    2014-04-01

    Full Text Available The threat of Al-Shabaab and Al-Qaeda terrorist attacks on the critical infrastructure (oil pipeline in Kenya has brought to the attention the strategic issue of the energy sector security, highlighting the potential vulnerabilities of this sector. Critical Infrastructure Protection (CIP should be a key component of the national security especially after the Kenya Defence Forces’ (KDF incursion into Somalia. The merger of Al-Shabaab and Al-Qaeda terrorist groups and the accelerated grenades attack against Kenya in retaliation has become the centre of the debate on terrorism and internal security of the Kenya. The energy resources are strategic assets from the security, political and economic point of view. Kenya as an oil transit country is considered of primary strategic importance at international level. International terrorism has always looked with interest at the oil resource in order to meet its political and economic targets. We argue that Kenya’s oil pipelines are vulnerable to Al-Shabaab and Al-Qaeda terrorist attack. In summary, the article looks at the concept of terrorism within the framework of critical infrastructure protection, the dangers of attacks on oil pipelines, Kenya’s government preparedness and recommendations.

  6. Integration of Social Sciences in Terrorism Modelling: Issues, Problems and Recommendations

    National Research Council Canada - National Science Library

    Resnyansky, L

    2007-01-01

    ...; terrorists behaviour; the structure of terrorist organisations and networks; terrorism threat; and influence strategies and actions directed towards terrorism threat anticipation and minimisation.

  7. Combatting Domestic Terrorism: A Strategic Approach for the Twenty-First Century

    National Research Council Canada - National Science Library

    Sienrukos, John

    1999-01-01

    .... In order to reach sound, strategic recommendations for combating terrorism, the author will begin with some background on terrorism, review the various definitions as defined by the Department...

  8. Addressing the Needs of Preschool Children in the Context of Disasters and Terrorism: Clinical Pictures and Moderating Factors.

    Science.gov (United States)

    Hamiel, Daniel; Wolmer, Leo; Pardo-Aviv, Lee; Laor, Nathaniel

    2017-07-01

    This paper surveys the existent theoretical and research literature regarding the needs of preschool children in the context of disasters and terrorism with the aim of understanding (a) the consequences of such events for young children and (b) the main moderating variables influencing the event-consequence association to learn how to enhance their resilience. Consequences include a variety of emotional, behavioral, and biological outcomes. Implications for refugee children are discussed. Main moderating variables were mother's sensitivity and mother's PTSD symptoms. Exposure to disasters and terrorism may have severe effects on the mental health and development among preschool children. Future research should explore the implications of different levels of exposure and the effects of moderating psychosocial and biological variables, including the parent-child triad, on the event-consequence relationship.

  9. On-site equipment and materials against CBRNE terrorism

    International Nuclear Information System (INIS)

    Yamamoto, Soichiro; Tokita, Kenichi

    2016-01-01

    There is no almighty field service equipment that can handle by itself all CBRNE (Chemical, Biological, Radiological, Nuclear, Explosive) terrorism. Since there is merit and demerit for each of equipment, operation methods and linkage of material/equipment based on detection principle are indispensable. This paper explained the principle and operation method of detection equipment, operation using multiple material/equipment, and system construction to facilitate cooperation with related ministries and agencies. There are six examples as typical material/equipment and detection principle for handling CBRNE as shown below: (1) ion mobility spectrometer, (2) infrared spectroscopy, (3) Raman scattering spectroscopy, (4) gas chromatographic mass spectrometry, (5) fluorescent reactive dye classification method, and (6) antigen antibody reaction method. This paper shows a flowchart that can measure within the duration of a respirator while wearing Level A protective clothing (about 15 to 20 min) by the combination of detector/analyzer based on these methods. The authors developed an information system that allows prompt information exchange between the on-site administrative agencies, research institutes, and other related organizations via network, in the case when substances etc. could not be specified in the above flowchart. (A.O.)

  10. Mental health and resiliency following 44 months of terrorism: a survey of an Israeli national representative sample

    Science.gov (United States)

    Bleich, Avi; Gelkopf, Marc; Melamed, Yuval; Solomon, Zahava

    2006-01-01

    Background Israeli citizens have been exposed to intense and ongoing terrorism since September 2000. We previously studied the mental health impact of terrorism on the Israeli population (Bleich et al., 2002), however the long-term impact of ongoing terrorism has not yet been examined. The present study evaluated the psychological sequelae of 44 months of terrorism in Israel, and sought to identify factors that may contribute to vulnerability and resilience. Methods This was a telephone survey using strata sampling of 828 households, which reached a representative sample of 702 adult Israeli residents (84.8% contact rate). In total, 501 people (60.5%) agreed to participate. The methodology was similar to that of our previous study. Exposure to terrorism and other traumatic events, number of traumatic stress-related symptoms (TSRS), percentage of respondents with symptom criteria for post-traumatic stress disorder (PTSD), traumatic stress (TS) resiliency and feelings of depression, anxiety, optimism, sense of safety, and help-seeking were the main outcome measures. Results In total, 56 participants (11.2%) were directly exposed to a terrorist incident, and 101 (20.2%) had family members or friends exposed. Respondents reported a mean ± SD of 5.0 ± 4.5 TSRS; 45 (9%) met symptom criteria for PTSD; and 72 (14.4%) were TS-resilient. There were 147 participants (29.5%) who felt depressed, 50 (10.4%) felt anxious, and almost half (235; 47%) felt life-threatening danger; 48 (9.7%) felt the need for professional help. Women and people of Arab ethnicity had more TSRS, more PTSD, and less TS resiliency. Injury following a life-threatening experience, a major stressful life event, and a major loss of income were associated with PTSD. Immigrant status, lower education, low sense of safety, low sense of social support, high societal distress, and injury following life-threatening experiences were associated with TSRS. TSRS did not increase with exposure severity. This study

  11. International Terrorism in East Africa: The Case of Kenya 1 ...

    African Journals Online (AJOL)

    International terrorism is a significant threat to world peace and security, and as such remains high on the agenda within policy and intelligence circles. In Africa, the notion of terrorism itself can be traced back to anti-colonial struggles whilst the more recent terrorist attacks in Kenya and Tanzania give some indication of the ...

  12. Education, Globalization, and the State in the Age of Terrorism

    Science.gov (United States)

    Peters, Michael A.

    2004-01-01

    Education plays an important role in challenging, combating and in understanding terrorism in its different forms, whether as counter-terrorism or as a form of human rights education. Just as education has played a significant role in the process of nation-building, so education also plays a strong role in the process of empire, globalization and…

  13. Conceptualising Terrorism: International Offence or Domestic Governance Tool?

    DEFF Research Database (Denmark)

    Aksenova, Marina

    2015-01-01

    This article argues that terrorism does not belong within the realm of international criminal law. On the surface, it is the lack of internationally agreed definition of terrorism and its domestic law origins that set it apart from the notions of crimes against humanity, war crimes and genocide...

  14. The Study of Terrorism: An Interdisciplinary Approach for the Classroom.

    Science.gov (United States)

    Kumamoto, Bob

    1993-01-01

    Asserts that terrorism, in its domestic and international forms, is a subject worthy of attention in social studies. Provides a list of causes of terrorism, a list of reasons why the United States is often a terrorist target, and three application lesson ideas. (CFR)

  15. The threat of nuclear terrorism: from analysis to precautionary measures

    International Nuclear Information System (INIS)

    Schneider, M.

    2003-01-01

    Facing the nuclear terrorism risk, this document analyzes the nature of the threat of nuclear terrorism, the risk of attack on nuclear installations, the limited protection of nuclear installations against aircraft crashes, the case of nuclear reprocessing plants, the case of nuclear transport and proposes measures which should be taken without endangering the foundations of democracy. (A.L.B.)

  16. The threat of nuclear terrorism: from analysis to precautionary measures

    Energy Technology Data Exchange (ETDEWEB)

    Schneider, M

    2003-07-01

    Facing the nuclear terrorism risk, this document analyzes the nature of the threat of nuclear terrorism, the risk of attack on nuclear installations, the limited protection of nuclear installations against aircraft crashes, the case of nuclear reprocessing plants, the case of nuclear transport and proposes measures which should be taken without endangering the foundations of democracy. (A.L.B.)

  17. The Mega-Terrorism - The Challenge of the Third Millennium

    Directory of Open Access Journals (Sweden)

    Daniel Andrișan

    2011-06-01

    Full Text Available The aim of this article is to describe the "new face" of terrorism in the twenty-first centuryindicating the transition to mass destruction weapons (nuclear terrorism, chemical, biological, toethnic-religious terrorism, the occurrence of massive gray area phenomena of terrorism and how thisphenomenon became a strategic weapon. Mega-terrorism has been existing, at a conceptual level,ever since the 70’s, when the experts of this phenomenon tried to find a semantic cover for thesituations that certain organizations, groups or terrorist or extremist sections would get someWeapons of Mass Destruction Systems. Actually, the 11th of September tragedy proves that megaterrorismrepresents the premeditated destruction, the lack of negotiations, of a tactical goal that wasto be accomplished by means of a threat. The mega-terrorism actors do not intend to get themselvesknown to the public, do not require anything, do not see the threat as means or device to reach theirpurpose. The 21 st century mega-terrorism simple logic is materialized in the systemic destroying ofthe enemy, no longer representing a political power or a government, but an entire ‘disobeying’,‘corrupted’, ‘unfaithful’ population indifferent to the mega-terrorist actors’ desires. New dimensionagainst mega-terrorism determines not only a rethinking of how to combat it, but also the realizationof a conceptual legal framework and measures established to materialize the political decision.

  18. El cine de terror español

    OpenAIRE

    Gómez Llorente, Tatiana

    2015-01-01

    La autora comienza haciendo un estudio del cine de terror desde sus inicios, sus subgéneros, mecanimos utilizados para provocar el miedo en el espectador para finalmente centrarse en el cine de terror español a través de cinco películas representativas del género.

  19. Terrorism: Supplement to the Second Edition. A Selected Bibliography.

    Science.gov (United States)

    Boston, Guy D.

    The annotated bibliography describes 85 materials related to terrorism which were collected by the National Criminal Reference Service. Although no consensus exists on the definition of terrorism, the term is interpreted in this document to include both illegal and destructive acts against society and governments and violent means undertaken to…

  20. Teaching Guide on International Terrorism: Definitions, Causes, and Responses.

    Science.gov (United States)

    United States Inst. of Peace, Washington, DC.

    Dealing with terrorism has become the centerpiece of United States foreign policy today. Yet terrorism--its definition, causes, and methods of dealing with it--has rarely been dealt with in high school courses. The United States Institute of Peace has developed this 3-lesson plan (for 45-minute class periods) teaching guide, aimed at grades 11 and…

  1. Lessons from History for Counter- Terrorism Strategic Communications

    NARCIS (Netherlands)

    Ingram, H.J.; Reed, A.G.

    2016-01-01

    Drawing on the Counter-terrorism Strategic Communication (CTSC) Project’s research paper “A Brief History of Propaganda during Conflict“, this Policy Brief lays out the key policy-relevant lessons for developing effective counter-terrorism strategic communications. It presents a framework of

  2. 239 Inter-Agency Cooperation in Combating Terrorism in Nigeria ...

    African Journals Online (AJOL)

    User

    In recent times, terrorism has become one of the most dangerous threats to .... groups or clandestine agents, usually intended to influence an audience”. (ITSR ... terrorist attacks on the World Trade Center in New York and the Pentagon ..... Books. Imobighe, T.A. (2006b). “Combating Terrorism in Africa: An Integrated.

  3. Freedom of expression and the Ethiopian anti-terrorism proclamation

    African Journals Online (AJOL)

    Freedom of expression and the Ethiopian anti-terrorism proclamation: a comparative analysis. ... Though surveillance and interception undermine democracy, a mere suspicion of terrorism gives the National Intelligence and Security Service a power to conduct surveillance or intercept any type of communications.

  4. The Role Of Education In Combating Terrorism | Oni | Journal of ...

    African Journals Online (AJOL)

    2005-06-07

    The world is witnessing series of repeated political, religious conflict and terrorism, particularly worrisome is the acts of terrorism, which is now prevalent across the world. The phenomenon of 9/11/2001 on U.S and the recent attack on June 7, 2005 in London and some other parts of the world revealed the devastation, pains ...

  5. On Terrorism: An Analysis of Terrorism as a Form of Warfare

    Science.gov (United States)

    1987-09-01

    unwitting political terrorists subconsciously reacting to their political and social environment. Given this, it is necessary to subject the...overt political rationale, there are some who would argue that it was, at least subconsciously , a product of sincere political motivations. For example...Isolate 3) Expansion Guerrilla War Physically Isolate 4) Victorious Conventional Physically Destroy 5) Consolidation Terrorism Reprogram Populace 6

  6. Correlation of Concepts "Extremism" and "Terrorism" in Countering the Financing of Terrorism and Extremism

    Science.gov (United States)

    Baisagatova, Diana B.; Kemelbekov, Saken T.; Smagulova, Diana A.; Kozhamberdiyeva, Aigul S.

    2016-01-01

    The main threats to world order are terrorist and extremist activities. On the world stage, countries unite into a coalition with the aim to increase the efficiency of the fight against terrorism. At the local level, the terrorist threat is fought by the security services. In order to prevent global human victims, which may arise as a result of…

  7. “Counterterrorism Bookshelf” – 23 Books on Terrorism & Counter-terrorism Related Subjects

    Directory of Open Access Journals (Sweden)

    Joshua Sinai

    2014-02-01

    Full Text Available This column consists of two parts: capsule reviews of ten books recently published on terrorism and counterterrorism-related topics, and - continuing the series begun in the previous column of highlighting books by significant publishers (listed in alphabetical order - capsule reviews of 13 important books published by CRC Press. 

  8. The Economics of Terrorism: Economics Methods of Analysis in the Study of Terrorism and Counterterrorism

    Science.gov (United States)

    2010-12-01

    addition to outlining definitions, data sources, choice theory , game theory , and the economic consequences of terrorism, this study identifies how...stratégiques. Les auteurs sont le Maj Alain Rollin, le Maj Meaghan Setter et Mme Rachel Lea Heide, Ph.D., sous la direction du Lcol William Yee...18 7 Choice Theory and its Applications 7.1

  9. Don't tread on me: masculine honor ideology in the U.S. and militant responses to terrorism.

    Science.gov (United States)

    Barnes, Collin D; Brown, Ryan P; Osterman, Lindsey L

    2012-08-01

    Using both college students and a national sample of adults, the authors report evidence linking the ideology of masculine honor in the U.S. with militant responses to terrorism. In Study 1, individuals' honor ideology endorsement predicted, among other outcomes, open-ended hostile responses to a fictitious attack on the Statue of Liberty and support for the use of extreme counterterrorism measures (e.g., severe interrogations), controlling for right-wing authoritarianism, social dominance orientation, and other covariates. In Study 2, the authors used a regional classification to distinguish honor state respondents from nonhonor state respondents, as has traditionally been done in the literature, and showed that students attending a southwestern university desired the death of the terrorists responsible for 9/11 more than did their northern counterparts. These studies are the first to show that masculine honor ideology in the U.S. has implications for the intergroup phenomenon of people's responses to terrorism.

  10. Posttraumatic play in young children exposed to terrorism: An empirical study.

    Science.gov (United States)

    Cohen, Esther; Chazan, Saralea; Lerner, Moran; Maimon, Efrat

    2010-03-01

    The phenomenon of "posttraumatic play" (PTP) has received much clinical recognition and little empirical support. The objective of this study was to examine various aspects of PTP in young children exposed to terror events and their relation to posttraumatic stress disorder (PTSD). Individual play sessions, conducted with 29 young Israeli children directly exposed to terrorism (M age = 5.47, SD = 1.34) and 25 matched unexposed children (M age = 5.62, SD = 0.87), were coded using the Children's Play Therapy Instrument-Adaptation for Terror Research (CPTI-ATR; S.E. Chazan & E. Cohen, 2003). Analyses using these ratings showed (a) significant differences between the two groups, (b) significant associations with the caregiver's reports on child's exposure, and (c) significant associations with the caregiver's reports on the child's PTSD symptoms. Play activity ratings of predominant negative affects, frequent acting-out/morbid themes, lowered developmental level, and reduced awareness of the child of him- or herself as a player significantly predicted more PTSD symptoms. PTP which included more coping strategies classified as "overwhelmed reexperiencing" and less "reenactment with soothing" was associated with a higher level of PTSD. Play analysis with the CPTI-ATR may be helpful in identifying PTSD in children and also guide the selection of therapeutic techniques. Copyright © 2010 Michigan Association for Infant Mental Health.

  11. Variance, Violence, and Democracy: A Basic Microeconomic Model of Terrorism

    Directory of Open Access Journals (Sweden)

    John A. Sautter

    2010-01-01

    Full Text Available Much of the debate surrounding contemporary studies of terrorism focuses upon transnational terrorism. However, historical and contemporary evidence suggests that domestic terrorism is a more prevalent and pressing concern. A formal microeconomic model of terrorism is utilized here to understand acts of political violence in a domestic context within the domain of democratic governance.This article builds a very basic microeconomic model of terrorist decision making to hypothesize how a democratic government might influence the sorts of strategies that terrorists use. Mathematical models have been used to explain terrorist behavior in the past. However, the bulk of inquires in this area have only focused on the relationship between terrorists and the government, or amongst terrorists themselves. Central to the interpretation of the terrorist conflict presented here is the idea that voters (or citizens are also one of the important determinants of how a government will respond to acts of terrorism.

  12. Development and validation of the coping with terror scale.

    Science.gov (United States)

    Stein, Nathan R; Schorr, Yonit; Litz, Brett T; King, Lynda A; King, Daniel W; Solomon, Zahava; Horesh, Danny

    2013-10-01

    Terrorism creates lingering anxiety about future attacks. In prior terror research, the conceptualization and measurement of coping behaviors were constrained by the use of existing coping scales that index reactions to daily hassles and demands. The authors created and validated the Coping with Terror Scale to fill the measurement gap. The authors emphasized content validity, leveraging the knowledge of terror experts and groups of Israelis. A multistep approach involved construct definition and item generation, trimming and refining the measure, exploring the factor structure underlying item responses, and garnering evidence for reliability and validity. The final scale comprised six factors that were generally consistent with the authors' original construct specifications. Scores on items linked to these factors demonstrate good reliability and validity. Future studies using the Coping with Terror Scale with other populations facing terrorist threats are needed to test its ability to predict resilience, functional impairment, and psychological distress.

  13. IAEA to hold special session on nuclear terrorism

    International Nuclear Information System (INIS)

    2001-01-01

    Experts from around the world are meeting at the IAEA this week for an international symposium on nuclear safeguards, verification, and security. A special session on 2 November focuses on the issue of combating nuclear terrorism. The Special Session, which will bring together experts on nuclear terrorism from around the world, will deal with the following issues: The Psychology of terrorism; Intelligence, police and border protection; Guarding nuclear reactors and material from terrorists and thieves; The threat of nuclear terrorism: Nuclear weapons or other nuclear explosive devices; The threat of nuclear terrorism: Intentional dispersal of radioactive material - Sabotage of fixed installations or transport systems; The Legal Framework: Treaties and Conventions, Laws; Regulations and Codes of Practice; IAEA Nuclear Security and Safety Programmes

  14. FIGHTING OF WESTERN INTELLIGENCE WITH ISLAMIC TERRORISM

    Directory of Open Access Journals (Sweden)

    Asadi NEJMAH

    2015-11-01

    Full Text Available The state of Israel even prior to its establishment, faces, in daily life, terrorist organizations that want to destroy it. Terrorism and terrorist acts as implied from the original meaning of the word – fear, anxiety, terror, are meant to plant fear amongst the attacked public and bring about its demoralization and confusion, and disruption of routine life. Occasionally it is performed also as an act of revenge in a blood circle of violence. A substantial part of terrorism weapons is the extensive publicity its activity gains in public, through electronic and printed media. In terrorism, a blow to the “soft stomach” of the state (civilians is performed, with the purpose of causing the state to give in to the demands of terrorism operators. In the basis of terrorism is also an objection to the basis of legitimacy of the ruling government, in that it is not capable of guarantying the safety of its citizens and maintain public order. This article presents the attitudes and ways of operation of terrorist organizations and how Western intelligence attempts to thwart, foil and prevent these organizations from casing for destruction and victims in human lives and state.COMBATEREA TERORISMULUI ISLAMIC PRIN WESTERN INTELLIGENCE Chiar de la înfiinţare, statul Israel s-a confruntat, în viaţa de zi cu zi, cu organizaţiile teroriste, care urmăresc să-l distrugă. Actele de terorism, aşa cum reiese din sensul originar al cuvântului – frică, anxietate, teroare, sunt menite să implanteze frica în rândul populaţiei, s-o demoralizeze şi să perturbeze viaţa cotidiană. Uneori teroarea se dovedeşte a fi un act de răzbunare. Prin acte de terorism se dă o lovitură la „stomacul moale” al statului, adică civililor. Actele de terorism sunt comise, de asemenea, pentru a „demonstra” lipsa de legitimitate a statului, incapacitatea lui de a asigura securitatea cetăţenilor săi. În articol sunt specificate modalităţile de func

  15. British torture in the 'war on terror'.

    Science.gov (United States)

    Blakeley, Ruth; Raphael, Sam

    2017-06-01

    Despite long-standing allegations of UK involvement in prisoner abuse during counterterrorism operations as part of the US-led 'war on terror', a consistent narrative emanating from British government officials is that Britain neither uses, condones nor facilitates torture or other cruel, inhuman or degrading treatment and punishment. We argue that such denials are untenable. We have established beyond reasonable doubt that Britain has been deeply involved in post-9/11 prisoner abuse, and we can now provide the most detailed account to date of the depth of this involvement. We argue that it is possible to identify a peculiarly British approach to torture in the 'war on terror', which is particularly well-suited to sustaining a narrative of denial. To explain the nature of UK involvement, we argue that it can be best understood within the context of how law and sovereign power have come to operate during the 'war on terror'. We turn here to the work of Judith Butler, and explore the role of Britain as a 'petty sovereign', operating under the state of exception established by the US executive. UK authorities have not themselves suspended the rule of law so overtly; indeed, they have repeatedly insisted on their commitment to it. Nevertheless, they have been able to construct a rhetorical, legal and policy 'scaffold' that has enabled them to demonstrate at least procedural adherence to human rights norms while, at the same time, allowing UK officials to acquiesce in the arbitrary exercise of sovereignty over individuals who are denied any access to appropriate representation or redress in compliance with the rule of law.

  16. Radiological terrorism and Australia's response

    International Nuclear Information System (INIS)

    Patterson, D.

    2003-01-01

    A terrorist attack in Australia involving dispersal of radioactive material is different from conventional terrorist attacks involving explosives. The trauma experienced by victims during an explosive incident includes cuts, broken limbs, burns and shock. When an explosive device involving radioactive materials is involved, there are a number of additional characteristics including the contamination of victims and the surrounding area and the potential requirement for ongoing monitoring and decontamination. Response actions may require additional complex emergency response measures including immediate protective actions to protect those potentially exposed to contamination, mass casualty care, and public and mental health. There are concerns that terrorist organizations are showing increasing interest in acquiring radiological material that could be used with explosive. A dirty bomb or technically known as a radiological dispersal device (RDD) is a device designed to spread radioactive contamination over a wide area and pose a health and safety threat to those within the contaminated area. The radioactive material could be in the form of a large chunk of material, fine powder, a liquid mist, or a gas. The material may also be spread in other ways, such as by simply emptying a container over the desired area. As RDD's do not require large amounts of explosives, there is unlikely to be a large numbers of casualties, however the areas contaminated by the radiological material may cause immediate and long term health risks to those exposed. An RDD is a weapon of Mass Disruption rather than destruction. While the likelihood of RDD's being employed by terrorist in Australia is still considered remote, Australia's emergency response organizations are developing plans to ensure a rapid and comprehensive response occurs should such an event occur in this country, The presentation will outline Australia's response arrangements at the local/state level and the type of federal

  17. Roots of terrorism: a reassessment after September 11th

    Energy Technology Data Exchange (ETDEWEB)

    Pilat, Joseph F.

    2002-01-01

    The brutal terrorist attacks of September 11th, the anthrax attacks that followed and growing knowledge of al Qaeda's pursuit of nuclear, biological and chemical weapons have not only intensified concerns about terrorism but also created doubts about our understanding of terrorism. These attacks were in many ways unprecedented, and ultimately raise the question of the roots or causes of terrorism. Historically and today, there have been divergent views on this question, which reflect philosophical, religious, political, sociological and other differences. These differences are not merely academic, as they can affect our understanding of both the threat and of responses to terrorism in the aftermath of September 11th, Terrorism is too complex and diverse a phenomenon to speak easily of causes. But we may be able to discern the causes of specific acts. Our response to 9/11 and other acts of terrorism will be affected by our understanding of their causes. If 9/11 was caused by US Middle East policies, the response must involve a review of these policies. If it is a backlash against globalization, the response must address the realities underlying anti-globalization sentiments. Addressing causes will not in any case end terrorism, and addressing the wrong causes will be counterproductive. Actions to reduce those conditions that create support for terrorism and aid its recruitment, which need to be clearly identified, are critical in any counterterrorism strategy. So we must understand the reasons for terrorism and, in particular, for the attacks of September 11th.T his paper will look at the question of the roots of terrorism and then look to the specific case of 911 and its aftermath, with a special view to the impact of globalization.

  18. Terror Operations: Case Studies in Terrorism (U.S. Army TRADOC G2 Handbook No. 1.01)

    Science.gov (United States)

    2007-07-25

    terrorism topics. Unless stated otherwise, masculine nouns or pronouns do not refer exclusively to men. Proponent Statement. Headquarters, U.S. Army...Economic and political disruptions can have profound global consequences. Sources of instability within the region include hegemony , terrorism

  19. Discussing Terrorism: A Pupil-Inspired Guide to UK Counter-Terrorism Policy Implementation in Religious Education Classrooms in England

    Science.gov (United States)

    Quartermaine, Angela

    2016-01-01

    My research into pupils' perceptions of terrorism and current UK counter-terrorism policy highlights the need for more detailed and accurate discussions about the implementation of the educational aims, in particular those laid out by the Prevent Strategy. Religious education (RE) in England is affected by these aims, specifically the challenging…

  20. Individual differences in relational motives interact with the political context to produce terrorism and terrorism-support.

    Science.gov (United States)

    Thomsen, Lotte; Obaidi, Milan; Sheehy-Skeffington, Jennifer; Kteily, Nour; Sidanius, Jim

    2014-08-01

    The psychology of suicide terrorism involves more than simply the psychology of suicide. Individual differences in social dominance orientation (SDO) interact with the socio-structural, political context to produce support for group-based dominance among members of both dominant and subordinate groups. This may help explain why, in one specific context, some people commit and endorse terrorism, whereas others do not.

  1. Terror, tortur og den tikkende bombe

    DEFF Research Database (Denmark)

    Dige, Morten

    2012-01-01

    The so-called "war on terror" has renewed the interest in torture in practice as well as in theory. The philosophical debate about possible justifications for torture has to a large extent revolved about the ticking bomb scenario: would it be justified to torture a terrorist in order to prevent...... a catastrophe? I criticize arguments based on ticking bomb scenarios in two steps. First, I show that exceptional resort to torture will not be possible in the situations where it is most needed. Second, I state several pragmatic as well as principled objections against a state sanctioned or tolerated practice...

  2. Terrorism: the threat of a radiological device

    International Nuclear Information System (INIS)

    Kingshott, B.F.

    2005-01-01

    Full text: This paper will discuss terrorism from the perspective of a terrorist organization building and detonating a 'dirty bomb' with a radiological component. The paper will discuss how such devices are made and how security of radiological material world wide will minimize the risk of such devices being used. It will discuss the threat assessments against nuclear waste processing and storage sites, threats to nuclear plants and other sites and the adequacy of current security. It will also discuss the phenomenon of suicide attacks by the bomb carriers and the role of the media in informing and educating the general public of the consequences should such a device be detonated. (author)

  3. Mass trauma: disasters, terrorism, and war.

    Science.gov (United States)

    Chrisman, Allan K; Dougherty, Joseph G

    2014-04-01

    Disasters, war, and terrorism expose millions of children globally to mass trauma with increasing frequency and severity. The clinical impact of such exposure is influenced by a child's social ecology, which is understood in a risk and resilience framework. Research findings informed by developmental systems theory and the related core principles of contemporary developmental psychopathology are reviewed. Their application to the recent recommendations for interventions based on evolving public health models of community resilience are discussed along with practical clinical tools for individual response. Published by Elsevier Inc.

  4. A prospect theory perspective on terrorism

    Directory of Open Access Journals (Sweden)

    Cind Du Bois

    2017-06-01

    Full Text Available This paper presents a new approach for the study of terrorist behaviour and argues that a framework based on Prospect Theory can provide novel, useful insights into the understanding of the terrorist mind-set. Such a framework allows different pathways to become a terrorist and although individual decisions are studied, the model also takes into account environmental factors. By changing these environmental factors and/or framing the choice differently, PT provides insights as to how the terrorist group and/or a charismatic leader can influence the individual’s whether or not to turn to terrorism.

  5. Journals Supporting Terrorism Research: Identification and Investigation into Their Impact on the Social Sciences

    Science.gov (United States)

    Bullis, Daryl R.; Irving, Richard D.

    2013-01-01

    A citation analysis of two preeminent terrorism journals ("Terrorism and Political Violence" and "Studies in Conflict and Terrorism") was used to identify 37 additional social science journals of significant importance to terrorism research. Citation data extracted from the "Web of Science" database was used to…

  6. 31 CFR 50.72 - Establishment of Federal Terrorism Policy Surcharge.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 1 2010-07-01 2010-07-01 false Establishment of Federal Terrorism... TERRORISM RISK INSURANCE PROGRAM Recoupment and Surcharge Procedures § 50.72 Establishment of Federal Terrorism Policy Surcharge. (a) Treasury will establish the Federal Terrorism Policy Surcharge based on the...

  7. 6 CFR 25.4 - Designation of qualified anti-terrorism technologies.

    Science.gov (United States)

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Designation of qualified anti-terrorism... REGULATIONS TO SUPPORT ANTI-TERRORISM BY FOSTERING EFFECTIVE TECHNOLOGIES § 25.4 Designation of qualified anti-terrorism technologies. (a) General. The Under Secretary may Designate as a Qualified Anti-Terrorism...

  8. Political Terrorism: A Mini-Course for High School Social Studies.

    Science.gov (United States)

    Ellington, Lucien

    By participating in the 2-week mini-course, high school students will learn that (1) there is a difference between political terror and other criminal activity; (2) governments as well as nongovernmental groups engage in political terrorism; (3) political terrorism has been present throughout history; (4) political terrorism is a world wide…

  9. A Study on Current Status of Detection Technology and Establishment of National Detection Regime against Nuclear/Radiological Terrorism

    International Nuclear Information System (INIS)

    Kwak, Sung Woo; Jang, Sung Soon; Lee, Joung Hoon; Yoo, Ho Sik

    2009-01-01

    Since 1990s, some events - detection of a dirty bomb in a Russian nation park in 1995, 9/11 terrorist attack to WTC in 2001, discovery of Al-Qaeda's experimentation to build a dirty bomb in 2003 etc - have showed that nuclear or radiological terrorism relating to radioactive materials (hereinafter 'radioactive materials' is referred to as 'nuclear material, nuclear spent fuel and radioactive source') is not incredible but serious and credible threat. Thus, to respond to the new threat, the international community has not only strengthened security and physical protection of radioactive materials but also established prevention of and response to illicit trafficking of radioactive materials. In this regard, our government has enacted or revised the national regulatory framework with a view to improving security of radioactive materials and joined the international convention or agreement to meet this international trend. For the purpose of prevention of nuclear/radiological terrorism, this paper reviews physical characteristics of nuclear material and existing detection instruments used for prevention of illicit trafficking. Finally, national detection regime against nuclear/radiological terrorism based on paths of the smuggled radioactive materials to terrorist's target building/area, national topography and road networks, and defence-in-depth concept is suggested in this paper. This study should contribute to protect people's health, safety and environment from nuclear/radiological terrorism

  10. [A systematic review of decided litigated cases on adverse drug events in Japan: classification of decided cases appearing in law reports].

    Science.gov (United States)

    Eguchi, Rika; Kato, Masahisa; Kaneko, Erina; Kusaba, Kenji; Yoshikawa, Manabu; Yamano, Toru; Seo, Takashi; Hagihara, Akihito

    2015-01-01

    Much of the damage to health caused by drugs could be prevented by appropriate care. A well-defined duty of care and further information are required for healthcare professionals. Although there are many litigation cases to use as references, neither the extent of the duty of care nor the obligation to explain medication according to the type of drug prescribed has yet been fully established. Thus, we systematically collected decided cases of adverse drug events, and assessed the degree of the duties of care and information. Specifically, we collected decided cases in which physicians, dentists, pharmacists, nurses, or hospitals had been sued. Data were derived from Bessatsu Jurist Iryo-kago Hanrei Hyakusen, Hanrei Jihou, and Hanrei Times from 1989 to November 2013, and information on precedents in the records of the Supreme Court of Japan from 2001 to November 2013. We analyzed the cases, and assessed the following according to the type of drug: (1) standards and explanations when dealing with drugs that were critical issues in litigation, and (2) the degree of the physician's or pharmacist's duties of care and information. In total, 126 cases were collected. The number of drug categories classified was 27, and 9 were considered of practical importance. After this systematic review, we found a trend in the degree of the required level of care and information on several drugs. With respect to duties of care and information, the gap between the required level and actual practice suggests that healthcare professionals must improve their care and explanations.

  11. Terrorism and anti-terror legislation - the terrorised legislator? A comparison of counter-terrorism legislation and its implications on human rights in the legal systems of the United Kingdom, Spain, Germany, and France

    NARCIS (Netherlands)

    Oehmichen, Anna

    2009-01-01

    The thesis deals with the history of terrorism and counter-terrorism legislation, focussing on the legislation in the UK, Spain, Germany and France, in the last 30 years, and analysing its compatibility with national and European human rights standards.

  12. Calculating the new global nuclear terrorism threat

    International Nuclear Information System (INIS)

    2001-01-01

    Experts from around the world are meeting at the IAEA on 29 October to 2 November at an international symposium on nuclear safeguards, verification, and security. A special session on 2 November focuses on the issue of combating nuclear terrorism. Although terrorists have never used a nuclear weapon, reports that some terrorist groups, particularly al-Qaeda, have attempted to acquire nuclear material is a cause of great concern. According to the IAEA, since 1993, there have been 175 cases of trafficking in nuclear material and 201 cases of trafficking in other radioactive sources (medical, industrial). However, only 18 of these cases have actually involved small amounts of highly enriched uranium or plutonium, the material needed to produce a nuclear bomb. IAEA experts judge the quantities involved to be insufficient to construct a nuclear explosive device. The IAEA experts have evaluated the risks for nuclear terrorism in these three categories: Nuclear facilities; Nuclear Material; Radioactive Sources. The IAEA is proposing a number of new initiatives, including strengthening border monitoring, helping States search for and dispose of orphan sources and strengthening the capabilities of the IAEA Emergency Response Centre to react to radiological emergencies following a terrorist attack. In the short term, the IAEA estimates that at least $30-$50 million annually will be needed to strengthen and expand its programs to meet this terrorist threat

  13. Nuclear and radiological terrorism: continuing education article.

    Science.gov (United States)

    Anderson, Peter D; Bokor, Gyula

    2013-06-01

    Terrorism involving radioactive materials includes improvised nuclear devices, radiation exposure devices, contamination of food sources, radiation dispersal devices, or an attack on a nuclear power plant or a facility/vehicle that houses radioactive materials. Ionizing radiation removes electrons from atoms and changes the valence of the electrons enabling chemical reactions with elements that normally do not occur. Ionizing radiation includes alpha rays, beta rays, gamma rays, and neutron radiation. The effects of radiation consist of stochastic and deterministic effects. Cancer is the typical example of a stochastic effect of radiation. Deterministic effects include acute radiation syndrome (ARS). The hallmarks of ARS are damage to the skin, gastrointestinal tract, hematopoietic tissue, and in severe cases the neurovascular structures. Radiation produces psychological effects in addition to physiological effects. Radioisotopes relevant to terrorism include titrium, americium 241, cesium 137, cobalt 60, iodine 131, plutonium 238, califormium 252, iridium 192, uranium 235, and strontium 90. Medications used for treating a radiation exposure include antiemetics, colony-stimulating factors, antibiotics, electrolytes, potassium iodine, and chelating agents.

  14. UK nuclear terrorism insurance arrangements: an overview

    International Nuclear Information System (INIS)

    Tetley, M. G.

    2004-01-01

    The risk of terrorism in the UK is not new, but since the New York World Trade Centre attacks in 2001, the potential scale of any terrorist attack has required a considerable reassessment. With UK foreign policy closely aligned to that of the USA, the UK security services now consider it is simply a matter of when and no longer if the UK is attacked. For insurers of any type this fact would cause concern; for insurers involved in high profile and potentially catastrophic loss targets such as nuclear power plants, any attack could have a severe impact on solvency and shareholder's funds. This paper's objective is to describe the terrorism insurance arrangements put in place in the U.K. both before and after the September 2001 attacks. These arrangements have been designed both to safeguard insurers' solvency and to ensure that the nuclear industry and general public can continue to be reassured by the availability of insurance should an attack ever occur.(author)

  15. New trends in terrorism : the use of social media, cyber-terrorism, the role of open-source intelligence and the cases of rightwing extremism and lone wolf terrorism

    OpenAIRE

    Καραδήμα, Σοφία

    2016-01-01

    Terrorism has existed almost as long as humanity, and has appeared in various forms, creating new and evolving trends, making the definition of terrorism even more difficult to define. The purpose of this thesis is to examine the new trends in terrorism after the terrorist attacks of 9/11, as well as attempting to find the factors that facilitate the emergence and/or recurrence of trends in terrorism, by examining the related Literature, creating case studies and providing supp...

  16. Legal Challenges of Combating Terrorism: International Humanitarian Law Implications of ‘Signature Strikes’ by Drones.

    OpenAIRE

    Ndi, George

    2015-01-01

    Terrorism has become the main international security challenge of the 21st century. From a historical perspective, terrorism has always been a serious concern for governments and nation states. The modern threat posed by terrorism has a much wider scope because of its international character. The much bigger threat posed by modern terrorism can also be explained by technological innovations and the reliance of terror networks on social networks both to propagate their message and as a recruit...

  17. The nuclear weapon non-proliferation treaty and terrorism: the consequences of 11 september 2001 on the treaty review process

    International Nuclear Information System (INIS)

    Arbellot du Repaire, G.

    2003-01-01

    The evolution of the terrorism makes the future uncertain, in such a context, the objective of universality of the Ntp and the construction of a comprehensive regime for protecting nuclear materials, technologies, sites, weapon and information may be postponed indefinitely or, on the contrary, become achievable. Should the latter be the case, this would be an unprecedented contribution to consolidating the international security system. Events could overtake political procrastination.But the price to pay risks being a high one. (N.C.)

  18. Terrorism and resilience: adolescents' and teachers' responses to September 11, 2001.

    Science.gov (United States)

    Noppe, Illene C; Noppe, Lloyd D; Bartell, Denise

    2006-01-01

    This study examined the impact of terrorism on adolescents, who may be resolving developmental issues regarding their vulnerability to death. Approximately 4 months after the September 11th attacks, a survey was given to 973 Upper Midwest adolescents and teachers. Quantitative analyses indicated that adolescents (especially girls) were frightened and upset but also used many coping strategies. Qualitative analyses suggested that adolescents were angry as well as tired of hearing about the events. Teachers discussed the attack's historical significance, student safety, and a desire to resume "normalcy." Adolescence resilience was seen by the making of a coherent narrative of September 11th and by focusing on their daily living.

  19. Universal preventive interventions for children in the context of disasters and terrorism.

    Science.gov (United States)

    Pfefferbaum, Betty; Varma, Vandana; Nitiéma, Pascal; Newman, Elana

    2014-04-01

    This review addresses universal disaster and terrorism services and preventive interventions delivered to children before and after an event. The article describes the organization and structure of services used to meet the needs of children in the general population (practice applications), examines screening and intervention approaches (tools for practice), and suggests future directions for the field. A literature search identified 17 empirical studies that were analyzed to examine the timing and setting of intervention delivery, providers, conditions addressed and outcomes, and intervention approaches and components. Copyright © 2014 Elsevier Inc. All rights reserved.

  20. Terror attacks increases the risk of vascular injuries

    Directory of Open Access Journals (Sweden)

    Eitan eHeldenberg

    2014-05-01

    Full Text Available Objectives: Extensive literature exists about military trauma as opposed to the very limited literature regarding terror-related civilian trauma. However, terror-related vascular trauma (VT, as a unique type of injury, is yet to be addressed.Methods: A retrospective analysis of the Israeli National Trauma Registry was performed. All patients in the registry from 09/2000 to 12/2005 were included. The subgroup of patients with documented vascular trauma (VT (N=1,545 was analyzedand further subdivided into those suffering from Terror-related Vascular Trauma (TVT and Non-Terror related Vascular Trauma (NTVT. Both groups were analyzed according to mechanism of trauma, type and severity of injury and treatment.Results: Out of 2,446 terror related trauma admissions 243 sustained TVT (9.9% compared to 1302 VT patients from Non Terror trauma (1.1%. TVT injuries tend to be more complex and most patients were operated on. ICU admissions and hospitallength of stay was higher in the TVT group. Penetrating trauma was the prominent cause of injury among the TVT group. TVT group had a higher proportion of patients with severe injuries (ISS>16 and mortality. Thorax injuries were more frequent in the TVT group. Extremity injuries were the most prevalent vascular injuries in both groups; however NTVT group had more upper extremity injuries, while the TVT group had significantly more lower extremity injuries.Conclusion: Vascular injuries are remarkably more common among terror attack victims than among non-terror trauma victims and the injuries of terror casualties tend to be more complex. The presence of a vascular surgeon will ensure a comprehensive clinical care.

  1. Improbable Success: Risk Communication and the Terrorism Hazard

    Science.gov (United States)

    2010-03-01

    never aspired to be anything more than a bureaucratic construct partnered with the media. It has taken years to fully understand the unintended...terrorism plan. http://www.ag.gov.au/agd/WWW/rwpattach.nsf/ VAP /(3273BD3F76A7A5DEDA E36942A54D7D90)~National+Counter-Terrorism+Plan+- +Alert+System...Australian Government National Security. (2009a). National Counter-Terrorism Alert System Fact Sheet. http://www.ag.gov.au/agd/WWW/rwpattach.nsf/ VAP

  2. Why Communication and Performance are Key in Countering Terrorism

    Directory of Open Access Journals (Sweden)

    Beatrice de Graaf

    2011-02-01

    Full Text Available In this Research Paper, Research Fellow Prof. Dr. Beatrice de Graaf emphasises the importance of effective communication and performance in the fight against terrorism and the fear it aims to induce. Essentially, terrorists and states are conducting “influence warfare”, a battle to convince and persuade the different target audiences to rally behind them. In this battle of perceptions, the different government agencies need to be aware of the often implicit and unwittingly produced “stories” they tell to counter those narrated by the terrorists. It is crucial to take in consideration the fact that combating terrorism is a form of communication, as much as terrorism is itself.

  3. Coping with Fear of and Exposure to Terrorism among Expatriates.

    Science.gov (United States)

    Beutell, Nicholas J; O'Hare, Marianne M; Schneer, Joy A; Alstete, Jeffrey W

    2017-07-19

    This paper examines existing research on the impact of terrorism on expatriate coping strategies. We consider pre-assignment fear of terrorism, in-country coping strategies, and anxiety and posttraumatic stress disorder (PTSD) associated with repatriation. The extant research is small but growing. Our model for expatriate coping at the pre-departure, in-country, and repatriation stages includes strategies specific to each stage. Preparation using proactive coping, systematic desensitization, problem and emotion focused coping, social support, and virtual reality explorations are recommended. Selecting expatriate candidates who are well-adjusted, emotionally intelligent, and possessing good coping skills is essential for successful assignments in terror-prone regions.

  4. Coping with Fear of and Exposure to Terrorism among Expatriates

    Directory of Open Access Journals (Sweden)

    Nicholas J. Beutell

    2017-07-01

    Full Text Available This paper examines existing research on the impact of terrorism on expatriate coping strategies. We consider pre-assignment fear of terrorism, in-country coping strategies, and anxiety and posttraumatic stress disorder (PTSD associated with repatriation. The extant research is small but growing. Our model for expatriate coping at the pre-departure, in-country, and repatriation stages includes strategies specific to each stage. Preparation using proactive coping, systematic desensitization, problem and emotion focused coping, social support, and virtual reality explorations are recommended. Selecting expatriate candidates who are well-adjusted, emotionally intelligent, and possessing good coping skills is essential for successful assignments in terror-prone regions.

  5. A Criminal Law Approach to Terrorism in Brazil

    Science.gov (United States)

    2014-12-01

    2 Veja Magazine, “Exclusivo: Documentos da CIA, FBI e PF Mostram Como Age a Rede do Terror Islamico no Brasil” [Exclusive: Documents from CIA, FBI...exclusivo-documentos-da-cia-fbi-e-pf-mostram-como-age-a- rede - do-terror-islamico-no-brasil. 3 Ibid. 4 Brazilian Federal Government,” Legislacao/Lei 7170/83...60 Ibid. 61 Veja Magazine, “Exclusivo: Documentos da CIA, FBI e PF Mostram como Age a Rede do Terror Islamico no Brasil.” April

  6. The problems of informational terrorism in African countries

    Directory of Open Access Journals (Sweden)

    Voznyuk Eugenia Vasylivna

    2017-12-01

    Full Text Available The features of informational terrorism in African countries, especially in SADC countries, are analyzed as well as the ways to combat information terrorism in this region. The major issues related to information terrorism are highlighted, which include data exfiltration, social engineering, insider threats, database breaches as well as poor identity and access management. The essence of Computer Security (Cyber Security is revealed and its main tasks are characterized: accessibility, integrity, including authenticity and confidentiality. The main threats for cyberspace are distinguished.

  7. Education in petrochemical industry as prevention from chemical terrorism

    International Nuclear Information System (INIS)

    Mesaric, B.; Habek, R.; Loncarevic, M.

    2009-01-01

    Technical and technological accidents in petrochemical industry, with possible catastrophic consequences, caused by anthropogenic activity (technical or technological malfunction, terror, or war destruction ), usually accompanied by great human losses and material damage and high intensity of events in a relatively short period of time, which requires a quick action of emergency responders, process personnel and the high degree of self-organized endangered population for treatment in these kind of accidents. This implies a high qualification and skills for the treatment of accidents of all factors of rescue and protection such as: process personnel, emergency responders (fire-fighters, technical services), other workers as well as the endangered population. Managing the system of protection and rescue in communities with such risks requires maximum responsibility of local authorities and management of petrochemical plants. Petrokemija Kutina, with its many years of experience as a target for military and terrorist attacks, actively participated in the creation of laws and systems of protection and rescue in the Republic of Croatia, and also in creating standard operating procedures on local and regional level, and is also ready to share its own experiences with other similar factories using toxic substances in the production processes.(author)

  8. Media use and insomnia after terror attacks in France.

    Science.gov (United States)

    Goodwin, Robin; Lemola, Sakari; Ben-Ezra, Menachem

    2018-03-01

    Direct exposure to traumatic events often precipitates sleep disorders. Sleep disturbance has also been observed amongst those indirectly exposed to trauma, via mass media. However, previous work has focused on traditional media use, rather than contemporary social media. We tested associations between both traditional and social media consumption and insomnia symptoms following 2015 terror attacks in Paris France, controlling for location and post-traumatic symptomology. 1878 respondents, selected to represent the national French population, completed an internet survey a month after the Bataclan attacks (response rate 72%). Respondents indicated different media use, post-traumatic stress and insomnia. Controlling for demographics, location and PTSD, insomnia was associated with both traditional (β 0.10, P = .001) and social media use (β 0.12, P = .001). Associations between social media and insomnia were independent of traditional media use. Interventions targeted at social media may be particularly important following mass trauma. Copyright © 2017 Elsevier Ltd. All rights reserved.

  9. The Threat Among Us: Insiders Intensify Aviation Terrorism

    Energy Technology Data Exchange (ETDEWEB)

    Krull, Katie E. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States)

    2016-08-19

    Aviation terrorism is powerful and symbolic, and will likely remain a staple target for terrorists aiming to inflict chaos and cause mass casualties similar to the 9/11 attacks on the U.S. The majority of international and domestic aviation terrorist attacks involves outsiders, or people who do not have direct access to or affiliation with a target through employment. However, several significant attacks and plots against the industry involved malicious employees motivated by suicide or devotion to a terrorist organization. Malicious insiders’ access and knowledge of aviation security, systems, networks, and infrastructure is valuable to terrorists, providing a different pathway for attacking the industry through the insider threat. Indicators and warnings of insider threats in these cases exist, providing insight into how security agencies, such as the Transportation Security Administration, can better predict and identify insider involvement. Understanding previous aviation insider threat events will likely aid in stimulating proactive security measures, rather than reactive responses. However, similar to traditional airport security measures, there are social, political, and economic challenges in protecting against the insider threat, including privacy concerns and cost-benefit analysis.

  10. Security Guards and Counter-terrorism: Tourism and Gaps in Terrorism Prevention

    Directory of Open Access Journals (Sweden)

    Luke Howie

    2014-11-01

    Full Text Available Organisation operating in the tourism industry are high priority targets for terrorists. In the aftermath of the 9/11 attacks tourism destinations, hotels and modes of public transportation have regularly been targeted by terrorists seeking to convey their violent message. As such, leaders and managers in the tourism industry carefully plan their security and counter-terrorism responses, often involving the hiring of security guards. It is here that I believe a significant gap in counter-terrorism preparedness exists. I argue that protecting tourism destinations is only possible if consideration is given the effectiveness of security guards and understanding that their well-being will impact upon their ability to deliver security. I want to draw attention to the often ignored social role of security guards. On 9/11, 42 security guards died whilst helping save the lives of thousands. They performed their jobs admirably, despite being low-paid, under-appreciated workers. In this paper I explore the social role of security guards in the context of tourism security. By drawing on representations of security guards in popular culture and reports on the state of the security guard industry. I argue that the lack of attention on the quality and well-being of guards is a significant black-spot in tourism security and terrorism preparedness.

  11. Terror in time: extending culturomics to address basic terror management mechanisms.

    Science.gov (United States)

    Dechesne, Mark; Bandt-Law, Bryn

    2018-04-11

    Building on Google's efforts to scan millions of books, this article introduces methodology using a database of annual word frequencies of the 40,000 most frequently occurring words in the American literature between 1800 and 2009. The current paper uses this methodology to replicate and identify terror management processes in historical context. Variation in frequencies of word usage of constructs relevant to terror management theory (e.g. death, worldview, self-esteem, relationships) are investigated over a time period of 209 years. Study 1 corroborated previous TMT findings and demonstrated that word use of constructs related to death and of constructs related to patriotism and romantic relationships significantly co-vary over time. Study 2 showed that the use of the word "death" most strongly co-varies over time with the use of medical constructs, but also co-varies with the use of constructs related to violence, relationships, religion, positive sentiment, and negative sentiment. Study 3 found that a change in the use of death related words is associated with an increase in the use of fear related words, but not in anxiety related words. Results indicate that the described methodology generates valuable insights regarding terror management theory and provide new perspectives for theoretical advances.

  12. The National Response Plan and the Problems in the Evaluation and Assessment of the Unconventional Modes of Terrorism

    International Nuclear Information System (INIS)

    LeMone, David V.; Gibbs, Shawn G.; Winston, John W. Jr.

    2006-01-01

    In the wake of the events of 9/11, a presidential mandate ordered the development of a master plan to enable governmental agencies to not only seamlessly cooperate but also rapidly react to disasters. The National Response Plan (NRP) is the document in force (December 2004). It was developed to provide a framework for response to catastrophic events whether those events are natural or man-made. Homeland Security, the coordinating entity, is an integral and critical part of that plan. The NRP is a direct outgrowth of the Initial National Response Plan and operates in tandem with the National Incident Management System (NIMS). NIMS was the first real attempt to amalgamate the capabilities and resources of some 22 governmental entities, non-governmental organizations (NGOs), and the private sector. The effectiveness of this system's response to natural disasters has been tested with reference to its performance during the 2005 late summer-early fall series of catastrophic hurricanes (Katrina, Rita, and Wilma). Ongoing evaluation of the response by the system indicates that there are significant lessons to be learned from system errors that occurred from the federal to local levels of government. Nevertheless, the conclusion would seem to be that Homeland Security's organizational structure of NIMS combined with protocols developed in the NRP represents an excellent response to both natural and man-made catastrophes. The lessons learned in these natural occurrences (chain of command failures and missteps from first responders to national level, periodic inaccurate and irresponsible news reporting, evacuation capabilities, quarantine problems, etc.) are directly applicable to potential man-made disaster events. In the yet largely untested areas of man-made disasters, the NRP document forms the basis for responding to terrorism as well as accidental man-made related incidents. There are two major categories of terrorism: conventional and unconventional. Conventional

  13. An Examination of How the Availability of State-backed Terrorism Insurance Programs and Commercial Terrorism Insurance Affects the Operational Decisions of Multinational Companies.

    OpenAIRE

    GREY, William / WJG

    2011-01-01

    This dissertation explores the extent to which the operational decisions of multinational companies (MNCs) are affected by the availability of State-backed terrorism insurance programs and commercial terrorism insurance. The initial hypothesis made is that MNCs will be reluctant to invest in zones or countries with high terrorism or political risks, especially when insurance for these risks may be limited or unavailable. This investigation finds that the availability of State-backed terrorism...

  14. The Development of a United Nations Counter-Terrorism Policy: A pragmatic approach to the problem of a definition of Terrorism

    OpenAIRE

    Turney-Harris, Latasha

    2014-01-01

    The primary object of this thesis is to propose a pragmatic solution to the legitimacy problems associated with the absence of a definition of Terrorism within United Nations Counter Terrorism Policy. It contends that the attempts to draft such a definition within the Ad Hoc Committee on Terrorism have now come to a political standstill and are unlikely to result in a strong legal definition of terrorism. Any outcome is likely to be a political compromise in nature. This thesis therefore ...

  15. Fear of Terrorism and Preparedness in New York City 2 Years After the Attacks: Implications for Disaster Planning and Research

    Science.gov (United States)

    Boscarino, Joseph A.; Adams, Richard E.; Figley, Charles R.; Galea, Sandro; Foa, Edna B.

    2009-01-01

    Objectives To help improve disaster planning and research, we studied psychosocial predictors of terrorism fear and preparedness among New York City residents after the World Trade Center disaster (WTCD). Method We conducted a random cross-sectional survey of 1,681 adults interviewed 2 years after the WTCD. Participants were living in New York City at the time of the attack and exposed to ongoing terrorist threats. Results We found 44.9 percent (95% confidence interval [CI] = 41.9−47.9) of residents were concerned about future attacks and 16.9 percent (95% CI = 14.7−19.3) reported a fear level of “10” on a 10-point analog scale. Furthermore, 14.8 percent (95% CI = 12.8−17.0) reported they had made some plans for a future attack, a significant increase from the previous year. In addition, although 42.6 percent (95% CI = 39.6−45.7) indicated that they would likely wait for evacuation instructions following a chemical, biological, or nuclear attack, 34.4 percent (95% CI = 31.5−37.3) reported they would evacuate immediately against official advice. Predictors of high terrorism fear in a multivariate model included Hispanic ethnicity (odds ratio [OR] = 2.0, P = .006), lower education (OR = 4.4, P terrorism threats, terrorism fear and preparedness were related to socioeconomic factors, mental health status, terrorism exposure levels, and exposure to stressful life events. PMID:17041297

  16. Twenty-five years of violence: the epidemiology of terrorism in South America.

    Science.gov (United States)

    Báez, Amado Alejandro; Sztajnkrycer, Matthew D; Zane, Richard; Giräldez, Ediza

    2008-01-01

    Terrorism is a global public health burden. South Americans have been victims of terrorism for many decades. While the causes vary, the results are the same: death, disability, and suffering. The objective of this study was to perform a comprehensive, epidemiological, descriptive study of terrorist incidents in South America. This is a cross-sectional, descriptive study. Data from January 1971 to July 2006 was selected using the RAND Terrorism Chronology 1968-1997 and RAND-Memorial Institute for Prevention of Terrorism (MIPT) Terrorism Incident database (1998-Present). Statistical significance was set at 0.05. The database reported a total of 2,997 incidents in South American countries that resulted in 3,435 victims with injuries (1.15 per incident) and 1,973 fatalities (0.66 per incident). The overall case fatality ratio (CFR) was 35.8%. Colombia had the majority of incidents with 57.9% (1,734 of 2,997), followed by Peru with 363 (12.1%), and Argentina with 267 (8.9%). The highest individual CFR occurred in Paraguay (83.3%), and the lowest in Chile with 4.8%. Of the total injuries and deaths, Colombia had 66.1% (2,269 of 2,997) of all injuries and 75.2% (1,443 out of 1,920) of all deaths. Living in the country of Colombia was associated with a 16 times greater likelihood of becoming a victim of terrorist violence [odds ratio (OR) 16.15; 95% CI 13.45 to 19.40; p < 0.0001]. The predominant method of choice for terrorist incidents was the use of conventional explosives with 2,543 of2,883 incidents (88.2%). Terrorist incidents in South America have accounted for nearly 2,000 deaths, with conventional explosive devices as the predominant method of choice. Understanding the nature of terrorist attacks and the medical consequences assist emergency preparedness and disaster management officials in allocating resources and preparing for potential future events.

  17. Coping responses in the midst of terror: the July 22 terror attack at Utøya Island in Norway.

    Science.gov (United States)

    Jensen, Tine K; Thoresen, Siri; Dyb, Grete

    2015-02-01

    This study examined the peri-trauma coping responses of 325 survivors, mostly youth, after the July 22, 2011 terror attack on Utøya Island in Norway. The aim was to understand peri-trauma coping responses and their relation to subsequent post-traumatic stress (PTS) reactions. Respondents were interviewed face-to-face 4-5 months after the shooting, and most were interviewed at their homes. Peri-trauma coping was assessed using ten selected items from the "How I Cope Under Pressure Scale" (HICUPS), covering the dimensions of problem solving, positive cognitive restructuring, avoidance, support seeking, seeking understanding, and religious coping. PTS reactions were assessed with the UCLA PTSD Reaction Index. The participants reported using a wide variety of coping strategies. Problem solving, positive cognitive restructuring, and seeking understanding strategies were reported most often. Men reported using more problem-solving strategies, whereas women reported more emotion-focused strategies. There were no significant associations between age and the use of coping strategies. Problem solving and positive cognitive restructuring were significantly associated with fewer PTS reactions. The results are discussed in light of previous research and may help to inform early intervention efforts for survivors of traumatic events. © 2014 Scandinavian Psychological Associations and John Wiley & Sons Ltd.

  18. Preventing radiological terrorism - opportunities and challenges

    International Nuclear Information System (INIS)

    Barlow, Maegon E.

    2016-01-01

    The Office of Radiological Security (ORS), within the U.S. Department of Energy's National Nuclear Security Administration, enhances global security by preventing high activity radioactive materials from use in acts of terrorism. This is a challenging task considering that high activity radiological materials are ubiquitous, constantly moving and mostly found in operational civil facilities. The implementation of the ORS mission is based on a three pillar strategy - protect, remove and reduce. ORS works both domestically and internationally with government authorities, law enforcement, and businesses to protect radioactive sources used for vital medical, research, and commercial purposes, remove and dispose of disused radioactive sources, and reduce the global reliance on radioactive sources through the promotion of viable non-isotopic alternative technologies. ORS has active engagement in all 50 States and in over 80 countries. This presentation will provide an overview of ORS protect, remove, and reduce strategy, as well as security challenges and opportunities

  19. Children's Cognitive Functioning in Disasters and Terrorism.

    Science.gov (United States)

    Pfefferbaum, Betty; Noffsinger, Mary A; Jacobs, Anne K; Varma, Vandana

    2016-05-01

    A growing literature has begun to address the cognitions that influence children's disaster reactions as well as the effects of disasters on children's cognitions. These cognitions must be viewed in the context of developmental and cultural considerations as well as disaster-related factors such as exposure and secondary stressors. This review examines the extant literature on children's cognitions related to disasters and terrorism including threat appraisal, beliefs, attention and concentration, memory, academic achievement, and executive functioning. The review highlights areas where research is lacking such as the effect of disasters on children's attention, concentration, content of disaster memories, and executive functioning. It also notes findings that may advance post-disaster screening and intervention.

  20. Nuclear terrorism: after the Washington summit

    International Nuclear Information System (INIS)

    Hautecouverture, Benjamin

    2016-01-01

    In this note, the author comments the issues addressed by the 2016 Nuclear Safety Summit (NSS) of Washington, and the content of its final statement. He notices that the scope of addressed topics has evolved since the first summits (issues related to highly enriched uranium and to plutonium), that not only technological but also political and diplomatic issues are taken into account, and that GNOs are always more involved. The author briefly comments some aspects of the content of the final statement: threat of nuclear terrorism, improvement of nuclear safety since 2010, recall of the three main pillars of the non proliferation Treaty (non proliferation, disarmament, specific uses of nuclear energy), implementation of nuclear safety under at the own responsibility and duty of countries possessing nuclear materials. Finally, the author discusses how the NSS process will go on, and evokes remaining questions regarding the existence of an actual international constraining regime, and financial and functional issues