WorldWideScience

Sample records for terrorist state defendants

  1. Defender's Edge: Utilizing Intelligent Agent Technology to Anticipate Terrorist Acts

    National Research Council Canada - National Science Library

    Scheiber, Lane

    2003-01-01

    ...), to the problem of anticipating terrorist acts. Two areas in which IAs could play a significant role are in the development and maintenance of a real-time picture of terrorist activity, and in predicting potential occurrences of terrorist acts...

  2. Suits Against Terrorist States by Victims of Terrorism

    National Research Council Canada - National Science Library

    Elsea, Jennifer K

    2008-01-01

    ... assets to satisfy judgments. After a court ruled that Congress never created a cause of action against terrorist States themselves, but only against their officials, employees, and agents, plaintiffs have based claims on state law...

  3. Islamic State and Its Attitude to the Terrorist Attacks on the Energy Sector

    Directory of Open Access Journals (Sweden)

    Lukáš Tichý

    2016-06-01

    Full Text Available The main aim of this article is both to analyze the importance of the terrorist attacks on energy infrastructure and industry for strategy of militant terrorist organization Islamic State against the background of the influence of Islam and to describe a specific example and manifestations of the terrorist activities focused on energy sector in the Middle East and North Africa. In the theoretical level, the article is based on the concept of terrorist attack on energy sector and relation between energy and Sunni Islam. In methodological level, the article is based on the case study method framing terrorist attacks of Islamic State on energy industry and infrastructure in Iraq, Syria and Libya.

  4. Preemption and Retribution: Precision-Guided Munitions to Counter Terrorist Threats

    Science.gov (United States)

    1998-04-01

    story are told. Terrorists have become skilled at cultivating 18 the " underdog " image and portraying their adversaries as ruthless aggressors...Frontiers, Israel’s War Against Terrorism, London: Arms and Armour Publications, 1990. Schmemann, Serge. " Netanyahu Defiantly Defending Botched

  5. FINANCIAL INSTRUMENTS OF THE STATE POLICY FOR THE PREVENTION OF TERRORIST ACTS IN UKRAINE

    Directory of Open Access Journals (Sweden)

    Mykola Bunchuk

    2017-11-01

    Full Text Available The article’s objective is to determine the mechanism for implementing the financial instruments of the state policy to counter terrorist acts in the territory not controlled by Ukrainian authorities in Donetsk and Luhansk regions. Methodology. Within the scientific research, for the most effective approaches at the national level to prevent the threat of international terrorism, under the conditions of the deep internal political crisis and extremely difficult economic situation, in order to improve the efficiency of public administration in developing and implementing the anti-terrorism state policies in Ukraine, the paper analyses international and domestic regulations on preventing the terrorist financing, considers factors that affect the deterioration of the social and economic situation of the temporarily occupied parts of Donbas. Results of the research allow formulating the definition of financial instruments of antiterrorist policies, the paper develops and proposes a series of organizational measures in order to prevent the terrorist financing in Ukraine. Practical implications. Based on the above, we propose an option of classification of main illegal mechanisms that may be used to finance terrorist activities in the territories of Donetsk and Luhansk regions uncontrolled by Ukrainian authorities, dividing them into internal and external. Given the above studied factors and classification of financing of terrorist acts in eastern Ukraine, we can assume that for the purpose of evading duty payable to relevant state bodies of Ukraine, external supplies of inventories in the uncontrolled areas of the Donetsk region, which are later obtained by illegal armed groups, are possibly carried out as follows: on behalf of a commercial entity registered in a foreign country for the Ukrainian commercial entity, registered in settlements located in the uncontrolled territory; crossing of international transit traffic that moves through the

  6. Combatting the Terrorist Threat.

    Science.gov (United States)

    1985-05-22

    have supplied many terrorist groups with plastique and other explosives to build bombs. 3 Using these explosives they have produced vehicle bombs which...deceptive, if not dangerously naive.1 5 State Supported Terrorism State supported terrorism is not a new concept , however, it has only recently been...terrorist incidents. The product of that study was the tri-level US anti- terrorism program concept . 3 The program structure is shown in Figure 11. President

  7. Suits Against Terrorist States by Victims of Terrorism

    Science.gov (United States)

    2008-05-01

    Nat’l City Bank v. Banco Para El Comercio Exterior de Cuba, 462 U.S. 611 (1983) (“Bancec”) to judgments against designated terrorist States. Bancec held...to determine both whether an exception to the Cuban Government’s immunity from garnishment also applies to [ Empresa de Telecomunicaciones de Cuba, S.A...was eventually reversed on other grounds by the U.S. Court of Appeals for the Eleventh Circuit — Alejandre v. Telefonica Larga Distancia de Puerto Rico

  8. 31 CFR 597.309 - Foreign terrorist organization.

    Science.gov (United States)

    2010-07-01

    ... REGULATIONS General Definitions § 597.309 Foreign terrorist organization. The term foreign terrorist... respect to which the Secretary of State has notified Congress of the intention to designate as a foreign...

  9. The Nation That Cried Lone Wolf : A Data-Driven Analysis of Individual Terrorists in the United States Since 9/11

    OpenAIRE

    Eby, Charles A.

    2012-01-01

    Approved for public release; distribution is unlimited Lone-wolf terrorist attacks have occurred in the United States throughout the countrys history. Attempted attacks from individual terrorists unaffiliated with terrorist groups may be becoming more prevalent. Both the general public and government officials acknowledge the presence and importance of these attacks; however, relatively little literature exists on the subject compared to group terrorism. Much of the information on lone wol...

  10. Terrorist targeting and energy security

    Energy Technology Data Exchange (ETDEWEB)

    Toft, Peter; Duero, Arash; Bieliauskas, Arunas [Institute of Energy, Joint Research Center of the European Commission, P.O. Box 2, 1755 ZG Petten (Netherlands)

    2010-08-15

    Sudden, short-term disruptions seriously endangering energy security can be triggered by a variety of events - among them attacks by terrorists. This study investigates terrorist attack practices against energy infrastructures and discusses how we may understand them. Our results indicate that attacks against energy infrastructures are comparatively few. Also, we find no strong connection between the ideologies of various terrorist groups and their proclivity to attack. In addition, the highly disproportionate number of attacks in a handful of countries highlights the strong geographic concentration of attacks. To explain these findings, we analyze terrorist targeting incentives including intimidation levels, symbolism, attack feasibility, and concerns for stakeholders. We argue that terrorists in general have comparatively few incentives to attack energy supply infrastructures based on our assessment of these factors. Moreover, higher levels of terrorist incidents in states more prone to internal violent conflict may suggest stronger incentives to attack energy infrastructures. When outlining energy security policies, the low frequency of worldwide attacks coupled with the high concentration of attacks in certain unstable countries should be taken into consideration. Energy importing countries could benefit from developing strategies to increase stability in key energy supply and/or transit countries facing risks of internal instability. (author)

  11. The Current Legal Framework of the Use of Force against Terrorist Organizations

    Directory of Open Access Journals (Sweden)

    Petra PERISIC

    2013-11-01

    Full Text Available Events that took place on 9/11, when symbols of American nation were destroyed by hijacked civilian airplanes, raised the issue of the effectiveness of the currently existing legal framework which regulates terrorist activities. Prior to that event, dealing with terrorist activities was mostly regulated by conventions, many of which were ratified by no more than couple of states. However, it became questionable whether these instruments are sufficient to fight terrorists who are not only immune to a threat of sanctions, but are even ready to sacrifice their lives. After the attacks took place, the United States launched against Afghanistan an armed action, ending up in a more than a decade long occupation, holding Taliban regime responsible for the attacks undertaken by Al-Qaida. The United States response to the 9/11 raised an important question: what is the legal response to terrorist attacks? This article explores the current legal framework of the use of force in response to terrorist attacks, especially with regard to distinguishing terrorist acts which are attributable to a certain state, from those which are undertaken by a terrorist group, not associated with any particular state.

  12. Terrorists and Suicide Attacks

    National Research Council Canada - National Science Library

    Cronin, Audrey K

    2003-01-01

    Suicide attacks by terrorist organizations have become more prevalent globally, and assessing the threat of suicide attacks against the United States and its interests at home and abroad has therefore...

  13. Defend the Approaches

    National Research Council Canada - National Science Library

    Patterson, Mark A

    2008-01-01

    .... territories to provide for better discrimination by Maritime Interdiction Operations (MIO). This paper argues that given the nature of the WMD threat, the United States will be better defended by forces operating closer to U.S...

  14. Evaluation of risk from acts of terrorism :the adversary/defender model using belief and fuzzy sets.

    Energy Technology Data Exchange (ETDEWEB)

    Darby, John L.

    2006-09-01

    Risk from an act of terrorism is a combination of the likelihood of an attack, the likelihood of success of the attack, and the consequences of the attack. The considerable epistemic uncertainty in each of these three factors can be addressed using the belief/plausibility measure of uncertainty from the Dempster/Shafer theory of evidence. The adversary determines the likelihood of the attack. The success of the attack and the consequences of the attack are determined by the security system and mitigation measures put in place by the defender. This report documents a process for evaluating risk of terrorist acts using an adversary/defender model with belief/plausibility as the measure of uncertainty. Also, the adversary model is a linguistic model that applies belief/plausibility to fuzzy sets used in an approximate reasoning rule base.

  15. Australian Correctional Management Practices for Terrorist Prisoners

    Directory of Open Access Journals (Sweden)

    Nathan Tompson

    2018-03-01

    Full Text Available Management practices for incarcerated terrorists is an important counterterrorism policy consideration. Moreover, there is a misconception that once incarcerated, terrorists cease to be a risk. If correctional management regimes are implemented poorly, terrorist prisoners may be afforded the opportunity to remain active while incarcerated, including the recruitment of other prisoners, and the planning of future attacks. Equally, they may be viewed as role models or martyrs for sympathisers to aspire to. Despite the magnitude of the consequences, there is no agreed approach to managing Australian terrorist prisoners. As such, a dichotomy of dominant models has emerged; that is, to either segregate terrorist prisoners, or conversely, to disperse them throughout the wider prisoner population. Each strategy presents its own set of benefits and risks. This paper compares the management practices for terrorist prisoners in the states of New South Wales and Victoria to determine the strengths and vulnerabilities of each of these approaches. The paper concludes that policy-makers should consider reassessing current strategies. It suggests that a focus that extends the immediate containment considerations to encompass post-release factors would bring benefits for society.

  16. State-Propagated Narratives about a National Defender in Central Asian States

    Directory of Open Access Journals (Sweden)

    Erica Marat

    2007-03-01

    Full Text Available This article examines the relationship between narratives propagated by the state about a historical national hero and a contemporary soldier's professional ideology in the post-Soviet Central Asian countries (Kazakhstan, Kyrgyzstan, Tajikistan, Turkmenistan, Uzbekistan. It argues that while elite-maintained mass publishing of cohesive narratives about a vividly drawn historical persona, male and warrior, trigger at raising a loyal soldier unified with his compatriots on the basis of cultural values and objects of loyalty, state elites seek to link a contemporary army recruit with his historical predecessors who fought for unity, integrity, and  dominance of the nation. But the link inevitably merges with ethno-centric ideas of protecting the cultural community identified with the narrative, as opposed to a physical entity within the state borders. State elites  reinforce the significance of military experience of the titular ethnic entity in accordance with their own political interests. Narratives about a national defender articulate what the political elites expect from the military service but are restrained from depicting in official policy documents. In order to reach effective results, the Central Asian states retained the same Soviet tools of cultivating patriotism as the basis for the army's internal discipline, but primordial characters have also been incorporated into the indoctrination.

  17. Assessing Strategic Effectiveness in the War on Terrorism

    National Research Council Canada - National Science Library

    Combs, II, Ray A

    2006-01-01

    The United States strategy for the war on terrorism encompasses four goals: defeating terrorist organizations, denying further sponsorship support, diminishing the underlying conditions that terrorists seek to exploit, and defending U.S...

  18. Money, media and the anti-politics of terrorist finance

    NARCIS (Netherlands)

    de Goede, M.

    2008-01-01

    This article offers a critical analysis of the anti-politics of terrorist finance, understood as the particularly depoliticized governing practices enabled in its name. The article conceptualizes 'terrorist finance' not as an unproblematic reality which has elicited a state response, but as a

  19. Saudi Arabia: Terrorist Financing Issues

    National Research Council Canada - National Science Library

    Blanchard, Christoper M; Prados, Alfred B

    2007-01-01

    According to the U.S. State Department 2007 International Narcotics Control Strategy Report, Saudi donors and unregulated charities have been a major source of financing to extremist and terrorist groups over the past 25 years...

  20. Factors affecting jail detention of defendants adjudicated incompetent to proceed.

    Science.gov (United States)

    Christy, Annette; Otto, Randy; Finch, Jacquelyn; Ringhoff, Daniel; Kimonis, Eva R

    2010-01-01

    The movement of defendants through the legal process who have been adjudicated incompetent to proceed is little studied, yet it is important. The purpose of this study was to provide empirical data regarding factors that affected the amount of time defendants adjudicated incompetent to proceed and ordered to undergo hospitalization remained in jail while awaiting transfer to a state hospital. Statewide data collected in Florida between July 2005 and June 2008 were used to determine the lengths of time incompetent defendants spent at certain stages in the legal process. The addition of forensic bed capacity following media attention and litigation resulted in a significant decrease in the amount of time defendants adjudicated incompetent to proceed waited in jail for transfer to a state hospital for treatment. The amount of time it took for completed commitment orders to be submitted to the state mental health authority by the Clerks of Court of each county accounted for a meaningful portion of days defendants spent in jail awaiting transfer to a state hospital, with considerable variation across counties with respect to waiting times. These findings reflect how various stakeholders can affect the amount of time defendants spend in jail while awaiting hospitalization. These issues are discussed in the context of controversy related to Florida's forensic mental health system, as well as issues related to the political process and funding of the state's mental health authority. Copyright © 2010 John Wiley & Sons, Ltd.

  1. Profile of a Terrorist.

    Science.gov (United States)

    1988-04-01

    than those questions dealing with terrorists and their methods. Explosives are used routinely and plastique has entered the terrorist’s preferred...to handle. (12:23) The female Lebanese terrorist, May Mansin, easily concealed plastique in a body cavity and proceeded to blow a hole into the side

  2. Anticipating Terrorist Safe Havens from Instability Induced Conflict

    Science.gov (United States)

    Shearer, Robert; Marvin, Brett

    This chapter presents recent methods developed at the Center for Army Analysis to classify patterns of nation-state instability that lead to conflict. The ungoverned areas endemic to failed nation-states provide terrorist organizations with safe havens from which to plan and execute terrorist attacks. Identification of those states at risk for instability induced conflict should help to facilitate effective counter terrorism policy planning efforts. Nation-states that experience instability induced conflict are similar in that they share common instability factors that make them susceptible to experiencing conflict. We utilize standard pattern classification algorithms to identify these patterns. First, we identify features (political, military, economic and social) that capture the instability of a nation-state. Second, we forecast the future levels of these features for each nation-state. Third, we classify each future state’s conflict potential based upon the conflict level of those states in the past most similar to the future state.

  3. Categorizing terrorist entities listed by the European Union according to terrorist groups’ underlying motives

    Directory of Open Access Journals (Sweden)

    Liane Rothenberger

    2015-10-01

    Full Text Available States and international organizations have compiled lists of a great variety of terrorist groups. The current European Union list includes 44 entities. This study analyzes the underlying motives of the terrorist organizations named in this list. In order to understand the groups’ motivations and consequently be able to advise on methods of countering them with communication strategies, we employ a three-item typology provided by Waldmann (2001. The results show that only five of the 44 groups were religiously motivated to commit terrorism. Most of the groups (n=20 had nationalist-separatist motives, and 19 groups displayed social-revolutionary motives. Based on the respective motives, differing counter-terrorism strategies are proposed, e.g., developing rhetorical counter-narratives that address and reduce the groups’ motivational and identity-generating characteristics.

  4. How and Why Do Terrorist Organizations Use the Internet?

    Directory of Open Access Journals (Sweden)

    Karolina Wojtasik

    2017-12-01

    Full Text Available The article gives general characterisation of the ways in which these organizations use modern communication technologies. Currently, every major terrorist organisation maintain robust media wings, which focus on producing videos, publishing magazines and sharing them with the public via the Web. The empirical system of reference is based on the activity of al-Qaeda, her franchise AQAP (al-Qaeda in the Arabian Peninsula and ISIS (the so-called Islamic State. While analysing the media of terrorist organisations, the Lasswell model was applied. This formula is a standard research procedure used for investigating acts of communication by answering the questions: who, says what, in which channel, to whom, with what effect?. The author also present typology of videos produced by jihadist organisations, characterised the most important and active media actions of terrorist organisations and a typology of recipients of such messages. The article presents a number of reasons why the Internet has become such an important tool for terrorists.

  5. Closing the gap : measuring the social identity of terrorists

    OpenAIRE

    Ludwick, Keith W.

    2008-01-01

    CHDS State/Local Studies of terrorism today focus on psychological and behavioral aspects of individuals. Most research shows that using a single model in an attempt to profile terrorists psychologically is problematic, if not impossible. However, using two well established theories from social psychology, Social Identity Theory and Social Distance Theory, allows the development of a practical model to develop a social profile of a terrorist group. From that, it is further possible to...

  6. Motives of terrorist acts

    Directory of Open Access Journals (Sweden)

    Krstić Marko

    2015-01-01

    Full Text Available Terrorism is a relatively new phenomenon, and data on terrorist motivations and psychological profiles of terrorists are fairly scarce and limited. In theory, there is a large number of quantitative analyses of collective violence, murder, and crime, however, none of these can be identified with terrorism. Most current studies do not consider a great heterogeneity of terrorists, and numerous practical, conceptual, and psychological barriers slow down the science of learning about terrorism. Psychology, as a science of behavior, certainly makes a great contribution to the study of terrorism as a very complex phenomenon. The aim of this paper is to analyze and synthesize social and psychological determinants which contribute to the development of terrorist motives, and to elaborate on those facts which have been discussed in scientific and professional literature so far.

  7. Training, SEVIS, and NSEERS: Will They Stop Terrorists from Entering the U.S

    National Research Council Canada - National Science Library

    Bugarin, Darwina S

    2007-01-01

    .... Stopping their entry is key to preventing attacks. The 9/11 Commission's Staff Report of the National Commission on Terrorist Attacks Upon the United States, 9/11 and Terrorist Travel, identified pre-9/11 gaps/weaknesses in U.S...

  8. Forensic Analysis of Terrorist Counter-Financing to Combat Nuclear Proliferation

    Energy Technology Data Exchange (ETDEWEB)

    Drame, B. [Brookhaven National Lab. (BNL), Upton, NY (United States); Toler, L. [Brookhaven National Lab. (BNL), Upton, NY (United States); Bachner, Katherine [Brookhaven National Lab. (BNL), Upton, NY (United States)

    2016-02-01

    The single greatest threat to U.S. homeland security remains the proliferation of nuclear weapons, especially among terrorists and other non-state actors who are not governed by the Non-Proliferation Treaty. One of the most important tools for combating terrorism among such rogue actors is counter-financing. Without funding, terrorists cannot acquire, maintain, or deploy nuclear weapons. According to the official report of the 9/11 Commission, counter-financing could have prevented the attacks of September 11, 2001. Unfortunately, no single country can defeat global terrorism. Successful counter-financing requires significant international cooperation. Since 2001, the United States and the European Union, despite vastly different approaches to intelligence gathering, have shared information through the Terrorist Finance Tracking Program (TFTP). That shared information allows authorities to trace suspicious transactions, identify culprits, and map out global terrorist networks. The TFTP successfully thwarted a 2011 plot to assassinate the Saudi Arabian Ambassador to the U.S. and multiple threats during the 2012 Summer Olympics in London; it also aided in the investigation of the 2013 Boston Marathon bombing. That program is necessary but not sufficient. To strengthen our ability to detect and disrupt terrorist plotting and prevent nuclear proliferation, we must expand and coordinate two additional transnational measures: (1) the Society for Worldwide Interbank Financial Telecommunications (SWIFT), a standardized global messaging network for financial institutions to quickly, accurately, and securely send and receive money transfer instructions, and (2) International Bank Account Numbers (IBAN) to identify individual accounts involved in international transactions. Both initiatives were incompletely adopted in the wake of 9/11, but most global banks use one or neither. More fully implementing and coordinating these two systems would allow for coherent information

  9. Posse Comitatus and the Use of the Military in Denying Terrorist Access to the United States Along the Border with Mexico

    National Research Council Canada - National Science Library

    Thomas, Greg A

    2005-01-01

    .... The largely unsecured border we share with Mexico is an enticing avenue for illegal immigrants and drug smugglers but also, and more importantly, for potential terrorists hostile to the United States...

  10. Homeland Security: Defending U.S. Airspace

    National Research Council Canada - National Science Library

    Bolkcom, Christopher

    2005-01-01

    The September 11th attacks drew attention to U.S. air defense, and the 9/11 Commission Report recommended that Congress regularly assess the ability of Northern Command to defend the United States against military threats. Protecting U.S...

  11. Homeland Security: Defending U.S. Airspace

    National Research Council Canada - National Science Library

    Bolkcom, Christopher

    2006-01-01

    The September 11th attacks drew attention to U.S. air defense, and the 9/11 Commission Report recommended that Congress regularly assess the ability of Northern Command to defend the United States against military threats. Protecting U.S...

  12. INTERNATIONALLY LEGAL MEASURES TO COMBAT TERRORIST FINANCING

    Directory of Open Access Journals (Sweden)

    Yuniarti Yuniarti

    2014-09-01

    Full Text Available Following the terrorist attacks in the USA on September 11th, 2001, it was discovered that money laundering was a significant source of finance for terrorists. Although, the amount of money that involve is not as involve as in drug and gun trafficking, terrorist financing had been the most important substance to be monitor. Further, various legal measures have been taken internationally in order to combat terrorist financing. This research analyses the legal measures that have been taken internationally and at EU level to combat terrorist financing. Key words: Money Laundering, Terrorist Financing, International Legal measures, EU.

  13. EWAS: Modeling Application for Early Detection of Terrorist Threats

    Science.gov (United States)

    Qureshi, Pir Abdul Rasool; Memon, Nasrullah; Wiil, Uffe Kock

    This paper presents a model and system architecture for an early warning system to detect terrorist threats. The paper discusses the shortcomings of state-of-the-art systems and outlines the functional requirements that must to be met by an ideal system working in the counterterrorism domain. The concept of generation of early warnings to predict terrorist threats is presented. The model relies on data collection from open data sources, information retrieval, information extraction for preparing structured workable data sets from available unstructured data, and finally detailed investigation. The conducted investigation includes social network analysis, investigative data mining, and heuristic rules for the study of complex covert networks for terrorist threat indication. The presented model and system architecture can be used as a core framework for an early warning system.

  14. The psychology of defendant plea decision making.

    Science.gov (United States)

    Redlich, Allison D; Bibas, Stephanos; Edkins, Vanessa A; Madon, Stephanie

    2017-01-01

    Every day, thousands of defendants, prosecutors, and defense attorneys must make guilty plea decisions, such as whether to accept a plea offer or proceed to trial. Most defendants opt to plead guilty; approximately 95% of state and federal convictions result from guilty pleas. In light of a newly emerging body of research and recent Supreme Court decisions on guilty pleas, this article asks and answers 2 questions: First, who pleads guilty and why? We describe the characteristics of those who are more or less likely to plead guilty, and examine the reasons why individuals plead guilty instead of proceeding to trial, exploring the cognitive, social influence, and developmental factors that underlie decision making. Second, are defendants' plea decisions valid, in that the decisions are made knowingly, intelligently, voluntarily, and with a factual basis of guilt? That is, do defendants who plead guilty understand and appreciate the conditions and consequences of their pleas, as required by law? Are innocent people induced to plead guilty to crimes they did not commit? We conclude with suggestions to move the field of plea research forward. (PsycINFO Database Record (c) 2017 APA, all rights reserved).

  15. Defending one's friends, not one's enemies: A social network analysis of children's defending, friendship, and dislike relationships using XPNet.

    Science.gov (United States)

    Oldenburg, Beau; Van Duijn, Marijtje; Veenstra, René

    2018-01-01

    Previous studies investigating to what extent students in elementary schools defend their victimized classmates typically treated defending as an individual characteristic. Defending should, however, be seen as a directed dyadic relationship between a victim and a defender, who are embedded multiple positive and negative relationships with each other and their classmates. Accordingly, in the present study defending was investigated using social network analysis. More specifically, it was investigated to what extent defending relationships co-occurred with friendship and dislike relationships involving not only the victim and the defender but also other classmates. Bivariate Exponential Random Graph Models (ERGMs) were used to analyze the defending-friendship and defending-dislike relationships in seven grade-three classrooms. As hypothesized, the results indicated that victimized students were likely to be defended by students who they perceive as friends or who perceive them as friends. Moreover, defending was likely to occur when the victim and (potential) defender had the same friends. Victimized students were unlikely to be defended by classmates whom they disliked or who had indicated to dislike them. Finally, defending was likely to occur between students who disliked the same classmates.

  16. What Are We Really Afraid Of? The Practitioner View of the Terrorist Threat in the United States

    Science.gov (United States)

    2005-03-01

    like intelligence gathering and courier work • 80% single • Familiarity with home ground. Thus terrorists come from both rural and urban areas • 66...codes also help disaggregate intra- - 114 - state regions by identifying urban areas from suburban and rural . Finally, through geographic mapping...National Laboratory for Tourism and eCommerce (NLTEC), University of Illinois at Urbana-Champaign. 2002. Self-Selection Biases in the Internet

  17. Increased Incidence Rate of Trauma- and Stressor-Related Disorders in Denmark After the September 11, 2001, Terrorist Attacks in the United States

    DEFF Research Database (Denmark)

    Hansen, Bertel T; Østergaard, Søren D; Sønderskov, Kim M

    2016-01-01

    The terrorist attacks that occurred on September 11, 2001 (hereafter referred to as 9/11) in the United States had a profound impact on the physical and mental health of Americans, but the effects beyond the United States are largely unknown. To understand the wider aftermath, we examined...

  18. Terrorists and Sponsors. An Inquiry into Trust and Double-Crossing

    Science.gov (United States)

    McCormick, Gordon H.; Owen, Guillermo

    We consider the conditions that lead to the dissolution of state-terrorist coalitions. While such coalitions have well known advantages, they also have structural weaknesses that are largely ignored in the literature on the state sponsorship of terrorism. Each player in the coalition has interests that are only partially shared and, in some cases, at odds with those of its partner. Long term cooperation must be based on mutual advantage and mutual trust, both of which are subject to change over time.We examine the conditions that are needed to begin and maintain a cooperative strategy and the circumstances that lead a state and a terrorist group to leave the coalition and double-cross its partner. Equilibrium strategies for both players are defined and interpreted.

  19. `Googling' Terrorists: Are Northern Irish Terrorists Visible on Internet Search Engines?

    Science.gov (United States)

    Reilly, P.

    In this chapter, the analysis suggests that Northern Irish terrorists are not visible on Web search engines when net users employ conventional Internet search techniques. Editors of mass media organisations traditionally have had the ability to decide whether a terrorist atrocity is `newsworthy,' controlling the `oxygen' supply that sustains all forms of terrorism. This process, also known as `gatekeeping,' is often influenced by the norms of social responsibility, or alternatively, with regard to the interests of the advertisers and corporate sponsors that sustain mass media organisations. The analysis presented in this chapter suggests that Internet search engines can also be characterised as `gatekeepers,' albeit without the ability to shape the content of Websites before it reaches net users. Instead, Internet search engines give priority retrieval to certain Websites within their directory, pointing net users towards these Websites rather than others on the Internet. Net users are more likely to click on links to the more `visible' Websites on Internet search engine directories, these sites invariably being the highest `ranked' in response to a particular search query. A number of factors including the design of the Website and the number of links to external sites determine the `visibility' of a Website on Internet search engines. The study suggests that Northern Irish terrorists and their sympathisers are unlikely to achieve a greater degree of `visibility' online than they enjoy in the conventional mass media through the perpetration of atrocities. Although these groups may have a greater degree of freedom on the Internet to publicise their ideologies, they are still likely to be speaking to the converted or members of the press. Although it is easier to locate Northern Irish terrorist organisations on Internet search engines by linking in via ideology, ideological description searches, such as `Irish Republican' and `Ulster Loyalist,' are more likely to

  20. Know thy enemy: Education about terrorism improves social attitudes toward terrorists.

    Science.gov (United States)

    Theriault, Jordan; Krause, Peter; Young, Liane

    2017-03-01

    Hatred of terrorists is an obstacle to the implementation of effective counterterrorism policies-it invites indiscriminate retaliation, whereas many of the greatest successes in counterterrorism have come from understanding terrorists' personal and political motivations. Drawing from psychological research, traditional prejudice reduction strategies are generally not well suited to the task of reducing hatred of terrorists. Instead, in 2 studies, we explored education's potential ability to reduce extreme negative attitudes toward terrorists. Study 1 compared students in a college course on terrorism (treatment) with wait-listed students, measuring prosocial attitudes toward a hypothetical terrorist. Initially, all students reported extremely negative attitudes; however, at the end of the semester, treatment students' attitudes were significantly improved. Study 2 replicated the effect within a sample of treatment and control classes drawn from universities across the United States. The present work was part of an ongoing research project, focusing on foreign policy and the perceived threat of terrorism; thus classes did not explicitly aim to reduce prejudice, making the effect of treatment somewhat surprising. One possibility is that learning about terrorists "crowds out" the initial pejorative associations-that is, the label terrorism may ultimately call more information to mind, diluting its initial negative associative links. Alternatively, students may learn to challenge how the label terrorist is being applied. In either case, learning about terrorism can decrease the extreme negative reactions it evokes, which is desirable if one wishes to implement effective counterterrorism policies. (PsycINFO Database Record (c) 2017 APA, all rights reserved).

  1. Terrorist threats of nuclear facilities

    International Nuclear Information System (INIS)

    Jozsef Solymosi; Jozser Ronaky; Zoltan Levai; Arpad Vincze; Laszlo Foldi

    2004-01-01

    More than one year has passed since the terrible terrorist attacks against the United States. The tragic event fundamentally restructured our security policy approach and made requirements of countering terrorism a top priority of the 21st century. In one year a lot of studies were published and the majority of them analyses primarily the beginnings of terrorism then focus on the interrelations of causes and consequences of the attacks against the WTC. In most of the cases the authors can only put their questions most of which have remained unanswered to date. Meanwhile, in a short while after the attacks the secret assessments of threat levels of potential targets and areas were also prepared. One of the high priority fields is the issue of nuclear, biological, and chemical security, in short NBC-security. Here and now we focus on component N, that is the assessment techniques of nuclear security in short, without aiming at completeness. Our definite objective is to make non-expert readers understand - and present a concrete example as it is done in risk analysis - the real danger-level of nuclear facilities and especially the terrorist threat. Our objective is not to give tips to terrorists but to provide them with deterring arguments and at the same time calm worried people. In our communique we give an overview of international practice of nuclear antiterrorism and of preventive nuclear protection in Hungary. (author)

  2. Understanding public confidence in government to prevent terrorist attacks.

    Energy Technology Data Exchange (ETDEWEB)

    Baldwin, T. E.; Ramaprasad, A,; Samsa, M. E.; Decision and Information Sciences; Univ. of Illinois at Chicago

    2008-04-02

    A primary goal of terrorism is to instill a sense of fear and vulnerability in a population and to erode its confidence in government and law enforcement agencies to protect citizens against future attacks. In recognition of its importance, the Department of Homeland Security includes public confidence as one of the principal metrics used to assess the consequences of terrorist attacks. Hence, a detailed understanding of the variations in public confidence among individuals, terrorist event types, and as a function of time is critical to developing this metric. In this exploratory study, a questionnaire was designed, tested, and administered to small groups of individuals to measure public confidence in the ability of federal, state, and local governments and their public safety agencies to prevent acts of terrorism. Data was collected from three groups before and after they watched mock television news broadcasts portraying a smallpox attack, a series of suicide bomber attacks, a refinery explosion attack, and cyber intrusions on financial institutions, resulting in identity theft. Our findings are: (a) although the aggregate confidence level is low, there are optimists and pessimists; (b) the subjects are discriminating in interpreting the nature of a terrorist attack, the time horizon, and its impact; (c) confidence recovery after a terrorist event has an incubation period; and (d) the patterns of recovery of confidence of the optimists and the pessimists are different. These findings can affect the strategy and policies to manage public confidence after a terrorist event.

  3. Improving Local and State Agency Response to Terrorist Incidents Involving Biological Weapons

    National Research Council Canada - National Science Library

    2003-01-01

    .... Because of multiple terrorist acts such as the September II, 2001 attacks on the Pentagon and the World Trade Center, as well as anthrax contaminated mail and the Oklahoma City bombing, there is a...

  4. The Decision Calculus of Terrorist Leaders

    OpenAIRE

    J. Tyson Chatagnier; Alex Mintz; Yair Samban

    2012-01-01

    This article contributes to the literature on terrorist group decision-making by introducing a new procedure, Applied Decision Analysis, in an attempt to understand how leaders of terrorist organizations make decisions. We examine twenty-three decisions taken by leaders of three terrorist organizations: Al-Qaeda, Hamas, and Hizballah. We also demonstrate the use of the Applied Decision Analysis procedure to uncover the "Decision DNA" or “decision code” of leaders of such organizat...

  5. Malevolent Creativity in Terrorist Organizations

    Science.gov (United States)

    Gill, Paul; Horgan, John; Hunter, Samuel T.; Cushenbery, Lily D.

    2013-01-01

    Terrorist organizations are both imitative and innovative in character. While the drivers of imitation have been extensively modeled using concepts such as contagion and diffusion, creativity and innovation remain relatively underdeveloped ideas in the context of terrorist behavior. This article seeks to redress this deficiency by presenting a…

  6. The Counter Terrorist Classroom: Religion, Education, and Security

    Science.gov (United States)

    Gearon, Liam

    2013-01-01

    The article identifies international cases--from the United States, Europe, and the United Nations--of an emergent interface of religion, education, and security. This is manifest in the uses of religion in education to counter religious extremism, the notional "counter terrorist classroom." To avoid an over-association of extremism with…

  7. Terrorist Capabilities for Cyberattack: Overview and Policy Issues

    Science.gov (United States)

    2007-01-22

    called “Digital Pearl Harbor” (DPH), with the result that 79% of the gamers said that a strategic cyberattack against the United States was likely...terrorist sponsors, five of them — North Korea , Sudan, Syria, Libya, and Cuba — are described as a diminishing concern for terrorism. Only Iran remains

  8. Comment on the first anniversary of the terrorist attacks in the United States of America. Vienna, 11 September 2002

    International Nuclear Information System (INIS)

    ElBaradei, M.

    2002-01-01

    The IAEA has long been active in encouraging States to make security an integral part of the management of their nuclear programmes. The attacks in September 2001 were, however, a wake-up call to the world nuclear community that more can and must be done. In the wake of the terrorist attacks, Member States of the IAEA meeting in the Agency's General Conference adopted a resolution requesting that the IAEA Director General initiate a thorough review of the Agency's activities and programmes relevant to preventing acts of terrorism involving nuclear and other radioactive materials. The Agency moved rapidly to respond. It devised and is presently implementing an integrated action plan which includes enhanced and new activities to upgrade nuclear security worldwide and to combat nuclear terrorism. The plan covers eight areas: (1) physical protection of nuclear material and nuclear facilities; (2) detection of malicious activities (such as illicit trafficking) involving nuclear and other radioactive materials; (3) strengthening of State systems for nuclear material accountancy and control; (4) security of radioactive sources; (5) the assessment of safety and security related vulnerabilities at nuclear facilities; (6) response to malicious acts or threats thereof; (7) the adherence to international agreements and guidelines; and (8) co-ordination and information management for nuclear security related matters. National measures for protecting nuclear material and facilities remain uneven in their substance and application. There is wide recognition that the international physical protection regime needs to be further strengthened. Through its International Physical Protection Advisory Service (IPPAS), the Agency provides Member States with assessment services, together with associated advice and follow up actions to improve security arrangements at nuclear facilities. It also provides training and workshops, notably in assessing threats, as well as other supporting

  9. Detecting Hidden Hierarchy of Non Hierarchical Terrorist Networks

    DEFF Research Database (Denmark)

    Memon, Nasrullah

    measures (and combinations of them) to identify key players (important nodes) in terrorist networks. Our recently introduced techniques and algorithms (which are also implemented in the investigative data mining toolkit known as iMiner) will be particularly useful for law enforcement agencies that need...... to analyze terrorist networks and prioritize their targets. Applying recently introduced mathematical methods for constructing the hidden hierarchy of "nonhierarchical" terrorist networks; we present case studies of the terrorist attacks occurred / planned in the past, in order to identify hidden hierarchy...

  10. Exploring the Iran-Hezbollah Relationship: A Case Study of how State Sponsorship affects Terrorist Group Decision-Making

    Directory of Open Access Journals (Sweden)

    Marc R. DeVore

    2012-10-01

    Full Text Available Understanding the impact of state sponsorship on the decision-making of violent non-state actors is among the more important issues to scholars of security studies. This article addresses the issue by examining the relationship between Iran and Lebanon’s Hezbollah. To preview its conclusions, there are two main perspectives to consider with regard to the terrorist group – state sponsor relationship. First, state support has a powerful, yet indirect effect on violent non-state actor decision-making by shaping the options available to groups’ leaders.  Second, state sponsors can also directly leverage their aid to shape the strategic decisions of armed non-state actors, forcing their clients to either expand or restrict their activities. Because of inevitable lacunae and contradictions amongst published accounts, this study relies heavily upon primary sources and data collected during field research in Lebanon, including interviews with leaders from Hezbollah, the Lebanese Army, the United Nations' Peacekeeping Mission in Southern Lebanon (UNIFIL and the rival Shia organization, Amal.

  11. 31 CFR 595.311 - Specially designated terrorist.

    Science.gov (United States)

    2010-07-01

    ...) OFFICE OF FOREIGN ASSETS CONTROL, DEPARTMENT OF THE TREASURY TERRORISM SANCTIONS REGULATIONS General Definitions § 595.311 Specially designated terrorist. (a) The term specially designated terrorist means: (1...

  12. Understanding Terrorist Ideology

    National Research Council Canada - National Science Library

    Cragin, Kim

    2007-01-01

    This variation, by its very nature, makes it somewhat difficult to identify overarching patterns in how terrorist ideologies might motivate individuals and sympathetic communities on a global level...

  13. Religious cover to terrorist movement

    International Nuclear Information System (INIS)

    Zaidi, M.K.

    2005-01-01

    Full text: Terrorism is the use of force or the threat of force against civilian populations to achieve political objectives. The terrorists create fear, response and disruption. People fighting for freedom who have no bombs - no airplanes would resort to such atrocities as beheading even though killing of innocent people is strictly prohibited in all the religions practiced on this earth. It is done out of political madness and not religious fervor so it was said that the fight against terrorism is not a military problem, nor is it a diplomatic one, but a cultural one. Terrorism is not associated to any particular faith or discipline but it is rooted deeply in poor education and resource system. Some frustrated individuals with no employment seek easy ways to form groups and cause harassment in neighborhoods and it expands to the local and national level. The scientific community must now resolve to confront the dangers facing civilized countries through employing the scientific culture, which means scientific excellence and solidarity, to overcome ignorance in the face of global terrorism. The developed nations have adopted to collect information, do research, have tools to act and take action. States must improve the timely cross-border sharing of national security intelligence information, under appropriate circumstances, between intelligence and law enforcement agencies to better prevent and disrupt terrorist activities and to prosecute terrorists. Some world's leaders have agreed to use the national security intelligence information in investigation and prosecution process as a vital component in the battle against terrorism. Political leaders, rulers, administrator, school counselors and teachers should think of how the problems could be solved if they meet the needs and hopes of their inhabitants, provide proper education to build good moral values and also address their concerns. (author)

  14. Religious cover to terrorist movement

    Energy Technology Data Exchange (ETDEWEB)

    Zaidi, M K [US Department of Energy, Idaho Radiological and Environmental Sciences Laboratory (RESL), Idaho Falls (United States)

    2005-07-01

    Full text: Terrorism is the use of force or the threat of force against civilian populations to achieve political objectives. The terrorists create fear, response and disruption. People fighting for freedom who have no bombs - no airplanes would resort to such atrocities as beheading even though killing of innocent people is strictly prohibited in all the religions practiced on this earth. It is done out of political madness and not religious fervor so it was said that the fight against terrorism is not a military problem, nor is it a diplomatic one, but a cultural one. Terrorism is not associated to any particular faith or discipline but it is rooted deeply in poor education and resource system. Some frustrated individuals with no employment seek easy ways to form groups and cause harassment in neighborhoods and it expands to the local and national level. The scientific community must now resolve to confront the dangers facing civilized countries through employing the scientific culture, which means scientific excellence and solidarity, to overcome ignorance in the face of global terrorism. The developed nations have adopted to collect information, do research, have tools to act and take action. States must improve the timely cross-border sharing of national security intelligence information, under appropriate circumstances, between intelligence and law enforcement agencies to better prevent and disrupt terrorist activities and to prosecute terrorists. Some world's leaders have agreed to use the national security intelligence information in investigation and prosecution process as a vital component in the battle against terrorism. Political leaders, rulers, administrator, school counselors and teachers should think of how the problems could be solved if they meet the needs and hopes of their inhabitants, provide proper education to build good moral values and also address their concerns. (author)

  15. Defendants' Rights in Criminal Trials.

    Science.gov (United States)

    Martin, Ralph C., II; Keeley, Elizabeth

    1997-01-01

    Reviews the protections afforded by the Constitution for defendants in criminal trials. These include the right to a jury trial (in cases of possible incarceration), an impartial jury, and the requirement of a unanimous verdict. Defends the use of plea bargaining as essential to an efficient criminal justice system. (MJP)

  16. Terrorist Financing: The 9/11 Commission Recommendation

    National Research Council Canada - National Science Library

    Weiss, Martin A

    2005-01-01

    .... The Commission recommended that the U.S. government shift the focus of its efforts to counter terrorist financing from a strategy based on seizing terrorist assets to a strategy based on exploiting intelligence gathered from financial investigations...

  17. Modeling attacker-defender interactions in information networks.

    Energy Technology Data Exchange (ETDEWEB)

    Collins, Michael Joseph

    2010-09-01

    The simplest conceptual model of cybersecurity implicitly views attackers and defenders as acting in isolation from one another: an attacker seeks to penetrate or disrupt a system that has been protected to a given level, while a defender attempts to thwart particular attacks. Such a model also views all non-malicious parties as having the same goal of preventing all attacks. But in fact, attackers and defenders are interacting parts of the same system, and different defenders have their own individual interests: defenders may be willing to accept some risk of successful attack if the cost of defense is too high. We have used game theory to develop models of how non-cooperative but non-malicious players in a network interact when there is a substantial cost associated with effective defensive measures. Although game theory has been applied in this area before, we have introduced some novel aspects of player behavior in our work, including: (1) A model of how players attempt to avoid the costs of defense and force others to assume these costs; (2) A model of how players interact when the cost of defending one node can be shared by other nodes; and (3) A model of the incentives for a defender to choose less expensive, but less effective, defensive actions.

  18. Peace with Guarantees of Life and Territory for Colombian Peasants: A Fight That Doesn't Cost Us Our Lives. "Let Us Defend Our Defenders"

    Directory of Open Access Journals (Sweden)

    Julia Lledín Vitos

    2017-09-01

    Full Text Available This article gathers the main findings of a research project the authors conducted as part of the Permanent Committee for the Defense of Human Rights on the situation of human rights defenders (HRDs in Colombia's rural contexts. The research included the following components: interviews with organizations and institutions working on the issue of protection; the implementation of a survey of 174 HRDs from twelve departments of the country; and the implementation of seven regional workshops, with the participation of 150 defenders, where participatory methodologies for risk analysis and research were used. From the analysis of the information, it was concluded that the majority had been victims of some type of aggression by reason of their work. The risks human rights defenders face in Colombia are related with the armed conflict, but also with the struggles for land and territory. The bodies responsible for the assaults were, fundamentally, the paramilitary successors and agents of the State, especially the Army. As a result of the research, it was established that the protection in the rural contexts requires differential responses by the State; these should respond to a combination of individual and collective measures of prevention, protection, and self-protection, which have turned out to be effective from the experience of the people.

  19. The Lord’s Resistance Army: an African Terrorist Group?

    Directory of Open Access Journals (Sweden)

    Emma Leonard

    2011-01-01

    Full Text Available The years since 9/11 have been characterised by the increasing threat of terrorist action in the  Middle East and South Asia. Yet Sub-Saharan Africa was has also become a region of concern. In 1998, it had been the scene of two Al-Qaeda attacks against US embassies; besides Africa is home to large Muslim populations. Since 9/11 African violent non-state groups unrelated to Al- Qaeda or to the wider Islamist movement have been recast as terrorist organisations. These groups primarily operate in conflict zones, an area of research that traditionally has not been the main focus of Terrorism Studies. Protagonists have at various times been called freedom fighters, rebels, warlords, insurgents or simply violent gangs. This article looks at the most notorious of African groups – the Lord’s Resistance Army (LRA. It argues that some groups like the LRA have been recast as terrorist organisations not because of a change in their activities but due to a change in the geo-strategic environment they found themselves in the post-9/11 period. The LRA’s ideology and tactics will be judged against a broad definition of terrorism in order to test whether the group can, in an objective way, be called a terrorist organisation. It is concluded that the LRA is too ambiguous an organisation to be simply labelled in such a way. It is also suggested that the terrorism label has in fact been an obstacle to attempts to end successfully a confrontation that is now going into its 24th year. 

  20. Real Time Big Data Analytics for Predicting Terrorist Incidents

    Science.gov (United States)

    Toure, Ibrahim

    2017-01-01

    Terrorism is a complex and evolving phenomenon. In the past few decades, we have witnessed an increase in the number of terrorist incidents in the world. The security and stability of many countries is threatened by terrorist groups. Perpetrators now use sophisticated weapons and the attacks are more and more lethal. Currently, terrorist incidents…

  1. Immigration: Terrorist Grounds for Exclusion and Removal Aliens

    National Research Council Canada - National Science Library

    Garcia, Michael J; Wasem, Ruth E

    2008-01-01

    ...., legal permanent residents) or temporarily as nonimmigrants. Notably, any alien who engages in terrorist activity, or is a representative or member of a designated foreign terrorist organization, is generally inadmissible...

  2. Political terrorism and affective polarization in "black" and "red" terrorists in Italy during the years 1968-1988.

    Science.gov (United States)

    Pacini, Matteo; Maremmani, Icro

    2018-04-01

    Psychiatric evaluations of violent political crime were mostly performed on a case-by-case basis in a forensic environment, which made them unduly dependent on categories of presumed dangerousness and legal responsibility, rather than on a clinical definition of their mental status. In referring to such "clinical" definitions, the disorder we have in mind is not limited to the major, agitated psychotic manias or mixed states. The presence of a dominant temperament, or protracted hypomania, is enough by itself to explain an individual's engagement in a wide range of activities, not necessarily sociopathic or violent. We put forward the hypothesis that formal and transpolitical radical choices, either in favor of an illegal lifestyle or of activities involving a high level of risk, may be linked with certain mental states, especially when considering small clandestine groups showing a high level of internal ideological consensus, and a no-return attitude toward a commitment to radical choices. Available data about the psycho(patho)logical profile of terrorists are still hard to come by. The only available studies are those on identified living terrorists (judging by the trials of those who personally admitted to having been terrorists), and statistical data imply a number of documented cases belonging to the same terrorist organization. In Italy, the period often called the "years of lead [bullets]" displays an interesting viewpoint for the study of terrorist psychology, for two main reasons: first of all, it is a historically defined period (1968-1988), and second, the number of ascertained participants in terrorist activities was quite large.

  3. Will it Ever be Possible to Profile the Terrorist?

    Directory of Open Access Journals (Sweden)

    Jonathan A Rae

    2012-09-01

    Full Text Available 'This paper critiques the claim that terrorists can be profiled – that is to say that terrorists possess distinguishable attributes that can be conceivably identified by an observer. In doing so, the most prominent profiling parameters - racial, gender, age, pathological, psychological and socioeconomic – are investigated. The above approaches are found to have little to no applied value in identifying terrorists from a societal population. The dominant criticisms of these methods emphasise their crude reductionism, an absence of internal and external validity, and their lack of practical application. Current evidence indicates that the profiling of terrorists is a futile venture.'

  4. CAROLIN GOERZIG. TALKING TO TERRORISTS: CONCESSIONS AND THE RENUNCIATION OF VIOLENCE. REVIEWED BY: SCOTT NICHOLAS ROMANIUK

    Directory of Open Access Journals (Sweden)

    Scott Nicholas Romaniuk

    2016-03-01

    Full Text Available “Talking to terrorists remains a taboo” (Goerzig, 2010: p. 125. The adoption and reinforcement of such a moral position by many Western and non-Western governments alike has played no small role in, to a large extent, states to contain the violence and insecurity bred by terror activist in the post-Cold war and post-9/11 periods. Yet, few policymakers seem to recognize the danger in building political and social environments in which dialogue between states and terrorist groups and organizations is little more than depravity or even a betrayal to entire populations. To be sure, the protection of civilian populations has been entrusted to states that might otherwise learn better means of terrorism deterrence if lines of communication between states and terrorists were less constrained. The taboo of which Carolin Goerzig speaks, is one that “has been institutionalized in a legal framework in which … academics are being asked to report on their students and in which attempting to understand the subjectivities of ‘terrorist’ suspects could be interpreted as a ‘glorification of terrorism’” (Jackson quoted in Goerzig, 2010: p. 125.

  5. Underlying Reasons for Success and Failure of Terrorist Attacks: Selected Case Studies

    National Research Council Canada - National Science Library

    McCleskey, Edward; McCord, Diana; Leetz, Jennifer; Markey, John

    2007-01-01

    .... This is the second of a two-phased effort: Phase I focused on assessing the underlying reasons for the success and failure of terrorist attacks against targets within the United States and against U.S. interests abroad...

  6. Determining a Criminal Defendant's Competency to Proceed With an Extradition Hearing.

    Science.gov (United States)

    Piel, Jennifer; Finkle, Michael J; Giske, Megan; Leong, Gregory B

    2015-06-01

    When a criminal defendant flees from one state (often referred to as the requesting state) to another (often referred to as the asylum state), the requesting state can demand that the asylum state return the defendant through a process called extradition. Only a handful of states have considered a fugitive's right to be competent to proceed with an extradition hearing. Those states fall into three categories. Some states apply the same standard as in criminal trial competency cases. Others apply a more limited competency standard. Two have found that a fugitive has no right to be competent to proceed in an extradition hearing. The particular legal test adopted affects the nature and scope of the competency evaluation conducted by the psychiatrist or psychologist in the extradition hearing. In addition, we are not aware of any state that has considered what happens to the fugitive if he is ultimately found not competent to proceed. Legislation, either state by state or through amendments to the Uniform Criminal Extradition Act, can provide the legal and psychiatric communities with guidance in assessing competency initially and in taking appropriate steps if the fugitive is ultimately found not competent. © 2015 American Academy of Psychiatry and the Law.

  7. Agent Based Modeling on Organizational Dynamics of Terrorist Network

    Directory of Open Access Journals (Sweden)

    Bo Li

    2015-01-01

    Full Text Available Modeling organizational dynamics of terrorist network is a critical issue in computational analysis of terrorism research. The first step for effective counterterrorism and strategic intervention is to investigate how the terrorists operate with the relational network and what affects the performance. In this paper, we investigate the organizational dynamics by employing a computational experimentation methodology. The hierarchical cellular network model and the organizational dynamics model are developed for modeling the hybrid relational structure and complex operational processes, respectively. To intuitively elucidate this method, the agent based modeling is used to simulate the terrorist network and test the performance in diverse scenarios. Based on the experimental results, we show how the changes of operational environments affect the development of terrorist organization in terms of its recovery and capacity to perform future tasks. The potential strategies are also discussed, which can be used to restrain the activities of terrorists.

  8. Motion patterns and phase-transition of a defender-intruder problem and optimal interception strategy of the defender

    Science.gov (United States)

    Wang, Jiangliu; Li, Wei

    2015-10-01

    In this paper, we consider a defense-intrusion interaction, in which an intruder is attracted by a protected stationary target but repulsed by a defender; while the defender tries to move towards an appropriate interception position (IP) between the intruder and the target in order to intercept the intruder and expel the intruder away from the target as maximum as possible. Intuitionally, to keep the intruder further away, one may wonder that: is it a better strategy for the defender trying to approach the intruder as near as possible? Unexpectedly and interestingly enough, this is not always the case. We first introduce the flexibility for IP selection, then investigate the system dynamics and the stable motion patterns, and characterize the phase-transition surface for the motion patterns. We show that, the phase-transition surface just defines the optimal interception strategy of the defender for IP selection; and from the perspective of mobility of agents, the optimal strategy just depends on relative mobility of the two agents.

  9. Survival of the Fittest: Why Terrorist Groups Endure

    Directory of Open Access Journals (Sweden)

    Joseph K. Young

    2014-04-01

    Full Text Available Why do terrorist groups endure? This question is relevant to scholars and policy makers alike. In the past, this issue was not been addressed in a systematic fashion. Recent work investigates this question using data on transnational groups and finds that factors associated with the home country can influence the duration the group endures. Applying the theory of outbidding to terrorist group survival, we argue that strategic competition among groups predicts group duration. Using the Global Terrorism Database, we develop a dataset using the terrorist group as the unit of analysis to model the duration of group activity and thus include the largest sample of groups yet. Controlling for previous explanations of both group duration and terrorism, we find a robust effect for the impact that group competition has on terrorist group survival.

  10. On Deceiving Terrorists

    Science.gov (United States)

    2001-12-01

    developed. By way of contrast, the last two categories—theoretical works and doctrine—attempt to transcend the contextual limits of the first two... Busqueda , the Colombian National Police “Search Bloc,” which was tasked with apprehending Escobar (Bowden, 2001). Deceiving Terrorists Chain Network

  11. Plutonium - how great is the terrorist threat

    International Nuclear Information System (INIS)

    Cohen, B.L.

    1977-01-01

    The terrorists' problems in stealing the plutonium and fabricating the device are measured against the likely effects of its explosion. Alternatives are discussed and it is concluded that there are many easier ways of killing a large number of people. It is considered impossible to guard absolutely against all possible terrorist threats of mass murder. (U.K.)

  12. Health effects of technologies for power generation: Contributions from normal operation, severe accidents and terrorist threat

    International Nuclear Information System (INIS)

    Hirschberg, Stefan; Bauer, Christian; Burgherr, Peter; Cazzoli, Eric; Heck, Thomas; Spada, Matteo; Treyer, Karin

    2016-01-01

    As a part of comprehensive analysis of current and future energy systems we carried out numerous analyses of health effects of a wide spectrum of electricity supply technologies including advanced ones, operating in various countries under different conditions. The scope of the analysis covers full energy chains, i.e. fossil, nuclear and renewable power plants and the various stages of fuel cycles. State-of-the-art methods are used for the estimation of health effects. This paper addresses health effects in terms of reduced life expectancy in the context of normal operation as well as fatalities resulting from severe accidents and potential terrorist attacks. Based on the numerical results and identified patterns a comparative perspective on health effects associated with various electricity generation technologies and fuel cycles is provided. In particular the estimates of health risks from normal operation can be compared with those resulting from severe accidents and hypothetical terrorist attacks. A novel approach to the analysis of terrorist threat against energy infrastructure was developed, implemented and applied to selected energy facilities in various locations. Finally, major limitations of the current approach are identified and recommendations for further work are given. - Highlights: • We provide state-of-the-art comparative assessment of energy health risks. • The scope of the analysis should to the extent possible cover full energy chains. • Health impacts from normal operation dominate the risks. • We present novel approach to analysis of terrorist threat. • Limitations include technology choices, geographical coverage and terrorist issues.

  13. Threat Assessment: Do Lone Terrorists Differ from Other Lone Offenders?

    Directory of Open Access Journals (Sweden)

    Diane M. Zierhoffer

    2014-10-01

    Full Text Available This study evaluates the viability of a threat assessment model developed to calculate the risk of targeted violence as a predictor of violence by potential lone terrorists. There is no profile, to date, which would assist in the identification of a lone terrorist prior to an attack. The threat assessment model developed by Borum, Fein, Vossekuil, and Berglund and described in “Threat Assessment: Defining an approach for evaluating risk of targeted violence” (1999 poses ten questions about the patterns of thinking and behaviors that may precipitate an attack of targeted violence. Three terrorists are studied to assess the model’s value as a predictor of terrorism. It is assessed for its use within law enforcement, during an investigation of someone brought to attention as a possible terrorist and for family members or friends who suspect potential terrorist behavior. Would these questions encourage someone to report a friend to prevent a possible attack? This threat assessment model provides a foundation for future research focused on developing a structured risk assessment for lone terrorists. In its present form, the questions can assist both citizens and law enforcement personnel in identifying the patterns of thought and behavior potentially indicative of a lone terrorist.

  14. On Terrorists and Terrorism

    National Research Council Canada - National Science Library

    Kellen, Konrad

    1982-01-01

    ...; it examines their socioeconomic backgrounds and their driving ideologies; and it probes into elements that may aid the cohesion of terrorist groups, as well as at elements that drive toward disintegration...

  15. Will it ever be possible to profile the terrorist?

    OpenAIRE

    Rae, Jonathan A.

    2012-01-01

    This paper critiques the claim that terrorists can be profiled – that is to say that terrorists possess distinguishable attributes that can be conceivably identified by an observer. In doing so, the most prominent profiling parameters - racial, gender, age, pathological, psychological and socioeconomic – are investigated. The above approaches are found to have little to no applied value in identifying terrorists from a societal population. The dominant criticisms of these methods emphasise th...

  16. International legal problem in combating 'Islamic State' terrorist group in Syria

    Directory of Open Access Journals (Sweden)

    Stevanović Miroslav

    2015-01-01

    Full Text Available 'Islamic State of Iraq and Syria' (ISIS has occupied parts of internationally recognized states and exerts further territorial pretensions. ISIS, also, implements a repressive rule, through violations of human rights and humanitarian law, which may constitute international crimes. In facing the threat od ISIS, the perception of international terrorism is important since this group has the features of a territorial entity. So far, facing with the threat of ISIS has been reduced to a model that is adopted by the UN Security Council against the terrorist network Al-Qaida. An international coalition of states, led by the United States, has undertaken air strikes on positions ISIS, on several grounds: the responsibility to protect, the protection of national security, and at the request of Iraq. At the same time, the strikes are applied in Syria, which can not be accountable for the actions of ISIS and has not requested international assistance. International law does not allow actions which would aim to destroy or jeopardize the territorial integrity or political independence of any sovereign and independent state, which is acting in accordance with the principle of equal rights and self-determination of peoples, and is hence governed by a representative government. The UNSC resolution 2249 remains short of recommending international armed action under the aegis of UNSC, but represents a step forward in recognizing the responsibility of this body in facing ISIS, at least as far as the 'destruction of refuge' is concerned. The use of force in the territory of Syria, without the express authorization of the UNSC is illegal, because terrorism does not constitute grounds for the use of force against countries. But, it opens broader issues of responsibility for the development of ISIS and the humanitarian crisis in the Middle East, as well as the functioning of the system of collective security. Overcoming the current crisis UNSC implies not just a

  17. Immigration: Terrorist Grounds for Exclusion and Removal of Aliens

    National Research Council Canada - National Science Library

    Garcia, Michael J; Wasem, Ruth E

    2007-01-01

    ...., legal permanent residents) or temporarily as nonimmigrants. Notably, any alien who engages in terrorist activity, or is a representative or member of a designated foreign terrorist organization, is generally inadmissible...

  18. Differential news framing of unmanned aerial drones: efficient and effective or illegal and inhumane?

    NARCIS (Netherlands)

    Sheets, P.; Rowling, C.; Jones, T.

    2012-01-01

    Over the past four years, the United States has significantly expanded its use of predator drones to conduct intelligence-gathering and military-strike operations. Experts are divided over this change in military strategy: some defend drones as a legal and efficient way to target terrorists, and

  19. Public Response to Wildfire: Is the Australian "Stay and Defend or Leave Early" Approach an Option for Wildfire Management in the United States?

    Science.gov (United States)

    Sarah M. McCaffrey; Alan Rhodes

    2009-01-01

    In the United States, the increasing costs and negative impacts of wildfires are causing fire managers and policymakers to reexamine traditional approaches to fire management including whether mass evacuation of populations threatened by wildfire is always the most appropriate option. This article examines the Australian "stay and defend or leave early" (SDLE...

  20. Guerilla Warfare & Law Enforcement: Combating the 21st Century Terrorist Cell within the U.S.

    Directory of Open Access Journals (Sweden)

    Major Richard Hughbank

    2009-01-01

    Full Text Available Both domestic and international terrorist organizations employ guerrilla warfare tactics, techniques, and procedures. Thus, the ability to identify and defeat the members of these organizations, cripple their infrastructures, and disrupt their financial resources lies in the understanding of modern guerrilla warfare as it develops in the twenty-first century within the United States.3 The forms of asymmetric warfare4 adopted by domestic and international terrorist groups alike is no longer intended to gain simple media exposure or governmental manipulation; they want to make an overpowering impact by causing massive loss of life and severe damage to infrastructure and are often motivated by religious imperatives and political goals. As terrorism analyst Stephen Flynn has observed, "Throughout the 20th century [Americans] were able to treat national security as essentially an out-of-body experience. When confronted by threats, [America] dealt with them on the turf of our allies or our adversaries. Aside from the occasional disaster and heinous crime, civilian life [in the United States] has been virtually terror-free." With the turn of the twenty-first century, terrorist operations have become more prevalent in the United States and are taking shape in the form of modern guerrilla warfare, thus creating new challenges for federal, state, and local law enforcement agencies. After reviewing the origin and nature of these challenges, this article will offer some suggestions for countering guerilla warfare in the United States.

  1. Bombing alone: tracing the motivations and antecedent behaviors of lone-actor terrorists,.

    Science.gov (United States)

    Gill, Paul; Horgan, John; Deckert, Paige

    2014-03-01

    This article analyzes the sociodemographic network characteristics and antecedent behaviors of 119 lone-actor terrorists. This marks a departure from existing analyses by largely focusing upon behavioral aspects of each offender. This article also examines whether lone-actor terrorists differ based on their ideologies or network connectivity. The analysis leads to seven conclusions. There was no uniform profile identified. In the time leading up to most lone-actor terrorist events, other people generally knew about the offender's grievance, extremist ideology, views, and/or intent to engage in violence. A wide range of activities and experiences preceded lone actors' plots or events. Many but not all lone-actor terrorists were socially isolated. Lone-actor terrorists regularly engaged in a detectable and observable range of activities with a wider pressure group, social movement, or terrorist organization. Lone-actor terrorist events were rarely sudden and impulsive. There were distinguishable behavioral differences between subgroups. The implications for policy conclude this article. © 2013 American Academy of Forensic Sciences.

  2. Defending majority voting systems against a strategic attacker

    International Nuclear Information System (INIS)

    Levitin, Gregory; Hausken, Kjell; Ben Haim, Hanoch

    2013-01-01

    Voting systems used in technical and tactical decision making in pattern recognition and target detection, data handling, signal processing, distributed and secure computing etc. are considered. A maxmin two period game is analyzed where the defender first protects and chooses units for participation in voting. The attacker thereafter attacks a subset of units. It is shown that when the defender protects all the voting units, the optimal number of units chosen for voting is either one or the maximal possible odd number. When the defender protects only the units chosen for voting, the optimal number of chosen units increases with the defender resource superiority (i.e., more resources than the attacker) and with probability of providing correct output by any unit. The system success probability always increases in the total number of voting units, the defender–attacker resource ratio, and the probability that each voting unit produces a correct output. The system success probability increases in the attacker–defender contest intensity if the defender achieves per-unit resource superiority, and otherwise decreases in the contest intensity. The presented model and enumerative algorithm allow obtaining optimal voting system defense strategy for any combination of parameters: total number of units, attack and defense resources, unit success probability and contest intensity.

  3. Reducing the attractiveness of chemical plants to terrorist attacks: dehorning rhinos

    NARCIS (Netherlands)

    Khakzad Rostami, N.

    2017-01-01

    The terrorist attacks to two French chemical facilities in June and July 2015 raised the flag about the attractiveness of chemical plants to terrorist groups and the imminent risk of similar attacks in western countries. Although the 9/11 terrorist attacks in the US put the security of chemical

  4. Is ALARP applicable to the management of terrorist risks?

    International Nuclear Information System (INIS)

    Guikema, S.D.; Aven, T.

    2010-01-01

    In this paper, we discuss the applicability of the as low as reasonable practicable (ALARP) principle to terrorist risk management. ALARP is a commonly used framework for managing risk due to non-intelligent threats, but terrorism introduces difficult issues, both technically and socially. In particular, the probability of a terrorist attack is difficult to define, terrorist threats are adaptive, and some terrorist risk management actions raise issues of loss of civil liberties not raised by risk management measures for other types of risk. We discuss these issues and their implications for risk management. After showing how ALARP is used to manage the risk from other hazards in different economic sectors, we discuss both the benefits and difficulties associated with extending the ALARP framework for terrorist risk analysis. We conclude that the ALARP framework can be modified to make it appropriate for risk management for adaptive risks, provided that care is taken to explicitly consider adaptive reallocation of risk in response to risk management actions, to account for perceived or actual loss of civil liberties resulting from risk management actions, and to consider the difficulties associated with using probability to measure uncertainty in adversary actions.

  5. Hidden Markov models for the activity profile of terrorist groups

    OpenAIRE

    Raghavan, Vasanthan; Galstyan, Aram; Tartakovsky, Alexander G.

    2012-01-01

    The main focus of this work is on developing models for the activity profile of a terrorist group, detecting sudden spurts and downfalls in this profile, and, in general, tracking it over a period of time. Toward this goal, a $d$-state hidden Markov model (HMM) that captures the latent states underlying the dynamics of the group and thus its activity profile is developed. The simplest setting of $d=2$ corresponds to the case where the dynamics are coarsely quantized as Active and Inactive, re...

  6. TERRITORIAL RISK ASSESMENT AFTER TERRORIST ACT: EXPRESS MODEL

    Directory of Open Access Journals (Sweden)

    M. M. Biliaiev

    2018-02-01

    Full Text Available Purpose. The paper involves the development of a method to assess the territorial risk in the event of a terrorist attack using a chemical agent. Methodology. To describe the process of chemical agent scattering in the atmosphere, ejected in the event of a terrorist attack, the equation of mass transfer of an impurity in atmospheric air is used. The equation takes into account the velocity of the wind flow, atmospheric diffusion, the intensity of chemical agent emission, the presence of buildings near the site of the emission of a chemically hazardous substance. For numerical integration of the modeling equation, a finite difference method is used. A feature of the developed numerical model is the possibility of assessing the territorial risk in the event of a terrorist attack under different weather conditions and the presence of buildings. Findings. A specialized numerical model and software package has been developed that can be used to assess the territorial risk, both in the case of terrorist attacks, with the use of chemical agents, and in case of extreme situations at chemically hazardous facilities and transport. The method can be implemented on small and medium-sized computers, which allows it to be widely used for solving the problems of the class under consideration. The results of a computational experiment are presented that allow estimating possibilities of the proposed method for assessing the territorial risk in the event of a terrorist attack using a chemical agent. Originality. An effective method of assessing the territorial risk in the event of a terrorist attack using a chemically hazardous substance is proposed. The method can be used to assess the territorial risk in an urban environment, which allows you to obtain adequate data on possible damage areas. The method is based on the numerical integration of the fundamental mass transfer equation, which expresses the law of conservation of mass in a liquid medium. Practical

  7. Defending dreamer’s rock

    OpenAIRE

    Beck, Günter U.

    2007-01-01

    Defending dreamer’s rock : Geschichte, Geschichtsbewusstsein und Geschichtskultur im Native drama der USA und Kanadas. - Trier : WVT Wiss. Verl. Trier, 2007. - 445 S. - (CDE - Studies ; 14). - Zugl.: Augsburg, Univ., Diss., 2006

  8. Intelligence Constraints on Terrorist Network Plots

    Science.gov (United States)

    Woo, Gordon

    Since 9/11, the western intelligence and law enforcement services have managed to interdict the great majority of planned attacks against their home countries. Network analysis shows that there are important intelligence constraints on the number and complexity of terrorist plots. If two many terrorists are involved in plots at a given time, a tipping point is reached whereby it becomes progressively easier for the dots to be joined and for the conspirators to be arrested, and for the aggregate evidence to secure convictions. Implications of this analysis are presented for the campaign to win hearts and minds.

  9. Israeli Adolescents' Coping Strategies in Relation to Terrorist Attacks

    Science.gov (United States)

    Tatar, Moshe; Amram, Sima

    2007-01-01

    Exposure to terrorism seriously threatens the well-being of children and adolescents. Israeli citizens have witnessed massive ongoing terrorist attacks during the last few years. The present research, conducted among 330 Israeli adolescents, examined coping strategies in relation to terrorist attacks. We found that adolescents utilize more…

  10. Attacker-defender game from a network science perspective

    Science.gov (United States)

    Li, Ya-Peng; Tan, Suo-Yi; Deng, Ye; Wu, Jun

    2018-05-01

    Dealing with the protection of critical infrastructures, many game-theoretic methods have been developed to study the strategic interactions between defenders and attackers. However, most game models ignore the interrelationship between different components within a certain system. In this paper, we propose a simultaneous-move attacker-defender game model, which is a two-player zero-sum static game with complete information. The strategies and payoffs of this game are defined on the basis of the topology structure of the infrastructure system, which is represented by a complex network. Due to the complexity of strategies, the attack and defense strategies are confined by two typical strategies, namely, targeted strategy and random strategy. The simulation results indicate that in a scale-free network, the attacker virtually always attacks randomly in the Nash equilibrium. With a small cost-sensitive parameter, representing the degree to which costs increase with the importance of a target, the defender protects the hub targets with large degrees preferentially. When the cost-sensitive parameter exceeds a threshold, the defender switches to protecting nodes randomly. Our work provides a new theoretical framework to analyze the confrontations between the attacker and the defender on critical infrastructures and deserves further study.

  11. The alliance relationship analysis of international terrorist organizations with link prediction

    Science.gov (United States)

    Fang, Ling; Fang, Haiyang; Tian, Yanfang; Yang, Tinghong; Zhao, Jing

    2017-09-01

    Terrorism is a huge public hazard of the international community. Alliances of terrorist organizations may cause more serious threat to national security and world peace. Understanding alliances between global terrorist organizations will facilitate more effective anti-terrorism collaboration between governments. Based on publicly available data, this study constructed a alliance network between terrorist organizations and analyzed the alliance relationships with link prediction. We proposed a novel index based on optimal weighted fusion of six similarity indices, in which the optimal weight is calculated by genetic algorithm. Our experimental results showed that this algorithm could achieve better results on the networks than other algorithms. Using this method, we successfully digged out 21 real terrorist organizations alliance from current data. Our experiment shows that this approach used for terrorist organizations alliance mining is effective and this study is expected to benefit the form of a more powerful anti-terrorism strategy.

  12. Underfunding in Terrorist Organizations

    Science.gov (United States)

    Shapiro, Jacob N.; Siegel, David A.

    A review of international terrorist activity reveals a pattern of financially strapped operatives working for organizations that seem to have plenty of money. To explain this observation, and to examine when restricting terrorists’ funds will reduce their lethality, we model a hierarchical terror organization in which leaders delegate financial and logistical tasks to middlemen, but cannot perfectly monitor them for security reasons. These middlemen do not always share their leaders’ interests: the temptation exists to skim funds from financial transactions. When middlemen are sufficiently greedy and organizations suffer from sufficiently strong budget constraints, leaders will not fund attacks because the costs of skimming are too great. Using general functional forms, we find important nonlinearities in terrorists’ responses to government counter-terrorism. Restricting terrorists’ funds may be ineffective until a critical threshold is reached, at which point cooperation within terrorist organizations begins to break down and further government actions have a disproportionately large impact.

  13. Optimal counterterrorism and the recruitment effect of large terrorist attacks

    DEFF Research Database (Denmark)

    Jensen, Thomas

    2011-01-01

    We analyze a simple dynamic model of the interaction between terrorists and authorities. Our primary aim is to study optimal counterterrorism and its consequences when large terrorist attacks lead to a temporary increase in terrorist recruitment. First, we show that an increase in counterterrorism...... makes it more likely that terrorist cells plan small rather than large attacks and therefore may increase the probability of a successful attack. Analyzing optimal counterterrorism we see that the recruitment effect makes authorities increase the level of counterterrorism after large attacks. Therefore......, in periods following large attacks a new attack is more likely to be small compared to other periods. Finally, we analyze the long-run consequences of the recruitment effect. We show that it leads to more counterterrorism, more small attacks, and a higher sum of terrorism damage and counterterrorism costs...

  14. Terrorist use of the Internet: exploitation and support through ICT infrastructure

    CSIR Research Space (South Africa)

    Veerasamy, N

    2011-03-01

    Full Text Available methods of fundraising are also possible. Electronic money transfer, laundering and generating support through front organisations are all fundraising methods used by terrorists (Goodman, Kirk & Kirk 2007). According to the Financial Action Task Force... agent. This allows terrorist groups to move money around without actually delivering the auctioned goods or services. Online casinos can be used for both laundering and storing money. When dealing with large sums of money, terrorists can place...

  15. Overview of the terrorist threat to international peace and security

    International Nuclear Information System (INIS)

    Wilkinson, P.

    2001-01-01

    This contribution deals with the implications of terrorism for international peace and security and the escalation to mass terrorism. The topics covered are: impact of the latest terrorist events on the United States, impact on the international community; illegitimacy of terrorism; need for global action; the role of the united Nations; the crucial role for disarmament and counter-proliferation activities, especially in finding means of enhancing the security of materials that could easily be misused

  16. Bombing Alone: Tracing the Motivations and Antecedent Behaviors of Lone-Actor Terrorists*,†,‡

    Science.gov (United States)

    Gill, Paul; Horgan, John; Deckert, Paige

    2014-01-01

    This article analyzes the sociodemographic network characteristics and antecedent behaviors of 119 lone-actor terrorists. This marks a departure from existing analyses by largely focusing upon behavioral aspects of each offender. This article also examines whether lone-actor terrorists differ based on their ideologies or network connectivity. The analysis leads to seven conclusions. There was no uniform profile identified. In the time leading up to most lone-actor terrorist events, other people generally knew about the offender’s grievance, extremist ideology, views, and/or intent to engage in violence. A wide range of activities and experiences preceded lone actors’ plots or events. Many but not all lone-actor terrorists were socially isolated. Lone-actor terrorists regularly engaged in a detectable and observable range of activities with a wider pressure group, social movement, or terrorist organization. Lone-actor terrorist events were rarely sudden and impulsive. There were distinguishable behavioral differences between subgroups. The implications for policy conclude this article. PMID:24313297

  17. Family Therapy of Terroristic Trauma: Psychological Syndromes and Treatment Strategies.

    Science.gov (United States)

    Miller, Laurence

    2003-01-01

    Reviews pertinent literature on terroristic trauma and combines this information with the author's experience in treating adults, children, and family victims and survivors of recent terrorist attacks. Describes the psychological syndromes resulting from terrorism and discusses the relevant individual and family therapy modalities for treating…

  18. 48 CFR 252.209-7001 - Disclosure of ownership or control by the government of a terrorist country.

    Science.gov (United States)

    2010-10-01

    ...) (a) Definitions. As used in this provision— (1) Government of a terrorist country includes the state... the government of which has repeatedly provided support for acts of international terrorism. As of the...

  19. Offensive Counterterrorism Targeted killing in eliminating terrorist target: the case of the USA and Israel

    Directory of Open Access Journals (Sweden)

    Hermínio Matos

    2012-01-01

    Full Text Available Due to the "global terrorism project", some States have adopted offensive counterterrorism measures which, though within national strategies on security and defense, contemplate the use of military power and the use of lethal force against non-state actors - individuals, groups or terrorist organizations - beyond their national borders. Reformulating the security paradigm has led, in these cases, to policies against terrorism. This is the case of targeted killing - the killing of selected targets - by the USA and Israel. Targeted killing actions - using essentially but not only drones - in Pakistan and Yemen by the American administration, a well as the Israeli response to Palestinian terrorism, are under heated debate in terms of their efficiency and legality. Thus, this paper aims to not only provide an analytical framework on this theme but also analyze the scope and impact of these counter terrorist strategies by the two countries.

  20. Personality and Fear of Terrorist attacks in Ghana: The mediating ...

    African Journals Online (AJOL)

    The study aimed at determining whether or not neuroticism would account for more variance in predicting risk perception and fear of terrorist attack in Ghana compared to conscientiousness. Moreover, it sought to examine the mediating effect of risk perception on the relationship between neuroticism and fear of terrorist ...

  1. Near-space airships against terrorist activities

    Science.gov (United States)

    Kesenek, Ceylan

    2014-06-01

    Near-space is a region surrounding the earth which is too dense for a satellite to fly and also too thin for air breathing vehicles to fly. The near-space region which is located between 65,000 and 325,000 feet is really underutilized despite its unique potential. Near-Space airships can be used to exploit the potential of near space. Such a system can supply not only a great deal of information using ISR (Intelligence Surveillance Reconnaissance) sensors on board but also serve as a communication/data relay. Airships used in near space can cover a very wide footprint area for surveillance missions. Free of orbital mechanics these near-space assets can continue its mission for long period of time with a persistence of days and months. These assets can provide persistent intelligence for fight against terrorist activities. Terrorism is a non-state threat and doesn't have a static hierarchical structure. To fight against such an adversary an overwhelming intelligence activity must be applied. Therefore, intelligence collection and surveillance missions play a vital role in counter terrorism. Terrorists use asymmetric means of threat that require information superiority. In this study exploitation of near space by airships is analyzed for fight against terrorism. Near-space airships are analyzed according to the operational effectiveness, logistic structure and cost. Advantages and disadvantages of airships are argued in comparison with satellites and airplanes. As a result, by bridging the gap between the air and space, nearspace airships are considered to be the most important asset of warfighter especially with its operational effectiveness.

  2. Agent Based Modeling on Organizational Dynamics of Terrorist Network

    OpenAIRE

    Bo Li; Duoyong Sun; Renqi Zhu; Ze Li

    2015-01-01

    Modeling organizational dynamics of terrorist network is a critical issue in computational analysis of terrorism research. The first step for effective counterterrorism and strategic intervention is to investigate how the terrorists operate with the relational network and what affects the performance. In this paper, we investigate the organizational dynamics by employing a computational experimentation methodology. The hierarchical cellular network model and the organizational dynamics model ...

  3. Defending against speculative attacks

    NARCIS (Netherlands)

    Daniëls, T.; Jager, H.; Klaassen, F.

    2009-01-01

    While virtually all currency crisismodels recognise that the fate of a currency peg depends on how tenaciously policy makers defend it, they seldom model how this is done. We incorporate themechanics of speculation and the interest rate defence against it in the model of Morris and Shin (American

  4. Kidnapping by Terrorist Groups, 1970-2010: Is Ideological Orientation Relevant?

    Science.gov (United States)

    Forest, James J. F.

    2012-01-01

    This article examines whether a terrorist group's ideology has a meaningful impact on its involvement in kidnapping. On a global level, incident data (1970-2010) indicate that in the past decade the number of kidnappings by terrorist groups has increased, while Muslim extremists have replaced left-wing/Marxist revolutionaries as the world's…

  5. Defendant Characteristics and Juridic Decisions.

    Science.gov (United States)

    Michelini, Ronald L.; Snodgrass, Stephan R.

    1980-01-01

    Attractiveness of defendant's traits and their relevance to the likelihood of acting criminally were varied. Results supported a causal inference explanation for deciding guilt and a liking-leniency explanation for deciding punishment. (Author/CS)

  6. Colombian Army Transformation and the Inflection Point of the Terrorist Groups

    Science.gov (United States)

    2011-03-30

    Prince (Cambridge: Cambridge University Press, 1988), 24. 2 James D Henderson, La Modernizacion en Colombia: Los años de Laureano Gomez, 1889-1965...prime factor that permits the terrorist´s isolation from the social base, as well as the legitimate use of force by the State. In summary, the FARC...his dismissal, for alleged meddling in political affairs. 23 3 Francisco Leal Buitrago, La Inseguridad de la Seguridad. Colombia 1958-2005

  7. Transnational Crime and the Criminal-Terrorist Nexus: Synergies and Corporate Trends

    Science.gov (United States)

    2004-04-01

    are forced into prostitution, pornography and sweatshop labor, it becomes an obvious and direct threat to the fabric of our society.3 Add terrorists... impacts the U.S. Finally, many nation states are on the brink of thriving or failing, and their fate depends either on us…or the “help” of organized...and social fabric of societies came to light in the mid-1990s. Aggravating factors include globalization of business networks, lowered trade

  8. 25 CFR 11.402 - Terroristic threats.

    Science.gov (United States)

    2010-04-01

    ... ORDER CODE Criminal Offenses § 11.402 Terroristic threats. A person is guilty of a misdemeanor if he or she threatens to commit any crime of violence with purpose to terrorize another or to cause evacuation...

  9. Countering the Nuclear Terrorist Threat

    International Nuclear Information System (INIS)

    Vantine, H C

    2002-01-01

    The nuclear/radioactive threat to homeland security posed by terrorists can be broken into four categories. Of highest concern is the use of an improvised nuclear device (IND). An IND, as its name implies, is a nuclear explosive device. It produces nuclear yield, and this nuclear yield has catastrophic effects. An IND is the ultimate terrorist weapon, and terrorist groups are actively attempting to acquire nuclear weapons. Detonation of an IND could dwarf the devastation of the September 11 attack on the World Trade Center. Dealing with the aftermath of an IND would be horrific. Rescue efforts and cleanup would be hazardous and difficult. Workers would have to wear full protection suits and self-contained breathing apparatus. Because of the residual radioactivity, in certain locations they could only work short times before acquiring their ''lifetime'' dose. As with the Chernobyl event, some rescue workers might well expose themselves to lethal doses of radiation, adding to the casualty toll. Enormous volumes of contaminated debris would have to be removed and disposed. If a terrorist group decides not to pursue an actual nuclear device, it might well turn to Radiological Dispersal Devices (RDDs) or ''dirty bombs'' as they are often called. RDDs spread radioactivity but they do not generate nuclear yield. The fabrication of an RDD requires radioactive material and a dispersal mechanism. Radioactive materials are used all over the world for medical, industrial, and research applications. Standards for safe handling and accountability of radioactive material vary around the world. Stories in the press suggest inadequate controls on radiological materials in parts of the world. The effects of an RDD vary widely, and are measured in terms of contamination area, health effects to the exposed population, and economic consequences. Even a negligible, but measurable, exposure would exploit the general public's fear of things radioactive and would have significant

  10. Spatial proximity and the risk of psychopathology after a terrorist attack

    OpenAIRE

    DiMaggio, Charles; Galea, Sandro; Emch, Michael

    2010-01-01

    Previous studies concerned with the relation of proximity to the September 11, 2001 terrorist attacks and subsequent psychopathology have produced conflicting results. The goals of this analysis are to assess the appropriateness of using Bayesian hierarchical spatial techniques to answer the question of the role of proximity to a mass trauma as a risk factor for psychopathology. Using a set of individual-level Medicaid data for New York State, and controlling for age, gender, median household...

  11. The Development of Decision Aids for Counter-Terrorist Applications

    Science.gov (United States)

    1980-12-01

    I.D. AM OLT of PLO A14YOLP of PLO Agua Sandinist TPLF of Turkey 0 TERORISTS 3 4 25 2 GROUP CAPABILITY Unknown Unknown Auto Weapons Sten Gun "DEADLINE...of any terrorist group to different situ - ations are not independent, but reflect a coherent policy regarding violence and willingness to negotiate...importance in this stage is the need to deter future terrorist activities with- out jeopardizing our credibility in future negotiation situ - ations. I8

  12. Who sets the Agenda: The Author or the Terrorist?

    DEFF Research Database (Denmark)

    Søndergaard, Leif

    2012-01-01

    Definitions of terrorism. Terorism in the 1980s, i.e. taking hostages and exploding bombs outside the US. UNA-bomber and Oklahoma bomber. Relations between author and terrorist in and outside USA before 9/11. Relations between terrorist and press. President Bush's rhetoric and various reactions t...... to 9/11. Novels by Safran Foer (Extremely Loud and Incredibly Close) and Don DeLillo (Falling Man) focus on the personal and private consequences whereas Mohsin Hamid (The Reluctant Fundamentalist) includes the other side....

  13. Modeling Resources Allocation in Attacker-Defender Games with "Warm Up" CSF.

    Science.gov (United States)

    Guan, Peiqiu; Zhuang, Jun

    2016-04-01

    Like many other engineering investments, the attacker's and defender's investments may have limited impact without initial capital to "warm up" the systems. This article studies such "warm up" effects on both the attack and defense equilibrium strategies in a sequential-move game model by developing a class of novel and more realistic contest success functions. We first solve a single-target attacker-defender game analytically and provide numerical solutions to a multiple-target case. We compare the results of the models with and without consideration of the investment "warm up" effects, and find that the defender would suffer higher expected damage, and either underestimate the attacker effort or waste defense investment if the defender falsely believes that no investment "warm up" effects exist. We illustrate the model results with real data, and compare the results of the models with and without consideration of the correlation between the "warm up" threshold and the investment effectiveness. Interestingly, we find that the defender is suggested to give up defending all the targets when the attack or the defense "warm up" thresholds are sufficiently high. This article provides new insights and suggestions on policy implications for homeland security resource allocation. © 2015 Society for Risk Analysis.

  14. Sub Saharan African Terrorist Groups’ use of the Internet

    Directory of Open Access Journals (Sweden)

    Stewart Bertram

    2014-02-01

    Full Text Available Recent actions by French military forces in Niger and the global prominence of terrorist groups such as Al Shabaab and Boko Haram, have highlighted the growing counter terrorist focus on the countries of Sub Saharan Africa. Additionally in a post Bin Laden world and with the immanent withdrawal of coalition combat troops from Afghanistan, there is the possibility of Africa as a continent becoming the new front in the Global War on Terror ('Mben' et al., 2013. However, it is a mistake to assume that Africa’s story is uniformly one of violence and death. Vibrant cultures and a rugged entrepreneurial spirit have combined with a robust Internet backbone, to create the embryonic emergence of high tech hotspots across Africa. With rising IT literacy levels, more and more Africans are becoming connected to the information super highway on a daily basis (Graham, 2010. A tiny minority of these Africans are terrorists.

  15. The Optimal Employment of a Deep Seaweb Acoustic Network for Submarine Communications at Speed and Depth Using a Defender-Attacker-Defender Model

    Science.gov (United States)

    2013-09-01

    location costs of a LRP. Berger, Coullard, and Daskin (2007) utilized a set-partitioning- based formulation of an uncapacitated location-routing...EMPLOYMENT OF A DEEP SEAWEB ACOUSTIC NETWORK FOR SUBMARINE COMMUNICATIONS AT SPEED AND DEPTH USING A DEFENDER-ATTACKER- DEFENDER MODEL by Andrew D...Hendricksen September 2013 Thesis Advisor: W. Matthew Carlyle Thesis Co-Advisor: Joseph A . Rice Second Reader: Robert E. Burks THIS PAGE

  16. Anti-money laundering and counter-terrorist financing in the Luxembourg investment fund market

    OpenAIRE

    Dietz, Andrea

    2017-01-01

    The field of Anti-Money Laundering and Counter-Terrorist Financing in their current form have had an important impact on the financial world for almost half a century. Today, Money Laundering and Terrorist Financing pose a threat to the integrity of the financial markets and systems worldwide. The intention behind implementing a regulatory Anti-Money Laundering and Counter-Terrorist Financing framework is to cut off the financial resources of criminals and to follow back the traces that finan...

  17. Terrorists: analogies and differences with mental diseases. A phenomenological-metaphysical perspective.

    Science.gov (United States)

    Fisogni, Primavera

    2010-01-01

    Are islamic terrorists insane? International scholars generally concede that Al Qaeda members are not mentally ill. But, until now, there has not been a shared consensus and a strong argument that can prove it. This paper intends to throw light on the specific dehumanization of terrorists and to show that they are always responsible for their acts, unlike those who are affected by mental diseases. The members of Al Qaeda deny the world of life and take the distance from its sense and value: in their perspective only subversive action makes sense. However they always maintain a transcendent relation with the world (I-you; I-it). Persons with serious mental diseases have generally lost the sense of their self and the transcendence with the world. Terrorists and people with mental illness share a common separation from the world of life: one is voluntary, the other is the consequence of a number of factors (biological, social, etc.). Terrorists and psychotics have nevertheless something in common: the deprivation of the self. A loss of being that--I argue--is at the origin of the ordinariness of terrorists and the experience of void in psychotics. Two symptoms that reveal the condition of an intimate dryness, from a phenomenological and a metaphysical point of view as a consequence of a distorted relation with the world of life. I shall discuss how ordinariness is strictly related with the blurring definition of terrorism.

  18. Combatting Commercial Terrorists: The PKK Case

    Science.gov (United States)

    2015-12-01

    Kurdistan Workers’ Party, drug trafficking, human trafficking, cigarette smuggling, prostitution, extortion, money laundering , Turkey 15. NUMBER OF...91 F. MONEY LAUNDERING ............................................................... 93 G. CONCLUSION...opportunity to launder illegal money . Also, donations from a sympathetic population is another source of money and legitimacy for terrorist

  19. Defending and attacking a network of two arcs subject to traffic congestion

    International Nuclear Information System (INIS)

    Bier, Vicki M.; Hausken, Kjell

    2013-01-01

    To study the effects of intentional attacks on transportation systems, we consider drivers who choose the more time-efficient of two arcs (possibly of different lengths). Both arcs are subjected to traffic congestion, and also to interdiction or blockage (e.g., by a terrorist attack). The model has three types of strategic actors: the government; the terrorist; and potential drivers. The government protects travel, while the terrorist interdicts travel, along the two arcs. Drivers choose the arc that gives the shortest travel time, and cannot choose an interdicted arc. The drivers have reservation travel times, such that if the actual travel time will exceed an individual driver's reservation travel time, that driver would prefer not to travel; the reservation travel times are allowed to vary among drivers. The objective function of the master problem, which the government minimizes and the terrorist maximizes, is the sum of the total travel time plus the reservation travel times of the non-travelers. Each potential driver decides endogenously whether to travel, according to whether the actual travel time is greater or lesser than that driver's reservation travel time

  20. Freedom and Information. Assessing Publicly Available Data Regarding U.S. Transportation Infrastructure Security

    Science.gov (United States)

    2007-01-01

    know or can learn may be advantageous to defenders. If defend- ers are unaware that a terrorist group knows about a particular vulnerability, that...cases, this information is necessarily in the public domain because it provides an important service. For instance, as noted above, ecommerce sites for

  1. Dynamical Adaptation in Terrorist Cells/Networks

    DEFF Research Database (Denmark)

    Hussain, Dil Muhammad Akbar; Ahmed, Zaki

    2010-01-01

    Typical terrorist cells/networks have dynamical structure as they evolve or adapt to changes which may occur due to capturing or killing of a member of the cell/network. Analytical measures in graph theory like degree centrality, betweenness and closeness centralities are very common and have long...

  2. The Proliferation of Unmanned Aerial Vehicles: Terrorist Use, Capability, and Strategic Implications

    Energy Technology Data Exchange (ETDEWEB)

    Ball, Ryan Jokl [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2017-10-16

    There has been unparalleled proliferation and technological advancement of consumer unmanned aerial vehicles (UAVs) across the globe in the past several years. As witnessed over the course of insurgency tactics, it is difficult to restrict terrorists from using widely available technology they perceive as advantageous to their overall strategy. Through a review of the characteristics, consumer market landscape, tactics, and countertactics, as well as operational use of consumer-grade UAVs, this open-source report seeks to provide an introductory understanding of the terrorist-UAV landscape, as well as insights into present and future capabilities. The caveat is evaluating a developing technology haphazardly used by terrorists in asymmetric conflicts.

  3. The Dynamics of the Creation, Evolution, and Disappearance of Terrorist Internet Forums

    Directory of Open Access Journals (Sweden)

    Manuel Ricardo Torres-Soriano

    2013-06-01

    Full Text Available An examination of the organizational nature of the threat posed by jihadi terrorism, supplying quantitative and qualitative data on the dynamics behind the creation, evolution, and disappearance of the main jihadi Internet forums during the period 2008–2012. An analysis of the origins and functions of the forums, their links with terrorist organizations, their internal structures, and the processes accounting for their stability in cyberspace shows that far from representinga horizontal structure where the main actors are a network of followers, the terrorist presence on the Internet is in fact a hierarchical organization in which intervention by formal terrorist organizations plays a crucial role.

  4. Terrorist Capabilities for Cyberattack: Overview and Policy Issues

    National Research Council Canada - National Science Library

    Rollins, John; Wilson, Clay

    2005-01-01

    .... Persistent Internet and computer security vulnerabilities, which have been widely publicized, may gradually encourage terrorists to develop new computer skills, or develop alliances with criminal...

  5. Protecting the fair trial rights of mentally disordered defendants in criminal proceedings: Exploring the need for further EU action.

    Science.gov (United States)

    Verbeke, Peter; Vermeulen, Gert; Meysman, Michaël; Vander Beken, Tom

    2015-01-01

    Using the new legal basis provided by the Lisbon Treaty, the Council of the European Union has endorsed the 2009 Procedural Roadmap for strengthening the procedural rights of suspected or accused persons in criminal proceedings. This Roadmap has so far resulted in six measures from which specific procedural minimum standards have been and will be adopted or negotiated. So far, only Measure E directly touches on the specific issue of vulnerable persons. This Measure has recently produced a tentative result through a Commission Recommendation on procedural safeguards for vulnerable persons in criminal proceedings. This contribution aims to discuss the need for the introduction of binding minimum standards throughout Europe to provide additional protection for mentally disordered defendants. The paper will examine whether or not the member states adhere to existing fundamental norms and standards in this context, and whether the application of these norms and standards should be made more uniform. For this purpose, the procedural situation of mentally disordered defendants in Belgium and England and Wales will be thoroughly explored. The research establishes that Belgian law is unsatisfactory in the light of the Strasbourg case law, and that the situation in practice in England and Wales indicates not only that there is justifiable doubt about whether fundamental principles are always adhered to, but also that these principles should become more anchored in everyday practice. It will therefore be argued that there is a need for putting Measure E into practice. The Commission Recommendation, though only suggestive, may serve as a necessary and inspirational vehicle to improve the procedural rights of mentally disordered defendants and to ensure that member states are able to cooperate within the mutual recognition framework without being challenged on the grounds that they are collaborating with peers who do not respect defendants' fundamental fair trial rights

  6. Threat Assessment: Do Lone Terrorists Differ from Other Lone Offenders?

    OpenAIRE

    Diane M. Zierhoffer

    2014-01-01

    This study evaluates the viability of a threat assessment model developed to calculate the risk of targeted violence as a predictor of violence by potential lone terrorists. There is no profile, to date, which would assist in the identification of a lone terrorist prior to an attack. The threat assessment model developed by Borum, Fein, Vossekuil, and Berglund and described in “Threat Assessment: Defining an approach for evaluating risk of targeted violence” (1999) poses ten questions about t...

  7. TePiTri : a screening method for assessing terrorist-related pipeline transport risks

    NARCIS (Netherlands)

    Reniers, G.; Dullaert, W.E.H.

    2012-01-01

    The article proposes an approach to determine relative terrorist-related security risk levels of pipeline transportation. Pipeline routes are divided into smaller route segments. Subsequently, likelihood scores of possible terrorist-related incidents are determined per route segment and per

  8. Environment Canada defends decision to ban PCB waste exports

    International Nuclear Information System (INIS)

    Anon.

    1995-01-01

    The position of Environment Canada in banning the export of PCB waste to the United States was defended as falling within their jurisdiction under provisions of the the Canadian Environmental Protection Act. The United States had previously banned the import of Canadian PCBs, but when it reversed its decision Environment Canada posted an Interim Order, upholding the ban. The decision to do so was based on protection of the large investment that was made to develop the Canadian PCB incineration facility in Swan Lake, Alberta. Canada also had an obligation under the Basel Convention to reduce it cross boundary movement of hazardous waste and provide adequate destruction facilities in Canada. Legal implications of PCB exports and the uncertainty of continuing access to American facilities were also cited as reasons for issuing the Interim Order

  9. Mass casualty response in the 2008 Mumbai terrorist attacks.

    Science.gov (United States)

    Roy, Nobhojit; Kapil, Vikas; Subbarao, Italo; Ashkenazi, Isaac

    2011-12-01

    The November 26-29, 2008, terrorist attacks on Mumbai were unique in its international media attention, multiple strategies of attack, and the disproportionate national fear they triggered. Everyone was a target: random members of the general population, iconic targets, and foreigners alike were under attack by the terrorists. A retrospective, descriptive study of the distribution of terror victims to various city hospitals, critical radius, surge capacity, and the nature of specialized medical interventions was gathered through police, legal reports, and interviews with key informants. Among the 172 killed and 304 injured people, about four-fifths were men (average age, 33 years) and 12% were foreign nationals. The case-fatality ratio for this event was 2.75:1, and the mortality rate among those who were critically injured was 12%. A total of 38.5% of patients arriving at the hospitals required major surgical intervention. Emergency surgical operations were mainly orthopedic (external fixation for compound fractures) and general surgical interventions (abdominal explorations for penetrating bullet/shrapnel injuries). The use of heavy-duty automatic weapons, explosives, hostages, and arson in these terrorist attacks alerts us to new challenges to medical counterterrorism response. The need for building central medical control for a coordinated response and for strengthening public hospital capacity are lessons learned for future attacks. These particular terrorist attacks had global consequences, in terms of increased security checks and alerts for and fears of further similar "Mumbai-style" attacks. The resilience of the citizens of Mumbai is a critical measure of the long-term effects of terror attacks.

  10. Possibility of death sentence has divergent effect on verdicts for Black and White defendants.

    Science.gov (United States)

    Glaser, Jack; Martin, Karin D; Kahn, Kimberly B

    2015-12-01

    When anticipating the imposition of the death penalty, jurors may be less inclined to convict defendants. On the other hand, minority defendants have been shown to be treated more punitively, particularly in capital cases. Given that the influence of anticipated sentence severity on verdicts may vary as a function of defendant race, the goal of this study was to test the independent and interactive effects of these factors. We conducted a survey-embedded experiment with a nationally representative sample to examine the effect on verdicts of sentence severity as a function of defendant race, presenting respondents with a triple murder trial summary that manipulated the maximum penalty (death vs. life without parole) and the race of the defendant. Respondents who were told life-without-parole was the maximum sentence were not significantly more likely to convict Black (67.7%) than White (66.7%) defendants. However, when death was the maximum sentence, respondents presented with Black defendants were significantly more likely to convict (80.0%) than were those with White defendants (55.1%). The results indicate that the death penalty may be a cause of racial disparities in criminal justice, and implicate threats to civil rights and to effective criminal justice. (c) 2015 APA, all rights reserved).

  11. Severe accidents and terrorist threats at nuclear reactors

    International Nuclear Information System (INIS)

    Pollack, G.L.

    1987-01-01

    Some of the key areas of uncertainty are the nature of the physical and chemical interactions of released fission products and of the interactions between a molten core and concrete, the completeness and validity of the computer codes used to predict accidents, and the behavior of the containment. Because of these and other uncertainties, it is not yet possible to reliably predict the consequences of reactor accidents. It is known that for many accident scenarios, especially less severe ones or where the containment is not seriously compromised, the amount of radioactive material expected to escape the reactor is less, even much less, than was previously calculated. For such accidents, the predictions are easier and more reliable. With severe accidents, however, there is considerable uncertainty as to the predicted results. For accidents of the type that terrorists might cause - for example, where the sequence of failure would be unexpected or where redundant safety features are caused to fail together - the uncertainties are still larger. The conclusion, then, is that there are potential dangers to the public from terrorist actions at a nuclear reactor; however, because of the variety of potential terrorist threats and the incompleteness of the knowledge about the behavior of reactor components and fission products during accidents, the consequences cannot yet be assessed quantitatively

  12. Defending victimized peers : Opposing the bully, supporting the victim, or both?

    NARCIS (Netherlands)

    Reijntjes, Albert; Vermande, Marjolijn; Olthof, Tjeert; Goossens, Frits A; Aleva, Liesbeth; van der Meulen, Matty

    2016-01-01

    To reduce bullying, more knowledge on children defending their victimized peers is critical. In previous work, predominantly cross-sectional in nature, defending has typically been operationalized as one single, broad construct. However, there are good reasons to assume that attacking the bully

  13. Jurors' locus of control and defendants' attractiveness in death penalty sentencing.

    Science.gov (United States)

    Beckham, Crystal M; Spray, Beverly J; Pietz, Christina A

    2007-06-01

    The authors examined the relationship between jurors' locus of control and defendants' attractiveness in death penalty sentencing. Ninety-eight participants voluntarily served as mock jurors. The authors administered J. B. Rotter's (1966) Internal-External Locus of Control Scale to participants and then randomly assigned them to a group with either an attractive or an unattractive defendant (represented by photographs). Participants read a murder vignette and selected a punishment--either a lifetime jail sentence or the death penalty-for the defendant. Results indicated that neither jurors' locus of control nor defendants' attractiveness influenced sentencing. However, jurors' age and gender significantly influenced sentencing. Men, with the exception of the youngest men, were more likely than women to choose the death penalty. Additionally, young women were more likely than older women to select the death penalty. The authors discuss the implications of these results for the study of jury behavior and bias.

  14. 40 years of terrorist bombings - A meta-analysis of the casualty and injury profile.

    Science.gov (United States)

    Edwards, D S; McMenemy, L; Stapley, S A; Patel, H D L; Clasper, J C

    2016-03-01

    Terrorists have used the explosive device successfully globally, with their effects extending beyond the resulting injuries. Suicide bombings, in particular, are being increasingly deployed due to the devastating effect of a combination of high lethality and target accuracy. The aim of this study was to identify trends and analyse the demographics and casualty figures of terrorist bombings worldwide. Analysis of the Global Terrorism Database (GTD) and a PubMed/Embase literature search (keywords "terrorist", and/or "suicide", and/or "bombing") from 1970 to 2014 was performed. 58,095 terrorist explosions worldwide were identified in the GTD. 5.08% were suicide bombings. Incidents per year are increasing (Pprofile of survivors to guide the immediate response by the medical services and the workload in the coming days. Copyright © 2016 Elsevier Ltd. All rights reserved.

  15. Simulations in Cyber-Security: A Review of Cognitive Modeling of Network Attackers, Defenders, and Users.

    Science.gov (United States)

    Veksler, Vladislav D; Buchler, Norbou; Hoffman, Blaine E; Cassenti, Daniel N; Sample, Char; Sugrim, Shridat

    2018-01-01

    Computational models of cognitive processes may be employed in cyber-security tools, experiments, and simulations to address human agency and effective decision-making in keeping computational networks secure. Cognitive modeling can addresses multi-disciplinary cyber-security challenges requiring cross-cutting approaches over the human and computational sciences such as the following: (a) adversarial reasoning and behavioral game theory to predict attacker subjective utilities and decision likelihood distributions, (b) human factors of cyber tools to address human system integration challenges, estimation of defender cognitive states, and opportunities for automation, (c) dynamic simulations involving attacker, defender, and user models to enhance studies of cyber epidemiology and cyber hygiene, and (d) training effectiveness research and training scenarios to address human cyber-security performance, maturation of cyber-security skill sets, and effective decision-making. Models may be initially constructed at the group-level based on mean tendencies of each subject's subgroup, based on known statistics such as specific skill proficiencies, demographic characteristics, and cultural factors. For more precise and accurate predictions, cognitive models may be fine-tuned to each individual attacker, defender, or user profile, and updated over time (based on recorded behavior) via techniques such as model tracing and dynamic parameter fitting.

  16. Assessment of terrorist threats to the Canadian energy sector

    Energy Technology Data Exchange (ETDEWEB)

    Shull, A. [Carleton Univ., Ottawa, ON (Canada). Norman Paterson School of International Affairs]|[Ottawa Univ., ON (Canada). Faculty of Law

    2006-03-15

    A critical terrorist threat assessment of Canadian energy systems was presented, as well as an analysis of integrated continental systems. Recent responses to heightened threat levels on the part of the Canadian government have ranged from information sharing to emergency preparedness and disaster mitigation strategies. This paper examined threats that the energy sector has traditionally encountered and argued that response capabilities do not match current threats posed by terrorism. The potential of a terrorist attack on the Canadian energy infrastructure is significant and has been referred to as a possible target by terrorist organizations. Actions taken by the Canadian government in response to heightened threat levels were examined. A review of energy industry security measures included outlines of: the natural gas industry, the electric sector, and nuclear reactors and waste. It was noted that not all elements of the critical energy infrastructure share the same level of risk. Recommendations included increased information sharing between government agencies and the private sector; resiliency standards in densely populated areas; and insulating the energy grid against a cascading blackout through the use of DC rather than AC lines. 59 refs.

  17. Assessment of terrorist threats to the Canadian energy sector

    International Nuclear Information System (INIS)

    Shull, A.

    2006-01-01

    A critical terrorist threat assessment of Canadian energy systems was presented, as well as an analysis of integrated continental systems. Recent responses to heightened threat levels on the part of the Canadian government have ranged from information sharing to emergency preparedness and disaster mitigation strategies. This paper examined threats that the energy sector has traditionally encountered and argued that response capabilities do not match current threats posed by terrorism. The potential of a terrorist attack on the Canadian energy infrastructure is significant and has been referred to as a possible target by terrorist organizations. Actions taken by the Canadian government in response to heightened threat levels were examined. A review of energy industry security measures included outlines of: the natural gas industry, the electric sector, and nuclear reactors and waste. It was noted that not all elements of the critical energy infrastructure share the same level of risk. Recommendations included increased information sharing between government agencies and the private sector; resiliency standards in densely populated areas; and insulating the energy grid against a cascading blackout through the use of DC rather than AC lines. 59 refs

  18. A data-stream classification system for investigating terrorist threats

    Science.gov (United States)

    Schulz, Alexia; Dettman, Joshua; Gottschalk, Jeffrey; Kotson, Michael; Vuksani, Era; Yu, Tamara

    2016-05-01

    The role of cyber forensics in criminal investigations has greatly increased in recent years due to the wealth of data that is collected and available to investigators. Physical forensics has also experienced a data volume and fidelity revolution due to advances in methods for DNA and trace evidence analysis. Key to extracting insight is the ability to correlate across multi-modal data, which depends critically on identifying a touch-point connecting the separate data streams. Separate data sources may be connected because they refer to the same individual, entity or event. In this paper we present a data source classification system tailored to facilitate the investigation of potential terrorist activity. This taxonomy is structured to illuminate the defining characteristics of a particular terrorist effort and designed to guide reporting to decision makers that is complete, concise, and evidence-based. The classification system has been validated and empirically utilized in the forensic analysis of a simulated terrorist activity. Next-generation analysts can use this schema to label and correlate across existing data streams, assess which critical information may be missing from the data, and identify options for collecting additional data streams to fill information gaps.

  19. Defense against terroristic hazards and risk by building planning law

    International Nuclear Information System (INIS)

    Hopkins, Richard

    2012-01-01

    The book on defense against terroristic hazards and risk by building planning law includes the following issues: Introduction: civil engineering and safety. Risk, hazards and urban planning: historical and actual examples for the constructional danger prevention, terroristic threat and urban planning. Risk, hazards and terrorism: sociology and risk, law and risk, terrorism - risk or hazard? Answer to uncertainty - risk prevention, catastrophe law as link. Risk, hazard, terrorism and the public building and regional planning law: regional planning law as point of origin, building law and terrorism, possibility of control by the legal building regulations.

  20. Terrorist Capabilities for Cyberattack: Overview and Policy Issues

    National Research Council Canada - National Science Library

    Rollins, John; Wilson, Clay

    2005-01-01

    ... organizations and consider attempting a cyberattack against the critical infrastructure. Cybercrime increased dramatically between 2004 and 2005, and several recent terrorist events appear to have been funded partially through online credit card fraud...

  1. Analysing Personal Characteristics of Lone-Actor Terrorists: Research Findings and Recommendations

    OpenAIRE

    Roy, de, van Zuijdewijn J.; Bakker, E.

    2016-01-01

    This Research Note presents the outcome of a project that looked at the personal characteristics of lone-actor terrorists. It is part of the larger Countering Lone-Actor Terrorism (CLAT) project. The project described here aimed to improve understanding of, and responses to, the phenomenon of (potentially) violent lone-actors based on an analysis of 120 cases from across Europe. The Research Note focuses on the personal characteristics of lone-actor terrorists.[1] First of all, it presents th...

  2. Addressing the Foreign Terrorist Fighters Phenomenon From a European Union Perspective

    Directory of Open Access Journals (Sweden)

    Mark Singleton

    2014-12-01

    Full Text Available With the outbreak of civil war and sectarian violence in Syria, Iraq, and Libya, over 15,000 men and women from more than 80 countries around the world have left their homes to become foreign fighters. The security challenge they pose is immense and there are concerns about radicalised fighters returning to their countries of origin or residence, hardened by experience and with the possible intent – and the know-how – to engage in terrorist activities. On 24 September, the UN Security Council unanimously adopted Resolution 2178 (2014 with the support of over 120 states representing a broad cross-section of the UN membership. Resolution 2178 called on all UN member states to ensure increased border security and to screen for or arrest so-called “foreign terrorist fighters” (FTFs travelling to or returning from conflict areas. Rightly so, it also urges states to counter violent extremism by taking preventive measures, such as engaging with communities at the local level to stop the spread of extremist ideologies. On 23 October 2014, the Global Center on Cooperative Security, the Human Security Collective, and ICCT convened an expert meeting at the European Union (EU in Brussels to discuss the implications of the resolution and to explore appropriate and effective responses to the threat of FTFs, both within the EU and as part of the Union’s foreign security and development programming. Building upon the discussion in Brussels, this policy brief is a compilation of essays from all three organisations on the challenges and opportunities for addressing the FTF threat from a European Union perspective. It also examines the implementation of Resolution 2178 as an integral part of national and multilateral foreign security and development policies and initiatives.

  3. Competency to stand trial and defendants who lack insight into their mental illness.

    Science.gov (United States)

    Reisner, Andrew D; Piel, Jennifer; Makey, Miller

    2013-01-01

    Forensic evaluators often assess patients who lack insight into their mental illnesses. This lack of insight can have a significant impact on the defendant's ability to make legal strategy decisions that rely on their acceptance of their mental illness. In this article, the relationship between refusing an insanity plea and competency to stand trial will be explored in the context of defendants who lack insight into their mental illness. The authors argue that an adequate competency assessment should take into account the defendant's ability to consider his available pleas rationally. Such evaluations may have the effect of negating the necessity of a Frendak inquiry in those jurisdictions that can impose the insanity defense on defendants.

  4. Can a Copycat Effect be Observed in Terrorist Suicide Attacks?

    Directory of Open Access Journals (Sweden)

    Nicholas Farnham

    2017-03-01

    Full Text Available The purpose of this paper is to explore how a copycat effect – established within the field of suicide studies – may manifest itself in terrorist suicide attacks, and takes an exploratory approach in evaluating the prospect of incorporating open-data resources in future counter-terrorism research. This paper explores a possible ‘copycat effect’ in cases of suicide terrorism, which entails a perpetrator being inspired by a preceding attack to carry out a similar attack not long after the original. In the wake of mounting risks of lone wolf terrorist attacks today and due to the general difficulties faced in preventing such attacks, in this paper we explore a potential area of future prevention in media reporting, security and anti-terrorism policies today. Using the START Global Terrorism Database (GTD, this paper investigates terrorist suicide-attack clusters and analyses the relationship between attacks found within the same cluster. Using a mixed-method approach, our analyses did not uncover clear evidence supporting a copycat effect among the studied attacks. These and other findings have numerous policy and future research implications.

  5. Chemical Plants Remain Vulnerable to Terrorists: A Call to Action

    Science.gov (United States)

    Lippin, Tobi Mae; McQuiston, Thomas H.; Bradley-Bull, Kristin; Burns-Johnson, Toshiba; Cook, Linda; Gill, Michael L.; Howard, Donna; Seymour, Thomas A.; Stephens, Doug; Williams, Brian K.

    2006-01-01

    U.S. chemical plants currently have potentially catastrophic vulnerabilities as terrorist targets. The possible consequences of these vulnerabilities echo from the tragedies of the Bhopal incident in 1984 to the terrorist attacks on 11 September 2001 and, most recently, Hurricanes Katrina and Rita. Findings from a 2004 nationwide participatory research study of 125 local union leaders at sites with very large volumes of highly hazardous chemicals suggest that voluntary efforts to achieve chemical plant security are not succeeding. Study respondents reported that companies had only infrequently taken actions that are most effective in preventing or in preparing to respond to a terrorist threat. In addition, companies reportedly often failed to involve key stakeholders, including workers, local unions, and the surrounding communities, in these efforts. The environmental health community thus has an opportunity to play a key role in advocating for and supporting improvements in prevention of and preparation for terrorist attacks. Policy-level recommendations to redress chemical site vulnerabilities and the related ongoing threats to the nation’s security are as follows: a) specify detailed requirements for chemical site assessment and security; b) mandate audit inspections supported by significant penalties for cases of noncompliance; c) require progress toward achieving inherently safer processes, including the minimizing of storage of highly hazardous chemicals; d) examine and require additional effective actions in prevention, emergency preparedness, and response and remediation; e) mandate and fund the upgrading of emergency communication systems; and f) involve workers and community members in plan creation and equip and prepare them to prevent and respond effectively to an incident. PMID:16966080

  6. 31 CFR 594.310 - Specially designated global terrorist; SDGT.

    Science.gov (United States)

    2010-07-01

    ... (Continued) OFFICE OF FOREIGN ASSETS CONTROL, DEPARTMENT OF THE TREASURY GLOBAL TERRORISM SANCTIONS REGULATIONS General Definitions § 594.310 Specially designated global terrorist; SDGT. The term specially...

  7. Analytical technique to address terrorist threats by chemical weapons of mass destruction

    Science.gov (United States)

    Dempsey, Patrick M.

    1997-01-01

    Terrorism is no longer an issue without effect on the American mind. We now live with the same concerns and fears that have been commonplace in other developed and third world countries for a long time. Citizens of other countries have long lived with the specter of terrorism and now the U.S. needs to be concerned and prepared for terrorist activities.T he terrorist has the ability to cause great destructive effects by focusing their effort on unaware and unprepared civilian populations. Attacks can range from simple explosives to sophisticated nuclear, chemical and biological weapons. Intentional chemical releases of hazardous chemicals or chemical warfare agents pose a great threat because of their ready availability and/or ease of production, and their ability to cause widespread damage. As this battlefront changes from defined conflicts and enemies to unnamed terrorists, we must implement the proper analytical tools to provide a fast and efficient response. Each chemical uses in a terrorists weapon leaves behind a chemical signature that can be used to identify the materials involved and possibly lead investigators to the source and to those responsible. New tools to provide fast and accurate detection for battlefield chemical and biological agent attack are emerging. Gas chromatography/mass spectrometry (GC/MS) is one of these tools that has found increasing use by the military to respond to chemical agent attacks. As the technology becomes smaller and more portable, it can be used by law enforcement personnel to identify suspected terrorist releases and to help prepare the response; define contaminated areas for evacuation and safety concerns, identify the proper treatment of exposed or affected civilians, and suggest decontamination and cleanup procedures.

  8. Simulations in Cyber-Security: A Review of Cognitive Modeling of Network Attackers, Defenders, and Users

    Directory of Open Access Journals (Sweden)

    Vladislav D. Veksler

    2018-05-01

    Full Text Available Computational models of cognitive processes may be employed in cyber-security tools, experiments, and simulations to address human agency and effective decision-making in keeping computational networks secure. Cognitive modeling can addresses multi-disciplinary cyber-security challenges requiring cross-cutting approaches over the human and computational sciences such as the following: (a adversarial reasoning and behavioral game theory to predict attacker subjective utilities and decision likelihood distributions, (b human factors of cyber tools to address human system integration challenges, estimation of defender cognitive states, and opportunities for automation, (c dynamic simulations involving attacker, defender, and user models to enhance studies of cyber epidemiology and cyber hygiene, and (d training effectiveness research and training scenarios to address human cyber-security performance, maturation of cyber-security skill sets, and effective decision-making. Models may be initially constructed at the group-level based on mean tendencies of each subject's subgroup, based on known statistics such as specific skill proficiencies, demographic characteristics, and cultural factors. For more precise and accurate predictions, cognitive models may be fine-tuned to each individual attacker, defender, or user profile, and updated over time (based on recorded behavior via techniques such as model tracing and dynamic parameter fitting.

  9. Simulations in Cyber-Security: A Review of Cognitive Modeling of Network Attackers, Defenders, and Users

    Science.gov (United States)

    Veksler, Vladislav D.; Buchler, Norbou; Hoffman, Blaine E.; Cassenti, Daniel N.; Sample, Char; Sugrim, Shridat

    2018-01-01

    Computational models of cognitive processes may be employed in cyber-security tools, experiments, and simulations to address human agency and effective decision-making in keeping computational networks secure. Cognitive modeling can addresses multi-disciplinary cyber-security challenges requiring cross-cutting approaches over the human and computational sciences such as the following: (a) adversarial reasoning and behavioral game theory to predict attacker subjective utilities and decision likelihood distributions, (b) human factors of cyber tools to address human system integration challenges, estimation of defender cognitive states, and opportunities for automation, (c) dynamic simulations involving attacker, defender, and user models to enhance studies of cyber epidemiology and cyber hygiene, and (d) training effectiveness research and training scenarios to address human cyber-security performance, maturation of cyber-security skill sets, and effective decision-making. Models may be initially constructed at the group-level based on mean tendencies of each subject's subgroup, based on known statistics such as specific skill proficiencies, demographic characteristics, and cultural factors. For more precise and accurate predictions, cognitive models may be fine-tuned to each individual attacker, defender, or user profile, and updated over time (based on recorded behavior) via techniques such as model tracing and dynamic parameter fitting. PMID:29867661

  10. In Their Own Words? Methodological Considerations in the Analysis of Terrorist Autobiographies

    Directory of Open Access Journals (Sweden)

    Mary Beth Altier

    2012-01-01

    Full Text Available Despite the growth of terrorism literature in the aftermath of the 9/11 attacks, there remain several methodological challenges to studying certain aspects of terrorism. This is perhaps most evident in attempts to uncover the attitudes, motivations, and intentions of individuals engaged in violent extremism and how they are sometimes expressed in problematic behavior. Such challenges invariably stem from the fact that terrorists and the organizations to which they belong represent clandestine populations engaged in illegal activity. Unsurprisingly, these qualities make it difficult for the researcher to identify and locate willing subjects of study—let alone a representative sample. In this research note, we suggest the systematic analysis of terrorist autobiographies offers a promising means of investigating difficult-to-study areas of terrorism-related phenomena. Investigation of autobiographical accounts not only offers additional data points for the study of individual psychological issues, but also provides valuable perspectives on the internal structures, processes, and dynamics of terrorist organizations more broadly. Moreover, given most autobiographies cover critical events and personal experiences across the life course, they provide a unique lens into how terrorists perceive their world and insight into their decision-making processes. We support our advocacy of this approach by highlighting its methodological strengths and shortcomings.

  11. Judge grants defendant leniency because of risk of rape in prison.

    Science.gov (United States)

    1998-06-26

    A gay man convicted of larceny and having a history of sexual abuse has escaped incarceration and was placed on probation because his appearance and mannerism would make him a target for rape. The argument that the defendant's HIV infection would endanger others if he were released was rejected by the judge because no evidence suggested the defendant exhibited harmful behavior to others.

  12. The personality profile of terrorist leaders: theoretical aspects and ways of measuring

    OpenAIRE

    Dimitrovska, Aleksandra; Dojcinovski, Metodija

    2015-01-01

    The main task of the psychology of terrorism is to explain the psychological aspects of terrorism, trying to provide answers about the behavior of the persons involved in terrorist activities. The literature suggests that there is no a single theory that explains the reasons and the way of "making the terrorists." While the first generation of research have viewed on terrorism as a pathology, explaining it predominantly through mental illness and psychopathic personality, th...

  13. Does Ability to Defend Moderate the Association between Exposure to Bullying and Symptoms of Anxiety?

    Directory of Open Access Journals (Sweden)

    Morten Birkeland Nielsen

    2017-11-01

    Full Text Available In the context of workplace bullying, the ability to defend refers to whether or not a target feels able to deal with those negative behaviors that typically constitute bullying. The aim of this study was to determine whether the perceived ability to defend oneself moderates the association between exposure to bullying behaviors at work and symptoms of anxiety as predicted by the definition of workplace bullying. It was hypothesized that exposure to bullying behaviors would be more strongly related to symptoms of anxiety among targets feeling unable to defend oneself than among targets who do feel that they are able to defend themselves in the actual situation. This survey study was based on a probability sample of 1,608 Norwegian employees (response rate 32%. Only respondents exposed to at least one bullying behavior were included (N = 739. In contrast to hypothesis, the findings showed that ability to defend only had a protective effect on the relationship between exposure to bullying behaviors and anxiety in cases of low exposure. In cases of high exposure, there was a stronger increase in anxiety among employees able to defend themselves than among those who generally felt unable to defend. Hence, the ability to defend against exposure to bullying behaviors does not seem to protect high-exposed targets against symptoms of anxiety. Organization should therefore intervene against bullying in early stages rather than relying on the individual resilience of those exposed.

  14. Does Ability to Defend Moderate the Association between Exposure to Bullying and Symptoms of Anxiety?

    Science.gov (United States)

    Nielsen, Morten Birkeland; Gjerstad, Johannes; Jacobsen, Daniel Pitz; Einarsen, Ståle Valvatne

    2017-01-01

    In the context of workplace bullying, the ability to defend refers to whether or not a target feels able to deal with those negative behaviors that typically constitute bullying. The aim of this study was to determine whether the perceived ability to defend oneself moderates the association between exposure to bullying behaviors at work and symptoms of anxiety as predicted by the definition of workplace bullying. It was hypothesized that exposure to bullying behaviors would be more strongly related to symptoms of anxiety among targets feeling unable to defend oneself than among targets who do feel that they are able to defend themselves in the actual situation. This survey study was based on a probability sample of 1,608 Norwegian employees (response rate 32%). Only respondents exposed to at least one bullying behavior were included ( N = 739). In contrast to hypothesis, the findings showed that ability to defend only had a protective effect on the relationship between exposure to bullying behaviors and anxiety in cases of low exposure. In cases of high exposure, there was a stronger increase in anxiety among employees able to defend themselves than among those who generally felt unable to defend. Hence, the ability to defend against exposure to bullying behaviors does not seem to protect high-exposed targets against symptoms of anxiety. Organization should therefore intervene against bullying in early stages rather than relying on the individual resilience of those exposed.

  15. Impunity for International Terrorists? Key Legal Questions and Practical Considerations

    Directory of Open Access Journals (Sweden)

    Christophe Paulussen

    2012-04-01

    Full Text Available This Research Paper discusses several of the key questions related to the subject of impunity of international terrorists, taking both a fundamental and a more practical approach within the context of international law. First, it reflects on a number of core definitional and theoretical questions which have been pushed into the background of day‐to‐day reality, by the actual fight against terrorism. For instance: what does the concept of impunity entail exactly and which kinds of standards could be used in measuring impunity? Is it clear what falls under the header of international terrorism and can it in fact be argued that international terrorists enjoy impunity? In practical terms, the paper explores a number of questions related to the actual prosecution of terrorism. What are the obstacles that national prosecutors face every day when prosecuting suspects of international terrorism? To what extent does a rule that prima facie seems ideal to fight terrorism (aut dedere aut judicare: either extradite or prosecute apply to terrorist offences? And what is the role of international criminal law – and the international criminal tribunals – in fighting terrorism? The Paper concludes with a series of recommendations.

  16. The Public Defenders of Indians in Tabasco during the Sixteenth Century

    Directory of Open Access Journals (Sweden)

    Caroline Cunill

    2012-10-01

    Full Text Available During the second half of the sixteenth century, the post of public defender of Indians spread throughout Spanish America, and its missions became more precisely defined, contributing to this effect both the way in which these officers executed their tasks and the publication of legal texts on the matter, conceived by local or metropolitan authorities. By 1591, the protector and defender of Indians or naturales became the essential piece of the recently-created Juzgado General de Indios, an authentic Indian institution that would last until the late colonial period. In order to understand the process, this work analyzes the peculiar evolution of the post of public defender in the Alcaldía Mayor de Tabasco, Gobernación de Yucatán, during the second half of the sixteenth century. Besides revealing the public defenders' identities, status, and wages, the author analyzes their dealings with colonial authorities —the governors of Yucatan, the Royal Audiencias, and the Consejo de Indias–, as well as the Tabaso Indians. All this allows us to understand the central importance this post acquired, not only in the colonial judicial system, but also in the Spanish American government.

  17. Vulnerability analysis and critical areas identification of the power systems under terrorist attacks

    Science.gov (United States)

    Wang, Shuliang; Zhang, Jianhua; Zhao, Mingwei; Min, Xu

    2017-05-01

    This paper takes central China power grid (CCPG) as an example, and analyzes the vulnerability of the power systems under terrorist attacks. To simulate the intelligence of terrorist attacks, a method of critical attack area identification according to community structures is introduced. Meanwhile, three types of vulnerability models and the corresponding vulnerability metrics are given for comparative analysis. On this basis, influence of terrorist attacks on different critical areas is studied. Identifying the vulnerability of different critical areas will be conducted. At the same time, vulnerabilities of critical areas under different tolerance parameters and different vulnerability models are acquired and compared. Results show that only a few number of vertex disruptions may cause some critical areas collapse completely, they can generate great performance losses the whole systems. Further more, the variation of vulnerability values under different scenarios is very large. Critical areas which can cause greater damage under terrorist attacks should be given priority of protection to reduce vulnerability. The proposed method can be applied to analyze the vulnerability of other infrastructure systems, they can help decision makers search mitigation action and optimum protection strategy.

  18. Terra Defender Cyber-Physical Wargame

    Science.gov (United States)

    2017-04-01

    time. However, the WHITE team did not offer game-dollar rewards for these actions and this probably caused low motivation for note-taking. In general...helped to achieve a better understanding of how Army supervisory control and data acquisition (SCADA) system and device security can be modeled and...managed. Terra game players obtained first-hand experience in attacking and defending a live (“operational”) SCADA system that was located in a testbed

  19. Defending Our Satellites: The Need for Electronic Warfare Education and Training

    Science.gov (United States)

    2015-12-01

    intercept Allied bombers attacking at night.9 As a result of the electronic warfare advantage that systems like Window and Airborne Cigar be- stowed...74 | Air & Space Power Journal Defending Our Satellites The Need for Electronic Warfare Education and Training Lt Col E. Lincoln Bonner, USAF...expanding education and training in the use of electronic warfare to defend US satellites and improve their survivability. The following discussion

  20. ANTI-TERROR POLICY OF UZBEKISTAN IN THE FRAMEWORK OF THE REGIONAL ANTI-TERRORIST POLICY OF THE SCO

    Directory of Open Access Journals (Sweden)

    С П Базылева

    2017-12-01

    Full Text Available The beginning of the XXI century was marked by a number of serious problems, including cancer, world hunger, environmental problems and increasing every year the problem of global terrorism, which poses a great threat to the security of the modern multipolar world. Uzbekistan today occupies a firm position in fight against terrorist threat. The principled position of Uzbekistan in the fight against terrorism is that “no country should exclude their participation in the fight against global terrorism, there must be no transit zones and "green corridors" for terrorist organizations”. The Central Asian region is one of the most vulnerable, because it is necessary to pay special attention to the strategy of the anti-terrorist security of the countries included in the structure of the Central Asian region. In this article, we consider the anti-terrorist policy of Uzbekistan in the framework of the regional anti-terrorist policy of the SCO.

  1. Clinical and psychological aspects of adolescent involvement in extremist and terrorist activities

    Directory of Open Access Journals (Sweden)

    Oshevsky D.S.

    2017-07-01

    Full Text Available The article deals with the clinical and psychological aspects of including minors in terrorist and extremist activities. In the historical perspective, it was traced how the views on the role of mental disorders in the genesis of such crimes changed. It is shown that terrorist and extremist activity must be viewed as a complex multi-factor phenomenon, in which socio-psychological components play a leading role. It is noted that the psychopathological process can act as a prerequisite for inclusion in such radical groups. Psychoanalytic, sociological, cognitive approaches, theories of social learning and the concept of diffuse ego-identity making attempts to explain the mechanisms of terrorist and extremist activity in minors are analyzed. The problem of insufficient study of the influence of the Internet and social networks on the formation of readiness for admission to adolescents in radical organizations is posed.

  2. Closing the Gap: Measuring the Social Identity of Terrorists

    National Research Council Canada - National Science Library

    Ludwick, Keith W

    2008-01-01

    .... However, using two well-established theories from social psychology, Social Identity Theory and Social Distance Theory, allows the development of a practical model to develop a social profile of a terrorist group...

  3. Combating the terrorist use of mass destruction weapons, particularly nuclear weapons

    International Nuclear Information System (INIS)

    Barakat, M.

    2008-01-01

    The risks of mass destruction weapons vary and also forms of damages resulting therefrom. While the effects of nuclear weapons are focused, sudden and comprehensive, the chemical weapons have limited impacts relatively unless used intensively severe prejudice to the element of surprise, and thus impaired the efficacy of their influences,especially that they affect exceptionally the individuals in the area of injury and biological weapons do not announce themselves except through their effect that appears later than the time of use as they affect exceptionally the organisms in the area of injury.The mass destruction weapons have turned from being a purely military means in the early twentieth century and have now become the means of violence against governments and countries that they should prepare themselves for and respond in ways of successful and effective countermeasures. Despite the fact that the acquisition of mass destruction weapons can be considered as a priority objective, which terrorist groups and organizations steadily seek but their accessibility is flanked by a lot of difficulties. Addressing the risk of further spread of nuclear weapons, and especially after doubling the power of those high-risk weapons, the international community has an approach to take a number of arrangements that complement each other to control and resist nuclear proliferation, either for the states or for terrorist groups.

  4. The verdict on jury trials for juveniles: the effects of defendant's age on trial outcomes.

    Science.gov (United States)

    Warling, Diane; Peterson-Badali, Michele

    2003-01-01

    With the progression to more adult-like policies and procedures for youth in the justice system, the right to a jury trial has been extended to young offenders. These youth would not be tried by a jury of their peers, however, but by a jury of adults. The concern is that adult jurors may hold negative attitudes about youth that might influence their decision making in a case involving a young defendant. Two studies examined whether and under what conditions defendant's age affects jurors' decisions about the guilt and sentencing of an accused. In study 1, data were gathered from two samples of jury eligible adults: one university sample and one public sample. Mock jurors read written transcripts of a trial involving a defendant who was presented as either 13, 17, or 25 years of age. Results indicated that the defendant's age had no effect on mock jurors' verdict or their ratings of defendant guilt. However, younger defendants were granted shorter sentences than the adult defendants. In study 2, mock jurors read the same trial presented in study 1 but were asked to deliberate about the case and render group verdicts. These group verdicts did not differ significantly by defendant's age. Age-related themes that emerged from group deliberations were identified, and results indicated that age tended to be used as a mitigating factor in favor of youth rather than against them. These findings are discussed in terms of their implications for youth justice policy and practice. Copyright 2003 John Wiley & Sons, Ltd.

  5. Stochastic nanopore sensors for the detection of terrorist agents: Current status and challenges

    Energy Technology Data Exchange (ETDEWEB)

    Liu Aihua; Zhao Qitao [Department of Chemistry and Biochemistry, University of Texas at Arlington, Arlington, TX 76019-0065 (United States); Guan Xiyun, E-mail: xguan@uta.edu [Department of Chemistry and Biochemistry, University of Texas at Arlington, Arlington, TX 76019-0065 (United States)

    2010-08-24

    Nanopore stochastic sensor works by monitoring the ionic current modulations induced by the passage of analytes of interest through a single pore, which can be obtained from a biological ion channel by self-assembly or artificially fabricated in a solid-state membrane. In this minireview, we overview the use of biological nanopores and artificial nanopores for the detection of terrorist agents including explosives, organophosphorus nerve agents, nitrogen mustards, organoarsenic compounds, toxins, and viruses. We also discuss the current challenge in the development of deployable nanopore sensors for real-world applications.

  6. An evaluation of security measures implemented to address physical threats to water infrastructure in the state of Mississippi.

    Science.gov (United States)

    Barrett, Jason R; French, P Edward

    2013-01-01

    The events of September 11, 2001, increased and intensified domestic preparedness efforts in the United States against terrorism and other threats. The heightened focus on protecting this nation's critical infrastructure included legislation requiring implementation of extensive new security measures to better defend water supply systems against physical, chemical/biological, and cyber attacks. In response, municipal officials have implemented numerous safeguards to reduce the vulnerability of these systems to purposeful intrusions including ongoing vulnerability assessments, extensive personnel training, and highly detailed emergency response and communication plans. This study evaluates fiscal year 2010 annual compliance assessments of public water systems with security measures that were implemented by Mississippi's Department of Health as a response to federal requirements to address these potential terrorist threats to water distribution systems. The results show that 20 percent of the water systems in this state had at least one security violation on their 2010 Capacity Development Assessment, and continued perseverance from local governments is needed to enhance the resiliency and robustness of these systems against physical threats.

  7. The Internet information infrastructure: Terrorist tool or architecture for information defense?

    Energy Technology Data Exchange (ETDEWEB)

    Kadner, S.; Turpen, E. [Aquila Technologies Group, Albuquerque, NM (United States); Rees, B. [Los Alamos National Lab., NM (United States)

    1998-12-01

    The Internet is a culmination of information age technologies and an agent of change. As with any infrastructure, dependency upon the so-called global information infrastructure creates vulnerabilities. Moreover, unlike physical infrastructures, the Internet is a multi-use technology. While information technologies, such as the Internet, can be utilized as a tool of terror, these same technologies can facilitate the implementation of solutions to mitigate the threat. In this vein, this paper analyzes the multifaceted nature of the Internet information infrastructure and argues that policymakers should concentrate on the solutions it provides rather than the vulnerabilities it creates. Minimizing risks and realizing possibilities in the information age will require institutional activities that translate, exploit and convert information technologies into positive solutions. What follows is a discussion of the Internet information infrastructure as it relates to increasing vulnerabilities and positive potential. The following four applications of the Internet will be addressed: as the infrastructure for information competence; as a terrorist tool; as the terrorist`s target; and as an architecture for rapid response.

  8. Lone Actor Terrorist Attack Planning and Preparation: A Data-Driven Analysis.

    Science.gov (United States)

    Schuurman, Bart; Bakker, Edwin; Gill, Paul; Bouhana, Noémie

    2017-10-23

    This article provides an in-depth assessment of lone actor terrorists' attack planning and preparation. A codebook of 198 variables related to different aspects of pre-attack behavior is applied to a sample of 55 lone actor terrorists. Data were drawn from open-source materials and complemented where possible with primary sources. Most lone actors are not highly lethal or surreptitious attackers. They are generally poor at maintaining operational security, leak their motivations and capabilities in numerous ways, and generally do so months and even years before an attack. Moreover, the "loneness" thought to define this type of terrorism is generally absent; most lone actors uphold social ties that are crucial to their adoption and maintenance of the motivation and capability to commit terrorist violence. The results offer concrete input for those working to detect and prevent this form of terrorism and argue for a re-evaluation of the "lone actor" concept. © 2017 The Authors. Journal of Forensic Sciences published by Wiley Periodicals, Inc. on behalf of American Academy of Forensic Sciences.

  9. Winning the War of Ideas in the Global War on Terrorism

    National Research Council Canada - National Science Library

    Freeman, Thomas

    2004-01-01

    .... The 4-D strategic concept consists of: defeating terrorist organizations of global reach denying them sponsorship/support/sanctuary diminishing the underlying conditions for terrorism and defending U.S...

  10. The human body as a terrorist weapon: hunger strikes and suicide bombers

    OpenAIRE

    Mollica, Marcello; Dingley, James

    2007-01-01

    This article argues that a major factor in terrorist acts is an appeal to the actor's own community at an emotional and symbolic level, through acts of sacrifice, particularly self-sacrifice. Although other aims also exist, a prime concern is to recall the actor's home audience to the struggle, because the actor regards himself as acting on their behalf. This utilizes the imagery and symbolism of traditional religion, implying a strong communal and non-material impetus to terrorist acts, rath...

  11. Closing the Gap: Measuring the Social Identity of Terrorists

    National Research Council Canada - National Science Library

    Ludwick, Keith W

    2008-01-01

    .... From that, it is further possible to use the resulting social profile to compare terrorist groups against each other in order to develop predictive models as to the propensity of violence of a particular group...

  12. The Relation of Empathy and Defending in Bullying: A Meta-Analytic Investigation

    Science.gov (United States)

    Nickerson, Amanda B.; Aloe, Ariel M.; Werth, Jilynn M.

    2015-01-01

    This meta-analysis synthesized results about the association between empathy and defending in bullying. A total of 20 studies were included, with 22 effect sizes from 6 studies that separated findings by the defender's gender, and 31 effect sizes from 18 studies that provided effects for the total sample were included in the analysis. The weighted…

  13. Game Theoretic Centrality Analysis of Terrorist Networks : The Cases of Jemaah Islamiyah and Al Qaeda

    NARCIS (Netherlands)

    Lindelauf, R.; Hamers, H.J.M.; Husslage, B.G.M.

    2011-01-01

    The identification of key players in a terrorist network can lead to prevention of attacks, due to efficient allocation of surveillance means or isolation of key players in order to destabilize the network. In this paper we introduce a game theoretic approach to identify key players in terrorist

  14. Protecting chemical plants against terrorist attacks: a review

    NARCIS (Netherlands)

    Khakzad Rostami, N.; Reniers, G.L.L.M.E.

    2015-01-01

    Protection of hazardous establishments such as chemical plants intentional incidents has drawn attention from safety and security experts since 9/11 terrorist attacks in the U.S. Although major steps have been taken since, the recent intentional incidents in two chemical plants in France in June and

  15. Friendship selection and influence in bullying and defending: effects of moral disengagement.

    Science.gov (United States)

    Sijtsema, Jelle J; Rambaran, J Ashwin; Caravita, Simona C S; Gini, Gianluca

    2014-08-01

    The current study examined the development of bullying and defending over a 1-year period as related to friends' influence and individual and friends' moral disengagement (i.e., self-justification mechanisms that allow one to avoid moral self-censure of transgressive actions) in children and young adolescents. Via longitudinal social network analysis (RSiena), it was tested whether similarity between friends in bullying and defending developed over time due to friends' influence, while controlling for friendship selection processes, and whether there were differences in these processes between children (age 9-10 years; n = 133; 42.9% girls) and young adolescents (age 11-14 years; n = 236; 40.6% girls). Results showed that individuals selected peers as friends who were similar in bullying and became more similar to friends in bullying over time, but only in early adolescence. Moreover, there was marginal support that friends' influence was stronger in young adolescents with higher moral disengagement. In early adolescence, bullying was also indirectly influenced through friends' moral disengagement, with different effects for boys and girls. With regard to defending, young adolescents maintained friendships with peers who were similar in defending, and became more similar to friends in terms of defending over time. These findings suggest important differences between late childhood and early adolescence in socialization processes and indicate that in early adolescence, friends' influence on the development of bullying is partially affected by moral disengagement. PsycINFO Database Record (c) 2014 APA, all rights reserved.

  16. When Do Governments Concede to Terrorists

    Science.gov (United States)

    2014-06-01

    crisis, 146 people were taken hostage by the terrorist group Tupac Amaru (MRTA) at the Japanese Embassy in Peru . Six of those were American...hispanic_heritage/article-9475994 FARC-EP. (2009). Chronology of resistance: FARC-EP, a history of struggle. Retrieved from http://resistencia- colombia.org...index.php?option=com_content&view=article&id=463: chronology - of-resistance-farc-ep-a-history-of-struggle&catid=50&Itemid=85 Gladwell, M. (2000). The

  17. A data fusion approach to indications and warnings of terrorist attacks

    Science.gov (United States)

    McDaniel, David; Schaefer, Gregory

    2014-05-01

    Indications and Warning (I&W) of terrorist attacks, particularly IED attacks, require detection of networks of agents and patterns of behavior. Social Network Analysis tries to detect a network; activity analysis tries to detect anomalous activities. This work builds on both to detect elements of an activity model of terrorist attack activity - the agents, resources, networks, and behaviors. The activity model is expressed as RDF triples statements where the tuple positions are elements or subsets of a formal ontology for activity models. The advantage of a model is that elements are interdependent and evidence for or against one will influence others so that there is a multiplier effect. The advantage of the formality is that detection could occur hierarchically, that is, at different levels of abstraction. The model matching is expressed as a likelihood ratio between input text and the model triples. The likelihood ratio is designed to be analogous to track correlation likelihood ratios common in JDL fusion level 1. This required development of a semantic distance metric for positive and null hypotheses as well as for complex objects. The metric uses the Web 1Terabype database of one to five gram frequencies for priors. This size requires the use of big data technologies so a Hadoop cluster is used in conjunction with OpenNLP natural language and Mahout clustering software. Distributed data fusion Map Reduce jobs distribute parts of the data fusion problem to the Hadoop nodes. For the purposes of this initial testing, open source models and text inputs of similar complexity to terrorist events were used as surrogates for the intended counter-terrorist application.

  18. Race, law, and health: Examination of 'Stand Your Ground' and defendant convictions in Florida.

    Science.gov (United States)

    Ackermann, Nicole; Goodman, Melody S; Gilbert, Keon; Arroyo-Johnson, Cassandra; Pagano, Marcello

    2015-10-01

    Previous analyses of Stand Your Ground (SYG) cases have been primarily descriptive. We examine the relationship between race of the victim and conviction of the defendant in SYG cases in Florida from 2005 to 2013. Using a regression analytic approach, we allow for simultaneous examination of multiple factors to better understand existing interrelationships. Data was obtained from the Tampa Bay Times SYG database (237 cases) which was supplemented with available online court documents and/or news reports. After excluding cases which were, still pending as of January 2015; had multiple outcomes (because of multiple suspects); and missing information on race of victim and weapon of victim, our final analytic sample has 204 cases. We chose whether the case resulted in a conviction as the outcome. We develop logistic regression models using significant bivariate predictors as candidates. These include race of the victim (White, non-White), whether the defendant could have retreated from the situation, whether the defendant pursued the victim, if the victim was unarmed, and who was the initiator of the confrontation. We find race of the victim to be a significant predictor of case outcome in this data set. After controlling for other variables, the defendant is two times (OR = 2.1, 95% CI [1.07, 4.10]) more likely to be convicted in a case that involves White victims compared to those involving non-White victims. Our results depict a disturbing message: SYG legislation in Florida has a quantifiable racial bias that reveals a leniency in convictions if the victim is non-White, which provides evidence towards unequal treatment under the law. Rather than attempting to hide the outcomes of these laws, as was done in Florida, other states with SYG laws should carry out similar analyses to see if their manifestations are the same as those in Florida, and all should remediate any injustices found. Copyright © 2015 Elsevier Ltd. All rights reserved.

  19. Efficacy of legal judgments for defendants with traumatic brain injury.

    Science.gov (United States)

    St Pierre, Maria E; Parente, Rick

    2016-06-23

    Literature has compared the frequency of aggressive behaviors of the TBI population and the non-TBI population, suggesting that the TBI population is predisposed to aggressive tendencies because the injury enables impulsivity, loss of self-control, and the inability to modify behaviors. These behavior changes have consequently, been found to lead to criminal involvement. In fact, the majority of the prison population has sustained at least one TBI in their lifetime compared to the prevalence of brain injuries in the general population. However, there is little research investigating the perceptions of criminality and guilt of these individuals. Two experiments were conducted that investigated the perceptions of morality, level of guilt, and appropriate sentencing of crimes committed by defendants with different severities of TBI (i.e., mild, severe, and no TBI). Participants were asked to read scenarios about crimes being committed by the defendant. Experiment 1 used a 1-between (crime), 1-within (TBI) mixed design ANOVA testing three dependent variables (morality, guilt, and sentencing). Using a more in vivo jury approach, Experiment 2 used a 3 (TBI)×2 (crime) independent groups factorial design testing the three dependent measures. Overall, defendants with TBI were found less guilty of their crime, perceived as behaving morally to the crime, and receiving a milder punishment relative to the no-TBI defendants. In the courtroom, the defense attorney should educate the judge and/or the jury on the effects brain injuries have on the cognition, behavior, and emotions of an individual. Thus, this education will ensure the best verdict is being reached.

  20. The meaning of collective terrorist threat : Understanding the subjective causes of terrorism reduces its negative psychological impact

    NARCIS (Netherlands)

    Fischer, Peter; Postmes, Tom; Koeppl, Julia; Conway, Lianne; Fredriksson, Tom

    This article hypothesized that the possibility to construct intellectual meaning of a terrorist attack (i.e., whether participants can cognitively understand why the perpetrators did their crime) reduces the negative psychological consequences typically associated with increased terrorist threat.

  1. Current nuclear threats and possible responses

    Science.gov (United States)

    Lamb, Frederick K.

    2005-04-01

    Over the last 50 years, the United States has spent more than 100 billion developing and building a variety of systems intended to defend its territory against intercontinental-range ballistic missiles. Most of these systems never became operational and ultimately all were judged ineffective. The United States is currently spending about 10 billion per year developing technologies and systems intended to defend against missiles that might be acquired in the future by North Korea or Iran. This presentation will discuss these efforts ad whether they are likely to be more effective than those of the past. It will also discuss the proper role of anti-ballistic programs at a time when the threat of a nuclear attack on the U.S. by terrorists armed with nuclear weapons is thought to be much higher than the threat of an attack by nuclear-armed ballistic missles.

  2. A Geographic Information Science (GISc) Approach to Characterizing Spatiotemporal Patterns of Terrorist Incidents in Iraq, 2004-2009

    Energy Technology Data Exchange (ETDEWEB)

    Medina, Richard M [ORNL; Siebeneck, Laura K. [University of Utah; Hepner, George F. [University of Utah

    2011-01-01

    As terrorism on all scales continues, it is necessary to improve understanding of terrorist and insurgent activities. This article takes a Geographic Information Systems (GIS) approach to advance the understanding of spatial, social, political, and cultural triggers that influence terrorism incidents. Spatial, temporal, and spatiotemporal patterns of terrorist attacks are examined to improve knowledge about terrorist systems of training, planning, and actions. The results of this study aim to provide a foundation for understanding attack patterns and tactics in emerging havens as well as inform the creation and implementation of various counterterrorism measures.

  3. Interactive Effects of Guilt and Moral Disengagement on Bullying, Defending and Outsider Behavior

    Science.gov (United States)

    Mazzone, Angela; Camodeca, Marina; Salmivalli, Christina

    2016-01-01

    We examined the moderating effect of guilt on the associations between moral disengagement and bullying, defending and outsider behaviors in a sample of 404 students (203 boys; M[subscript age] = 11.09 years; SD = 1.48). Bullying, defending and outsider behavior were assessed through peer nominations, whereas guilt and moral disengagement were…

  4. Vulnerability to terrorist attacks in European electricity decarbonisation scenarios: Comparing renewable electricity imports to gas imports

    International Nuclear Information System (INIS)

    Lilliestam, Johan

    2014-01-01

    The decarbonised future European electricity system must remain secure: reliable electricity supply is a prerequisite for the functioning of modern society. Scenarios like Desertec, which partially rely on solar power imports from the Middle East and North Africa, may be attractive for decarbonisation, but raise concerns about terrorists interrupting supply by attacking the long, unprotected transmission lines in the Sahara. In this paper, I develop new methods and assess the European vulnerability to terrorist attacks in the Desertec scenario. I compare this to the vulnerability of today's system and a decarbonisation scenario in which Europe relies on gas imports for electricity generation. I show that the vulnerability of both gas and electricity imports is low, but electricity imports are more vulnerable than gas imports, due to their technical characteristics. Gas outages (and, potentially, resulting blackouts) are the very unlikely consequence even of very high-number attacks against the gas import system, whereas short blackouts are the potential consequence of a few attacks against the import electricity lines. As the impacts of all except extreme attacks are limited, terrorists cannot attack energy infrastructure and cause spectacular, fear-creating outages. Both gas and electricity import infrastructure are thus unattractive and unlikely terrorist targets. - Highlights: • A comparison of terrorism risks of importing solar power and gas for power generation. • Both scenarios show low vulnerability to terrorist attacks. • Within low vulnerabilities, gas imports are less vulnerable than electricity imports. • Causing spectacular, large and long outages is very difficult for attacker. • The attractiveness of gas and power import infrastructure as terrorist target is low

  5. Liquid Missile Fuels as Means of Chemical Terrorist Attack

    International Nuclear Information System (INIS)

    Superina, V.; Orehovec, Z.

    2007-01-01

    Modern world is faced with numerous terrorist attacks whose goals, methods and means of the conduct are various. It seems that we have entered the era when terrorism, one's own little terrorism, is the easiest and the most painless way of achieving a goal. That is why that such a situation has contributed to the necessity for strengthening individual and collective protection and safety, import and export control, control of the production and illegal sale of the potential means for delivering terrorist act. It has also contributed to the necessity for devising means of the delivery. For more than 10 years, a series of congresses on CB MTS Industry has pointed at chemicals and chemical industry as potential means and targets of terrorism. The specialization and experience of different authors in the field of the missile technology and missile fuels, especially those of Eastern origin, and the threat that was the reality of the war conflicts in 1990s was the reason for making a scientific and expert analysis of the liquid missile fuels as means of terrorism. There are not many experts in the field of NBC protection who are familiar with the toxicity and reaction of liquid missile fuels still lying discarded and unprotected in abandoned barracks all over Europe and Asia. The purpose of this paper is to draw public attention to possible different abuses of liquid missile fuels for a terrorist purpose, as well as to possible consequences and prevention measures against such abuses. (author)

  6. Criminal defendants' satisfaction with lawyers : Perceptions of procedural fairness and effort of the lawyer

    NARCIS (Netherlands)

    Raaijmakers, E.; de Keijser, J. W.; Nieuwbeerta, P.; Dirkzwager, A. J E

    2014-01-01

    At present, procedural justice theory has predominantly been used to explain defendants' satisfaction with the police, courts and prisons. It is unclear to what extent this theory is also applicable to lawyers. This study investigates to what extent (1) criminal defendants are satisfied with their

  7. Asian Organized Crime and Terrorist Activity in Canada, 1999-2002

    National Research Council Canada - National Science Library

    Helfand, Neil S

    2003-01-01

    This study is based on open source research into the scope of Asian organized crime and terrorist activity in Canada during the period 1999 to 2002, and the extent of cooperation and possible overlap...

  8. Chemical or Biological Terrorist Attacks: An Analysis of the Preparedness of Hospitals for Managing Victims Affected by Chemical or Biological Weapons of Mass Destruction

    Science.gov (United States)

    Bennett, Russell L.

    2006-01-01

    The possibility of a terrorist attack employing the use of chemical or biological weapons of mass destruction (WMD) on American soil is no longer an empty threat, it has become a reality. A WMD is defined as any weapon with the capacity to inflict death and destruction on such a massive scale that its very presence in the hands of hostile forces is a grievous threat. Events of the past few years including the bombing of the World Trade Center in 1993, the Murrah Federal Building in Oklahoma City in 1995 and the use of planes as guided missiles directed into the Pentagon and New York’s Twin Towers in 2001 (9/11) and the tragic incidents involving twenty-three people who were infected and five who died as a result of contact with anthrax-laced mail in the Fall of 2001, have well established that the United States can be attacked by both domestic and international terrorists without warning or provocation. In light of these actions, hospitals have been working vigorously to ensure that they would be “ready” in the event of another terrorist attack to provide appropriate medical care to victims. However, according to a recent United States General Accounting Office (GAO) nationwide survey, our nation’s hospitals still are not prepared to manage mass causalities resulting from chemical or biological WMD. Therefore, there is a clear need for information about current hospital preparedness in order to provide a foundation for systematic planning and broader discussions about relative cost, probable effectiveness, environmental impact and overall societal priorities. Hence, the aim of this research was to examine the current preparedness of hospitals in the State of Mississippi to manage victims of terrorist attacks involving chemical or biological WMD. All acute care hospitals in the State were selected for inclusion in this study. Both quantitative and qualitative methods were utilized for data collection and analysis. Six hypotheses were tested. Using a

  9. Reaksi Pasar atas Pengukuran Kinerja Akuntansi Perusahaan Prospector dan Defender : Analisis Dengan Pendekatan Life Cycle Theory

    Directory of Open Access Journals (Sweden)

    Tri Jatmiko Wahyu P.

    2015-12-01

    Full Text Available The study is an empirical study that intends to examine the difference accounting performance measures between prospector and defender strategies. The study also has objective to examine market reaction for both organizational strategies. Variables that implicated by organizational strategy are income growth, sales growth, dividend pay out, and return on investment. Life cycle theory approach is used to analyze the difference accounting performance measures. Four variables are used to explain strategies between prospector and defender firms are price to book value (PBV ratio, sales to employee ratio, capital expenditure to market equity value ratio, and capital expenditure to total assets ratio. The sample are 30 to prospector firms, and 30 to defender firms derived from 60 manufacturing public firms at Jakarta Stock Exchange, tested by Principal Component Analysis. The result show that income and sales growth of prospector firms are greater than defender firms (significant at 0,01 level. Dividend pay out and return on investment of prospector firms are smaller than defender firms (significant at 0,01 level. While, the market reaction of prospector firms are greater than defender firms, the difference significantly at 0,01 level. Multivariate analysis is used to determine the difference level between prospector and defender firms and it relationship with stock price. The result show that there are significantly difference between income growth, sales growth, dividend pay out, and return on investment to abnormal return.

  10. Exploitation of Free Markets and Globalization to Finance Terrorists

    Science.gov (United States)

    2008-09-01

    is their capability to exploit the black market peso exchange or the international foreign exchange arbitrage . Under the scenario of a weak U.S...appears legitimate. By using intermediaries or legitimate businesses, the financial markets are wide open for terrorists to hedge funds and

  11. Defending behaviors, bullying roles, and their associations with mental health in junior high school students: a population-based study.

    Science.gov (United States)

    Wu, Wen-Chi; Luu, Shyuemeng; Luh, Dih-Ling

    2016-10-10

    Students should be encouraged to help prevent or stop bullying. However, defending victims of bullying can impact on mental health. It is not only bystanders who may defend victims, but bullies, victims and bully-victims can also have defending behaviors. Nevertheless, most studies of defending behaviors have been limited to an examination of the reactions of bystanders or those not involved in bullying and have ignored the other players. The aim of this study is to investigate the associations between defending behaviors and mental health among bullies, victims, bully-victims and bystanders. Associations among defending behaviors, mental health (including depressive symptoms and social anxiety), and bullying experiences were cross-sectionally examined in 3441 students (13-15 years old.) from 20 randomly selected junior high schools in Taiwan using a self-report questionnaire. SAS 9.3 Survey Analysis procedures were used to conduct descriptive analysis and multiple regression models. Defending behaviors were associated with bullying roles and were higher in victims than in bullies or bystanders. Defending behaviors were positively associated with social anxiety and depressive symptoms. After stratifying by bullying roles, defending behaviors were positively associated with social anxiety in bystanders, and were positively associated with depressive symptoms in victims and bystanders. However, defending behaviors were not significantly associated with mental health indicators in bullies. The associations between defending behaviors and mental health varied according to bullying roles. The results suggest that bystanders and victims experience more mental health effects than bullies. Intervention programs aimed at preventing bullying should focus on strategies that minimize social anxiety and depression in victims and bystanders, and urge students to help vulnerable peers during bullying events.

  12. The Next Terrorist Attack: Not If, But When...Are We Prepared?

    National Research Council Canada - National Science Library

    Lynch, David

    2004-01-01

    .... Since lessons learned from past attacks call attention to the terrorists' ability to overcome military defenses, the importance of well-developed, exercised response plans cannot be overstated...

  13. The Terrorist War against Islam: Clarifying Academic Confusions

    Science.gov (United States)

    Schwartz, Stephen

    2011-01-01

    Since the terrorist atrocities of September 11, 2001, Westerners have been challenged to understand the ideological and theological concepts, derived from Islam, that motivated the actions of Al-Qaida on that day and in other attacks before and since. Differences in taxonomy have proven to be a major issue. In the author's view, it is insufficient…

  14. Department of Defense Involvement in Homeland Security: The Militarization of the Southwestern Border in the U.S

    National Research Council Canada - National Science Library

    Thompson, Michael A

    2008-01-01

    .... The Department of Defense (DoD) was given the lead role in Homeland Defense and it directed the U.S. Northern Command (USNORTHCOM) to implement plans and policies to defend against future terrorist attacks...

  15. Bystander Behavior in Bullying Situations: Basic Moral Sensitivity, Moral Disengagement and Defender Self-Efficacy

    Science.gov (United States)

    Thornberg, Robert; Jungert, Tomas

    2013-01-01

    The aim of the present study was to investigate how basic moral sensitivity in bullying, moral disengagement in bullying and defender self-efficacy were related to different bystander behaviors in bullying. Therefore, we examined pathways that linked students' basic moral sensitivity, moral disengagement, and defender self-efficacy to different…

  16. Predicting delay in residents' decisions on defending v. evacuating through antecedents of decision avoidance

    DEFF Research Database (Denmark)

    McNeill, Ilona M.; Dunlop, Patrick D.; Skinner, Timothy C.

    2015-01-01

    Journal compilation © IAWF 2015. In the event of a wildfire, Australian residents of wildfire-prone areas have a choice to defend their home or evacuate early. However, rather than deciding on and preparing for one of these fire-responses ahead of time, most residents delay deciding on defending ...

  17. Waste Management Policy Framework to Mitigate Terrorist Intrusion Activities

    International Nuclear Information System (INIS)

    Redus, Kenneth S.

    2003-01-01

    A policy-directed framework is developed to support US Department of Energy (DOE) counterterrorism efforts, specifically terrorist intrusion activities that affect of Environmental Management (EM) programs. The framework is called the Security Effectiveness and Resource Allocation Definition Forecasting and Control System (SERAD-FACS). Use of SERAD-FACS allows trade-offs between resources, technologies, risk, and Research and Development (R and D) efforts to mitigate such intrusion attempts. Core to SERAD-FACS is (1) the understanding the perspectives and time horizons of key decisionmakers and organizations, (2) a determination of site vulnerabilities and accessibilities, and (3) quantifying the measures that describe the risk associated with a compromise of EM assets. The innovative utility of SERAD-FACS is illustrated for three integrated waste management and security strategies. EM program risks, time delays, and security for effectiveness are examined to demonstrate the significant cost and schedule impact terrorist activities can have on cleanup efforts in the DOE complex

  18. Defending behaviors, bullying roles, and their associations with mental health in junior high school students: a population-based study

    Directory of Open Access Journals (Sweden)

    Wen-Chi Wu

    2016-10-01

    Full Text Available Abstract Background Students should be encouraged to help prevent or stop bullying. However, defending victims of bullying can impact on mental health. It is not only bystanders who may defend victims, but bullies, victims and bully-victims can also have defending behaviors. Nevertheless, most studies of defending behaviors have been limited to an examination of the reactions of bystanders or those not involved in bullying and have ignored the other players. The aim of this study is to investigate the associations between defending behaviors and mental health among bullies, victims, bully-victims and bystanders. Methods Associations among defending behaviors, mental health (including depressive symptoms and social anxiety, and bullying experiences were cross-sectionally examined in 3441 students (13–15 years old. from 20 randomly selected junior high schools in Taiwan using a self-report questionnaire. SAS 9.3 Survey Analysis procedures were used to conduct descriptive analysis and multiple regression models. Results Defending behaviors were associated with bullying roles and were higher in victims than in bullies or bystanders. Defending behaviors were positively associated with social anxiety and depressive symptoms. After stratifying by bullying roles, defending behaviors were positively associated with social anxiety in bystanders, and were positively associated with depressive symptoms in victims and bystanders. However, defending behaviors were not significantly associated with mental health indicators in bullies. Conclusions The associations between defending behaviors and mental health varied according to bullying roles. The results suggest that bystanders and victims experience more mental health effects than bullies. Intervention programs aimed at preventing bullying should focus on strategies that minimize social anxiety and depression in victims and bystanders, and urge students to help vulnerable peers during bullying events.

  19. Moral motivation in defending classmates victimized by bullying

    Czech Academy of Sciences Publication Activity Database

    Kollerová, Lenka; Janošová, Pavlína; Říčan, Pavel

    2015-01-01

    Roč. 12, č. 3 (2015), s. 297-309 ISSN 1740-5629 R&D Projects: GA ČR(CZ) GAP407/12/2325 Institutional support: RVO:68081740 Keywords : Adolescence * Defending * Moral motivation * Peer relations * Prosocial behaviour Subject RIV: AN - Psychology Impact factor: 0.792, year: 2015

  20. A First Look on iMiner's Knowledge base and Detecting Hidden Hierarchy of Riyadh Bombing Terrorist Network

    DEFF Research Database (Denmark)

    Memon, Nasrullah

    2007-01-01

      - Data collection is difficult to any network analysis because it is difficult to create a complete network.  It is not easy to gain information on terrorist networks.  It is fact that terrorist organizations do not provide information on their members and the government rarely allows researche...

  1. Bullying and defending behavior: The role of explicit and implicit moral cognition.

    Science.gov (United States)

    Pozzoli, Tiziana; Gini, Gianluca; Thornberg, Robert

    2016-12-01

    Research on bullying has highlighted the role of morality in explaining the different behavior of students during bullying episodes. However, the research has been limited to the analysis of explicit measures of moral characteristics and moral reasoning, whereas implicit measures have yet to be fully considered. To overcome this limitation, this study investigated the association between bullying and defending, on one hand, and both explicit (moral disengagement, self-importance of moral values) and implicit (immediate affect toward moral stimuli [IAMS]) moral components, on the other hand. Young adolescents (N=279, mean age=11years, 9months, 44.4% girls) completed a series of self-report scales and individually performed a computer task investigating the IAMS. Two hierarchical regressions (bootstrapping method) were performed. Results showed that moral disengagement was associated with bullying and defending behavior at high levels of IAMS, however not when IAMS was low. In contrast, self-importance of moral values was not significantly associated to the two behaviors when IAMS was high whereas both associations were significant at low levels of IAMS. These results significantly expand previous knowledge about the role of morality in bullying and defending behavior. In particular, they highlight the role of the interaction between explicit and implicit moral dimensions in predicting bullying and defending behaviors. Copyright © 2016 Society for the Study of School Psychology. Published by Elsevier Ltd. All rights reserved.

  2. 40 CFR 312.28 - Specialized knowledge or experience on the part of the defendant.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 27 2010-07-01 2010-07-01 false Specialized knowledge or experience on the part of the defendant. 312.28 Section 312.28 Protection of Environment ENVIRONMENTAL PROTECTION... knowledge or experience on the part of the defendant. (a) Persons to whom this part is applicable per § 312...

  3. Computing Optimal Mixed Strategies for Terrorist Plot Detection Games with the Consideration of Information Leakage

    OpenAIRE

    Li MingChu; Yang Zekun; Lu Kun; Guo Cheng

    2017-01-01

    The terrorist’s coordinated attack is becoming an increasing threat to western countries. By monitoring potential terrorists, security agencies are able to detect and destroy terrorist plots at their planning stage. Therefore, an optimal monitoring strategy for the domestic security agency becomes necessary. However, previous study about monitoring strategy generation fails to consider the information leakage, due to hackers and insider threat. Such leakage events may lead to failure of watch...

  4. Effect of criminal defendant's history of childhood sexual abuse and personality disorder diagnosis on juror decision making.

    Science.gov (United States)

    Butler, Ebony; Jacquin, Kristine

    2014-08-01

    This study investigated whether a defendant's history of childhood sexual abuse (CSA) and/or personality disorder (PD) diagnosis affected juror decision making in a child sexual abuse trial. The PDs in the study were borderline PD and antisocial PD. Participants were 385 college students, 121 men and 264 women, who read a summary of a mock criminal trial and then made various juror decisions. Trial summaries were prepared by the principal investigator and were all uniform in content, length and detail. For the trial, both the defendant's gender and victim's gender were specified. The defendant was male, and the alleged victim was female. When the verdict was assessed, the results yielded that when the defendant's CSA history was presented, juror guilt ratings were higher than when there was no history of CSA. Similarly, when the defendant had a PD diagnosis, there were higher guilt ratings than when there was no PD diagnosis. CSA history and PD diagnosis were significant predictors of guilt ratings, suggesting that jurors perceive defendants more negatively if they have either been sexually abused as a child or have borderline or antisocial PD. Copyright © 2014 John Wiley & Sons, Ltd.

  5. Juror Decision-making in Death Penalty Sentencing when Presented with Defendant's History of Child Abuse or Neglect.

    Science.gov (United States)

    Bell Holleran, Lisa L; Vaughan, Tyler J; Vandiver, Donna M

    2016-11-01

    Previous studies have found aggravating, mitigating, and null effects of defendant histories of abuse and neglect on punishment preferences in capital sentencing. Perceiving these defendants as more dangerous, jurors may be more likely to favor the death penalty when such evidence is presented. This is counter to the intuition that abuse or neglect reduces culpability, and therefore mitigates the severity of punishment. We investigated the effect of defendant childhood physical abuse, sexual abuse, or neglect on the probability of a prospective juror preferring the death penalty in an between-subject experimental design. Using vignettes and two large samples (students and jurors), defendant histories were found to mitigate the probability that the hypothetical defendant received the death penalty, with sexual abuse having the most salient effect. Further, the effects were conditioned by preference for the death penalty - larger mitigating effects were observed among individuals who favor the death penalty. These findings suggest that initial judgments of abuse and neglect are related to juror leniency, and further research on the interaction of jury instructions and defendant histories is needed. Copyright © 2017 John Wiley & Sons, Ltd. Copyright © 2017 John Wiley & Sons, Ltd.

  6. Freed: Ripples of the Convicted and Released Terrorist in America

    Science.gov (United States)

    2011-03-01

    Singapore, Malaysia , Indonesia, Thailand, and the Philippines (The International Conference on Terrorist Rehabilitation, 2009). No single methodology to...2009, p. 16). Care Rehabilitation Centers include group meals, art therapy, recreation and other leisure activity to “build teamwork but also

  7. A Defender-Attacker Optimization of Port Radar Surveillance

    Science.gov (United States)

    2011-01-01

    security; optimization; attacker-defender “And thence discover how with most advantage They may vex us with shot, or with assault.” Shakespeare , KingHenryVI...1. INTRODUCTION We introduce a new planning tool for locating shore radars and mobile picket boats with radar to maximize the probabil- ity that one

  8. Defending behaviors, bullying roles, and their associations with mental health in junior high school students: a population-based study

    OpenAIRE

    Wu, Wen-Chi; Luu, Shyuemeng; Luh, Dih-Ling

    2016-01-01

    Abstract Background Students should be encouraged to help prevent or stop bullying. However, defending victims of bullying can impact on mental health. It is not only bystanders who may defend victims, but bullies, victims and bully-victims can also have defending behaviors. Nevertheless, most studies of defending behaviors have been limited to an examination of the reactions of bystanders or those not involved in bullying and have ignored the other players. The aim of this study is to invest...

  9. The Use of Structures in Communication Networks to Track Membership in Terrorist Groups

    Directory of Open Access Journals (Sweden)

    H.A Eiselt

    2015-02-01

    Full Text Available This concept paper investigates possibilities to detect terrorist cells based on communications between individuals without the need for wiretapping. The advantages of such procedure are apparent: fewer (if any legal requirements, and, most importantly, the possibility to automate the surveillance. After a brief review of the pertinent literature, we offer three approaches that are designed to aid in the detection of not only terrorist cells, but also the command structures within the cells. The techniques are demonstrated by using a small illustration. The paper concludes by outlining limitations of the procedures described here.

  10. Terrorism against Human Rights: Reflections in the light of the Evolution

    Directory of Open Access Journals (Sweden)

    Rubens Sotero

    2017-03-01

    Full Text Available Departing from the Universal Declaration of Human Rights, we will inquire if there are human rights for terrorists. Initially, we will defend the claim that the Declaration guarantees such rights to terrorists and we will show its consequences. Then we will seek an objective foundation for human rights based on the theory of evolution of species; as such a foundation is missing, we will show some consequences of the lack of this objective foundation.

  11. Surgical resource utilization in urban terrorist bombing: a computer simulation.

    Science.gov (United States)

    Hirshberg, A; Stein, M; Walden, R

    1999-09-01

    The objective of this study was to analyze the utilization of surgical staff and facilities during an urban terrorist bombing incident. A discrete-event computer model of the emergency room and related hospital facilities was constructed and implemented, based on cumulated data from 12 urban terrorist bombing incidents in Israel. The simulation predicts that the admitting capacity of the hospital depends primarily on the number of available surgeons and defines an optimal staff profile for surgeons, residents, and trauma nurses. The major bottlenecks in the flow of critical casualties are the shock rooms and the computed tomographic scanner but not the operating rooms. The simulation also defines the number of reinforcement staff needed to treat noncritical casualties and shows that radiology is the major obstacle to the flow of these patients. Computer simulation is an important new tool for the optimization of surgical service elements for a multiple-casualty situation.

  12. Charitable collaborations in Bronzeville, 1928-1944: the "Chicago Defender" and the Regal Theater.

    Science.gov (United States)

    Semmes, Clovis E

    2011-01-01

    In the twentieth century, race-based residential and commercial segregation that supported racial oppression and inequality became an elemental characteristic of urban black communities. Conflict-ridden, black-white relationships were common. However, the Chicago Defender Charities, Inc., the entity that sponsors the largest African American parade in the country and that emerged in 1947, embodied a tradition of charitable giving, self-help, and community service initiated in 1921 by Chicago Defender newspaper founder and editor, Robert S. Abbott. The foundation of this charitable tradition matured as a result of an early and sustained collaboration between Chicago’s white-owned Regal Theater and the black-owned Chicago Defender newspaper. Thus, in segregated African American communities, black and white commercial institutions, under certain conditions, were able to find important points of collaboration to uplift the African American communities of which they were a part.

  13. [Treatment strategies for mass casualty incidents and terrorist attacks in trauma and vascular surgery : Presentation of a treatment concept].

    Science.gov (United States)

    Friemert, B; Franke, A; Bieler, D; Achatz, A; Hinck, D; Engelhardt, M

    2017-10-01

    The treatment of patients in the context of mass casualty incidents (MCI) represents a great challenge for the participating rescue workers and clinics. Due to the increase in terrorist activities it is necessary to become familiar with this new kind of threat to civilization with respect to the medical treatment of victims of terrorist attacks. There are substantial differences between a "normal" MCI and a terrorist MCI with respect to injury patterns (blunt trauma vs. penetrating/perforating trauma), the type and form of the incident (MCI=static situation vs. terrorist attack MCI= dynamic situation) and the different security positions (rescue services vs. police services). This article is concerned with question of which changes in the surgical treatment of patients are made necessary by these new challenges. In this case it is necessary that physicians are familiar with the different injury patterns, whereby priority must be given to gunshot and explosion (blast) injuries. Furthermore, altered strategic and tactical approaches (damage control surgery vs. tactical abbreviated surgical care) are necessary to ensure survival for as many victims of terrorist attacks as possible and also to achieve the best possible functional results. It is only possible to successfully counter these new challenges by changing the mindset in the treatment of terrorist MCI compared to MCI incidents. An essential component of this mindset is the acquisition of a maximum of flexibility. This article would like to make a contribution to this problem.

  14. Licensing issues in the context of terrorist attacks on nuclear power plants

    International Nuclear Information System (INIS)

    Danwitz, T. von

    2002-01-01

    The terrorist attack on the World Trade Center in September 2001 has prompted enhanced nuclear risk awareness among the German population. But in the current public debate about the safety of nuclear power plants in Germany in times of new dimensions of danger, aspects such as the role of the constitutional law, the German Atomic Energy Act, and the regulatory system governing nuclear power plant licensing in the context of protection and safety have not been addressed. The author therefore discusses the German nuclear power plant licensing law and administrative regime, elaborating on the significance attributed in those bodies of law to risks like terrorist attacks on nuclear power plants. (orig./CB) [de

  15. ‘Let the Punishment Match the Offence’: Determining Sentences for Australian Terrorists

    Directory of Open Access Journals (Sweden)

    Nicola McGarrity

    2013-04-01

    Full Text Available To date, 38 men have been charged with terrorism offences in Australia. Twenty-six have been convicted. The article commences with an overview of the factual circumstances leading to these convictions. This provides important background for the following discussion of a largely unexplored issue in Australian anti-terrorism law and policy, namely, the difficulties faced by the Australian courts in adapting traditional sentencing principles to the (for the most part, preparatory terrorism offences enacted by the Commonwealth Parliament after the 9/11 terrorist attacks. Of particular interest are how the courts determine the objective seriousness of these offences and the respective weight placed upon deterrence (both specific and general and the rehabilitation of convicted terrorists.

  16. LOWER NORTH BATTERY - DEFENDED PORT OF SIMON'S TOWN

    African Journals Online (AJOL)

    LOWER NORTH BATTERY - DEFENDED. PORT OF SIMON'S TOWN. Lt-Cdr W. M. Bisset*. In 1975 Mr H. C. Willis suggested to the present writer that the SA Navy should mount a bronze plaque similar to those commissioned by the. Simon's Town Historical Society and displayed on certain historical buildings in the town at ...

  17. Computing Optimal Mixed Strategies for Terrorist Plot Detection Games with the Consideration of Information Leakage

    Directory of Open Access Journals (Sweden)

    Li MingChu

    2017-01-01

    Full Text Available The terrorist’s coordinated attack is becoming an increasing threat to western countries. By monitoring potential terrorists, security agencies are able to detect and destroy terrorist plots at their planning stage. Therefore, an optimal monitoring strategy for the domestic security agency becomes necessary. However, previous study about monitoring strategy generation fails to consider the information leakage, due to hackers and insider threat. Such leakage events may lead to failure of watching potential terrorists and destroying the plot, and cause a huge risk to public security. This paper makes two major contributions. Firstly, we develop a new Stackelberg game model for the security agency to generate optimal monitoring strategy with the consideration of information leakage. Secondly, we provide a double-oracle framework DO-TPDIL for calculation effectively. The experimental result shows that our approach can obtain robust strategies against information leakage with high feasibility and efficiency.

  18. Short and intermediate economic impacts of a terrorist-initiated loss of electric power: Case study of New Jersey

    International Nuclear Information System (INIS)

    Greenberg, Michael; Mantell, Nancy; Lahr, Michael; Felder, Frank; Zimmerman, Rae

    2007-01-01

    The economic impacts of potential terrorist attacks on the New Jersey electric power system are examined using a regional econometric model. The magnitude and duration of the effects vary by type of business and income measure. We assume damage is done during in the summer 2005 quarter, a peak period for energy use. The state economy recovers within a year, if we assume that economic activity is restored in the next time period. However, if the attacks prompt an absolute of loss of activity due to firm relocation, closing, and geographical changes in expansion plans, then the economy does not fully recover by the year 2010. Hence, the electrical power system's resiliency to damage is the key to the extent and duration of any economic consequences of a terrorist attack, at least in New Jersey. The policy implication is that the costs and benefits of making the electric power system more resilient to plausible attacks should be weighed and that the restorative capacity of the system should be strengthened

  19. Short and intermediate economic impacts of a terrorist-initiated loss of electric power: case study of New Jersey

    Energy Technology Data Exchange (ETDEWEB)

    Greenberg, M.; Mantell, N.; Lahr, M.; Felder, F. [Rutgers University, New Brunswick, NJ (United States). Edward J. Bloustein School; Zimmerman, R. [New York University (United States). Robert F. Wagner School of Public Service

    2007-01-15

    The economic impacts of potential terrorist attacks on the New Jersey electric power system are examined using a regional econometric model. The magnitude and duration of the effects vary by type of business and income measure. We assume damage is done during in the summer 2005 quarter, a peak period for energy use. The state economy recovers within a year, if we assume that economic activity is restored in the next time period. However, if the attacks prompt an absolute of loss of activity due to firm relocation, closing, and geographical changes in expansion plans, then the economy does not fully recover by the year 2010. Hence, the electrical power system's resiliency to damage is the key to the extent and duration of any economic consequences of a terrorist attack, at least in New Jersey. The policy implication is that the costs and benefits of making the electric power system more resilient to plausible attacks should be weighed and that the restorative capacity of the system should be strengthened. (author)

  20. Classroom relationship qualities and social-cognitive correlates of defending and passive bystanding in school bullying in Sweden: A multilevel analysis.

    Science.gov (United States)

    Thornberg, Robert; Wänström, Linda; Hong, Jun Sung; Espelage, Dorothy L

    2017-08-01

    Using the social-ecological and social cognitive theories as integrated guiding frameworks, the present study examined whether moral disengagement and defender self-efficacy at the individual level, and moral disengagement, quality of teacher-student relationships and quality of student-student relationships at the classroom level were associated with passive bystanding and defending in bullying situations. Participants were 900 Swedish students from 43 classrooms, ranging in age from 9 to 13years. Multilevel regression analyses revealed that passive reactions by bystanders were associated with greater moral disengagement and less defender self-efficacy. Defending, in turn, was associated with less moral disengagement and greater defender self-efficacy and classroom student-student relationship quality. Furthermore, students who scored high in moral disengagement were even less prone to defend victims when the classroom student-student relationship quality was low, but more prone to act as defenders when the classroom student-student relationship quality was high. In addition, the negative association between defender self-efficacy and passive bystanding was stronger both in classrooms with higher student-student relationship quality and in those with lower class moral disengagement. Implications for prevention are discussed. Copyright © 2017 Society for the Study of School Psychology. All rights reserved.

  1. Islamic State and Chemical Weapons

    Directory of Open Access Journals (Sweden)

    Lukáš Rafay

    2016-09-01

    Full Text Available The article deals with topic of Islamic State and chemical weapons. The issue is analysed in three dimensions: origin of used chemical weapons and possibility of independent production; known chemical attacks and tactical regularities in their execution; and traits of future chemical terrorist attacks. By providing a thorough examination of the problem, the article aims at predicting the future development of the group’s chemical program as well as describing any prospective chemical terrorist attacks in Europe

  2. IS MISS SYMPATHY A CREDIBLE DEFENDANT ALLEGING INTIMATE PARTNER VIOLENCE IN A TRIAL FOR MURDER?

    Directory of Open Access Journals (Sweden)

    Francisca Expósito

    2012-07-01

    Full Text Available Current research has postulated that judicial inferencing and judgement-making are subject to biased appraisals. This study assessed the factors reported in the literature associated to the appraisal of criminality in a mock case of a battered woman standing trial for murdering her husband, and who pleaded legitimate self-defence in response to an instance of intimate partner violence. A nationwide sample of 169 police officers from different cities in Spain freely volunteered to participate in the study. Using a mock trial design, the defendant´s prototypicality (prototypical vs. non-prototypical, and physical attractiveness (attractive vs. unattractive were manipulated. Participants were required to assess the criminality (credibility, responsibility, and controllability of a battered woman accused of murdering her husband, and who alleged legitimate self-defence in response to an incident of intimate partner violence. The results showed that a defendant perceived as the prototype of a battered woman was judged as having less or no control of the situation; physical attractiveness increased the perception of the defendant´s responsibility in committing the crime; and an interaction between prototypicality and attractiveness in assigning credibility to the defendant´s testimony. Moreover, hostile sexism mediated the relationship between the defendant´s prototypicality and controllability. The results are discussed in terms of their implications for judicial judgement making in cases of battered women who kill their aggressors.

  3. The game-theoretic national interstate economic model : an integrated framework to quantify the economic impacts of cyber-terrorist behavior.

    Science.gov (United States)

    2014-12-01

    This study suggests an integrated framework to quantify cyber attack impacts on the U.S. airport security system. A cyber attack by terrorists on the U.S. involves complex : strategic behavior by the terrorists because they could plan to invade an ai...

  4. The Sociology and Psychology of Terrorism: Who Becomes a Terrorist and Why?

    National Research Council Canada - National Science Library

    Hudson, Rex A

    1999-01-01

    ...) and the new recruitment patterns of some groups, such as recruiting suicide commandos, female and child terrorists, and scientists capable of developing weapons of mass destruction, provide a measure...

  5. Can a Copycat Effect be Observed in Terrorist Suicide Attacks?

    NARCIS (Netherlands)

    Farnham, N.T.; Liem, M.C.A.

    2017-01-01

    The purpose of this paper is to explore how a copycat effect – established within the field of suicide studies – may manifest itself in terrorist suicide attacks, and takes an exploratory approach in evaluating the prospect of incorporating open-data resources in future counter-terrorism research.

  6. The Effect Terrorist Labels Have on Military Operations

    Science.gov (United States)

    2012-05-17

    Department until 2008.44 Nelson Mandela , the renowned member of the ANC and Nobel Prize laureate, became president of South Africa in 1994 and is...celebrated internationally as one of the most prolific and revolutionary leaders of the 20th century. Mandela received all these awards and accolades—many...models or key players during 44 Mimi Hall, "U.S. has Mandela on Terrorist List," USA Today, http

  7. Public health preparedness and response to a radiological terrorist attack

    International Nuclear Information System (INIS)

    Yamaguchi, Ichiro

    2016-01-01

    Given the potential for intentional malevolent acts, the security of radioactive sources should be ensured. In the event of a terrorist attack using a radioactive source, we should care not only about health concerns of victims, especially including first responders who suffer from radiation injury, but also public health activities with affected people during the long recovery phase. Regarding the radiological public health viewpoint, preventive efforts are also important. In fact, regulatory reform is progressing in Japan according to the code of conduct issued by IAEA. One of the difficulties of countermeasures for the security of radioactive sources in Japan is to establish a disposal facility for disused sealed radioactive sources, since radioactive waste has been additionally a point of contention in society since the nuclear disaster. This paper presents an overview of countermeasures for terrorist attacks using a radioactive source, from the viewpoint of public health in Japan including the results of survey targeted hospitals equipped with blood irradiation machines. (author)

  8. Terror i tvillingtårnene – dystopi og ironi? 9/11 i Darlah og En terrorist i senga

    Directory of Open Access Journals (Sweden)

    Lersbryggen Mørk, Kjersti

    2011-03-01

    Full Text Available Terror in the Twin Towers – dystopia and irony? 9/11 in Darlah and En terrorist i senga. Through globalization of our media society, children as well as adults are endlessly exposed to information and images from all over the world. In Norway, signs of the terrorist attack on the Twin Towers in USA on September 11th 2001 are now to be found in literature for children and young adults. With globalization theory and post-colonial theory I will examine how two novels present global challenges in general and 9/11 in particular. What does globalization mean for the construction of identity? Who are “we”, and who are “the others”? The novel for young adults, Darlah – 172 timer på månen [Darlah – 172 hours on the moon] (2008 by Johan Harstad, is a dystopia where 9/11 points forward to a full scale catastrophe for humanity. En terrorist i senga [There's a terrorist in my bed] (2008, a novel for children by Endre Lund Eriksen, makes explicit references to 9/11 – but with playfulness and ironic revelation of xenophobia. Both books use aliens from outer space as “the other”, but where Darlah presents a pessimistic view of our global future, En terrorist i senga is optimistic on behalf of the humankind.

  9. The Rise and the Fall of Terrorist Organizations in Post-Dictatorial Greece: The Role and the Lessons for the Intelligence Services

    National Research Council Canada - National Science Library

    Fakitsas, Miltiadis

    2003-01-01

    The Greek government unsuccessfully battled leftist terrorist groups from 1975 to 2002, The two most notorious terrorist organizations during this period were the "November 17" group and another group...

  10. The 'overlooked trio' of hypothetical terrorist nuclear weapons - reactor grade plutonium, neptunium-237 and tritium

    International Nuclear Information System (INIS)

    Sholly, S.

    2002-01-01

    Full text: Considerations revolving around physical protection of nuclear material are quite commonly and naturally focused on protecting weapons-grade plutonium (WGPu) and highly enriched uranium (HEU) from theft and diversion. These two materials are the center of attention because of their well-known (and demonstrated) potential for use in first-generation nuclear explosive devices of which potential terrorists are widely thought to be capable. They are also the center of attention because of retirements of these materials from military use as the Russian Federation and the United States reduce the number of nuclear weapons in their arsenals. Three other materials - an 'overlooked trio' - must also be borne in mind within this context: (1) reactor-grade plutonium (RGPu); (2) neptunium-237 (Np-237); and (3) tritium (H-3). Although there are still some authorities who either contend that RGPu cannot be used in a nuclear explosive or that there are (for a terrorist) insurmountable difficulties in doing so, the knowledgeable scientific and technical community, recognizes the potential utility of RGPu for hypothetical terrorist nuclear devices. A much smaller community of experts recognizes the usefulness of Np-237 for nuclear devices, but Np-237 is as straight-forwardly and easily usable as HEU and similarly abundant (but not often in separated form). Tritium can be used (with a modest increase in design sophistication) in a conventional first-generation nuclear device with any of the weapons-usable materials (WGPu, HEU, RGPu or Np-237) to increase the yield and/or increase the reliability of a non-fizzle yield. Given the presence of RGPu and Np-237 in abundant quantities in spent commercial reactor fuel, widely available knowledge of how to separate these materials, and a world-wide total of more than 400 nuclear power plants, spent reactor fuel also requires stringent controls. This is especially true of old spent fuel which has far less radiation dose

  11. Do terrorist attacks affect ethnic discrimination in the labour market? Evidence from two randomized field experiments.

    Science.gov (United States)

    Birkelund, Gunn Elisabeth; Chan, Tak Wing; Ugreninov, Elisabeth; Midtbøen, Arnfinn H; Rogstad, Jon

    2018-01-24

    Terrorist attacks are known to influence public opinion. But do they also change behaviour? We address this question by comparing the results of two identical randomized field experiments on ethnic discrimination in hiring that we conducted in Oslo. The first experiment was conducted before the 2011 terrorist attacks in Norway; the second experiment was conducted after the attacks. In both experiments, applicants with a typical Pakistani name were significantly less likely to get a job interview compared to those with a typical Norwegian name. But the ethnic gap in call-back rates were very similar in the two experiments. Thus, Pakistanis in Norway still experienced the same level of discrimination, despite claims that Norwegians have become more positive about migrants after the far-right, anti-migrant terrorist attacks of 2011. © London School of Economics and Political Science 2018.

  12. Changing the story the role of the narrative in the success or failure of terrorist groups

    OpenAIRE

    Mellen, Brian C.

    2009-01-01

    Approved for public release, distribution unlimited This thesis focuses on the nexus between a terrorist group's narrative and the group's success or failure in achieving its strategic goals. This work theorizes that the interaction of competing narratives exerts a systematic impact on the ability of the terrorist group to achieve its strategic goals through the influence that the narratives have over a group's members, the group's adversary, and the affected population. Although a te...

  13. What is Russia trying to defend?

    Directory of Open Access Journals (Sweden)

    Andrei Yakovlev

    2016-06-01

    Full Text Available Contrary to the focus on the events of the last two years (2014–2015 associated with the accession of Crimea to Russia and military conflict in Eastern Ukraine, in this study, I stress that serious changes in Russian domestic policy (with strong pressure on political opposition, state propaganda and sharp anti-Western rhetoric, as well as the fight against “foreign agents’ became visible in 2012. Geopolitical ambitions to revise the “global order” (introduced by the USA after the collapse of the USSR and the increased role of Russia in “global governance” were declared by leaders of the country much earlier, with Vladimir Putin's famous Munich speech in 2007. These ambitions were based on the robust economic growth of the mid-2000s, which encouraged the Russian ruling elite to adopt the view that Russia (with its huge energy resources is a new economic superpower. In this paper, I will show that the concept of “Militant Russia” in a proper sense can be attributed rather to the period of the mid-2000s. After 2008–2009, the global financial crisis and, especially, the Arab Spring and mass political protests against electoral fraud in Moscow in December 2011, the Russian ruling elite made mostly “militant” attempts to defend its power and assets.

  14. MOTIVATION SPECIFIC FOR YOUNGSTERS INVOLVED INTO TERRORIST OPERATION

    OpenAIRE

    Beslan Alexeyevich Tarchokov

    2015-01-01

    The paper made an attempt to explore preconditions, motives, reasons and factors capable of facilitating youth’ involvement into terrorist operations, emergence of youth terrorism and its spreading around, including the specifics of social and economic domains, of ideology and politics, psychology and law, etc. all of them taken on the scene of nowadays globalized society. Specifying in greater detail the causes and circumstances that contributed to involvement of young Russians into terroris...

  15. Abuse Is Abuse: The Influence of Type of Abuse, Victim Age, and Defendant Age on Juror Decision Making.

    Science.gov (United States)

    Sheahan, Chelsea L; Pica, Emily; Pozzulo, Joanna D

    2017-09-01

    The purpose of the current study was to examine the role of victim age, defendant age, and type of abuse on mock juror decision making. Mock jurors ( N = 556) read a trial transcript in which a soccer coach was accused of sexual abuse or physical abuse against a player. The victim's age (child, adolescent, or young adult), the defendant's age (young, middle age, or older adult), and the type of abuse (sexual or physical) were varied. Mock jurors provided a dichotomous and continuous verdict and rated their perceptions of the victim and the defendant. Although no differences on mock jurors' dichotomous verdict were found due to victim age, defendant age, or type of abuse, mock jurors provided higher guilt ratings when the abuse was sexual and both the victim and defendant were described as young adults. Similarly, mock jurors rated the victim more positively when the victim was described as a young adult (vs. child) for both sexual and physical abuse cases, and rated the defendant more positively when the victim was described as a child compared with young adult in sexual abuse cases. These findings suggest that mock jurors were largely influenced by victim age, particularly when the victim was described as an adult compared with a child.

  16. Early adolescents' motivations to defend victims in school bullying and their perceptions of student-teacher relationships: A self-determination theory approach.

    Science.gov (United States)

    Jungert, Tomas; Piroddi, Barbara; Thornberg, Robert

    2016-12-01

    The aim of this study was to investigate whether various dimensions of student-teacher relationships were associated with different types of motivation to defend victims in bullying and to determine the association between these types of motivations and various bystander behaviors in bullying situations among early adolescents in Italy. Data were collected from 405 Italian adolescents who completed a survey in their classroom. Results showed that warm student-teacher relationships were positively associated with defending victims and with autonomous motivation to defend victims. In contrast, conflictual student-teacher relationships were positively associated with passive bystanding and with extrinsic motivation to defend victims. Different forms of motivation to defend were found to be mediators between student-teacher relationship qualities and bystander behaviors in school bullying. Our findings suggest that teachers should build warm and caring student-teacher relationships to enhance students' autonomous motivation to defend victims of bullying as well as their inclination to defend the victims in practice. Copyright © 2016 The Foundation for Professionals in Services for Adolescents. Published by Elsevier Ltd. All rights reserved.

  17. Terrorism and Counter-Terrorism Strategies in a Globalised World : alternative perceptiveness of terrorist emergence theory and policing strategies confrontation with human rights

    OpenAIRE

    Kikkas, Margit

    2015-01-01

    Globalisation and development in technology have advanced terrorism to reach a broader target audience. Especially focussing at the international co-operation strategies and combined social networks, terrorist activities have an direct- and indirect effect on private households, international commerce and local governments. Security institutions and state organisations use various combinations of counter- terrorism measures, that are mostly social-, political-, or financial in nature. Neverth...

  18. Detection of Hidden Hostile/Terrorist Groups in Harsh Territories by Using Animals as Mobile Biological Sensors.

    Science.gov (United States)

    Sahin, Yasar Guneri; Ercan, Tuncay

    2008-07-25

    Terrorism is the greatest threat to national security and cannot be defeated by conventional military force alone. In critical areas such as Iraq, Afghanistan and Turkey, regular forces cannot reach these hostile/terrorist groups, the instigators of terrorism. These groups have a clear understanding of the relative ineffectiveness of counter-guerrilla operations and rely on guerrilla warfare to avoid major combat as their primary means of continuing the conflict with the governmental structures. In Internal Security Operations, detection of terrorist and hostile groups in their hiding places such as caves, lairs, etc. can only be achieved by professionally trained people such as Special Forces or intelligence units with the necessary experience and tools suitable for collecting accurate information in these often harsh, rugged and mountainous countries. To assist these forces, commercial micro-sensors with wireless interfaces could be utilized to study and monitor a variety of phenomena and environments from a certain distance for military purposes. In order to locate hidden terrorist groups and enable more effective use of conventional military resources, this paper proposes an active remote sensing model implanted into animals capable of living in these environments. By using these mobile sensor devices, improving communications for data transfer from the source, and developing better ways to monitor and detect threats, terrorist ability to carry out attacks can be severely disrupted.

  19. Detection of Hidden Hostile/Terrorist Groups in Harsh Territories by Using Animals as Mobile Biological Sensors

    Directory of Open Access Journals (Sweden)

    Tuncay Ercan

    2008-07-01

    Full Text Available Terrorism is the greatest threat to national security and cannot be defeated by conventional military force alone. In critical areas such as Iraq, Afghanistan and Turkey, regular forces cannot reach these hostile/terrorist groups, the instigators of terrorism. These groups have a clear understanding of the relative ineffectiveness of counter-guerrilla operations and rely on guerrilla warfare to avoid major combat as their primary means of continuing the conflict with the governmental structures. In Internal Security Operations, detection of terrorist and hostile groups in their hiding places such as caves, lairs, etc. can only be achieved by professionally trained people such as Special Forces or intelligence units with the necessary experience and tools suitable for collecting accurate information in these often harsh, rugged and mountainous countries. To assist these forces, commercial micro-sensors with wireless interfaces could be utilized to study and monitor a variety of phenomena and environments from a certain distance for military purposes. In order to locate hidden terrorist groups and enable more effective use of conventional military resources, this paper proposes an active remote sensing model implanted into animals capable of living in these environments. By using these mobile sensor devices, improving communications for data transfer from the source, and developing better ways to monitor and detect threats, terrorist ability to carry out attacks can be severely disrupted.

  20. Defending or Challenging the Status Quo: Position Effects on Biased Intergroup Perceptions

    Directory of Open Access Journals (Sweden)

    Emma A. Bäck

    2014-05-01

    Full Text Available The default ideological position is status quo maintaining, and challenging the status quo is associated with increased efforts and risks. Nonetheless, some people choose to challenge the status quo. Therefore, to challenge the status quo should imply a strong belief in one’s position as the correct one, and thus efforts may be undertaken to undermine the position of others. Study 1 (N = 311 showed that challengers undermined, by ascribing more externality and less rationality, the position of defenders to a larger extent than defenders did of challengers’ position. Studies 2 (N = 135 and 3 (N = 109 tested if these effects were driven by the implied minority status of the challenging position. Results revealed no effects of experimentally manipulated numerical status, but challengers were again more biased than defenders. Study 3 also revealed that challengers felt more negatively toward their opponents (possibly due to greater social identification with like-minded others, and these negative emotions in turn predicted biased attributions. Results are important as they add to the understanding of how intergroup conflict may arise, providing explanations for why challengers are less tolerant of others’ point of view.

  1. Terrorist Threats in the Basque Country: its Impact on the Psychosocial Sphere of Victims

    Directory of Open Access Journals (Sweden)

    Javier Martín-Peña

    2014-07-01

    Full Text Available The ceasefire of armed activities announced by ETA (Basque Homeland and Freedom in 2011 has fostered a debate about the violence and the victims of the terrorist organization. During those years, the violence perpetrated by ETA was characterized by bomb attacks and assassinations. In addition to this blatant violent behavior, a low-intensity violence was also taking place in the Basque Country, consisting of terrorist threats against their targets. There is, however, a lack of evidence-based research into this phenomenon. This investigation studies the impact of terrorist threats on the psychosocial functioning of people threatened by ETA in the Basque Country. Seventy-six people targeted by ETA completed self-reported survey. Terrorist threats and their derived psychosocial consequences were assessed by this way. The findings point out a relationship between terrorist threats and their psychosocial effects, which greatly affected the immediate environment of the targets too. The implications of these findings are discussed. El cese de la actividad armada anunciado por ETA (Euskadi ta Askatasuna – Euskadi y Libertad en 2011 ha promovido un debate sobre la violencia y las víctimas de la organización terrorista. Durante esos años, la violencia perpetrada por ETA se caracterizó por ataques con bombas y asesinatos. Además de este comportamiento claramente violento, en el País Vasco también se estaba produciendo una violencia de baja intensidad, consistente en amenazas terroristas contra sus objetivos. Sin embargo, no hay una investigación basada en la evidencia sobre este fenómeno. Esta investigación estudia el impacto de las amenazas terroristas en el funcionamiento psicosocial de las personas amenazadas por ETA en el País Vasco. Setenta y seis personas amenazadas por ETA completaron una encuesta de autoevaluación. Se evaluaron de esta forma las amenazas terroristas y sus consecuencias psicosociales derivadas. Los resultados indicaron

  2. Scientific Support of Terrorist Actions by Commercial Grey Area Literature

    International Nuclear Information System (INIS)

    Katzung, W.

    2007-01-01

    The publication of the Al-Quaida handbook and time and time again notes of the possibility for getting special scientific knowledge from the internet have decreased the attention for an other important source of scientific support for terrorist education and/or actions. This is the commercial available and distributed grey area literature provided by a huge amount of (book) sellers and publishing houses. Most of this literature (hard copies and CDs) with dangerous subject matter is published in the US and may be ordered fast and with low costs using the internet. This kind of support for real and potential terrorists stands strongly in contradiction to the official policy and the 'unconditional' war against terrorism. With the presented poster the above described problem should be a little bit put in the focus of the CBMTS community and so to the authorities, too. By means of selected examples from different branches, such as Narcotics, Explosives, unusual Killing Methods, special Poisons / Toxins and, last not least, CW agents inclusive application methods and devices the highly charged situation is tried to shown. (author)

  3. Defending against the Advanced Persistent Threat: An Optimal Control Approach

    Directory of Open Access Journals (Sweden)

    Pengdeng Li

    2018-01-01

    Full Text Available The new cyberattack pattern of advanced persistent threat (APT has posed a serious threat to modern society. This paper addresses the APT defense problem, that is, the problem of how to effectively defend against an APT campaign. Based on a novel APT attack-defense model, the effectiveness of an APT defense strategy is quantified. Thereby, the APT defense problem is modeled as an optimal control problem, in which an optimal control stands for a most effective APT defense strategy. The existence of an optimal control is proved, and an optimality system is derived. Consequently, an optimal control can be figured out by solving the optimality system. Some examples of the optimal control are given. Finally, the influence of some factors on the effectiveness of an optimal control is examined through computer experiments. These findings help organizations to work out policies of defending against APTs.

  4. Arbitrariness and the death penalty: how the defendant's appearance during trial influences capital jurors' punishment decision.

    Science.gov (United States)

    Antonio, Michael E

    2006-01-01

    This paper examines the impact of the defendant's appearance during the trial on capital jurors' punishment decision. The data used in this analysis were gathered by the Capital Jury Project (CJP), a national program of research on the decision-making of capital jurors. A series of multivariate logistic regression analyses were conducted using four aggravating circumstances related to the killing and eight defendant appearance variables as predictors of jurors' punishment decision at three points during the capital trial: (1) after the punishment phase ended, but before formal deliberation began; (2) when the first vote was taken on punishment at jury deliberations; and (3) at the final vote on punishment. Results indicated that when the defendant appeared emotionally involved during the trial (i.e. sorry and sincere) jurors either favored a life sentence or were undecided about punishment; however, when the defendant appeared emotionally uninvolved during the trial (i.e. bored) jurors either sought a death sentence or remained undecided. Policy implications will be discussed. Copyright (c) 2006 John Wiley & Sons, Ltd.

  5. Effectiveness of Using Red-Teams to Identify Maritime Security Vulnerabilities to Terrorist Attack

    National Research Council Canada - National Science Library

    Culpepper, Anna

    2004-01-01

    .... Moreover, there have been no attacks on homeland U.S. targets since September 11. The red team concept provides an innovative method to examine these vulnerabilities from the terrorist perspective...

  6. Breaching the Fortress Wall. Understanding Terrorist Efforts to Overcome Defensive Technologies

    Science.gov (United States)

    2007-01-01

    that affect, in overlapping ways, sequential parts of the terrorist activity chain (Figure 1.2). The purposes of each of these types of technologies...fication lineup .51 The ways in which PIRA chose to manage operations also contrib- uted to its overall counterforensic effort. For example, although

  7. Lone Actor Terrorist Attack Planning and Preparation : A Data-Driven Analysis

    NARCIS (Netherlands)

    Schuurman, B.W.; Bakker, E.; Gill, P.; Bouhana, N.

    2017-01-01

    This article provides an in-depth assessment of lone actor terrorists’ attack planning and preparation. A codebook of 198 variables related to different aspects of pre-attack behavior is applied to a sample of 55 lone actor terrorists. Data were drawn from open-source materials and complemented

  8. Analysing Personal Characteristics of Lone-Actor Terrorists : Research Findings and Recommendations

    NARCIS (Netherlands)

    Roy, de van Zuijdewijn J.; Bakker, E.

    2016-01-01

    This Research Note presents the outcome of a project that looked at the personal characteristics of lone-actor terrorists. It is part of the larger Countering Lone-Actor Terrorism (CLAT) project. The project described here aimed to improve understanding of, and responses to, the phenomenon of

  9. Cross-Milieu Terrorist Collaboration: Using Game Theory to Assess the Risk of a Novel Threat.

    Science.gov (United States)

    Ackerman, Gary A; Zhuang, Jun; Weerasuriya, Sitara

    2017-02-01

    This article uses a game-theoretic approach to analyze the risk of cross-milieu terrorist collaboration-the possibility that, despite marked ideological differences, extremist groups from very different milieus might align to a degree where operational collaboration against Western societies becomes possible. Based upon theoretical insights drawn from a variety of literatures, a bargaining model is constructed that reflects the various benefits and costs for terrorists' collaboration across ideological milieus. Analyzed in both sequential and simultaneous decision-making contexts and through numerical simulations, the model confirms several theoretical arguments. The most important of these is that although likely to be quite rare, successful collaboration across terrorist milieus is indeed feasible in certain circumstances. The model also highlights several structural elements that might play a larger role than previously recognized in the collaboration decision, including that the prospect of nonmaterial gains (amplification of terror and reputational boost) plays at least as important a role in the decision to collaborate as potential increased capabilities does. Numerical simulation further suggests that prospects for successful collaboration over most scenarios (including operational) increase when a large, effective Islamist terrorist organization initiates collaboration with a smaller right-wing group, as compared with the other scenarios considered. Although the small number of historical cases precludes robust statistical validation, the simulation results are supported by existing empirical evidence of collaboration between Islamists and right- or left-wing extremists. The game-theoretic approach, therefore, provides guidance regarding the circumstances under which such an unholy alliance of violent actors is likely to succeed. © 2016 Society for Risk Analysis.

  10. ACTS OF TERRORISM AS A TACTIC OF THE ISLAMIC STATE AND IMPLICATIONS FOR RUSSIAN FOREIGN POLICY

    Directory of Open Access Journals (Sweden)

    Aleksandr Nikolaevich Xaribin

    2016-02-01

    Full Text Available In the article the analysis of the Islamic state: emergence, current status, reasons for success, control methods and prospects. The last terrorist attacks: Russian aircraft over the Sinai and the terrorist attack in Paris. A comparative analysis and reasons for election purposes by terrorists to attack, the consequences for Egypt, Europe, the middle East and Russia. At the end of the article gives practical recommendations for Russian foreign policy and the forecast of development of events in this region, it is hypothesized that the further growth of the Islamic state and the inability to move it to the borders of Russia

  11. A Functional Approach to Televised Political Spots: Acclaiming, Attacking, Defending.

    Science.gov (United States)

    Benoit, William L.; Pier, P. M.; Blaney, Joseph R.

    1997-01-01

    Articulates a theoretical framework for understanding the fundamental functions of political advertising (acclaiming, attacking, defending) which occur on the twin grounds of policy considerations and character. Applies this theory of political discourse to presidential general election television spots from 1980-1996, finding that Democrats and…

  12. Templeton Prize winner defends Christianity's credibility in a scientific age

    CERN Multimedia

    Heffern, Rich

    2002-01-01

    The 2002 Templeton Prize has gone to the Rev. John C. Polkinghome, a British mathematical physicist and Anglican priest, and a key spokesperson for belief in God in an age of science, defending the ideal that faith is not against science but inconcert with it

  13. Politické násilí a koncept failed state - komparace Iráku a Somálska

    OpenAIRE

    Nemešová, Lucie

    2011-01-01

    There is recently growing interest, and also the political and academic debate connected to it, in the so called failed states. The problem of state failure in some of the world regions was securitized, particularly after the 9/11 terrorist attacks, and the failed states began being understood as a security threat by the international community. This change in perception of the failed states reflects the concerns that such states' areas could serve as a "safe havens" of various terrorist grou...

  14. "Racial bias in mock juror decision-making: A meta-analytic review of defendant treatment": Correction to Mitchell et al. (2005).

    Science.gov (United States)

    2017-06-01

    Reports an error in "Racial Bias in Mock Juror Decision-Making: A Meta-Analytic Review of Defendant Treatment" by Tara L. Mitchell, Ryann M. Haw, Jeffrey E. Pfeifer and Christian A. Meissner ( Law and Human Behavior , 2005[Dec], Vol 29[6], 621-637). In the article, all of the numbers in Appendix A were correct, but the signs were reversed for z' in a number of studies, which are listed. Also, in Appendix B, some values were incorrect, some signs were reversed, and some values were missing. The corrected appendix is included. (The following abstract of the original article appeared in record 2006-00971-001.) Common wisdom seems to suggest that racial bias, defined as disparate treatment of minority defendants, exists in jury decision-making, with Black defendants being treated more harshly by jurors than White defendants. The empirical research, however, is inconsistent--some studies show racial bias while others do not. Two previous meta-analyses have found conflicting results regarding the existence of racial bias in juror decision-making (Mazzella & Feingold, 1994, Journal of Applied Social Psychology, 24, 1315-1344; Sweeney & Haney, 1992, Behavioral Sciences and the Law, 10, 179-195). This research takes a meta-analytic approach to further investigate the inconsistencies within the empirical literature on racial bias in juror decision-making by defining racial bias as disparate treatment of racial out-groups (rather than focusing upon the minority group alone). Our results suggest that a small, yet significant, effect of racial bias in decision-making is present across studies, but that the effect becomes more pronounced when certain moderators are considered. The state of the research will be discussed in light of these findings. (PsycINFO Database Record (c) 2017 APA, all rights reserved).

  15. 75 FR 75904 - Global Terrorism Sanctions Regulations; Terrorism Sanctions Regulations; Foreign Terrorist...

    Science.gov (United States)

    2010-12-07

    ... Terrorism Sanctions Regulations; Terrorism Sanctions Regulations; Foreign Terrorist Organizations Sanctions... Foreign Assets Control (``OFAC'') of the U.S. Department of the Treasury is amending the Global Terrorism Sanctions Regulations (``GTSR'') and the Terrorism Sanctions Regulations (``TSR'') to expand the scope of...

  16. The challenge of preparation for a chemical, biological, radiological or nuclear terrorist attack

    Directory of Open Access Journals (Sweden)

    Alexander David

    2006-01-01

    Full Text Available Terrorism is not a new phenomenon, but, in the contemporary scene, it has established itself in a manner which commands the most serious attention of the authorities. Until relatively recently, the major threat has been through the medium of conventional weaponry and explosives. Their obvious convenience of use and accessibility guarantees that such methods will continue to represent a serious threat. However, over the last few years, terrorists have displayed an enthusiasm for higher levels of carnage, destruction and publicity. This trend leads inexorably to the conclusion that chemical, biological, radiological and nuclear (CBRN methods will be pursued by terrorist organisations, particularly those which are well organised, are based on immutable ideological principles, and have significant financial backing. Whilst it is important that the authorities and the general public do not risk over-reacting to such a threat (otherwise, they will do the work of the terrorists for them, it would be equally ill-advised to seek comfort in denial. The reality of a CBRN event has to be accepted and, as a consequence, the authorities need to consider (and take seriously how individuals and the community are likely to react thereto and to identify (and rehearse in a realistic climate what steps would need to be taken to ameliorate the effects of such an event.

  17. Media participation and mental health in terrorist attack survivors.

    Science.gov (United States)

    Thoresen, Siri; Jensen, Tine K; Dyb, Grete

    2014-12-01

    Terrorism and disasters receive massive media attention, and victims are often approached by reporters. Not much is known about how terror and disaster victims perceive the contact with media and whether such experiences influence mental health. In this study, we describe how positive and negative experiences with media relate to posttraumatic stress (PTS) reactions among survivors of the 2011 Utøya Island terrorist attack in Norway. Face-to-face interviews were conducted with 285 survivors (47.0% female and 53.0% male) 14-15 months after the terrorist attack. Most survivors were approached by reporters (94%), and participated in media interviews (88%). The majority of survivors evaluated their media contact and participation as positive, and media participation was unrelated to PTS reactions. Survivors who found media participation distressing had more PTS reactions (quite distressing: B = 0.440, extremely distressing: B = 0.611, p = .004 in adjusted model). Perceiving media participation as distressing was slightly associated with lower levels of social support (r = -.16, p = .013), and regretting media participation was slightly associated with feeling let down (r = .18, p = .004). Reporters should take care when interviewing victims, and clinicians should be aware of media exposure as a potential additional strain on victims. Copyright © 2014 International Society for Traumatic Stress Studies.

  18. Terrorist threat and perceived Islamic support for terrorist attacks as predictors of personal and institutional out-group discrimination and support for anti-immigration policies: evidence from 9 European countries

    NARCIS (Netherlands)

    Doosje, B.; Zimmermann, A.; Küpper, B.; Zick, A.; Meertens, R.

    2009-01-01

    Traditionally, research has shown that subtle and blatant prejudices are important predictors of out-group discrimination and support for anti-immigration policies. The present paper shows that, when controlling for these types of prejudices and for political conservatism, terrorist threat and

  19. Transition from Terrorist Event Management to Consequence Management, Executive Summary

    Science.gov (United States)

    1982-03-31

    hUMIEe " BDM/W-82-l1 5-TR AUTO11(o 1. CONTR ACT OR GRANT NumURe) J. C. Evanis, M. K. Pilgrim, C. J. Potter EMW-C-0744 9. PER•O^•ING ORGANIZATIN NAME...should, and is expected to, provide leadership in this regard. There exists a variety of experience and planning for responding to terrorist events. The

  20. When Can Forensic Psychologists Comment on the Credibility of Criminal Defendants?

    Directory of Open Access Journals (Sweden)

    Roberto Flores de Apodaca

    2015-06-01

    Full Text Available Forensic psychological examiners are often confronted with assessments in the guilt phase of criminal cases in which a Defendant denies his/her charged conduct, but the existing evidence clearly contradicts their account. This happens often in cases involving charges of violence, sex offending and or substance abuse (Langton, Barbaree, Harkins, Arenovich, McNamee & Peacock, 2008. What is the proper role of the examiner in such instances?; granting the benefit of the doubt and accepting the Defendant’s account, using the one contained in the differing evidence, or making an independent judgment about which is more likely to be true? Does accepting any version mean the expert is offering an opinion on the Ultimate Issue in the case, and encroaching on the role of the Trier of Fact? The Federal Rules of Evidence (FREE dictate that judgments about Ultimate Issues belong solely to the Trier of Fact, yet the DSM-5 Manual (APA, 2013 instructs us to consider Malingering in every forensic situation; i.e. is the Defendant being honest about his mental state, and by implication, his/her credibility?  Our recommendation is that examiners offer no opinions about which conflicting version in a criminal case is the more credible during the guilt phase, and instead, offer “if, then” assessments about a Defendant’s propensity for violence or sexual offending; i.e. if the charges are true, then s/he poses certain levels of risk going forward, for reasons detailed in the report. Such a stance avoids experts “taking sides” during the guilt phase of a case and allows them to fully inform the adversarial, legal process as it deliberates on possible Plea Bargains or Sentencing decisions. We argue that this impartial approach serves a useful function in legal proceedings while adhering to our Ethical Guidelines (APA, 2010.

  1. Terrorists on Trial: A Performative Perspective

    Directory of Open Access Journals (Sweden)

    Beatrice de Graaf

    2011-03-01

    Full Text Available On 30 March 2011, ICCT organised an Expert Meeting entitled “Terrorism Trials as Theatre: A Performative Perspective”. The Expert Meeting applied a performative perspective to three well known and recent trials in different parts of the world: the trials against the Dutch Hofstad Group, the Mumbai 2008 Terrorist Attack Trial and the Guantanamo Military Tribunals. As such, the Expert Meeting did not concentrate solely on the immediate judicial performance of the magistrates and/or the defence; instead, the trials were put in their wider sociological context, adopting notions of social drama and communication sciences. This Expert Meeting Paper is a further adaptation of the Discussion Paper that was used as basis for debate during the Meeting.

  2. Prospects of the Economic Community of West African States Standby Force

    National Research Council Canada - National Science Library

    Amponsem-Boateng, Richard

    2006-01-01

    .... Political instability, conflicts and economic deprivation breeds failed states. In addition to wanton human sufferings, failed states can provide safe havens for terrorist and other international crime...

  3. Social categorization and fear reactions to the September 11th terrorist attacks

    NARCIS (Netherlands)

    Dumont, M.; Yzerbyt, V.Y.; Wigboldus, D.H.J.; Gordijn, E.H.

    2003-01-01

    Two experiments were run in The Netherlands and Belgium 1 week after the terrorist attacks against the World Trade Center in New York on September 11, 2001. The aim was to investigate whether social categorization affected emotional reactions, behavioral tendencies, and actual behaviors. Results

  4. Is magnetic resonance imaging safe for patients with retained metal fragments from combat and terrorist attacks?

    International Nuclear Information System (INIS)

    Eshed, Iris; Kushnir, Tamar; Shabshin, Noga; Konen, Eli

    2010-01-01

    Background: Increasing numbers of military confrontations and terrorist attacks have led to increasing reports of retained metal fragments among patients referred for magnetic resonance imaging (MRI). The potential hazard of retained metal fragments for patients undergoing MRI has been studied among patients with retained metal fragments from domestic violence but not from combat and terrorist attacks. Purpose: To retrospectively evaluate the safety of MRI in patients with subcutaneous warfare-metal fragments. Material and Methods: 10,322 consecutive metal screening forms of patients scheduled for 1.5 Tesla (T) MR examination were retrospectively reviewed. All patients reported to have retained metal fragments were contacted by telephone and asked to describe the event in which they were exposed to the fragments and for any adverse sequelae or sensations during and after MRI. Their radiographs were evaluated for the number and size of the fragments. The data were analyzed for correlations between these factors. Results: Seven of the 24 patients who reported retained metal fragments were excluded, since there was no validating evidence of their presence. Fragments in the remaining 17 patients (18 MRI examinations) were inflicted by military or terrorist attacks that occurred 2-39 years prior to the MRI. The fragment size ranged between 1 and 10 mm. One patient reported a superficial migration of a 10-mm fragment after MRI. No other adverse reactions were reported. Conclusion: Conducting 1.5T MRI examinations is safe in patients with retained metal fragments from combat and terrorist attacks not in the vicinity of vital organs. However, caution is advised.

  5. Is magnetic resonance imaging safe for patients with retained metal fragments from combat and terrorist attacks?

    Energy Technology Data Exchange (ETDEWEB)

    Eshed, Iris; Kushnir, Tamar; Shabshin, Noga; Konen, Eli (Dept. of Diagnostic Imaging, Sheba Medical center, Tel Hashomer, Sackler School of Medicine, Tel Aviv Univ., Tel Aviv (Israel)), e-mail: iris.eshed@sheba.health.gov.il

    2010-03-15

    Background: Increasing numbers of military confrontations and terrorist attacks have led to increasing reports of retained metal fragments among patients referred for magnetic resonance imaging (MRI). The potential hazard of retained metal fragments for patients undergoing MRI has been studied among patients with retained metal fragments from domestic violence but not from combat and terrorist attacks. Purpose: To retrospectively evaluate the safety of MRI in patients with subcutaneous warfare-metal fragments. Material and Methods: 10,322 consecutive metal screening forms of patients scheduled for 1.5 Tesla (T) MR examination were retrospectively reviewed. All patients reported to have retained metal fragments were contacted by telephone and asked to describe the event in which they were exposed to the fragments and for any adverse sequelae or sensations during and after MRI. Their radiographs were evaluated for the number and size of the fragments. The data were analyzed for correlations between these factors. Results: Seven of the 24 patients who reported retained metal fragments were excluded, since there was no validating evidence of their presence. Fragments in the remaining 17 patients (18 MRI examinations) were inflicted by military or terrorist attacks that occurred 2-39 years prior to the MRI. The fragment size ranged between 1 and 10 mm. One patient reported a superficial migration of a 10-mm fragment after MRI. No other adverse reactions were reported. Conclusion: Conducting 1.5T MRI examinations is safe in patients with retained metal fragments from combat and terrorist attacks not in the vicinity of vital organs. However, caution is advised.

  6. Iraagi väitel tuleb iga teine terrorist Süüriast / Igor Taro

    Index Scriptorium Estoniae

    Taro, Igor

    2007-01-01

    Bagdadis elurajooni turul hukkus enesetapurünnakus 130 inimest. Iraagi kõrge valitsusametniku sõnul tuleb 50% terrorist üle Süüria piiri. Iraagi peaminister Nuri al-Maliki arvamus. Vt. samas: Mässulised leiavad tuge internetist

  7. Trash can bomb can fall into the hands of terrorists

    CERN Multimedia

    2001-01-01

    Leading scientists from CERN described how if terrorists were able to get their hands on plutonium or uranium, they would be able to manufacture a 'trash can' nuclear bomb simply by inserting the radioactive material into a normal bomb. Once detonated a large area could be contaminated leading to the immediate deaths of many with many more future casualties due to cancers caused by the radiation.

  8. Remediation following a CBRN terrorist attack : domestic and international perspectives

    Energy Technology Data Exchange (ETDEWEB)

    Yanofsky, N. [Defence Research and Development Canada, Ottawa, ON (Canada)

    2005-07-01

    The risks of chemical, biological and radiological/nuclear (CBRN) agents in terrorist attacks is well recognized. Serious measures must be in place to respond to terrorist attacks that involve these agents, including cleanup of affected buildings, machinery, land, water and air. This paper describes what is expected from the science community in the development of adequate, reliable and economical decontamination methods and equipment. It also discusses improved detection methods and adequate personal protection. Cleanup after a terrorist attack has much in common with the cleanup of contaminated sites or dealing with the consequences of industrial accidents, particularly as most potential chemical terror agents are represented by toxic industrial chemicals. The major needs of organizations involved in cleanup procedures were reviewed. Issues concerning first responders, assessment of situations, information collecting and the detection of possible chemical, biological and radiological agents were discussed. The development of generic decontamination procedures and equipment was suggested, with reference to the fact that the spectrum of CBRN weapons is very broad. In addition, the development of detection systems and instruments capable of analyzing a broad range of agents was also seen as desirable. New generation instruments such as Toxic Industrial Materials (TIMs) detectors were reviewed. Guidelines for cleanup procedures and remediation efforts were examined. It was also noted that there is relatively little information available to predict the behaviour of potential agents of CBRN terrorism in a complex urban environment. By studying different complex threat scenarios, scientists, first responders and other parties can achieve a better understanding of how to optimize the deployment of their resources. Mechanical, physiochemical and biological methods of decontamination were evaluated. Issues concerning waste disposal were discussed. It was noted that the

  9. Action Foundations! a Comic (Book) Tale of Defending Educational Studies

    Science.gov (United States)

    Nuñez, Isabel; Konkol, Pamela J.

    2013-01-01

    When defending educational foundations, Isabel Nunez and Pamela Konkol sometimes find themselves responding to the question of "why?"-often phrased, "But WHYYYYY do we have to take a class on this stuff??? (We want to take more methods!)." As distressing as this can be for teacher educators whose own work reveals rather a…

  10. Defending the Military Food Supply Acquisition, Preparation, and Protection of Food at U.S. Military Installations

    Science.gov (United States)

    2009-09-01

    former KGB official, with polonium - 210 in 2006.25 However, a number of factors make radiological contamination of food unlikely. First, it is...Defense University September 2009 Defending the Military Food Supply Acquisition, Preparation, and Protection of Food at U.S. Military...DATE SEP 2009 2. REPORT TYPE 3. DATES COVERED 00-00-2009 to 00-00-2009 4. TITLE AND SUBTITLE Defending the Military Food Supply Acquisition

  11. The Sociology and Psychology of Terrorism: Who Becomes a Terrorist and Why?

    Science.gov (United States)

    1999-09-01

    for School Killers,” New York Times, June 21, 1999, A10. Della Porta, Donatella. “ Political Socialization in Left-Wing Underground Organizations...Newsletter of the Association of Former Intelligence Officers, 22, No. 1, 1997. Wasmund, Klaus. “The Political Socialization of West German Terrorists.” In

  12. The participation of juvenile defendants in the youth court. A comparative study of juvenile justice procedures in Europe

    NARCIS (Netherlands)

    Rap, S.E.

    2013-01-01

    This study revolves around the issue of the participation of juvenile defendants in the youth court. The European Court of Human Rights has put forward the notion that defendants should be able to participate effectively in a court hearing. Moreover, in international children’s rights law it is

  13. Radiological preparedness in the case of a terrorist attack or an accident

    International Nuclear Information System (INIS)

    Cizmek, A.

    2005-01-01

    During the Cold War, every information about weapons of mass destruction was treated as top secret, regardless of whether the information concerned friend or foe. The most serious threat in our post Cold War era are terrorist radiological dispersal devices. Dirty nukes are what you may choose to build if you're unable to create a real nuclear bomb, i.e. one whose explosion is based on a nuclear reaction. A dirty bomb is a conventional explosive salted with radioactive isotopes in order to spew out that nuclear material and contaminate a wide area. The military usefulness of such devices have always been in dispute. In fact, the TNT in such a bomb may still be more dangerous than the nuclear material. Its destructive power would really depend on the size of the conventional bomb, and the volume and nature of nuclear material. This paper addresses the possibilities of decontamination and preparedness in the case of a terrorist attack or accident.(author)

  14. [Publications of medical thesis defended in Lille school of medicine].

    Science.gov (United States)

    Benotmane, Ilies; Glatz, Nicolas; Bihan, Solenn; Legrand, Fanny; Gosset, Didier; Boulanger, Eric

    2012-07-01

    The purpose of this study was to determine the future, in terms of scientific publication, of medical thesis (MT) defended in the Medical School of Lille 2 University (MSL2U) between January 1st, 2001 and December 31st, 2007. The collection of MT published as a corresponding scientific article was realized from PubMed(®). For every corresponding article, we determined the journal Impact Factor (IF), the language of publication and the rank of the student and his MT director in the author list. Analyses were also realized according to the group of speciality of the TM. In all, 11.3% of the 2150 MT defended in the MSL2U were followed up by a scientific publication. The average IF was 2.32 with a median at 1.75 and extreme values from 0 to 14.78. Seventy percent of the articles were published in English. The rank of the student was placed before his MT director (2.06 vs. 3.15). The MT defended by students in the field of medical specialities presented the highest rate of publication (25.1%). The general medicine was the second speciality the most productive in term of number of published articles (n=49) after medical specialities (n=103). The MT director and the PhD students must be more motivated to publish their results. The value of 11.3% could be considered as weak but, because of a huge lack of references, it is impossible to compare our results to those of other French medical schools. It remains important to reform the objectives and the modalities of the writing of a MT: should we not have to turn to thesis called "on article"? Copyright © 2012. Published by Elsevier Masson SAS.

  15. Defense against terroristic hazards and risk by building planning law; Abwehr terroristischer Gefahren und Risiken durch Bauplanungsrecht

    Energy Technology Data Exchange (ETDEWEB)

    Hopkins, Richard

    2012-07-01

    The book on defense against terroristic hazards and risk by building planning law includes the following issues: Introduction: civil engineering and safety. Risk, hazards and urban planning: historical and actual examples for the constructional danger prevention, terroristic threat and urban planning. Risk, hazards and terrorism: sociology and risk, law and risk, terrorism - risk or hazard? Answer to uncertainty - risk prevention, catastrophe law as link. Risk, hazard, terrorism and the public building and regional planning law: regional planning law as point of origin, building law and terrorism, possibility of control by the legal building regulations.

  16. Defending Against Advanced Persistent Threats Using Game-Theory.

    Science.gov (United States)

    Rass, Stefan; König, Sandra; Schauer, Stefan

    2017-01-01

    Advanced persistent threats (APT) combine a variety of different attack forms ranging from social engineering to technical exploits. The diversity and usual stealthiness of APT turns them into a central problem of contemporary practical system security, since information on attacks, the current system status or the attacker's incentives is often vague, uncertain and in many cases even unavailable. Game theory is a natural approach to model the conflict between the attacker and the defender, and this work investigates a generalized class of matrix games as a risk mitigation tool for an advanced persistent threat (APT) defense. Unlike standard game and decision theory, our model is tailored to capture and handle the full uncertainty that is immanent to APTs, such as disagreement among qualitative expert risk assessments, unknown adversarial incentives and uncertainty about the current system state (in terms of how deeply the attacker may have penetrated into the system's protective shells already). Practically, game-theoretic APT models can be derived straightforwardly from topological vulnerability analysis, together with risk assessments as they are done in common risk management standards like the ISO 31000 family. Theoretically, these models come with different properties than classical game theoretic models, whose technical solution presented in this work may be of independent interest.

  17. 47 CFR 1.735 - Copies; service; separate filings against multiple defendants.

    Science.gov (United States)

    2010-10-01

    ... overnight delivery service such as, or comparable to, the US Postal Service Express Mail, United Parcel... 47 Telecommunication 1 2010-10-01 2010-10-01 false Copies; service; separate filings against... Complaints § 1.735 Copies; service; separate filings against multiple defendants. (a) Complaints may...

  18. A New Forensic Picture Polygraph Technique for Terrorist and Crime Deception System

    Science.gov (United States)

    Costello, R. H. Brian; Axton, JoAnn; Gold, Karen L.

    2006-01-01

    The Forensic Terrorist Detection System called Pinocchio Assessment Profile (PAP) employs standard issue polygraphs for a non-verbal picture technique originated as a biofeedback careers interest instrument. The system can be integrated readily into airport screening protocols. However, the method does not rely on questioning or foreign language…

  19. Conceptualizing Terrorist Violence and Suicide Bombing

    Directory of Open Access Journals (Sweden)

    Murad Ismayilov

    2010-01-01

    Full Text Available This article presents an analysis of different approaches to terrorist violence, with a particular focus on suicide terrorism, using the above mentioned levels of analysis as a conceptual framework to organize this study. In doing so, the article focuses primarily on four selected studies: Khashan's theory of collective Palestinian frustration operating at individual and structural levels; Pape's strategic theory of suicide terrorism, Devji's notion of global jihad, and Hammes' conceptualization of suicide terrorism as one of the strategies of Fourth Generation Warfare, all studied at a strategic level. Drawing on these analyses, as well as on Tilly, this article attempts to address the question of whether suicide terrorism represents a "coherent phenomenon," and whether there is, or may be, a generalized pattern which could account for all possible causes of martyrdom operations.

  20. Playing the villain : understanding the punishment and portrayal of terrorists

    OpenAIRE

    Spens, Christiana

    2017-01-01

    Playing the Villain argues that the portrayal and punishment of terrorists in the Western media perpetuates colonialist attitudes, due to the visual connections between these modern images and past or fictional representations of iconic, punished villains. A theory of scapegoating related to intervisuality supports this argument, by explaining that as a ritual dependent on and developed by cultural history and mythology, scapegoating requires engagement with recognisable visual motifs that...

  1. Have the Mexican Drug Cartels Evolved into a Terrorist Insurgency?

    Science.gov (United States)

    2013-06-14

    individual police officers and journalists.55 Originally, the Gulf Cartel recruited them from Mexico’s Special Operations Forces, known as Grupo Aeromóvil de ...fluid situation surrounding the Mexican drug war has led to much speculation about how to classify the powerful drug cartels conducting it. There is... conducting it. There is literature debating whether the cartels are merely a criminal enterprise or whether the cartels represent a new terrorist

  2. Defending spaceflight: The echoes of Apollo

    Science.gov (United States)

    Rovetto, R. J.

    2016-12-01

    This paper defends, and emphasizes the importance of, spaceflight, broadly construed to include human and unmanned spaceflight, space science, exploration and development. Within this discourse, I provide counter-replies to remarks by physicist Dr. Steven Weinberg against my previous support of human spaceflight. In this defense of peaceful spaceflight I draw upon a variety of sources. Although a focus is human spaceflight, human and unmanned modes must not be treated as an either-or opposition. Rather, each has a critical role to play in moving humanity forward as a spacefaring species. In the course of this communication, I also stress the perennial role of space agencies as science and technology-drivers, and their function to provide a stable and unified platform for space programs.

  3. Developing Health-Based Pre-Planning Clearance Goals for Airport Remediation Following Chemical Terrorist Attack: Introduction and Key Assessment Considerations

    OpenAIRE

    Watson, Annetta; Hall, Linda; Raber, Ellen; Hauschild, Veronique D.; Dolislager, Fredrick; Love, Adam H.; Hanna, M. Leslie

    2011-01-01

    In the event of a chemical terrorist attack on a transportation hub, post-event remediation and restoration activities necessary to attain unrestricted facility reuse and re-entry could require hours to multiple days. While restoration timeframes are dependent on numerous variables, a primary controlling factor is the level of pre-planning and decision-making completed prior to chemical terrorist release. What follows is the first of a two-part analysis identifying key considerations, critica...

  4. Defending Democracy: Citizen Participation in Election Monitoring in Post-Authoritarian Indonesia

    Directory of Open Access Journals (Sweden)

    Dini Suryani

    2015-02-01

    Full Text Available The collapse of the authoritarian regime in 1998 has made Indonesia as one of the most democratic country in Southeast Asia. To ensure the quality of democracy, in particular electoral democracy, supervision and monitoring of elections has a veryimportant role. Although the Badan Pengawas Pemilu (Bawaslu or Election Supervisory Body of Indonesiahas experienced institutional strengthening, this institution has not yet become effective in supervisingand monitoring the elections. Therefore, electionmonitoring conducted by non-state agencies, particularly the citizens become important to complement the performance of Bawaslu. This article aimsto explore how the election monitoring conducted by citizens in the aftermath of post authoritarian era,affect the quality of Indonesian democracy. This article argues that although the citizen participation in monitoring the elections is likely to decline, but thecrowd sourced method that appeared in the 2014election has succeeded in improving the quality of the electoral process as well as defending the democratic regime in Indonesia.

  5. State, Foreign Operations, and Related Programs: FY2008 Appropriations

    National Research Council Canada - National Science Library

    Veillette, Connie; Epstein, Susan B

    2007-01-01

    ... an unprecedented level compared with the past 40 years. Emergency supplementals enacted since the September 11, 2001, terrorist attacks to assist the front-line states in the war on terrorism, fund Afghanistan and Iraq reconstruction, and upgrade State...

  6. Defending the indefensible? Psychiatry, assisted suicide and human freedom.

    Science.gov (United States)

    Parker, Malcolm

    2013-01-01

    The siege guns of the forces for change to euthanasia and assisted suicide laws have been pounding for decades, but the longstanding proscription on these practices has held out in all but a few jurisdictions. A few psychiatrists have enlisted with the challengers, but many remain on the battlements, defending the impermissibility of active assistance in dying. Given the long history of the separation of church and state and the significant secularisation of society; the recognition by the law of both acts and omissions as legal causes; lenient sentences for mercy killers; critiques of the "psychiatriatisation" of different aspects of life; and the consistency of public opinion, this recalcitrant stand bespeaks undercurrents and positions that are often by rationalised or camouflaged, and which call for exploration. In this paper, I examine connections between psychiatry and conceptualisations of harm, suffering and natural death; medicalisation, psychiatrisation and medical paternalism; decision-making capacity, rationality and diagnosis; recent legal developments; social pluralism; and religious intuitionism. I conclude that psychiatrists and the psychiatry profession, concerned as they are with enlarging the province of human freedom, should begin a more transparent rapprochement with those they would repel. Copyright © 2013 Elsevier Ltd. All rights reserved.

  7. Helman defends decision to pull VA sponsorship of Veterans day parade

    Directory of Open Access Journals (Sweden)

    Robbins RA

    2013-04-01

    Full Text Available No abstract available. Article truncated after 150 words. Sharon Helman, Phoenix VA Director, defended her decision to cancel VA sponsorship of the annual Phoenix Veterans Day Parade in a 4/10/13 email to VA employees. Helman said that VA sponsorship was cancelled because of “…priorities in the organization (specifically access, and heightened awareness over liability concerns which VA Legal Counsel brought forward”. She concluded her letter by warning “… that all media inquiries should be forwarded to Paul Coupaud, Acting Public Affairs Officer”. VA officials initially said fear of litigation prompted the review of VA support. Last year, a float carrying wounded Veterans in a Midland, Texas, parade collided with a freight train, killing four and injuring 17. Crash victims and their families filed lawsuits in Texas against Union Pacific Railroad and the float owner. The VA was not a defendant, and the VA has not issued any national directives on liability as a result of the tragedy.In…

  8. Use of Unmanned Aerial Vehicles by the Islamic State: Nature of the Threat

    Directory of Open Access Journals (Sweden)

    David Mrva

    2018-01-01

    Full Text Available The proliferation of Unmanned Aerial Vehicles (UAVs on the battlefield does not exclude terrorist actors. Recently, there is an evident increase in the number of incidents when the so-called Islamic State has used UAVs. This article tries to describe this relatively new phenomenon and present an overview of main types of the potential Islamic State’s UAV employment in Europe. Despite the fact, that the UAV use by terrorist actors will probably not have the strategic impact by itself, it constitutes a new challenge for state security agencies.

  9. Effects of Mental Health and Neuroscience Evidence on Juror Perceptions of a Criminal Defendant: the Moderating Role of Political Orientation.

    Science.gov (United States)

    Mowle, Elyse N; Edens, John F; Clark, John W; Sörman, Karolina

    2016-11-01

    Several recent studies have examined the effects of mental health and neuroscientific evidence on attitudes toward criminal defendants, suggesting that these factors may influence juror decision-making in meaningful ways. Few studies to date have manipulated both of these variables while also considering theoretically important individual difference variables (e.g., political orientation). Using a criminal case simulation, this study manipulated the presence of evidence concerning mental disorders (psychopathy and schizophrenia) and increasing levels of neuroscientific detail regarding a defendant's brain injury, and examined verdicts and sentencing recommendations in over 400 persons attending jury duty. Main effects were detected for mental health testimony and political orientation, although interactions were noted as well. More negative reactions to defendants labeled as psychopaths were relatively consistent, whereas participants who identified as liberal generally were less punitive towards a defendant identified as schizophrenic than were more conservative jurors. Consistent with other recent research, juror perceptions of the defendant's level of psychopathic traits (independent of the effects of the experimental manipulations) predicted guilty verdicts and longer sentencing recommendations. Copyright © 2016 John Wiley & Sons, Ltd. Copyright © 2016 John Wiley & Sons, Ltd.

  10. Abortion, metaphysics and morality: a review of Francis Beckwith's defending life: a moral and legal case against abortion choice.

    Science.gov (United States)

    Nobis, Nathan

    2011-06-01

    In Defending Life: A Moral and Legal Case Against Abortion Choice (2007) and an earlier article in this journal, "Defending Abortion Philosophically"(2006), Francis Beckwith argues that fetuses are, from conception, prima facie wrong to kill. His arguments are based on what he calls a "metaphysics of the human person" known as "The Substance View." I argue that Beckwith's metaphysics does not support his abortion ethic: Moral, not metaphysical, claims that are part of this Substance View are the foundation of the argument, and Beckwith inadequately defends these moral claims. Thus, Beckwith's arguments do not provide strong support for what he calls the "pro-life" view of abortion.

  11. Authoritarian reactions to terrorist threat: who is being threatened, the Me or the We?

    Science.gov (United States)

    Asbrock, Frank; Fritsche, Immo

    2013-01-01

    Endorsement of authoritarian attitudes has been observed to increase under conditions of terrorist threat. However, it is not clear whether this effect is a genuine response to perceptions of personal or collective threat. We investigated this question in two experiments using German samples. In the first experiment (N = 144), both general and specific authoritarian tendencies increased after asking people to imagine that they were personally affected by terrorism. No such effect occurred when they were made to think about Germany as a whole being affected by terrorism. This finding was replicated and extended in a second experiment (N = 99), in which personal and collective threat were manipulated orthogonally. Authoritarian and ethnocentric (ingroup bias) reactions occurred only for people highly identified with their national ingroup under personal threat, indicating that authoritarian responses may operate as a group-level coping strategy for a threat to the personal self. Again, we found no effects for collective threat. In both studies, authoritarianism mediated the effects of personal threat on more specific authoritarian and ethnocentric reactions. These results suggest that the effects of terrorist threat on authoritarianism can, at least in part, be attributed to a sense of personal insecurity, raised under conditions of terrorist threat. We discuss the present findings with regard to basic sociomotivational processes (e.g., group-based control restoration, terror management) and how these may relate to recent models of authoritarianism.

  12. Terrorist Precursor Crimes: Issues and Options for Congress

    Science.gov (United States)

    2007-05-24

    iterated by the purported comments of Abu Bakar Bashir, spiritual leader of the al Qaeda-linked Jemaah Islamiyah (JI), an Islamist group in Indonesia ...and law enforcement in recent years.61 In August 2006, Abdel-Ilah Elmardoudi was convicted for operating a phone card “shoulder surfing ” scheme in...identification fraud charges and the fourth defendant was cleared of all charges.64 Beyond calling card surfing , there has been increasing concern

  13. Extremist Radicalism and Terrorist Inroads in West Africa: Understanding the Threat

    Directory of Open Access Journals (Sweden)

    Solomon Kofi Amoah

    2017-12-01

    Full Text Available While research has not yet established the regional consequences of terrorism, its immediate effects on states that have been hit (i.e. Mali, Niger, Burkina Faso and Nigeria, and the spill over effects in neighbouring countries cannot be discounted. This paper analyses the challenge of violent extremism in Africa based on existing evidence from across the West African sub- region. It pays particular attention to the recruitment of young people in Africa into extremist causes on the continent and beyond and proffers measures for their curtailment. The paper argues that terrorism in contemporary Africa undermines democratization, good governance, peace and security and regional development. It also recommends three-pronged strategies for addressing the miasma of extremist radicalism and its associated violence in West Africa, namely, governance, development and security reforms. While it may be difficult to absolutely curtail the activities of terrorist organizations in West Africa. Countries with minimal vulnerabilities like Ghana, Sierra Leone, Liberia and others should intensify efforts towards increased border and cyber security surveillance, sustained de-radicalization programmes and youth empowerment programmes to curb unemployment in earnest.

  14. Activist or Terrorist? Negotiating Discourses of Eco-Terror in "If a Tree Falls"

    Science.gov (United States)

    Olson, Jade

    2018-01-01

    Environmentalist voices like the Earth Liberation Front have been labeled "eco-terrorists." The 2011 documentary film "If a Tree Falls" explores how "eco-terrorism" troubles the unstable border between activism and terrorism. This essay offers a textual analysis of the film's negotiation of the activism/terrorism…

  15. A Terrorist-fraud Resistant and Extractor-free Anonymous Distance-bounding Protocol

    OpenAIRE

    Avoine , Gildas; Bultel , Xavier; Gambs , Sébastien; Gerault , David; Lafourcade , Pascal; Onete , Cristina; Robert , Jean-Marc

    2017-01-01

    International audience; Distance-bounding protocols have been introduced to thwart relay attacks against contactless authentication protocols. In this context, veri-fiers have to authenticate the credentials of untrusted provers. Unfortunately , these protocols are themselves subject to complex threats such as terrorist-fraud attacks, in which a malicious prover helps an accomplice to authenticate. Provably guaranteeing the resistance of distance-bounding protocols to these attacks is a compl...

  16. VULNERABILITIES, TERRORIST AND BIOTERRORIST THREATS AND RISKS

    Directory of Open Access Journals (Sweden)

    Viorel ORDEANUL

    2014-12-01

    Full Text Available The contemporary society has been, is and will probably be dominated "urbi et orbi " (everywhere and for everybody by conflicts expressed through violence, social confrontations, permissiveness, authority collapse, collapse of moral norms. Paradoxically, although it is spoken and written much about terrorism and terrorists, there is still no complete and accepted definition of these terms, and the legal classification is approximate. The analysis of threats is an extremely important decisional asset when setting up plans of direct protection or objective security strategies or institutions suitable to become targets of violent actions, but today's intelligence community has not yet established a clear set of procedures and principles that constitute the expert main frame for a comprehensive analysis of threats and vulnerabilities.

  17. Defending to the Four Directions Evolving Uechi-ryu’s Hojoundo Exercises for Advanced Students

    Directory of Open Access Journals (Sweden)

    Ihor Rymaruk

    2012-07-01

    Full Text Available This article introduces “Defending to the Four Directions,” techniques that add challenge to Uechi-ryu while incorporating and building upon the traditional katas which have formed the basis of the style. Making changes within a style’s training methods just to be different without any other purpose is of little value and actually destructive to the system. This article describes a meaningful and realistic addition to the practice of hojoundo, the formal exercises incorporating basic movements. “Defending to the Four Directions” is intended for advanced students who have mastered Uechi-ryu’s foundamentals. In addition, the practice is well-suited for adaptation and adoption into other martial art styles.

  18. An Overview of NCRP Report No. 138 on Terrorist Activities

    Science.gov (United States)

    Poston, John, Sr.

    2005-04-01

    In late 1998, the National Council on Radiation Protection and Measurements (NCRP) convened Scientific Committee 46-14 to prepare a report on the radiological safety aspects of terrorist activities involving radioactivity. The work of this committee was funded through a contract with the Planning and Preparedness Division of the Office of Emergency Management of the Department of Energy. The committee was composed of a diverse group of individuals with expertise in many areas in addition to radiation safety and emergency response. These areas included law (both federal and state), public communications, and psychosocial aspects of such incidents. The statement of work focused the work of the committee, and the resulting report did not necessarily address all issues of such activities. One of the charges of the committee was to provide guidance as to necessary research and make recommendations regarding the present infrastructure with the responsibility for responding to such incidents. This presentation will provide an overview of NCRP Report No. 138 and focus on some of the critical issues raised in the report. These issues include recognition of the event, the interface between federal, state, and local authorities, exposure limits for the first-responders, clean-up criteria, training and resources, the psychosocial aspects of such events, and communications with the media and the public. This report represented the ``beginning'' of such considerations. It pointed the way for additional studies and research in this very important area.

  19. Ants defend aphids against lethal disease

    Science.gov (United States)

    Nielsen, Charlotte; Agrawal, Anurag A.; Hajek, Ann E.

    2010-01-01

    Social insects defend their own colonies and some species also protect their mutualist partners. In mutualisms with aphids, ants typically feed on honeydew produced by aphids and, in turn guard and shelter aphid colonies from insect natural enemies. Here we report that Formica podzolica ants tending milkweed aphids, Aphis asclepiadis, protect aphid colonies from lethal fungal infections caused by an obligate aphid pathogen, Pandora neoaphidis. In field experiments, bodies of fungal-killed aphids were quickly removed from ant-tended aphid colonies. Ant workers were also able to detect infective conidia on the cuticle of living aphids and responded by either removing or grooming these aphids. Our results extend the long-standing view of ants as mutualists and protectors of aphids by demonstrating focused sanitizing and quarantining behaviour that may lead to reduced disease transmission in aphid colonies. PMID:19923138

  20. Reasoning about Emotional Contents Following Shocking Terrorist Attacks: A Tale of Three Cities

    Science.gov (United States)

    Blanchette, Isabelle; Richards, Anne; Melnyk, Laura; Lavda, Anastasia

    2007-01-01

    The authors examined reasoning following the terrorist attacks carried out in London in July 2005. They tested participants in London (United Kingdom), Manchester (United Kingdom), and London (Canada) within 1 week of the attacks and again 6 months later. Participants reasoned about syllogisms of 3 types: neutral, generally emotional, and…

  1. Understanding Cybercrime from Its Stakeholders’ Perspectives: Part 2 - Defenders and Victims

    OpenAIRE

    Arief, Budi; Bin Adzmi, Mohd Azeem

    2015-01-01

    A comprehensive model and taxonomy of cybercrime, including all of its stakeholders, would contribute to better cybersecurity. Part 1 of this two-part series, which appeared in the January/February 2015 issue of IEEE Security & Privacy, explored cyberattackers and their motives in detail. Part 2 focuses on the other key stakeholders: defenders and victims of cybercrime.

  2. CHARACTERISTICS OF CAPITALISM AND OF STATE IN PORTUGAL: PASSAGE OF ECONOMIC AND FINANCIAL GROUPS DOMINATED BY THE PORTUGUESE CAPITAL FOR GROUPS DOMINATED BY MULTINATIONAL CAPITAL, AND OF A PROTECTOR STATE FOR A SUBSERVIENT STATE

    Directory of Open Access Journals (Sweden)

    Eugénio Rosa

    2014-06-01

    Full Text Available The paper analyzes the capitalism characteristics in the Portuguese social formation, considering economic groups in Portugal before and after of April 25. Detailing the characteristics of these economic groups, the author concludes that the principal shareholders of most economic and financial groups operating in Portugal, are transnational groups, some companies belonging to foreign States and other large economic and financial groups operating on a global scale. Accordingly, the State role, given the fragility towards these groups, is of simple server and executor of policies dictated by these groups directly or, indirectly by international organizations that represent and defend their interests, like the IMF, the Commission European, the World Bank, even the OECD, etc. Argues that given the growing globalization and increased threats of all kinds, one needs in Portugal is a strong State that defend the national sovereignty, able of promote the growth and sustained development of the country, and to defend the Portuguese of threats and constant attacks to a life with a minimum of human dignity.

  3. Consequence Assessment for Potential Scenarios of Radiological Terrorists Events

    International Nuclear Information System (INIS)

    Shin, Hyeongki; Kim, Juyoul

    2007-01-01

    Radiological dispersal device (RDD) means any method used to deliberately disperse radioactive material to create terror or harm. Dirty bomb is an example of RDD, which usually consists of radioactive material and unconventional explosive. Dirty bomb was a problem long before September 11, 2001. In 1987, the Iraqi government tested a one-ton radiological bomb. The Iraqi tests confirmed that a dirty bomb is not effective as weapons of mass destruction (WMD) and that its main value is as a psychological weapon. In 1995, Chechen rebels buried a dirty bomb in a park in Moscow threatening to detonate one in the future if their demands were not met. Another good example of potential dirty bomb effects was an incident in Goiania, Brazil on September 18, 1987, where an orphaned medical source containing 1,375 Ci of Cs-137 resulted the death of four people and extensive environmental contamination. The purposes of radiological terrorists events are not to destroy or damage the target but to disperse radioactivity in the environment. They inflict panic on a public and economic damage by disruption of business. They also have influence on enormous clean-up costs by spreading radioactive contamination including secondary impacts on water supply reservoirs. Generally, two major long-term concerns following a RDD are human health and economic impacts. In this study, we developed potential scenarios of radiological terrorists events and performed their radiological consequence assessments in terms of total effective dose equivalent (TEDE), projected cumulative external and internal dose, and ground deposition of radioactivity

  4. Consequence Assessment for Potential Scenarios of Radiological Terrorists Events

    Energy Technology Data Exchange (ETDEWEB)

    Shin, Hyeongki [Korea Institute of Nuclear Safety, Daejeon (Korea, Republic of); Kim, Juyoul [Seoul National University, Seoul (Korea, Republic of)

    2007-07-01

    Radiological dispersal device (RDD) means any method used to deliberately disperse radioactive material to create terror or harm. Dirty bomb is an example of RDD, which usually consists of radioactive material and unconventional explosive. Dirty bomb was a problem long before September 11, 2001. In 1987, the Iraqi government tested a one-ton radiological bomb. The Iraqi tests confirmed that a dirty bomb is not effective as weapons of mass destruction (WMD) and that its main value is as a psychological weapon. In 1995, Chechen rebels buried a dirty bomb in a park in Moscow threatening to detonate one in the future if their demands were not met. Another good example of potential dirty bomb effects was an incident in Goiania, Brazil on September 18, 1987, where an orphaned medical source containing 1,375 Ci of Cs-137 resulted the death of four people and extensive environmental contamination. The purposes of radiological terrorists events are not to destroy or damage the target but to disperse radioactivity in the environment. They inflict panic on a public and economic damage by disruption of business. They also have influence on enormous clean-up costs by spreading radioactive contamination including secondary impacts on water supply reservoirs. Generally, two major long-term concerns following a RDD are human health and economic impacts. In this study, we developed potential scenarios of radiological terrorists events and performed their radiological consequence assessments in terms of total effective dose equivalent (TEDE), projected cumulative external and internal dose, and ground deposition of radioactivity.

  5. The Terrorist and the Media: Partners in Crime or Rituals and Harmless Observers?

    Science.gov (United States)

    Dowling, Ralph E.

    This paper explores the idea that the media "cause" or strongly motivate acts of terrorism. In an effort to refute this view the paper applies Kenneth Burke's dramatistic theory of communication to show that the motives and behavior of political terrorists can be explained without reference to the media coverage terrorism produces. The…

  6. Defending basic research in Europe

    CERN Multimedia

    Staff Association

    2010-01-01

    « Research without a budget means a Europe without a future » On Wednesday 25th August 2010, 871 of you signed the Staff Council petition which carried this message. This is a resounding success for a month of August. Staff members and pensioners, you showed by your presence your mass support for our appeal to defend research budgets in Europe. The participation and messages of support from our colleagues in other European scientific organizations is confirmation that budget cuts in research are common practice far beyond the confines of CERN. If research had benefited from the promises made by the European Union in 2000 to increase investment in research and development (R&D) from 1.8% to 3% of GDP by 2010, the scientific community would more readily accept the current cuts. However, we are now in 2010 and the rate of 1.8% has remained the same. So, we have been hit twice: not only have we not had the good weather we were promised, we now find ourselves in the middl...

  7. Radicalization: An Overview and Annotated Bibliography of Open-Source Literature

    Science.gov (United States)

    2006-12-15

    particularly with liberal, democratic, and humanistic Muslims Phares points to Jihadism as the main root cause of terrorism and suggests that defending...An Overview and Annotated Bibliography of Open-Source Literature 155 of ambiguity), epistemic and existential needs theory (need for closure...This book presents Terror Management Theory, which addresses behavioral and psychological responses to terrorist events. An existential

  8. Developing Health-Based Pre-Planning Clearance Goals for Airport Remediation Following Chemical Terrorist Attack: Introduction and Key Assessment Considerations

    Science.gov (United States)

    Watson, Annetta; Hall, Linda; Raber, Ellen; Hauschild, Veronique D.; Dolislager, Fredrick; Love, Adam H.; Hanna, M. Leslie

    2011-01-01

    In the event of a chemical terrorist attack on a transportation hub, post-event remediation and restoration activities necessary to attain unrestricted facility reuse and re-entry could require hours to multiple days. While restoration timeframes are dependent on numerous variables, a primary controlling factor is the level of pre-planning and decision-making completed prior to chemical terrorist release. What follows is the first of a two-part analysis identifying key considerations, critical information, and decision criteria to facilitate post-attack and post-decontamination consequence management activities. A conceptual site model and human health-based exposure guidelines are developed and reported as an aid to site-specific pre-planning in the current absence of U.S. state or Federal values designated as compound-specific remediation or re-entry concentrations, and to safely expedite facility recovery to full operational status. Chemicals of concern include chemical warfare nerve and vesicant agents and the toxic industrial compounds phosgene, hydrogen cyanide, and cyanogen chloride. This work has been performed as a national case study conducted in partnership with the Los Angeles International Airport and The Bradley International Terminal. All recommended guidelines have been selected for consistency with airport scenario release parameters of a one-time, short-duration, finite airborne release from a single source followed by compound-specific decontamination. PMID:21390292

  9. Developing Health-Based Pre-Planning Clearance Goals for Airport Remediation Following Chemical Terrorist Attack: Introduction and Key Assessment Considerations.

    Science.gov (United States)

    Watson, Annetta; Hall, Linda; Raber, Ellen; Hauschild, Veronique D; Dolislager, Fredrick; Love, Adam H; Hanna, M Leslie

    2011-02-13

    In the event of a chemical terrorist attack on a transportation hub, post-event remediation and restoration activities necessary to attain unrestricted facility reuse and re-entry could require hours to multiple days. While restoration timeframes are dependent on numerous variables, a primary controlling factor is the level of pre-planning and decision-making completed prior to chemical terrorist release. What follows is the first of a two-part analysis identifying key considerations, critical information, and decision criteria to facilitate post-attack and post-decontamination consequence management activities. A conceptual site model and human health-based exposure guidelines are developed and reported as an aid to site-specific pre-planning in the current absence of U.S. state or Federal values designated as compound-specific remediation or re-entry concentrations, and to safely expedite facility recovery to full operational status. Chemicals of concern include chemical warfare nerve and vesicant agents and the toxic industrial compounds phosgene, hydrogen cyanide, and cyanogen chloride. This work has been performed as a national case study conducted in partnership with the Los Angeles International Airport and The Bradley International Terminal. All recommended guidelines have been selected for consistency with airport scenario release parameters of a one-time, short-duration, finite airborne release from a single source followed by compound-specific decontamination.

  10. Computer Network Attack and Its Effectiveness against Non-State Actors

    National Research Council Canada - National Science Library

    Presby, Timothy D

    2006-01-01

    .... With the United States engaged in counter-insurgency operations against terrorist groups, synchronizing the effects of CNA with more traditional forms of kinetic attacks, as well as other instruments...

  11. Estimation of terrorist attack resistibility of dual-purpose cask TP-117 with DU (depleted uranium) gamma shield

    International Nuclear Information System (INIS)

    Alekseev, O.G.; Matveev, V.Z.; Morenko, A.I.; Il'kaev, R.I.; Shapovalov, V.I.

    2004-01-01

    Report is devoted to numerical research of dual-purpose unified cask (used for SFA transportation and storage) resistance to terrorist attacks. High resistance of dual-purpose unified cask has been achieved due to the unique design-technological solutions and implementation of depleted uranium in cask construction. In suggested variant of construction depleted uranium fulfils functions of shielding and constructional material. It is used both in metallic and cermet form (basing on steel and depleted uranium dioxide). Implementation of depleted uranium in cask construction allows maximal load in existing overall dimensions of the cask. At the same time: 1) all safety requirements (IAEA) are met, 2) dual-purpose cask with SFA has high resistance to terrorist attacks

  12. Estimation of terrorist attack resistibility of dual-purpose cask TP-117 with DU (depleted uranium) gamma shield

    Energy Technology Data Exchange (ETDEWEB)

    Alekseev, O.G.; Matveev, V.Z.; Morenko, A.I.; Il' kaev, R.I.; Shapovalov, V.I. [Russian Federal Nuclear Center - All-Russian Research Inst. of Experimental Physics, Sarov (Russian Federation)

    2004-07-01

    Report is devoted to numerical research of dual-purpose unified cask (used for SFA transportation and storage) resistance to terrorist attacks. High resistance of dual-purpose unified cask has been achieved due to the unique design-technological solutions and implementation of depleted uranium in cask construction. In suggested variant of construction depleted uranium fulfils functions of shielding and constructional material. It is used both in metallic and cermet form (basing on steel and depleted uranium dioxide). Implementation of depleted uranium in cask construction allows maximal load in existing overall dimensions of the cask. At the same time: 1) all safety requirements (IAEA) are met, 2) dual-purpose cask with SFA has high resistance to terrorist attacks.

  13. The quest for significance model of radicalization: implications for the management of terrorist detainees.

    Science.gov (United States)

    Dugas, Michelle; Kruglanski, Arie W

    2014-01-01

    Radicalization and its culmination in terrorism represent a grave threat to the security and stability of the world. A related challenge is effective management of extremists who are detained in prison facilities. The major aim of this article is to review the significance quest model of radicalization and its implications for management of terrorist detainees. First, we review the significance quest model, which elaborates on the roles of motivation, ideology, and social processes in radicalization. Secondly, we explore the implications of the model in relation to the risks of prison radicalization. Finally, we analyze the model's implications for deradicalization strategies and review preliminary evidence for the effectiveness of a rehabilitation program targeting components of the significance quest. Based on this evidence, we argue that the psychology of radicalization provides compelling reason for the inclusion of deradicalization efforts as an essential component of the management of terrorist detainees. Copyright © 2014 John Wiley & Sons, Ltd.

  14. 13 CFR 142.41 - How does SBA protect the rights of defendants?

    Science.gov (United States)

    2010-01-01

    ... 13 Business Credit and Assistance 1 2010-01-01 2010-01-01 false How does SBA protect the rights of... CIVIL REMEDIES ACT REGULATIONS Decisions and Appeals § 142.41 How does SBA protect the rights of defendants? These procedures separate the functions of the investigating official, reviewing official, and...

  15. MMPI Profiles and Code Types of Responsible and Non-Responsible Criminal Defendants.

    Science.gov (United States)

    Kurlychek, Robert T.; Jordan, L.

    1980-01-01

    Compared MMPI profiles and two-point code types of criminal defendants (N=50) pleading a defense of "not responsible due to mental disease or defect." A sign test was computed, treating the clinical scales as matched pairs, and a significant difference was found; the nonresponsible group profile was more elevated. (Author)

  16. Operation the laboratory for NBC protection and bio monitoring in the case of terrorist attack with NBC weapons

    International Nuclear Information System (INIS)

    Tusek, D.; Vucemilovic, A; Klobucar, J.

    2009-01-01

    The aim of this study was to develop efficacy of Operation the Laboratory for NBC protection and Bio monitoring in the case of terrorist attack with chemical weapons. When is necessary quickly, adeptly Operation and unambiguous confirmation about use chemical warfare agent, the Laboratory must be ready and qualified for reaction. The Laboratory had to develop capability for the timely sampling and unambiguous identification chemical warfare agents in a battlefield or in case of the terrorist attack. The need for quality sample collection and analyses is critical to verify use of chemical weapon (CW) by an enemy or terrorists. Collection, packaging, transport and analysis of samples must be carried out on proper way and quickly enough for military, medical or political purposes. Precise records must accompany each sample but these records must not contaminate samples anyway. All sampling team personnel have to be equipped with appropriate equipment and qualified in its handling. After arriving samples at our Laboratory, we will handle with them on standard procedures; carry out preparation such as Headspace, Liquid/liquid extraction, Solid phase extraction, Liquid/solid extraction, concentration and derivatization. After that we will analyze samples by gas-chromatography mass-spectrometry (GC/MS) method.(author)

  17. 9/11, Act II : A Fine-Grained Analysis of Regional Variations in Traffic Fatalities in the Aftermath of the Terrorist Attacks

    OpenAIRE

    Gaissmaier, Wolfgang; Gigerenzer, Gerd

    2012-01-01

    Terrorists can strike twice - first, by directly killing people, and second, through dangerous behaviors induced by fear in people's minds. Previous research identified a substantial increase in U.S. traffic fatalities subsequent to the September 11 terrorist attacks, which were accounted for as due to a substitution of driving for flying, induced by fear of dread risks. Here, we show that this increase in fatalities varied widely by region, a fact that was best explained by regional variatio...

  18. [Stories and drawings by children after the 2015 terrorist attacks in Paris].

    Science.gov (United States)

    Poget, Marc; Bouaziz, Nora; Apter, Gisèle

    2016-01-01

    Through the stories and drawings of children in a medical-psychological centre, it is possible to explore their psychological representations of the terrorist attacks which took place in Paris in January 2015. This work highlights the need to rethink the methods of care provided to these children in order to adapt them to their specific needs. Copyright © 2016 Elsevier Masson SAS. All rights reserved.

  19. Minmax defense strategy for complex multi-state systems

    International Nuclear Information System (INIS)

    Hausken, Kjell; Levitin, Gregory

    2009-01-01

    This paper presents a general optimization methodology that merges game theory and multi-state system survivability theory. The defender has multiple alternatives of defense strategy that presumes separation and protection of system elements. The attacker also has multiple alternatives of its attack strategy based on a combination of different possible attack actions against different groups of system elements. The defender minimizes, and the attacker maximizes, the expected damage caused by the attack (taking into account the unreliability of system elements and the multi-state nature of complex series-parallel systems). The problem is defined as a two-period minmax non-cooperative game between the defender who moves first and the attacker who moves second. An exhaustive minmax optimization algorithm is presented based on a double-loop genetic algorithm for determining the solution. A universal generating function technique is applied for evaluating the losses caused by system performance reduction. Illustrative examples with solutions are presented

  20. ¿POR QUÉ DEFENDER LA CIENCIA EN COLOMBIA?

    OpenAIRE

    Enrique Forero González

    2016-01-01

    Un grupo de nuestros más destacados científicos le cuenta a la sociedad colombiana por qué es necesario defender la ciencia en el país, demuestra con lujo de detalles porqué este tema se considera importante y se refiere a la forma como los países más avanzados del mundo han alcanzado esos niveles de desarrollo gracias a sus inversiones en educación, ciencia y tecnología. También, llama la atención sobre el hecho que la clase política tiene el deber ético de hacer políticas sobre cie...

  1. The relationship between sympatric defended species depends upon predators' discriminatory behaviour.

    Directory of Open Access Journals (Sweden)

    Christina G Halpin

    Full Text Available Toxic prey species living in the same environment have long been thought to mutually benefit from having the same warning signal by sharing the education of naïve predators. In contrast, 'saturation theory' predicts that predators are physiologically limited by the amount of toxin that they can eat in a given time period. Therefore, sympatric species that contain the same toxin should mutually benefit from reduced predation even when they are visually distinct, reducing the benefits to visual mimicry. For the first time, we found that mutualism can occur between unequally defended prey that are visually distinct, although the benefits to each prey type depends on the predators' abilities and/or motivation to visually discriminate between them. Furthermore, we found that this variability in predatory behaviour had a significant impact on the benefits of mimicry for unequally defended prey. Our results demonstrate that variability in the foraging decisions of predators can have a significant effect on the benefits of shared toxicity and visual mimicry between sympatric species, and highlights the need to consider how predators exert selection pressures on models and mimics over their entire lifetimes.

  2. 77 FR 48542 - United States

    Science.gov (United States)

    2012-08-14

    ... litigation.'' United States v. Armour and Co., 402 U.S. 673, 681 (1971). Section 5 of the Clayton Act... relief in consent judgment that contained recitals in which defendants asserted their innocence); Armour...

  3. PROSECUTING SOMALIA PIRATES AS TERRORISTS

    Directory of Open Access Journals (Sweden)

    ODHIAMBO E.O.S., ONKWARE K., KASSILLY J., NTABO O. M.

    2011-01-01

    Full Text Available This article starts from the assumption that piracy resembles terrorism in many aspects and attempts to support it through both a theoretical investigation and practical examples. The argument it makes is that Somali pirates should be prosecuted as terrorists. Moreover, it emphasizes the idea that for Somalia’s neighboring countries and not only the implementation of such an approach consists in resorting to the antiterrorist conventions already in place. Thus, for example, Kenya Navy as a piracyfi ghting agency should rely on these conventions to justify the capture and prosecution of pirates in Kenyan courts. In this respect, we emphasize the idea that only by resorting to an established international legal framework can Kenya identify the tools to counter pirates’ actions within legal limits. Moreover, this should be paralleled by efforts towards rebuilding Somalia and its institutions if long-term solutions are to be envisaged in the eradication of piracy in the Indian Ocean. In conclusion, the article looks at the concepts of piracy, terrorism and development in the Horn of Africa, suggests that piracy is a form of Terrorism and, makes a series of recommendations.

  4. 9/11, Act II: a fine-grained analysis of regional variations in traffic fatalities in the aftermath of the terrorist attacks.

    Science.gov (United States)

    Gaissmaier, Wolfgang; Gigerenzer, Gerd

    2012-12-01

    Terrorists can strike twice--first, by directly killing people, and second, through dangerous behaviors induced by fear in people's minds. Previous research identified a substantial increase in U.S. traffic fatalities subsequent to the September 11 terrorist attacks, which were accounted for as due to a substitution of driving for flying, induced by fear of dread risks. Here, we show that this increase in fatalities varied widely by region, a fact that was best explained by regional variations in increased driving. Two factors, in turn, explained these variations in increased driving. The weaker factor was proximity to New York City, where stress reactions to the attacks were previously shown to be greatest. The stronger factor was driving opportunity, which was operationalized both as number of highway miles and as number of car registrations per inhabitant. Thus, terrorists' second strike exploited both fear of dread risks and, paradoxically, an environmental structure conducive to generating increased driving, which ultimately increased fatalities.

  5. We Bomb, Therefore We Are: The Evolution of Terrorist Group Life Cycles

    Science.gov (United States)

    1994-03-24

    34 Political Socialization in Left-Wing Underground Organizations: Biographies of Italian and German Militants," International Social Movement Research... Political Socialization of Terrorist Groups in West Germany," Journal of Political and Military Sociology, v. 11, n. 2, Fall 1983, 236. See also Giorgio...Love?, 30-31. 7 Quoted in Wasmund, " Political Socialization ," 236. 88Irving L. Horowitz, "The Routinization of Terrorism and Its Unanticipated

  6. Plastic Surgery Management of Victims of Terrorist Violence in Ankara, Turkey.

    Science.gov (United States)

    İğde, Murat; Kaplan, Ahmet

    2017-12-01

    Terror attacks have been progressively increasing worldwide through the present era. The management of the consequences of terrorism events is under debate in almost every scientific area. The organization and advancement of health services constitute important components of the crisis management. Similar to other specialty areas in medicine, the medical management of terrorist attacks is becoming important in terms of plastic and reconstructive surgery.Ankara, the capital of Turkey, has been subject to 2 terrorist events in public places within a year. The total number of patients involved in both cases was 434. Ankara Numune Training and Research Hospital is a tertiary health care institution and one of the most important trauma centers in the region. A total of 178 Patients exposed to these events referred to our hospital. Of the total, 34 patients were completely or partially treated in the plastic and reconstructive surgery clinic. In this study, we tried to discuss the difficulties encountered in the classification of patients and plastic surgery during the treatment period of patients who experienced these attacks.Data were obtained from The National News Agency, hospital, and our own clinic registries. Patient classification was based on the injured parts of the body. Statistical analysis was performed for all data. In conclusion, the role and the importance of plastic surgery department especially in trauma management have been emphasized in the light of our findings.

  7. Identifying foreign terrorist fighters: The Role of Public-Private Partnership, Information Sharing and Financial Intelligence

    Directory of Open Access Journals (Sweden)

    Tom Keatinge

    2015-07-01

    Full Text Available Since 9/11, financial institutions have found themselves placed squarely on the front line of efforts to combat terrorism: countering terrorist financing has been a core element of the global counter-terrorism architecture since President George W Bush signed Executive Order 13224 promising to starve terrorists of funding. Financial institutions have played valuable “post-event” forensic roles, but despite the apparently immense troves of data they hold, their effective involvement in the identification and disruption of terrorist intentions or activity remains elusive. With global authorities consumed with the mushrooming growth of “foreign terrorist fighters” (FTFs, it seems timely to revisit the question of how financial institutions can play a more preventative role in countering terrorist threats. As the intergovernmental Financial Action Task Force (FATF noted recently, “greater domestic cooperation among AML/CFT [anti-money laundering and countering the financing of terrorism] bodies and other authorities” is needed to tackle funding of FTFs. Banks must play a key role in the development of this architecture. The issue of FTFs flowing to and from the conflict in Syria is likely to shape the international security agenda for the foreseeable future. Identifying citizens who have joined terrorist groups in Syria and Iraq pose a threat to the UK. The UK is certainly not alone in Europe in facing this threat. Evidence suggests these fears are now being realised. Both the scale of the issue in the context of the Syrian conflict and the speed with which the numbers have risen have caught international security authorities off guard, which – it would seem – have only belatedly appreciated the magnitude of the challenge. Whilst there has been much discussion and debate about who these travelling fighters are, their motivations, and the threats they pose, the majority of this analysis has focused on the role of social media in this

  8. Expression of defender against apoptotic death (DAD-1) in iris and dianthus petals

    NARCIS (Netherlands)

    Kop, van der D.A.M.; Ruys, G.; Dees, D.; Schoot, van der C.; Boer, de A.D.; Doorn, van W.G.

    2003-01-01

    The gene defender against apoptotic death (DAD-1) prevents programmed cell death in animal cells. We investigated the expression pattern of DAD-1 in petals of iris (Iris x hollandica cv. Blue Magic) and carnation (Dianthus caryophyllus cv. Etarro). DAD-1 expression in Iris petals was strongly

  9. Compartmentalization: a conceptual framework for understanding how trees grow and defend themselves

    Science.gov (United States)

    Alex L. Shigo

    1984-01-01

    The purpose of this chapter is to describe a conceptual framework for understanding how trees grow and how they and other perennial plants defend themselves. The concept of compartmentalization has developed over many years, a synthesis of ideas from a number of investigators. It is derived from detailed studies of the gross morphology and cellular anatomy of the wood...

  10. Infants' Use of Force to Defend Toys: The Origins of Instrumental Aggression

    Science.gov (United States)

    Hay, Dale F.; Hurst, Sarah-Louise; Waters, Cerith S.; Chadwick, Andrea

    2011-01-01

    The two aims of the study were (a) to determine when infants begin to use force intentionally to defend objects to which they might have a claim and (b) to examine the relationship between toddlers' instrumental use of force and their tendencies to make possession claims. Infants' and toddlers' reactions to peers' attempts to take their toys were…

  11. Attention and Memory in School-Age Children Surviving the Terrorist Attack in Beslan, Russia

    Science.gov (United States)

    Scrimin, Sara; Moscardino, Ughetta; Capello, Fabia; Axia, Giovanna

    2009-01-01

    Little is known about the impact of terrorism on children's cognitive functioning and school learning. The primary purpose of this study was to report on cognitive functioning among school-age children 20 months after a terrorist attack against their school. Participants included 203 directly and indirectly exposed children from Beslan and 100…

  12. State and Local Preparedness for Terrorism: Selected Policy Issues

    National Research Council Canada - National Science Library

    Canada, Ben

    2002-01-01

    While the federal government has resources at hand for responding to terrorist attacks, the proximity of state and local first responders insures they will almost always be the first to arrive at the site of an attack...

  13. [Terrorist attack trauma - an individual entity of polytrauma : A 10-year update].

    Science.gov (United States)

    Güsgen, C; Franke, A; Hentsch, S; Kollig, E; Schwab, R

    2017-10-01

    The incidence of terrorist attacks is increasing worldwide, and they have also become a permanent threat in European cities. Due to its complexity, terrorist attack trauma places high demands on the strategy of surgical treatment. The combination of various mechanisms, explosions and gunshot injuries, with the characteristic pressure (blast) damage and a high proportion of penetrating trauma with simultaneous burns are characteristic features. Unlike in military conflicts, injuries to people of all ages and without ballistic body protection (body armor) are to be expected. The mechanism of the attack and its local conditions are of relevance for the assessment of the situation and the expected injury patterns. Thus, suicide attacks result in several times higher numbers of fatalities and casualties. Explosions on free ground lead to different types of injury than those in closed or semi-enclosed spaces. The treatment principles of the Advanced Trauma Life Support (ATLS®) are based on the intrahospital care of casualties as well as damage control strategies with trigger factors. In order to prepare and educate clinics and surgeons in Germany for such scenarios, various course formats of the professional societies, the German Society for General and Visceral Surgery (DGAV) and the German Society for Trauma Surgery (DGU) have now been established.

  14. Defending against speculative attacks: A hybrid model of exchange market pressure and crises

    NARCIS (Netherlands)

    Daniels, T.R.; Jager, H.; Klaassen, F.

    2008-01-01

    While virtually all currency crisis models recognise that the fate of a currency peg depends on how tenaciously policy makers defend it, they seldom model how this is done. We incorporate themechanics of speculation and the interest rate defence against it in the model of Morris and Shin (American

  15. Fear of Terrorism in New York After the September 11 Terrorist Attacks: Implications for Emergency Mental Health and Preparedness

    Science.gov (United States)

    Boscarino, Joseph A.; Figley, Charles R.; Adams, Richard E.

    2009-01-01

    To examine the public’s response to future terrorist attacks, we surveyed 1,001 New Yorkers in the community one year after the September 11 attacks. Overall, New Yorkers were very concerned about future terrorist attacks and also concerned about attacks involving biological or nuclear weapons. In addition, while most New Yorkers reported that if a biological or nuclear attack occurred they would evaluate available information before evacuating, a significant number reported they would immediately evacuate, regardless of police or public health communications to the contrary. The level of public concern was significantly higher on all measures among New York City and Long Island residents (downstate) compared to the rest of the state. A model predicting higher fear of terrorism indicated that downstate residents, women, those 45 to 64 years old, African Americans and Hispanics, those with less education/income, and those more likely to flee, were more fearful of future attacks. In addition, making disaster preparations and carefully evaluating emergency information also predicted a higher level of fear as well. A second model predicting who would flee suggested that those more likely to evaluate available information were less likely to immediately evacuate, while those with a higher fear of future attacks were more likely to flee the area. Given these findings and the possibility of future attacks, mental health professionals need to be more involved in preparedness efforts, especially related to the psychological impact of attacks involving weapons of mass destruction. PMID:14730761

  16. What Can the United States Learn from India to Counter Terrorism?

    National Research Council Canada - National Science Library

    Latimer, William

    2004-01-01

    Terrorism is the principal threat to global and national security in the post-11 September world, Facing terrorist threats at home and abroad, the United States has declared counterterrorism its top priority...

  17. Terrorists or cowards: negative portrayals of male Syrian refugees in social media

    OpenAIRE

    Rettberg, Jill Walker; Gajjala, Radhika

    2015-01-01

    This paper examines images and words shared on the Twitter hashtag #refugeesNOTwelcome to understand the portrayal of male Syrian refugees in a post-9/11 context where the Middle-Eastern male is often primarily cast as a potential terrorist. Queer theorist Jasbir Puar (2007) and Middle- East scholar Paul Amar (2011) provide us with a theoretical approach to make sense of the contradictions we see emerging in this social media context.

  18. Strengthening Hospital Surge Capacity in the Event of Explosive or Chemical Terrorist Attacks

    Science.gov (United States)

    2009-03-01

    and become more specialized and efficient over the past decade in order to survive in the tight financial markets . Capacity is not keeping pace...Surge Capacity for Terrorist Bombings,” Atlanta, Georgia, (April 2007): 6. 197 S. Einav, Z. Feigenberg, C. Weissman, D. Zolchik, G. Caspi, D. Kotler ...activated in several bombings, 200 S. Einav, Z. Feigenberg, C. Weissman, D. Zolchik, G. Caspi, D. Kotler

  19. The nuclear state

    International Nuclear Information System (INIS)

    Jungk, R.

    1979-01-01

    A general picture is given of the technical and sociological problems which it is said arise in the 'nuclear state'. Separate chapters are entitled: radiation fodder; the gamblers; the atomic man; the intimidated; the proliferators; atomic terrorists; the supervised. The Foreword, entitled 'the hard path' (i.e. with nuclear power) is contrasted with a final chapter entitled 'Prospect: the soft path' (i.e. without nuclear power). (U.K.)

  20. Threatening “the Good Order”: West Meets East in Cecil B. DeMille’s The Cheat and John Updike’s Terrorist

    Directory of Open Access Journals (Sweden)

    Bradley M. Freeman

    2011-12-01

    Full Text Available

    Despite almost a hundred years of separation, both Cecil B. DeMille’s film The Cheat (1915 and John Updike’s novel Terrorist (2006 deploy a clear-cut territorial divide between Western and Eastern spaces in order to envision a unified American space. These narratives superimpose a “natural” division on these historically opposed spaces and thereby suggest that any contact between these spaces will have dangerous consequences. These consequences include the potential dissolution and eventual destruction of American productivity, surveillance, and territorial integrity. DeMille’s film and Updike’s novel represent America as a nation-state that must be protected from the East. In 1915, The Cheat warned against an interracial America and the upsurge in immigration that characterized the turn of the century. Nearly a century later, Terrorist presupposes an interracial America but still constructs an East that threatens the security of America. While registering the particular concerns of two distinct historical moments, these narratives represent a larger attempt in American aesthetics to imagine an East that jeopardizes the utopian possibilities of an overly idealized American space.

  1. 45 CFR 2554.52 - How does the Corporation protect the rights of defendants?

    Science.gov (United States)

    2010-10-01

    ... 45 Public Welfare 4 2010-10-01 2010-10-01 false How does the Corporation protect the rights of... Appeals § 2554.52 How does the Corporation protect the rights of defendants? These procedures separate the functions of the investigating official, reviewing official, and the ALJ, each of whom report to a separate...

  2. Evaluation of MR safety of a set of canine ear defenders (MuttMuffs®) at 1 T

    International Nuclear Information System (INIS)

    Baker, Martin A.

    2013-01-01

    Previous studies have indicated that loud noise produced during MR scanning is hazardous for human patients. Although loud noise can also be harmful to canine patients in MRI, ear protection is not routinely provided. The purpose of this study was to test the safety of a set of commercially available canine ear defenders (MuttMuffs ® ) during MRI scanning at 1 T. A metal fastening ring was removed and replaced with a plastic washer prior to testing. Torque, translation, heating and artifact production were tested. No torque, translation, or excessive heating were detected. No artifacts were observed. Clinical use demonstrated additional benefits of improved immobilisation of the dog, with no effect on signal-to-noise ratio. Results from this study indicate that following replacement of the metal ring with one made of plastic, these canine ear defenders are suitable for use at 1 T. The author recommends the use of ear defenders during canine MRI scans in order to reduce the risk of hearing damage, reduce the dose needed for anaesthetic maintenance and reduce the need for repeated MRI sequences due to movement of the dog

  3. Protecting nuclear power plants. Chapter 2. On the importance of the security and safety of the reactor pressure vessel to external threats

    International Nuclear Information System (INIS)

    Ballesteros, A.; Gonzalez, J.; Debarberis, L.

    2006-01-01

    Nuclear power plants have blong been recognized as potential targets of terrorist attacks, and critics have long questioned the adequacy of the existing measures to defend against such attacks. The 11-S 2001, 11-M 2004 and 7-J 2005 attacks in USA, Spain and UK illustrated the deadly intention and abilities of modern terrorist groups. These attacks also brought to surface long standing concerns about the vulnerability of nuclear installations to possible terrorist attacks. Commercial nuclear reactors contain large inventory of radioactive fission products which, if dispersed, could pose a direct radiation hazard on the population. The reactor pressure vessel (RPV), which contains the nuclear fuel, is the most critical component of the plant. This paper shows that small amount of explosive material can produce irreversible damage in the RPV and the release of radioactive material. Therefor, access of working personal to the vicinity of the RPV during the refuelling outage should be stricktly limited. It should be considered a high priority security issue

  4. Tracking and Analyzing Individual Distress Following Terrorist Attacks Using Social Media Streams.

    Science.gov (United States)

    Lin, Yu-Ru; Margolin, Drew; Wen, Xidao

    2017-08-01

    Risk research has theorized a number of mechanisms that might trigger, prolong, or potentially alleviate individuals' distress following terrorist attacks. These mechanisms are difficult to examine in a single study, however, because the social conditions of terrorist attacks are difficult to simulate in laboratory experiments and appropriate preattack baselines are difficult to establish with surveys. To address this challenge, we propose the use of computational focus groups and a novel analysis framework to analyze a social media stream that archives user history and location. The approach uses time-stamped behavior to quantify an individual's preattack behavior after an attack has occurred, enabling the assessment of time-specific changes in the intensity and duration of an individual's distress, as well as the assessment of individual and social-level covariates. To exemplify the methodology, we collected over 18 million tweets from 15,509 users located in Paris on November 13, 2015, and measured the degree to which they expressed anxiety, anger, and sadness after the attacks. The analysis resulted in findings that would be difficult to observe through other methods, such as that news media exposure had competing, time-dependent effects on anxiety, and that gender dynamics are complicated by baseline behavior. Opportunities for integrating computational focus group analysis with traditional methods are discussed. © 2017 Society for Risk Analysis.

  5. Proceedings of the Annual Symposium on the Role of Behavioral Science in Physical Security (10th) - Outthinking the Terrorist: An International Challenge Held at Springfield, Virginia on 23-24 April 1985

    Science.gov (United States)

    1985-04-24

    feasibility of terrorist organizations, state-sponsored or otherwise, resorting to* Legislation unconventional means (including nuclear, biological ...responsibility for dealing with April, we already have active programs under way with a nuclear and chemical/ biological terrorism. While as yet no dozen...16Alex P. Schmid and Jenny de Graaf, I’iolence As Communication, London: Sate, 1982, 57. 𔄁John Naisbitt, Megatrends , New York: Warner Books, 1982. 1 8

  6. Crime and Punishment: the Impact of Skin Color and Socioeconomic Status of Defendants and Victims in Jury Trials in Brazil.

    Science.gov (United States)

    da Silva, Rogério Ferreira; Oliveira Lima, Marcus Eugênio

    2016-11-14

    Social judgments are often influenced by racism. Voluntary crimes against life, and in particular the crime of homicide, may be the most critical situations of the impact of racism in social judgments. We analyzed 114 homicide trials conducted by the 1st Jury Court, in a Brazilian judicial capital, concluded between 2003 and 2007, for the purpose of investigating the effects of skin color and the socioeconomic status of the defendant and the victim of homicides in the jury trial court's decision. The results indicate that the social and economic profile of defendants and victims of homicide is identical. They are almost all poor (more than 70%), with low education (more than 73%) and frequently non-Whites (more than 88%). We found that judges assign longer sentences to black (β = .34, p = .01) and poor defendants (β = .23, p socioeconomic status in social judgments and in discrimination.

  7. How Belfius Bank's response to the terrorist attacks in Brussels helped embed business continuity in the company culture.

    Science.gov (United States)

    Jappens, Ludo

    2017-01-01

    Until 2015, major terrorist incidents in Belgium were considered a 'black swan'. However, the suicide attacks in Paris on 13th November, 2015 provided a wake-up call. Investigations revealed that the raid was prepared in Belgium by jihadists who grew up in Brussels and was coordinated by Belgian ISIS fighters in Syria. In an instant, it became clear that terror had been embedded in Belgian society and could erupt at any moment. At Belfius Bank Belgium, the subsequent months were a rollercoaster ride of terrorist-related events. Business activities were strongly affected, as the company's head office is located in the centre of Brussels. This paper focuses on the way Belfius responded to the events and how the lessons learned have helped to improve its business continuity and crisis management capability.

  8. Cultural Memory of Sorrow in Advertising after the Terrorist Attacks

    Directory of Open Access Journals (Sweden)

    Esther Martínez Pastor

    2015-09-01

    Full Text Available The general objective of this research study is to do a comparative research to investigate the perception of sorrow in the advertising in the press after the terrorist attacks: 11/09/2001 (U.S. and 11/04/2004 (Spain. The general hypothesis considers that there are similar perceptions of the sorrow towards the ads although there are cultural differences. On a computer program the subject was shown these images about announcement advertisement published in the press after the 09/11 and 11/04 in a random order and was asked different questions that explored their perception and attitudes with regard to these advertisements

  9. Following the terrorist attacks recently committed in the United States of America, and according to the recommendations of the Council of the European Union, the CERN staff observed 3 minutes of silence on Friday 14 September 2001 at 12h00, as a sign of deepest sympathy for all the victims and their families, and of solidarity with the American people

    CERN Multimedia

    Maximilien Brice

    2001-01-01

    Following the terrorist attacks recently committed in the United States of America, and according to the recommendations of the Council of the European Union, the CERN staff observed 3 minutes of silence on Friday 14 September 2001 at 12h00, as a sign of deepest sympathy for all the victims and their families, and of solidarity with the American people

  10. The impact of cooperation on the rights of defendants before the International Criminal Court

    NARCIS (Netherlands)

    Ferioli, M.L.

    2016-01-01

    The present study locates the challenges faced by defendants during cooperation proceedings in the context of the unique structural system of the Court, and the inherent tensions and limitations that characterize the ICC’s functioning. The study is divided into two parts. The first part sets out the

  11. Optimizing Visits to the Site of Death for Bereaved Families After Disasters and Terrorist Events.

    Science.gov (United States)

    Kristensen, Pål; Dyregrov, Atle; Weisæth, Lars; Straume, Marianne; Dyregrov, Kari; Heir, Trond; Bugge, Renate Grønvold

    2017-09-13

    In recent years it has been common after disasters and terrorist events to offer bereaved families the opportunity to visit the place where their loved ones died. Many report that such visits are beneficial in processing their loss. Various factors, both cognitive (eg, counteracting disbelief) and existential or emotional (eg, achieving a sense of closeness to the deceased), are associated with the experienced benefit. Nonetheless, exacerbations of trauma and grief reactions (eg, re-enactment fantasies) are common, with some of the bereaved also reporting adverse reactions after the visit. Subsequently, proper preparations are a prerequisite before such visits take place. This article describes how to optimize collective visits to the site of death after disasters or terrorist events for bereaved families. Important questions-for example, concerning those who should be responsible for organizing a visit and those who should be invited, the timing of the visit, what can be done at the site, the need for support personnel, and other practical issues-are discussed and general guidelines are recommended. (Disaster Med Public Health Preparedness. 2017;page 1 of 5).

  12. Lawyer of defendant and his role in the criminal process from the viewpoint of the European Convention on Human Rights and the Albanian criminal procedural legislation

    Directory of Open Access Journals (Sweden)

    Klodjan Skenderaj

    2014-01-01

    Full Text Available A guarantee for real ensuring of defendant’s rights is the qualified legal assistance by the side of the lawyer, chosen or assigned by the proceeding body. Providing legal protection to defendants was an important achievement in the long and difficult efforts to democratize the criminal proceedings. It was initially achieved in developed countries which promulgated the fundamental rights and freedoms and on this basis the major laws of activity of justice’s bodies were enforced. The role of lawyer in the criminal proceeding gradually increased and became an important factor in the fight against violations of law and injustice. The lawyer became a respected procedural figure, standing in front of prosecution, as the opposing party able to develop a cross-examination and to influence in a fair solution of case. However in practice, it is not rare the violation of rights of defendants by proceeding organs. So, it is right to make this question: What will be done with their rights and how will they be protected? In practice there were different opinions in terms of guaranteeing the rights of these defendants and how far the rights of lawyers of the defendants are extended. This is the reason why this paper will bring in attention the position, procedural guarantees of lawyers, the actions that can take and the exercise of their main rights in defending the interest of defendant, taking into account the main phases of criminal proceedings. Special attention will be devoted to case law of European Court of Human Rights (ECHR in terms of guaranteeing the rights of defendants, the orientations of the Albanian Constitutional Court and that of Supreme Court. At the end, this paper will reach in some conclusions through which proposals and amendments will be made to the code of criminal procedure, starting from the principle that the rights and procedural guarantees of defendants should be guaranteed at the maximum, because it’s the only way to

  13. Gut microbes may facilitate insect herbivory of chemically defended plants.

    Science.gov (United States)

    Hammer, Tobin J; Bowers, M Deane

    2015-09-01

    The majority of insect species consume plants, many of which produce chemical toxins that defend their tissues from attack. How then are herbivorous insects able to develop on a potentially poisonous diet? While numerous studies have focused on the biochemical counter-adaptations to plant toxins rooted in the insect genome, a separate body of research has recently emphasized the role of microbial symbionts, particularly those inhabiting the gut, in plant-insect interactions. Here we outline the "gut microbial facilitation hypothesis," which proposes that variation among herbivores in their ability to consume chemically defended plants can be due, in part, to variation in their associated microbial communities. More specifically, different microbes may be differentially able to detoxify compounds toxic to the insect, or be differentially resistant to the potential antimicrobial effects of some compounds. Studies directly addressing this hypothesis are relatively few, but microbe-plant allelochemical interactions have been frequently documented from non-insect systems-such as soil and the human gut-and thus illustrate their potential importance for insect herbivory. We discuss the implications of this hypothesis for insect diversification and coevolution with plants; for example, evolutionary transitions to host plant groups with novel allelochemicals could be initiated by heritable changes to the insect microbiome. Furthermore, the ecological implications extend beyond the plant and insect herbivore to higher trophic levels. Although the hidden nature of microbes and plant allelochemicals make their interactions difficult to detect, recent molecular and experimental techniques should enable research on this neglected, but likely important, aspect of insect-plant biology.

  14. Characterising the UK Terrorist Threat: The Problem with Non-Violent Ideology as a Focus for Counter-Terrorism and Terrorism as the product of ‘Vulnerability’

    OpenAIRE

    Anthony Richards

    2012-01-01

    This article investigates two particular aspects as to how the terrorist threat in the UK has been characterised, arguing that they both challenge conventional academic wisdom as to how terrorism should be conceptualised. While such conventional wisdom should always be open to challenge, and policymaking perspectives are different to those of academics, these two particular aspects as to how the terrorist threat has been perceived in the UK merit scrutiny, especially as counter-terrorism stra...

  15. Defending Against Opposed Patterns of Resistant: Can Past Cultural Lessons in Armed Conflict Help U.S. Identify, Defend, Adapt, or Exploit Notions of Resistant With New Adversaries Like ISIS

    Science.gov (United States)

    2015-05-01

    experienced in Sri Lanka, the “Birds of Paradise ” women combatants and suicide bombers were successfully able to exploit gender bias...research paper are those of the author and do not reflect the official policy or position of the US government or the Department of Defense. In...contact and how might we defend them or exploit them without compromising our own notions? This research paper evaluates current events and identifies

  16. Securing public transportation systems an integrated decision analysis framework for the prevention of terrorist attacks as example

    CERN Document Server

    Brauner, Florian

    2017-01-01

    Florian Brauner addresses the risk reduction effects of security measures (SecMe) as well as economic and social effects using terrorist threats in public transportation as use case. SecMe increase the level of security but cause interferences and restrictions for customers (e.g. privacy). This study identifies the interferences and analyzes the acceptance with an empirical survey of customers. A composite indicator for the acceptance of different SecMe is developed and integrated into a risk management framework for multi-criteria decision analysis achieving the right balance of risk reduction, costs, and social acceptance. Contents Assessment of Security Measures for Risk Management Measurement of Objective Effectiveness of Security Measures Against Terrorist Attacks Determination of Subjective Effects of Security Measures (Customer Acceptance Analysis) Cost Analysis of Security Measures Multi-Criteria Decision Support Systems Target Groups Scientists with Interest in Civil Security Research Providers and S...

  17. Keep your bias to yourself: How deliberating with differently biased others affects mock-jurors' guilt decisions, perceptions of the defendant, memories, and evidence interpretation.

    Science.gov (United States)

    Ruva, Christine L; Guenther, Christina C

    2017-10-01

    This experiment explored how mock-jurors' (N = 648) guilt decisions, perceptions of the defendant, memories, and evidence interpretation varied as a function of jury type and pretrial publicity (PTP); utilizing a 2 (jury type: pure-PTP vs. mixed-PTP) × 3 (PTP: defendant, victim, and irrelevant) factorial design. Mock-juries (N = 126) were composed of jurors exposed to the same type of PTP (pure-PTP; e.g., defendant-PTP) or different types of PTP (mixed-PTP; e.g., half exposed to defendant-PTP and half to irrelevant-PTP). Before deliberations jurors exposed to defendant-PTP were most likely to vote guilty; while those exposed to victim-PTP were least likely. After deliberations, jury type and PTP affected jurors' guilt decisions. Specifically, jurors deliberating on pure-PTP juries had verdict distributions that closely resembled the predeliberation distributions. The verdict distributions of jurors on mixed-PTP juries suggested that jurors were influenced by those they deliberated with. Jurors not exposed to PTP appeared to incorporate bias from PTP-exposed jurors. Only PTP had significant effects on postdeliberation measures of memory and evidence interpretation. Mediation analyses revealed that evidence interpretation and defendant credibility assessments mediated the effect of PTP on guilt ratings. Taken together these findings suggest that during deliberations PTP bias can spread to jurors not previously exposed to PTP. In addition, juries composed of jurors exposed to different PTP slants, as opposed to a single PTP slant, can result in less biased decisions. Finally, deliberating with others who do not share similar biases may have little, if any, impact on biased evidence interpretation or memory errors. (PsycINFO Database Record (c) 2017 APA, all rights reserved).

  18. Review of the Estimates for the Impact of the September 11, 2001, Terrorist Attacks on New York Tax Revenues

    National Research Council Canada - National Science Library

    2002-01-01

    As a follow-up to our May 2002 report, reviewing the estimates of the economic impact of the September 11, 2001, terrorist attacks on New York, Congress requested additional information on New York tax revenues...

  19. The Representation of Islam in Western Media: The Coverage of Norway Terrorist Attacks

    Directory of Open Access Journals (Sweden)

    Emad A. Alghamdi

    2015-05-01

    Full Text Available Undeniably mass media have become the primary source of information and communication for the majority of, if not all, members of modern societies. The nature of the information thus communicated and the manner in which it is dispensed through media certainly have a profound influence on people’s perceptions of the world around them. The relation between the media, on one hand, and culture, social life, and politics on the other, is an interesting one in which media fulfills dual functions, reflecting and also shaping issues occurring within these three domains (Bell & Garrett, 1998. In the initial media coverage of the 2011 Norway terrorist attacks, some western media authors, inaccurately and unjustly, held Muslims and Islamic groups as being responsible for the attacks. Using Critical Discourse Analysis (CDA, this study seeks to ascertain how language was manipulated in this coverage of the terrorist attacks in order to give expression to blind prejudice against Islam and Muslims. As findings of the analyses reveal, the tones of allegation in these articles and reports differed dramatically from one article to another ranging from tones of mere suspicion to those of overt accusation. The varying degrees of uncertainty or assertion of the authors’ statements were reflected in the varied linguistic forms and devices used within the discourse.

  20. Securing the virtual environment how to defend the enterprise against attack

    CERN Document Server

    Ottenheimer, Davi

    2012-01-01

    A step-by-step guide to identifying and defending against attacks on the virtual environment As more and more data is moved into virtual environments the need to secure them becomes increasingly important. Useful for service providers as well as enterprise and small business IT professionals the book offers a broad look across virtualization used in various industries as well as a narrow view of vulnerabilities unique to virtual environments. A companion DVD is included with recipes and testing scripts. Examines the difference in a virtual model versus traditional computing models an

  1. Anti-Terrorism Authority Under the Laws of the United Kingdom and the United States

    National Research Council Canada - National Science Library

    Feikert, Clare; Doyle, Charles

    2006-01-01

    This is a comparison of the laws of the United Kingdom and of the United States that govern criminal and intelligence investigations of terrorist activities Both systems rely upon a series of statutory authorizations...

  2. Mental illness and legal fitness (competence) to stand trial in New York State: expert opinion and criminal defendants' psychiatric symptoms.

    Science.gov (United States)

    Lee, Eugene; Rosner, Richard; Harmon, Ronnie

    2014-07-01

    Fitness to Stand Trial is a critical concept in the adjudication of justice-involved persons. A retrospective study was conducted to examine criminal defendants' specific psychiatric symptoms and those symptoms' associations with expert opinions on Competence to Stand Trial. One hundred charts were reviewed: 50 Cases (opined as Not Fit) were compared against 50 Controls (opined as Fit) with respect to ratings on the Brief Psychiatric Rating Scale (BPRS). A significance level of 0.001 was selected a priori. Statistically significant differences were found in seven of the eighteen BPRS symptom constructs (with the highest differences in Conceptual Disorganization and Unusual Thought Content) and two of the four BPRS higher-order syndrome factors (Thinking Disorder and Hostile-Suspiciousness). Consistent with previous reports, psychotic symptoms are found in this study to be inversely associated with Fitness. Validity, reliability, and limitations of this study, as well as directions for future research, are discussed herein. © 2014 American Academy of Forensic Sciences.

  3. The need to counter extremist terrorist manifestations in society and in the penal system

    Directory of Open Access Journals (Sweden)

    Kazberov P.N.

    2013-09-01

    Full Text Available The article discusses the need for inter-agency work to minimize the extremist-terrorist activities in the community. The problem of the psychology of extremism and terrorism are increasingly in the spotlight representatives of various scientific disciplines. First of all, there is no single legal science in all respects understanding of phenomena such as extremism and terrorism, their classification and evaluation, although a number of positive examples in this respect international cooperation is present. According to current data provided by the Investigative Committee of the Russian Federation, the General Prosecutor of the Russian Federation, the Russian Ministry of Internal Affairs, as well as the Moscow Bureau for Human Rights, extremism is a real threat to the national security of the Russian Federation. From the data of law enforcement should be the fact that most of the crimes of extremist and terrorist nature committed by persons of young age, the consciousness of which are susceptible to nationalist propaganda. A significant increase in informal youth movements extremist-nationalist orientation. The problem of expansion of extremism is also relevant for the penitentiary system of modern society. The very fact that a significant number of prisoners serving sentences for extremism and terrorism, illustrates the need for them special psychological and educational work

  4. Cyberspace as a new arena for terroristic propaganda: an updated examination.

    Science.gov (United States)

    Minei, Elizabeth; Matusitz, Jonathan

    2012-11-01

    This paper analyzes the role of propaganda use in cyberterrorism. The main premise is that cyberterrorists display various semiotic gestures (e.g., the use of images and Internet videos) to communicate their intents to the public at large. In doing so, they communicate themes-these themes range from hate to anger. Cyberterrorism, then, is a form of theater or spectacle in which terrorists exploit cyberspace to trigger feelings of panic and overreaction in the target population. In many cases, this form of propaganda is the primary means of communication for various cyberterrorist groups to convey their intents. Internet sites also produce numerous opportunities for in-group communication and publicity.

  5. State health policy for terrorism preparedness.

    Science.gov (United States)

    Ziskin, Leah Z; Harris, Drew A

    2007-09-01

    State health policy for terrorism preparedness began before the terrorist attacks on September 11, 2001, but was accelerated after that day. In a crisis atmosphere after September 11, the states found their policies changing rapidly, greatly influenced by federal policies and federal dollars. In the 5 years since September 11, these state health policies have been refined. This refinement has included a restatement of the goals and objectives of state programs, the modernization of emergency powers statutes, the education and training of the public health workforce, and a preparation of the health care system to better care for victims of disasters, including acts of terrorism.

  6. Terrorist and Insurgent Unmanned Aerial Vehicles: Use, Potentials, and Military Implications

    Science.gov (United States)

    2015-08-01

    which were conceptually based on the earlier World War I Kettering Bug concept—to dive into highly defended German military- industrial tar- gets—were... industrial 3D printer.71 A projected capability to regularly print higher strength metal components, in addition to plas- tic and composite components...between line-of-sight to the drone and wearing eyewear is to use a tablet or smart phone as the controller on which the drone video is fed. 61. Robert

  7. Development of Risk Assessment Methodology for State's Nuclear Security Regime

    International Nuclear Information System (INIS)

    Jang, Sung Soon; Seo, Hyung Min; Lee, Jung Ho; Kwak, Sung Woo

    2011-01-01

    Threats of nuclear terrorism are increasing after 9/11 terrorist attack. Treats include nuclear explosive device (NED) made by terrorist groups, radiological damage caused by a sabotage aiming nuclear facilities, and radiological dispersion device (RDD), which is also called 'dirty bomb'. In 9/11, Al Qaeda planed to cause radiological consequences by the crash of a nuclear power plant and the captured airplane. The evidence of a dirty bomb experiment was found in Afganistan by the UK intelligence agency. Thus, the international communities including the IAEA work substantial efforts. The leaders of 47 nations attended the 2010 nuclear security summit hosted by President Obama, while the next global nuclear summit will be held in Seoul, 2012. Most states established and are maintaining state's nuclear security regime because of the increasing threat and the international obligations. However, each state's nuclear security regime is different and depends on the state's environment. The methodology for the assessment of state's nuclear security regime is necessary to design and implement an efficient nuclear security regime, and to figure out weak points. The IAEA's INPRO project suggests a checklist method for State's nuclear security regime. The IAEA is now researching more quantitative methods cooperatively with several countries including Korea. In this abstract, methodologies to evaluate state's nuclear security regime by risk assessment are addressed

  8. 76 FR 39408 - Privacy Act of 1974; Department of Homeland Security/ALL-030 Use of the Terrorist Screening...

    Science.gov (United States)

    2011-07-06

    ... of Investigation (FBI)/Terrorist Screening Center (TSC) is providing a near real time, synchronized... appropriate clearances or permissions. Retention and disposal: The WLS will maintain a near real time mirror... difficulties they experienced during their travel screening at transportation hubs such as airports and train...

  9. [Defusing of victims of the terrorist attacks in Paris. Elements of assessment one-month post-event].

    Science.gov (United States)

    Prieto, N; Cheucle, E; Faure, P; Digard, F; Dalphin, C; Pachiaudi, V; Simond, M; Darbon, R; Collinet, C; Habibi, R; Gueugniaud, P-Y

    2018-04-01

    The terrorist attacks (fusillades and suicide attacks) in Paris on 13 November 2015 have had a major psychic impact on all individuals directly or secondarily exposed to them. Medico-psychological unit (CUMP) of the Paris Île-de-France region's immediate care services were immediately mobilized and rapidly strengthened by all regional medico-psychological units (CUMP) throughout the country. Psychological assistance has been provided in several key points of Paris and specifically in the 11th district City Hall of Paris where Lyon's Medico-psychological unit was located. These specific immediate psychological assistances, referred to as a "defusing process" by the medico-psychological unit (CUMP), are mostly devoted to provide the victims with an entry point to a psychological healthcare relationship and give them a first sense of soothing and relief even though they do not prevent further psychological care follow up for the victims. Nonetheless, the potential therapeutic effect of this "defusing process" has not yet been sufficiently established nor demonstrated by any scientific study. A phoning survey was carried out one-month post-terrorist attacks and interviewed the 129 victims who benefited from the "defusing process" conducted by Lyon's medico-psychological unit (CUMP) in order to collect data and assess its effects. These people, whether directly exposed, bereaved relatives or witnesses, whose average age is 35, are mostly living in the Île-de-France region. Most of them present a high score on the IES-R scale, whether they were directly exposed, bereaved relatives or witnesses. Almost all of them (96.5%) experienced at least one medical care contact within this one-month post-trauma period with psychotropic medication for 37% of them. Regarding the defusing conducted by Lyon's medico-psychological unit (CUMP) in the 11th district City Hall of Paris, it appears that 93% of the victims who were looked after indicated that they were satisfied and 87.4% of

  10. Forecasting the “Arab Spring” of 2011: Terrorist Incident Data from 2000-2010 Offered No Early Warning

    Directory of Open Access Journals (Sweden)

    Richard J. Chasdi

    2013-04-01

    Full Text Available One of the single most predominant questions associated with the so-called “Arab Spring” is whether or not any social research indicators associated with terrorism data are available with predictive value for such profound structural political changes. The underlying aim of this “Research Note” is to take a first pass at the terrorism data and to compare certain terrorism data trends for four countries that experienced successful regime change in 2011, namely Tunisia, Egypt, Libya, and Yemen, to terrorism trends in nine countries where political strains and tensions did not result in full blown regime change. In this essay, those countries include Bahrain, Syria, Jordan, Morocco, Algeria, Kuwait, UAE, Lebanon, and Saudi Arabia. From the start, it should be clear that even though there was non-violent protest in many of these countries, this analysis places singular attention on what both Gurr and Ross and Miller call “oppositional” or “insurgent” terrorism where terrorist assaults are directed at state governments.

  11. Air Base Defense: Different Times Call for Different Methods

    Science.gov (United States)

    2006-12-01

    small explosives in an attempt to drive U.S. forces from their territories. Many of these attacks were successful, resulting in the loss of human ...value.27 As the war rages on in Iraq, Matthew Levitt argues that the U.S. cannot afford to be distracted by the situation there, as terrorists may...serious and more difficult to defend.101 Air bases typically employ infrared and thermal imagers, security sentries, canine patrols and motion-tracking

  12. How Systems Engineering and Risk Management Defend Against Murphy's Law and Human Error

    Science.gov (United States)

    Bay, Michael; Connley, Warren

    2004-01-01

    Systems Engineering and Risk Management processes can work synergistically to defend against the causes of many mission ending failures. Defending against mission ending failures is facilitated by fostering a team that has a healthy respect for Murphy's Law and a team with a of curiosity for how things work, how they can fail, and what they need to know. This curiosity is channeled into making the unknowns known or what is uncertain more certain. Efforts to assure mission success require the expenditure of energy in the following areas: 1. Understanding what defines Mission Success as guided by the customer's needs, objectives and constraints. 2. Understanding how the system is supposed to work and how the system is to be produced, fueled by the curiosity of how the system should work and how it should be produced. 3. Understanding how the system can fail and how the system might not be produced on time and within cost, fueled by the curiosity of how the system might fail and how production might be difficult. 4. Understanding what we need to know and what we need learn for proper completion of the above three items, fueled by the curiosity of what we might not know in order to make the best decisions.

  13. Victims, bullies, and their defenders : A longitudinal study of the coevolution of positive and negative networks

    NARCIS (Netherlands)

    Huitsing, Gijs; Snijders, Tom A.B.; Van Duijn, Marijtje A. J.; Veenstra, René

    The complex interplay between bullying/victimization and defending was examined using a longitudinal social network approach (stochastic actor-based models). The (co) evolution of these relations within three elementary schools (Grades 2-5 at Time 1, ages 8-11, N = 354 children) was investigated

  14. Cooperative international arrangements: prevention of nuclear terrorism and the extradition and prosecution of terrorists

    International Nuclear Information System (INIS)

    Murphy, J.F.

    1987-01-01

    In considering the problems associated with prosecuting and punishing nuclear terrorists, it is noted that nuclear terrorism per se is not currently a crime under international law. To be sure, the Convention on the Physical Protection of Nuclear Material would probably cover any act of nuclear terrorism that involved nuclear material used for peaceful purposes. However, nuclear material used for military purposes or military nuclear reactors is outside the scope of the convention. US legislation implementing the convention goes beyond its terms in this respect and covers crimes involving nuclear material for nonpeaceful purposes if the offense is committed within US territorial, special maritime, special territorial, or special aircraft jurisdiction or if the offense is committed by nationals of the US. The author feels an effort should be made, under the auspices of the United Nations, to conclude a convention that would define nuclear terrorism, declare it a crime under international law, and obligate state parties to extradite or prosecute those who commit the crime. Such a convention would fill the large gap in the coverage of the Convention on the Physical Protection of Nuclear Material

  15. United States National Strategy and Defense Policy Objectives After Chemical Disarmament

    Science.gov (United States)

    1989-03-19

    decision to use CB weapons in order to gain publicity, extract ransom or achieve revenge. 40 GREATEST TERRORIST, CB THREAT Modern state sponsored...countries became ill after eating oranges, lemons and grapefruit from Israel which were contaminated with mercury, injected under the citrus skins with a

  16. Finding the Wolves in Sheeps Clothing: Ways to Distinguish and Deter Lone-Wolf Terrorists

    Science.gov (United States)

    2015-03-01

    Mark Hamm, “Lone-wolf Terrorism in America: Forging a New Way of Looking at an Old Problem,” YouTube video, 7:32, posted by the National Institute...that factors that influence most lone-wolf terrorists include, “to varying degrees and in variable combinations: personal aversion or depression ...Russia.”97 Also discovered after the bombings, “Tamerlan had a YouTube account that he used to post and watch violent Islamic extremist videos starting

  17. The Top Ten Errors of Martial Artists Defending Against a Blade

    Directory of Open Access Journals (Sweden)

    John McCurry

    2012-07-01

    Full Text Available There are ten deadly errors which make most empty-handed martial-arts techniques against a knife ineffective. The principal error stems from the fact that few present-day martial systems teach the blade. The premise of this article is that to effectively defend against a knife, you need to know how to use one. The purpose of this article is to motivate martial arts instructors to analyze more critically their unarmed knife defense techniques based on a clear understanding of the use of the knife, and to reawaken interest in the blade arts in the martial arts community.

  18. The Other Special Relationship: The United States and Australia at the Start of the 21st Century

    Science.gov (United States)

    2007-02-01

    Post columnist Charles Krauthammer highlighted this reality in noting that “Australia is the only country that has fought with the United States in...scenarios in which terrorist networks, WMD proliferation, state weakness, and criminal syndicates might feed off each other in malign ways. The real

  19. The counter-terrorist campus: Securitisation theory and university securitisation – Three Models

    Directory of Open Access Journals (Sweden)

    Liam Gearon

    2017-02-01

    Full Text Available With intensified threats to global security from international terrorism, universities have become a focus for security concerns and marked as locus of special interest for the monitoring of extremism and counter-terrorism efforts by intelligence agencies worldwide. Drawing on initiatives in the United Kingdom and United States, I re-frame three – covert, overt and covert–overt – intersections of education, security and intelligence studies as a theoretical milieu by which to understand such counter-terrorism efforts. Against the backdrop of new legislative guidance for universities in an era of global terrorism and counter-terrorism efforts by security and intelligence agencies and their Governments, and through a review of Open-Source security/intelligence concerning universities in the United Kingdom and the United States, I show how this interstitial (covert, overt and covert– overt complexity can be further understood by the overarching relationship between securitisation theory and university securitisation. An emergent securitised concept of university life is important because de facto it will potentially effect radical change upon the nature and purposes of the university itself. A current-day situation replete with anxiety and uncertainty, the article frames not only a sharply contested and still unfolding political agenda for universities but a challenge to the very nature and purposes of the university in the face of a potentially existential threat. Terrorism and counterterrorism, as manifest today, may well thus be altering the aims and purposes of the university in ways we as yet do not fully know or understand. This article advances that knowledge and understanding through a theoretical conceptualisation: the counter-terrorist campus.

  20. The Rise and the Fall of Terrorist Organizations in Post-Dictatorial Greece: The Role and the Lessons for the Intelligence Services

    National Research Council Canada - National Science Library

    Fakitsas, Miltiadis

    2003-01-01

    ... and business elite, The government's failure to curtail these groups resulted from the enormous belief that these terrorists were not a direct threat to Greek's democracy Fortunately, in June of 2002...

  1. Reflection in phraseological neology of traumatic historical events connected with the terrorist threat

    Directory of Open Access Journals (Sweden)

    Skorobogatova Taisiya Ivanovna

    2016-03-01

    Full Text Available The article is devoted to the analysis of phraseological units - neologisms which are associated with such traumatic historical events, as the implementation of terrorist acts. Particular emphasis is placed on the description of English, Russian and French phraseological units that have introduced the memory of the terrorist threat in the XX-XXI centuries.: Eng. That’s so 10th September (lit. today September 10, fig: Do not worry ahead of time about nothing; Rus. мочить в сортире (descriptor: беспощадно расправиться; фр. le prince s’est mari, le m chant est mort, c’est une semaine Walt Disney (lit. prince married the villain died, week Walt Disney; descriptor: Idyll, g n ration Bataclan (lit. Bataklan generation; descriptor: young people age of the victims who died in the “Bataklane”, i.e. young people aged 25-35. Phraseology description of new, emerging units is one of the most important problems in theoretical linguistics, namely: to illustrate and confirm the fact that the phrasebook body of a single national language is the result of the two memories - historical and linguistic. At the same time important to consider such a significant factor that determines the specificity of the national phraseological fund as memory selectivity in general and historical memory in particular.

  2. STATE COLLAPSE AND REGIONAL CONTAGION IN SUB-SAHARA AFRICA: LESSONS FOR ZIMBABWE

    OpenAIRE

    James J. Hentz

    2012-01-01

    Hollowing out the stateState collapse is one of the most important security threats in Sub-Sahara Africa. The George W. Bush administration's National Security Strategy includes failed and failing states as a national security priority. The U.S. European Command, whose area of responsibility includes much of Sub-Sahara Africa, are "concerned about ungoverned areas descending into chaos with terrorist and warlords…."2 The United Nations is trying to restore order to numerous collapsed states i...

  3. The New Product Development Improvement Motives and Practices of Miles and Snow's Prospectors, Analysers and Defenders

    DEFF Research Database (Denmark)

    Laugen, Bjørge Timenes; Boer, Harry; Acur, Nuran

    2006-01-01

    , twenty-seven analysers and seven defenders (Miles and Snow, 1978) suggests that the NPD improvement motives and practices of these three types of strategies are less different than we expected. Our explanation for this finding is that the three strategic types are growing towards each other, forced...

  4. The effect of the September 11 terrorist attacks on suicide and deliberate self-harm : A time trend study

    NARCIS (Netherlands)

    De Lange, AW; Neeleman, J

    2004-01-01

    Suicide rates may be affected by world news. Our objective was to investigate the possible impact of the terrorist attacks of September 11, 2001, on suicidal behavior in the Netherlands. There was evidence of an increase in rates of suicide and deliberate self-harm in the weeks immediately following

  5. A project to develop restoration methods for buildings and facilities after a terrorist attack

    Energy Technology Data Exchange (ETDEWEB)

    Fingas, M.F. [Environment Canada, Ottawa, ON (Canada). Emergencies Science and Technology Div]|[Environment Canada, Ottawa, ON (Canada). River Road Environmental Technology Centre; Volchek, K.; Hornof, M.; Boudreau, L.; Punt, M. [SAIC Canada, Ottawa, ON (Canada); Payette, P.; Best, M. [Health Canada, Ottawa, ON (Canada); Garbutt, M.; Krishnan, J.; Wagener, S.; Bernard, K. [Health Canada, Winnipeg, MB (Canada); Cousins, T.; Haslip, D. [Defence Research and Development Canada, Ottawa, ON (Canada)

    2004-07-01

    A multi-agent project was initiated to review site restoration after a terrorist attack. The objective was to acquire and compile information on all known restoration procedures for buildings, exteriors of buildings, their interior contents, and adjacent areas such as parking lots, lawns and vehicles. All procedures were then tested and validated. Restoration procedures included pickup, neutralization, decontamination, removal and final destruction/deposition of the contaminant, cleaning material and contaminated debris resulting from the terrorist act. This research and development project considered chemical, biological and nuclear contamination with the intent to develop methods to decontaminate and restore buildings after a chemical, biological and radiological (CBR) attack. Ideas were collected from work conducted around the world. The efficacy of best candidates was tested along with all selected chemical target items. The project also involved the preparation of procedures for decontamination and restoration. Ultimately, a tradeoff decision basis will be developed to provide information on abandonment and quarantine versus cleanup. The study revealed that there are several technologies that can be used for the decontamination of structures and equipment after acts of terrorism, however, no one technique will work for all contaminants on all surfaces. The selection of a decontamination method depends on the contaminant, the surface being decontaminated and economic, social and health factors. The amount of waste generated by decontamination is a major feasibility factor. 25 refs., 6 tabs.

  6. State and Urban Area Homeland Security Plans and Exercises: Issues for the 110th Congress

    National Research Council Canada - National Science Library

    Reese, Shawn

    2007-01-01

    ... for both terrorist attacks and natural disasters. Two potential activities that Congress might choose to focus on are the certification of state and urban area homeland security plans and the conduct of exercises to test the plans...

  7. State and Urban Area Homeland Security Plans and Exercises: Issues for the 109th Congress

    National Research Council Canada - National Science Library

    Reese, Shawn

    2006-01-01

    ... for both terrorist attacks and natural disasters. Two potential activities that Congress might choose to focus on are the certification of state and urban area homeland security plans, and the conduct of exercises to test the plans...

  8. Great Britain Against Libya’s state Terrorism in the 1980s

    Directory of Open Access Journals (Sweden)

    Łukasz Jureńczyk

    2018-06-01

    Full Text Available The aim of this paper is to present and assess Britain’s attitude towards Libya’s state terrorism in the 1980s. It presents the circumstances of involvement of Libyan authorities in the acts of terror, as well as the reasons for directing such activity against the United Kingdom. The paper discusses the response of the British authorities to the Libyan-backed terrorist activity and the results of investigations into attacks perpetrated by Libyans against British citizens. The main thesis of the paper is the statement that the politics of Great Britain in reaction for support offered by Muammar Gaddafi’s regime to the international terrorist network was formulated in line with the main directions of US policy towards Libya.

  9. Urgensi Perlindungan Hukum Bagi Pembela Hak Asasi Manusia (Human Rights Defender) Di Indonesia

    OpenAIRE

    Rahayu, Rahayu

    2010-01-01

    Human rights defenders are they working and having activities dealing with any effort to promote human rights. They stand in the front tine of struggle and dignifying human rights to utter the victims of human rights violation (the voice of the voiceless). Their existence is obviously recognized in United Nations' Genera! Assembly Nr. 53/144 on "Declaration on the Right and Responsibility of Individuals, Groups and Organ of Society to Promote and Protect Universally Recognized Human Rights an...

  10. NATIONAL PREPAREDNESS: Integration of Federal, State, Local, and Private Sector Efforts Is Critical to an Effective National Strategy for Homeland Security

    National Research Council Canada - National Science Library

    2002-01-01

    .... Federal, state, and local governments have a shared responsibility in preparing for catastrophic terrorist attacks, but the initial responsibility falls upon local governments and their organizations...

  11. Battling for the household's category buck : Can economy private labels defend supermakets against the hard-discounter threat?

    NARCIS (Netherlands)

    Vroegrijk, M.J.J.; Gijsbrechts, Els; Campo, K.

    Traditional grocery retailers often use price-based strategies to defend against hard-discounters (HDs). One increasingly-popular approach is the introduction of an economy private label (EPL), which provides similar or even larger price advantages over national brands than HD products. However, the

  12. An Adaptive Approach for Defending against DDoS Attacks

    Directory of Open Access Journals (Sweden)

    Muhai Li

    2010-01-01

    Full Text Available In various network attacks, the Distributed Denial-of-Service (DDoS attack is a severe threat. In order to deal with this kind of attack in time, it is necessary to establish a special type of defense system to change strategy dynamically against attacks. In this paper, we introduce an adaptive approach, which is used for defending against DDoS attacks, based on normal traffic analysis. The approach can check DDoS attacks and adaptively adjust its configurations according to the network condition and attack severity. In order to insure the common users to visit the victim server that is being attacked, we provide a nonlinear traffic control formula for the system. Our simulation test indicates that the nonlinear control approach can prevent the malicious attack packets effectively while making legitimate traffic flows arrive at the victim.

  13. Defending the Concept of Time in the Hebrew Bible

    DEFF Research Database (Denmark)

    Bundvad, Mette

    2014-01-01

    Due to the scarcity of reflection on time as an independent subject in the Hebrew Bible, there has been a scholarly tendency to consider biblical time conception more limited than our own, perhaps even nonexistent. This article confronts the scholarly skepticism regarding the ability of the bibli......Due to the scarcity of reflection on time as an independent subject in the Hebrew Bible, there has been a scholarly tendency to consider biblical time conception more limited than our own, perhaps even nonexistent. This article confronts the scholarly skepticism regarding the ability...... of the biblical authors to think about time, defending the presence of time conceptualization in the Hebrew Bible. In the article I discuss central research contributions to the subject of biblical time, in particular Sacha Stern’s thesis that the concept of time is entirely absent from the Hebrew Bible and from...

  14. Trial by Jury in Russian Military Courts

    Directory of Open Access Journals (Sweden)

    Nikolai P. Kovalev

    2008-07-01

    Full Text Available One of peculiar features of the military criminal justice system in Russia is that in some cases military defendants may apply for trial by jury. Unlike the existing U.S. court-martial jury and the Russian military jury of the early 1900s (World War I period which were comprised of the members of the armed forces, in modern Russia jurors trying military defendants are civilians. This article aims to provide a brief history of military jury in Russia and identify issues of independence and impartiality in Russian military courts with participation of lay decision-makers. In particular, the article will analyze two high-profile cases which resulted in acquittals of Russian officers accused of killing several Chechen civilians during counter-terrorist operations in Chechnya.

  15. Defending the social value of knowledge as a safeguard for public trust.

    Science.gov (United States)

    Holzer, Felicitas S

    2017-09-01

    The 'socially valuable knowledge' (SVK) principle has been widely acknowledged as one of the most important guiding principles for biomedical research involving human subjects. The principle states that the potential of producing socially valuable knowledge is a necessary requirement, although not sufficient, for the ethical conduct of research projects. This is due to the assumption that the social value of knowledge avoids exploitation of research subjects and justifies the use of health resources. However, more recently, several authors have started interrogating the validity of SVK in research and offered various lines of argument against the SVK principle as a necessary constraint to research. In this article, I will reconstruct the main arguments of this discussion between defenders and debunkers of the SVK principle and offer a third way to consider the social value of knowledge in research studies. I will argue that the social value of knowledge can be supported by an independent justification. This justification of the SVK principle addresses the rationality and common interest of researchers. Thus, I will introduce the SVK principle as a safeguarding principle for public trust based on a conceptual framework by Alex John London. My approach justifies keeping the principle as a precautionary and rational requirement for human health research that all rational stakeholders can agree upon. © 2017 John Wiley & Sons Ltd.

  16. Local government under the defenders of the constitution

    Directory of Open Access Journals (Sweden)

    Svirčević Miroslav

    2004-01-01

    Full Text Available The paper explains the development of local government under the rule of the constitution defenders 1842-1858. The author describes the historical facts that led to the abdication of Prince Miloš and the establishment of an oligarchic government of chieftains assembled in a council (Toma Vučić Perišić, Avram Petronijević, Hadji Milutin Garašanin and his son Ilija Stojan and Aleksa Simić, as well as the process of building a modern state administration and cultural identity, an integral part of which was a narrower process of constituting local government. A distinct role in the latter process was played by the Austrian-born Serbs, the only intelligentsia in the Principality of Serbia which was still under Turkish suzerainty. Special attention is given to the analysis of two local government acts instituting centralized local authorities with an enhanced law enforcement role in the districts, counties and communes. Those are District Prefectural System and of County Prefect Office Act of 12 May 1839 and Communal System Act of 13 July the same year. Of great importance was the former law, one of the longest-lived in the history of nineteenth-century Serbian constitutionalism. It was in force in 1839-88 and 1894-1903. Every autocratic regime in Serbia was to rely on it. Its distinctive feature is that it subordinated district and county prefects to the central authority and to the minister of internal affairs. They were reduced to mere police agents deprived of any freedom of action. Thus the local officials assumed the character of rigid administrators looking down on the common people. A natural continuation of this law was the other law of communal organization which turned the lowest local units into mere executive agencies of counties. Thus local government took on the form of a mere transmission of the central government, functioning according to a principle similar to the medieval lord-vassal system: my vassal's vassal is not my

  17. Behind bullying and defending : Same-sex and other-sex relations and their associations with acceptance and rejection

    NARCIS (Netherlands)

    Veenstra, René; Verlinden, Marina; Huitsing, Gijs; Verhulst, Frank; Tiemeier, Henning

    Relatively little is known about bullying and defending behaviors of children in early elementary school. However, this period is crucial for children's development as at this age they start to participate in a stable peer group, and difficulties in social interactions can be detected early by

  18. The Islamic State and U.S. Policy

    Science.gov (United States)

    2016-06-14

    global sense of urgency about further weakening the group and preventing future attacks. Members of Congress, Administration officials, and their...organization, IS terrorist attacks may restore a sense of pride and accomplishment among its members but also may galvanize new patterns of multilateral...question “Is the Islamic State Islamic?” to focus on whether or not the group’s members and actions are authentically Islamic in the sense of

  19. “The same love, the same faith, the same tears”: ecclesial initiatives about the cult of Our Lady of El Quinche to defend the Republic of the Sacred Heart, Ecuador (1883-1889

    Directory of Open Access Journals (Sweden)

    Luis Esteban Vizuete Marcillo

    2017-07-01

    Full Text Available Within the conflict between church and state in the 19th century, the clergy and laymen tried to defend the establishment where the church had hegemony over the state and society. Between 1883 and 1889, Ecuador experienced some ecclesial initiatives to defend which stood for the idea of a Republic of the Sacred Heart. This article studies the case of Our Lady of El Quiche, a colonial massive cult, which was part of a process of re-appropriation and reinterpretation of its history. It also suffered a process of spreading and strengthening of its cult, linking with the image of the Republic, political conflicts and the power of the church. Between politics and religion, the discourses and practices of the clergy and the faithful show the intention of the church to shore up its own idea of a catholic Republic and an organized society. In this article, the use of manuscripts and printed sources give information to contrast multiple voices and multiple religious acts which performed a new local Mariology about El Quinche and a reaction to a context in which the religious hegemony and the participation of the clergy in politics were questioned; meanwhile the relations inside the church were recomposing.

  20. Cognitive functioning and adjudicative competence: defendants referred for neuropsychological evaluation in a psychiatric inpatient setting.

    Science.gov (United States)

    Arredondo, Beth C; Marcopulos, Bernice A; Brand, Jesse G; Campbell, Kristen T; Kent, Julie-Ann

    2017-11-01

    A paucity of peer-reviewed research exists regarding the relation between cognitive functioning and adjudicative competence, despite increasing awareness of cognitive deficits associated with serious mental illness. This retrospective study sought to add to and expand upon existing research by considering performance validity and court determinations of competence, when available. We compared demographic and cognitive variables of a group of defendants with presumed valid testing admitted to an inpatient psychiatric facility for evaluation of adjudicative competence and referred for neuropsychological evaluation (n = 45) and compared individuals determined by the evaluator and/or the court to be competent (n = 30) and incompetent (n = 15). Defendants who were incompetent were more likely to be diagnosed with a cognitive disorder, with a medium effect size. There was a difference in tests of immediate and delayed memory as measured by the Repeatable Battery for the Assessment of Neuropsychological Status (RBANS), with medium to large effects, and high delayed memory scores were helpful in ruling out incompetence (Negative predictive power = 85.71%). These results provide support for the relationship between cognitive functioning and trial competence, particularly at high and low levels of performance.

  1. How States Carry Out Acts of Terror: Wars, Strategies and Tactics in Bosnia and Herzegovina and Kosovo

    Directory of Open Access Journals (Sweden)

    MA. Astrit Lleshi

    2016-01-01

    Full Text Available Terrorism is a notoriously difficult concept that defies single universal definition. Terrorists intentionally employ violence in order to instill fear in their victims and the wider public. Terrorist movements aim to achieve their political, social and/or religious goals through use of violent acts. (Hoffman, 1998: 43 In most cases terrorism is perpetrated by non-state actors and is "bottom up" challenge to the existing political order. However this article argues that the nature of the crime and not the perpetrator should determine whether some criminal act constitutes terrorism and acts of terror can also be committed by states and/or state actors. In this article, the author will examine the overall strategy and tactics used by the Milosevic and Karadzic regimes in BiH and Kosovo to fulfil their wartime ambitions of maintaining and consolidating control over Serb and Serb-occupied territory, relying primarily upon the indictments and judgments of the ICTY in which they and members of their armed forces acting under their authority have been charged and/or convicted of war crimes and terror, along with reports from international organizations such as the United Nations and other sources. Through an analysis of these tactics against leading definitions of terrorism, it will be demonstrated that rather than fighting against terrorists and insurgents, the Milosevic and Karadzic regimes carried out acts of terror during the wars in Kosovo and BiH, respectively, and furthermore Milosevic was sponsoring state-terrorism in BiH (Blakely, 2012: 3-4.

  2. Preventing nuclear terrorism: responses to terrorist grievances

    International Nuclear Information System (INIS)

    Beres, L.R.

    1987-01-01

    The US is vulnerable to nuclear terrorism, despite the presence of physical security and other measures. Although these measures are important, they are insufficient to prevent or deter terrorism. What, then, is the answer? The author feels it lies in a hitherto neglected dimension of terrorism: its underlying political grievances. The principal grievance that potential terrorists have against the US concerns misguided elements of US foreign policy. These elements are moving the US on a seemingly inexorable collision course with terrorism and, more than likely, with nuclear terrorism. The US represents a serious threat to many people and groups who feel directly the effects of a foreign policy mired in strident anti-Sovietism: opponents of the US-NATO Euromissile deployments, populations seeking to secure their human rights from repressive regimes supported by the US, and governments seeking self-determination but embattled by insurgents backed by US arms, equipment, and advisers. In many cases, the US foreign policy stance in one country has aroused suspicion and anger within the region as a whole. The collision course need not be inevitable. The US can take a number of steps in the political arena that would greatly reduce the threat of nuclear terrorism

  3. The correlation between diversion (Article 113 of the Criminal Code of Ukraine and terrorist act (Article 258 of the Criminal Code of Ukraine

    Directory of Open Access Journals (Sweden)

    Андрій Сергійович Климосюк

    2018-03-01

    During the investigating of the punishability for these crimes, it was found that in some cases the actual infliction of harm by a s diversion causes the necessity for additional qualifications by Part 2 of Art. 115 or Part 3 of Art. 258 of the Criminal Code of Ukraine. It is proved that the norm of diversion can be competed with the norm of a terrorist act as a whole (Article 113 of the Criminal Code of Ukraine and as part of the whole (Article 258 of the Criminal Code of Ukraine, and in such cases the preference in enforcement should be qualified as a diversion. Examples given in this article are an illustrations of an ideal and actual set of diversion e and terrorist act.

  4. Network-Behavior Dynamics in Bullying and Defending : A Multilevel Network Analysis of Single-Grade versus Multi-Grade Classes

    NARCIS (Netherlands)

    Rambaran, Johannes; McFarland, Daniel; Veenstra, David

    2017-01-01

    The social networks in which children participate in are strongly associated with their involvement in bullying and defending (Juvonen & Graham, 2014; Salmivalli, 2010). It is likely that peer effects – referring to selection and influence processes – explain this association. Children seek out

  5. [The analysis of the theses for the scientific degree in "forensic medicine" and related medical disciplines defended during the period from 2010 till 2014].

    Science.gov (United States)

    Fetisov, V A; Gusarov, A A; Kuprina, T A

    2016-01-01

    The objective of the present study was to analyze the results of research reported in the theses for the degree in "forensic medicine" defended in different dissertation committees during the 5 year period (from 2010 till 2014) and to summarize and compartmentalize the main research areas in which the authors carried out their study and thereby make the data obtained more readily available for the wide circles of readers. A total of 55 theses for the scientific degree in "forensic medicine" (14.03.05) were defended during the period from 2010 till 2014 including 18 (32.7%) ones for the degree in two disciplines, the second being either "pathological anatomy" (n=6) or "stomatology" (n=4). Despite the great variety of the problems resolved in the studies conducted during the five year period, the subject matter of most research was on the whole consistent with the main lines of activities of the institutions with which the degree-seeking workers were affiliated. The same refers to the choice of the tutors and scientific advisers. the authors emphasize the necessity of centralized planning of research in compliance with the list of priority investigations having practical significance and coordination of cooperative studies carried out based on the state bureau of forensic medical expertise (SBFME) and departments of forensic medical expertise of medical universities.

  6. Architectural and structural engineering aspects of protective design for nuclear power plants against terrorist attack

    International Nuclear Information System (INIS)

    Musacchio, J.M.; Rozen, A.

    1987-01-01

    This paper presents the results of several threat studies which have been performed, provides collective data on costs, and discusses, in a general sense, architectural/structural aspects of passive protection design measures which have been developed and utilized at several nuclear power plants. By combining relevant architectural and structural measures in the standard design, it is possible to substantially reduce the vulnerability of nuclear power plants to terrorist attack and the estimated damage to a manageable level with a minimal investment. (orig./HP)

  7. Mrs. Shipley’s Ghost: The Right to Travel and Terrorist Watchlists (by Jeffrey Kahn, University of Michigan Press, 2013

    Directory of Open Access Journals (Sweden)

    Susan Ginsburg

    2014-04-01

    Full Text Available Since 9/11, migration-related security measures, including a growing reliance on watch-lists, have limited the right to travel. Jeffrey Kahn’s book, Mrs. Shipley’s Ghost: The Right to Travel and Terrorist Watchlists, examines the legal and policy questions raised by prohibitions on travel by US citizens. 

  8. Foreign Students in the United States: Policies and Legislation

    National Research Council Canada - National Science Library

    Haddal, Chad C

    2007-01-01

    Five years after the September 11, 2001, terrorist attacks by foreign nationals -- including several terrorists on student visas -- the security concerns over foreign student visas are being weighed...

  9. What’s Good Enough -- Stability or Democracy as a Strategic End in State-Building

    Science.gov (United States)

    2012-06-08

    absentee or ill-governed states. Concerns include creating permissive environments for international terrorists training and organization to trade...which he promoted the spread of democracy as a cure -all for tyranny. She also pointed out the dangers presented to the world from weak and failing

  10. The Islamic State and U.S. Policy

    Science.gov (United States)

    2017-01-18

    for an explicit containment strategy tended to assess the linkage between the Islamic State’s success or staying power in the Middle East and terrorist...by some Shia of the democratic political process to monopolize political power in Iraq. Following Zarqawi’s death at the hands of U.S. forces in June...organization in early 2013. The Islamic State presence grew further as additional Taliban factions broke with the Taliban and declared allegiance to the

  11. Learning from history: The Glasgow Airport terrorist attack.

    Science.gov (United States)

    Crichton, Gillies

    Glasgow Airport was the target of a terrorist attack on 30th June, 2007. Many people within Scotland had come to believe that Scotland was immune from terrorism. This perception was in large part informed by Scotland's experience during the protracted Troubles in Northern Ireland, during which the Provisional Irish Republican Army's mainland bombing campaign focused on targets in England, sparing both Scotland and Wales. While Glasgow Airport did not expect such an attack to take place, meticulous planning, organising and testing of plans had taken place to mitigate the unlikely event of such an attack. The attack stands up as a shining example of robust business continuity management, where the airport reopened for business as usual in less than 24 hours from the time of the attack. Little is known about how the airport handled the situation in conjunction with other responding agencies as people tend to want to focus on high-profile disasters only. Yet countless such incidents are happening worldwide on a daily basis, in which there are excellent learning opportunities, and, taken in the spirit of converting hindsight into foresight, the likelihood of similar incidents could potentially be reduced in the future.

  12. Active Defending and Passive Bystanding Behavior in Bullying: The Role of Personal Characteristics and Perceived Peer Pressure

    Science.gov (United States)

    Pozzoli, Tiziana; Gini, Gianluca

    2010-01-01

    This study examined the role of pro-victim attitudes, personal responsibility, coping responses to observations of bullying, and perceived peer normative pressure in explaining defending the victim and passive bystanding behavior in bullying. A total of 462 Italian early adolescents (mean age = 13.4 years, SD = 9 months) participated in the study.…

  13. Development of Risk Assessment Methodology for State's Nuclear Security Regime

    Energy Technology Data Exchange (ETDEWEB)

    Jang, Sung Soon; Seo, Hyung Min; Lee, Jung Ho; Kwak, Sung Woo [Korea Atomic Energy Research Institute, Daejeon (Korea, Republic of)

    2011-05-15

    Threats of nuclear terrorism are increasing after 9/11 terrorist attack. Treats include nuclear explosive device (NED) made by terrorist groups, radiological damage caused by a sabotage aiming nuclear facilities, and radiological dispersion device (RDD), which is also called 'dirty bomb'. In 9/11, Al Qaeda planed to cause radiological consequences by the crash of a nuclear power plant and the captured airplane. The evidence of a dirty bomb experiment was found in Afganistan by the UK intelligence agency. Thus, the international communities including the IAEA work substantial efforts. The leaders of 47 nations attended the 2010 nuclear security summit hosted by President Obama, while the next global nuclear summit will be held in Seoul, 2012. Most states established and are maintaining state's nuclear security regime because of the increasing threat and the international obligations. However, each state's nuclear security regime is different and depends on the state's environment. The methodology for the assessment of state's nuclear security regime is necessary to design and implement an efficient nuclear security regime, and to figure out weak points. The IAEA's INPRO project suggests a checklist method for State's nuclear security regime. The IAEA is now researching more quantitative methods cooperatively with several countries including Korea. In this abstract, methodologies to evaluate state's nuclear security regime by risk assessment are addressed

  14. Defender of the Faith – hagiography’s topos in the Orthodox Church

    Directory of Open Access Journals (Sweden)

    Michał Dżega

    2014-12-01

    Full Text Available In this article, the author wanted to show the specific for Orthodoxy – topos Her defender. As demonstratedby this topos is universal for any kind of holiness. Starting from the Martyrs ending the Hierarchs and Ascetics, inthe Orthodox Church, there is a never-ending battle for Purity of the Faith in Christ. In this paper author have shown thethree main determinants for the Fight of Faith: 1 Holy Zeal, 2 Holy Pride and 3 Holy Insubordination. To confirm histhesis the author gives some examples from the history of the Eastern Orthodox Church. At the same time author usingthe patristic and liturgical texts.

  15. Thinking aloud during idea generating and planning before written translation: Developmental changes from ages 10 to 12 in expressing and defending opinions.

    Science.gov (United States)

    Davidson, Matt; Berninger, Virginia

    2016-01-01

    This interdisciplinary research, drawing on cognitive psychology and linguistics, extended to middle childhood past research during early childhood or adulthood on thinking aloud prior to written composing. In year 5 of a longitudinal study of typical writing, when cohort 1 was in grade 5 ( n = 110 ten year-olds) and cohort 2 in grade 7 ( n = 97 twelve year-olds), a cross-sectional study was conducted. Children were first asked to think aloud while they generated ideas and second while they planned their essays to express and defend their opinions on a controversial topic in the region of the United States where they lived. Third, they wrote their essays. Their think-aloud protocols were audio-recorded and later transcribed into writing for analysis. The authors developed and applied rating scales for quality of idea generating and planning in the written transcriptions and quality of opinion expression, opinion defense, organization, and content in the essays children wrote after thinking aloud; total number of words in essays was also counted. Seventh graders scored significantly higher than fifth graders on quality of idea generation but not planning, and higher on all variables rated for quality in the written essays including length. Quality of expressing opinions and defending opinions were uncorrelated in grade 5, but moderately correlated in grade 7. Whether idea generating or planning quality explained unique variance in essays varied with coded written essay variables and grade. Educational applications of results for assessment, assessment-instruction links, instruction in social studies, and theory of mind in persuasive essay writing are discussed.

  16. Terrorism, the Internet and the Social Media Advantage: Exploring how terrorist organizations exploit aspects of the internet, social media and how these same platforms could be used to counter-violent extremism.

    Directory of Open Access Journals (Sweden)

    Luke Bertram

    2016-06-01

    Full Text Available The deeply engrained nature of social media in modern life have provided ease of access to information and speed of use within almost every aspect of a person’s life. These same benefit are also available to terrorists and their organizations. The same technology that allows for a globalized world to interact without regard for distance or physical location is also utilized, exploited and adapted to by terrorist organizations to conduct operations, reach candidates and ensure organizational longevity. This article takes the position of observer of these advancements with the end goal of informing counter-violent extremism strategists of the advances that terrorist groups have already made in digital technology; and where the priority of intervention strategies should be aimed. Further, this is intended to guide policy makers to embrace and utilize digital technologies as a mechanism to carry counter-radicalization and counter-violent extremism interventions through the same digital potential and reach the same audiences as terrorist organizations. What appears strongly apparent is that social media will not abate from its intrinsic position graphed into daily life. This means that counter-terrorism, counter-radicalization and counter-violent extremism strategies must take up the same technology in order to effectively discredit and nullify extremist groups – a digital problem needs a digital solution.

  17. Unique and Interactive Effects of Moral Emotions and Moral Disengagement on Bullying and Defending among School Children

    Science.gov (United States)

    Thornberg, Robert; Pozzoli, Tiziana; Gianluca, Gini; Jungert, Tomas

    2015-01-01

    The first aim of the present study was to examine in a single model how moral disengagement and moral emotions were related to bullying and defending behavior among schoolchildren. The second aim was to test whether the two moral dimensions interacted with each other to explain behavior in bullying situations. Data were collected from 561 Swedish…

  18. The Treatment of Images in 11-M Terrorist Attacks. Terrorism and Violence in the Press

    Directory of Open Access Journals (Sweden)

    Dra. Emma Torres Romay

    2006-01-01

    Full Text Available In this paper we want to analyze the pictures publishing in the Spanish and international newspapers before the Madrid terrorist attack, March, 11. With this research we get some ideas about freedom speech limits: the respect of the privacy and, in special, the respect of the pain. At the same time, we´ll remark the importance of the photography in the press and their communication power. For this research we used the March, 11 and 12 newspapers of most important Spanish editors and the digital edition of international press.

  19. Optical and acoustical UAV detection

    Science.gov (United States)

    Christnacher, Frank; Hengy, Sébastien; Laurenzis, Martin; Matwyschuk, Alexis; Naz, Pierre; Schertzer, Stéphane; Schmitt, Gwenael

    2016-10-01

    Recent world events have highlighted that the proliferation of UAVs is bringing with it a new and rapidly increasing threat for national defense and security agencies. Whilst many of the reported UAV incidents seem to indicate that there was no terrorist intent behind them, it is not unreasonable to assume that it may not be long before UAV platforms are regularly employed by terrorists or other criminal organizations. The flight characteristics of many of these mini- and micro-platforms present challenges for current systems which have been optimized over time to defend against the traditional air-breathing airborne platforms. A lot of programs to identify cost-effective measures for the detection, classification, tracking and neutralization have begun in the recent past. In this paper, lSL shows how the performance of a UAV detection and tracking concept based on acousto-optical technology can be powerfully increased through active imaging.

  20. The dilemma of the failed state thesis in post-9/11 world affairs

    Directory of Open Access Journals (Sweden)

    A. Schoeman

    2008-07-01

    Full Text Available The 9/11 terrorist attacks shifted the emphasis of failed states as just a regional humanitarian problem to one that could present a global security threat. In this regard US policymakers, especially, identified failed states as possible terrorist threats. However, this renewed attention to the study of state failure has exposed a number of theoretical weaknesses in this body of literature. The latter could mainly be ascribed to the way in which US policy makers have often used generalised definitions of failed states and then applied it to states that are perceived as threats. Another problem is the fact that government sponsored research institutes and think tanks are operating independently from university academics. This situation has caused theoretical confusion as conditions in failed states are often interpreted differently resulting in the development of a number of opposing theories, definitions and confusing classification models. The body of literature is further accused of endorsing a “Weberian” definition (ideal type of the state against which degrees of “failure” in non-complying states are measured. This article will investigate the extent of these theoretical weaknesses and expose the dangers of following an approach that seem to misinterpret the political realities of developing states (often regarded as failed – this despite having an extensive popular following. It will further focus on possible alternative approaches – or the formulation of ideas that are better suited and relevant to the often unique internal political, social and economic dynamics of unstable states.

  1. 75 FR 27387 - Sentencing Guidelines for United States Courts

    Science.gov (United States)

    2010-05-14

    ...) those cultural ties provided the primary motivation for the defendant's illegal reentry or continued... continuously in the United States from childhood, (B) those cultural ties provided the primary motivation for... acts), makes it unlawful, whether or not acting under color of law, to willfully cause bodily injury to...

  2. 76 FR 24960 - Sentencing Guidelines for United States Courts

    Science.gov (United States)

    2011-05-03

    ..., or attempted to bribe, a law enforcement officer to facilitate the commission of the offense. The new... bribe, a Federal, State, or local law enforcement official in connection with a drug trafficking offense... super-aggravating factors: (i) The defendant-- (I) used another person to purchase, sell, transport, or...

  3. Nuclear theft and sabotage. Priorities for reducing new threats

    International Nuclear Information System (INIS)

    Bunn, Matthew; Bunn, George

    2001-01-01

    The appalling attacks of 11 September 2001 in the United States make clear that the threat of large, well-organized global terrorist groups bent on causing mass destruction is not hypothetical but real. The attackers achieved horrifying destruction with box-cutters. The results could have been even more horrific if the attackers would have had access to, and used, weapons of mass destruction. Ensuring that technologies and materials for weapons of mass destruction - especially weapons-usable nuclear materials, whose acquisition is the most difficult part of making a nuclear bomb - do not fall into the hands of terrorist groups or hostile States must be a central element of the coming global effort to prevent catastrophic terrorism. At the same time, nuclear facilities and materials - along with a wide range of other especially hazardous facilities and materials must be protected from mass-consequence sabotage. Securing these materials and facilities must be a top priority on the international agenda - pursued at every opportunity, at every level of authority, until the job is done. At the same time, the threats against which we must defend have to be fundamentally reconsidered. On 11 September, the threat revealed itself to be bigger, smarter, better organized, and more deadly than the threats most of the world's security systems were designed to defend against. We must ensure that our defensive response is every bit as intelligent and capable as the September attackers. And we may have to rethink some of the approaches to nuclear energy that the world has been pursuing or contemplating. Every reasonable effort must be made to ensure that nuclear materials and facilities are effectively secured. In the past, many scenarios with enormously high consequences were dismissed as too unlikely to contribute much to overall risk - but now many of these probability estimates will have to be revised. A far-reaching new effort is needed to strengthen security for nuclear

  4. Granting Concessions and Paying Ransoms to Terrorists: A Policy Options Analysis of the U.S. Policy on Hostage Recovery

    Science.gov (United States)

    2016-06-01

    businesses like General Motors, which received bailout money from the federal government, and the Catholic Church, which receives tax-exempt status...from gaining independence from France . Other examples of absolute terrorists include the Provisional Irish Republican Army (IRA), Hamas, and al...The conflict began when the IRA, which represented the Catholic minority, felt discriminated against by the Protestant majority, represented by

  5. Feigned Symptoms among Defendants Claiming Psychiatric Problems: Survey of 45 Malingerers

    Directory of Open Access Journals (Sweden)

    Seyed Mehdi Saberi

    2013-03-01

    Full Text Available Objective: In many jurisdictions, psychiatric problems are intended for commutation. Therefore, a forensic psychiatrist has an important role in detection of malingering. While several studies evaluate diagnostic tests, it is less known what symptoms are more likely to be imitated by malingerers.Method: In a prospective study [t1] 45 [t2] malingerers, who were diagnosed according to interviews by two forensic psychiatrists, from defendants [t3] with a judicial order for evaluation of mental status and criminal responsibility during a period of eighteen months were examined in legal medicine center of Tehran.[t4] [t5] Participants were assessed in another interview to determine symptoms. Dichotomous symptoms in felony and misdemeanor groups were analyzed using fisher’s exact test. The level of statistical significance was set at P<0.05. [t6] Results: Thirty-eight malingerers were charged with misdemeanors and seven with felonies. Behavioral symptoms were most frequently faked by 35 participants (77.8%. Participants charged with criminal accusation had a significantly lower mean age (P=0.032 and a higher level of education (P=0.008 than other non-criminal defendants. A statistically significant increase in memory function problems was demonstrated in the misdemeanor group (P=0.040. With regard to dual symptom imitation, statistically significant correlations were observed between thought content and perceptual symptoms (P=0.048 for felonies and mood & affect and thought process symptoms (P=0.034, mood & affect and behavioral symptoms (P=0.000 and cognitive function and behavioral symptoms (P=0.039 for misdemeanors. In general, many simulators attempted to mimic simple symptoms of behavioral disorders. Probably felony offenses need less accurate programming; therefore, their rates are higher in older, less educated participants.Conclusion: This study demonstrated that differences between presenting symptoms among different offenses may not be

  6. Health status and indicators of stress-regulatory systems in children with cardiorheumatologic diseases from the zone of anti-terrorist operation

    Directory of Open Access Journals (Sweden)

    I.S. Lebets

    2018-03-01

    Full Text Available Background. To characterize the health status of children from the antiterrorist operation zone in the east of Ukraine with cardiorheumatologic pathology and to study the indicators of stress-regulating systems was the purpose of our work. Materials and methods. A clinical and instrumental exa­mination was performed in 126 children aged 8–18 years, 92 of them from the anti-terrorist operation zone and 34 immigrant children from the Donetsk and Luhansk regions. The comparison group consisted of 509 children of the same age from the Kharkiv region and Kharkiv. The intensity of stress-realizing systems was determined by the level of cortisol, thiobarbituric acid-active products and diene conjugates in the blood serum, epinephrine and norepinephrine in daily urine. The state of stress-limiting systems was assessed by the content of serotonin, reduced glutathione, activity of glutathione pe­roxidase and superoxide dismutase in the blood and melatonin in daily urine. Results. In the structure of somatic pathology of children and adolescents from zone of military operations in the east of Ukraine, cardiorheumatologic diseases rank se­cond, the first place belongs to diseases of the digestive system. In 34.1 % of children admitted to the institute for the first time, the deterioration of health occurred against the background of psychoemotional stress and lack of conditions for treatment in the main place of residence. In the structure of patients’ complaints, astheno-neurotic ones prevailed, which was significantly more frequent in children of the first group. Also, various psychosomatic disorders, diseases of the digestive system and endocrinopathy were diagnosed most often. The study of stress-regulating systems in children from the anti-terrorist operation zone revealed some differences in the indicators, taking into account the nosology. Thus, patients with cardiovascular patho­logy had an activation of stress-realizing systems, and

  7. Cognitive Architecture and the Epistemic Gap: Defending Physicalism without Phenomenal Concepts

    DEFF Research Database (Denmark)

    Fazekas, Peter

    2011-01-01

    The novel approach presented in this paper accounts for the occurrence of the epistemic gap and defends physicalism against anti-physicalist arguments without relying on so-called phenomenal concepts. Instead of concentrating on conceptual features, the focus is shifted to the special...... characteristics of experiences themselves. To this extent, the account provided is an alternative to the Phenomenal Concept Strategy. It is argued that certain sensory representations, as accessed by higher cognition, lack constituent structure. Unstructured representations could freely exchange their causal...... to pose a serious problem for contemporary physicalism. I conclude that if those concepts which are related to the phenomenal character of conscious experience are special in any way, their characteristics are derivative of and can be accounted for in terms of the cognitive and representational features...

  8. Classroom Norms of Bullying Alter the Degree to Which Children Defend in Response to Their Affective Empathy and Power

    Science.gov (United States)

    Peets, Kätlin; Pöyhönen, Virpi; Juvonen, Jaana; Salmivalli, Christina

    2015-01-01

    This study examined whether the degree to which bullying is normative in the classroom would moderate associations between "intra"- (cognitive and affective empathy, self-efficacy beliefs) and "inter"personal (popularity) factors and defending behavior. Participants were 6,708 third- to fifth-grade children (49% boys;…

  9. Nuclear material control and accounting safeguards in the United States

    International Nuclear Information System (INIS)

    Woltermann, H.A.; Rudy, C.R.; Rakel, D.A.; DeVer, E.A.

    1982-01-01

    Material control and accounting (MC and A) of special nuclear material (SNM) must supplement physical security to protect SNM from unlawful use such as terrorist activities. This article reviews MC and A safeguards of SNM in the United States. The following topics are covered: a brief perspective and history of MC and A safeguards, current MC and A practices, measurement methods for SNM, historical MC and A performance, a description of near-real-time MC and A systems, and conclusions on the status of MC and A in the United States

  10. Armed Groups and Intra State Conflict: A Study on the Egyptian Case

    OpenAIRE

    Ghzlan Mahmoud Abdel Aziz

    2016-01-01

    This case study aims to identify the intrastate conflicts between the nation state and armed groups. Nowadays, most wars weaken states against armed groups. Thus, it is very important to negotiate with such groups in order to reinforce the law for the protection of victims. These armed groups are the cause of conflicts and they are related with many of humanitarian issues that result out of conflicts. In this age of rivalry; terrorists, insurgents, or transnational criminal parties have surfa...

  11. The insurgency business: the Islamic State in Iraq and Syria, 2010-2016

    OpenAIRE

    Pillot, Beau L.

    2017-01-01

    Approved for public release; distribution is unlimited The Islamic State (IS)--also known as Islamic State of Iraq and the Syria (ISIS)--managed to seize large swaths of territory within the sovereign countries of Iraq and Syria from 2011 to 2016. Even though its caliphate has been reduced in size and scope in 2017, the IS's entrepreneurial capability to effectively manage money, manpower, and materiel has enabled it to develop its brand as the deadliest and most widely known terrorist org...

  12. Reducing Mortality from Terrorist Releases of Chemical and Biological Agents: I. Filtration for Ventilation Systems in Commercial Building

    Energy Technology Data Exchange (ETDEWEB)

    Thatcher, Tracy L.; Daisey, Joan M.

    1999-09-01

    There is growing concern about potential terrorist attacks involving releases of chemical and/or biological (CB) agents, such as sarin or anthrax, in and around buildings. For an external release, the CB agent can enter the building through the air intakes of a building's mechanical ventilation system and by infiltration through the building envelope. For an interior release in a single room, the mechanical ventilation system, which often recirculates some fraction of the air within a building, may distribute the released CB agent throughout the building. For both cases, installing building systems that remove chemical and biological agents may be the most effective way to protect building occupants. Filtration systems installed in the heating, ventilating and air-conditioning (HVAC) systems of buildings can significantly reduce exposures of building occupants in the event of a release, whether the release is outdoors or indoors. Reduced exposures can reduce the number of deaths from a terrorist attack. The purpose of this report is to provide information and examples of the design of filtration systems to help building engineers retrofit HVAC systems. The report also provides background information on the physical nature of CB agents and brief overviews of the basic principles of particle and vapor filtration.

  13. What we need to know ...and when. Educating the public about nuclear terrorist risks can help raise levels of security

    International Nuclear Information System (INIS)

    Khripunov, I.

    2006-01-01

    Nuclear power infrastructures could be the target of terrorist acts of theft, sabotage, unauthorized access or other malicious acts given their radiological and chemical content and potential for building weapons. Attacks on its major components, including fuel production, reactors, waste handling, and reprocessing facilities, would lead to serious consequences-even if there is little or no damage to a nuclear power plant itself and other related structures. Public fear of nuclear radiation, in combination with a possibly massive resultant blackout and other aggravating factors, could create significant distress and panic. In other words, successful terrorist attempts to attack nuclear power infrastructure can easily bring about systemic disaster. Systemic risks impact society on a large scale and their effects may spread much further from the original hazardous source. Those risks widely affect systems that society depends on, such as health, transport, environment, telecommunications. Their consequences may be technical, social, environmental, psychological and economic and involve different stakeholders. In this context, however, one important stakeholder has been under-appreciated, under-utilized and somewhat misunderstood: the general public. The nuclear power infrastructure must learn how to efficiently communicate to the public and develop better options for public risk communication that relate to deliberate attacks or accidents. The public is also a challenging stockholder because citizens are deeply split regarding the acceptability and value of nuclear power generation and tend to express their feelings emotionally. However, there is growing recognition that because of skyrocketing oil prices and evidence of the greenhouse effect, nuclear power may be approaching renaissance. Hence, the public must no longer be looked upon only as potential victims or panicked masses but rather as an important contributing factor for better nuclear security throughout

  14. Christian Thomasius, the rule of law, and the separation of Church and State

    Directory of Open Access Journals (Sweden)

    John Christian Laursen

    2018-06-01

    Full Text Available Christian Thomasius was above all a professor of jurisprudence who used his legal skills to resolve all sorts of legal, political, and moral problems. In this article we review two of his writings that contributed to his rearticulation of the relations between religion and politics in early modernity. He used the elements of what later became the concept of the rule of law to defend Denis Veiras, author of the Histoire des Sevarambes, against charges of atheism. He also defended the skeptical jurisprudence of Georg Heber as the best instrument for separating church and state and assigning each their proper roles, and made use of theological skepticism to justify excluding the theologians from politics and limit the interventions of princes into religious matters except in cases where the peace of the state was endangered.

  15. An assessment of the terrorist threat to use a nuclear or radiological device in an attack

    Energy Technology Data Exchange (ETDEWEB)

    Kingshott, B.F. [Grand Valley State University, 275C DeVos Center, 401 West Fulton Street, Grand Rapids, MI 49504 (United States)]. E-mail: kingshob@gvsu.edu

    2006-07-01

    This paper will discuss terrorism from the perspective of a terrorist organisation acquiring nuclear material to build weapons and how security of radiological material world wide will minimise the risk of such devices being used. It will discuss the need to improve security at nuclear waste processing and storage sites and the adequacy of current security. It will also discuss the phenomenon of suicide attacks by the bomb carriers and the role of the media in informing and educating the general public of the consequences should such a device containing nuclear material be detonated. (author)

  16. Case note: ECHR (Animal Defenders International v UK: App no 48876/08: Political Advertising Bans and Freedom of Expression)

    NARCIS (Netherlands)

    Ó Fathaigh, R.

    2013-01-01

    In Animal Defenders International v UK, the 17-judge Grand Chamber of the European Court of Human Rights ruled that the UK’s ban on political advertising on television, as applied to an animal rights organisation, did not violate freedom of expression. The Court divided nine votes to eight, with the

  17. Vivisecting Major: a Victorian gentleman scientist defends animal experimentation, 1876-1885.

    Science.gov (United States)

    Boddice, Rob

    2011-06-01

    Through an investigation of the public, professional, and private life of the Darwinian disciple George John Romanes, this essay seeks a better understanding of the scientific motivations for defending the practice of vivisection at the height of the controversy in late Victorian Britain. Setting aside a historiography that has tended to focus on the arguments of antivivisectionists, it reconstructs the viewpoint of the scientific community through an examination of Romanes's work to help orchestrate the defense of animal experimentation. By embedding his life in three complicatedly overlapping networks-the world of print, interpersonal communications among an increasingly professionalized body of scientific men, and the intimacies of private life-the essay uses Romanes as a lens with which to focus the physiological apprehension of the antivivisection movement. It is a story of reputation, self-interest, and affection.

  18. Involvement of Russian Organized Crime Syndicates, Criminal Elements in the Russian Military, and Regional Terrorist Groups in Narcotics Trafficking in Central Asia, the Caucasus, and Chechnya

    National Research Council Canada - National Science Library

    Curtis, Glenn E

    2002-01-01

    ... (Armenia, Azerbaijan, and Georgia), and in Chechnya. The purpose of the report is to reveal the role of Russian organized crime and Central Asian terrorist organizations in narcotics trafficking in those areas...

  19. Hospital Preparedness to Respond to Biological and Chemical Terrorist Attack

    International Nuclear Information System (INIS)

    Florin, P.

    2007-01-01

    There is a growing concern about the terrorist use of chemical or biological agents against civilian population. A large proportion of hospitals are probably poorly prepared to handle victims of chemical or biological terrorism. At national level, starting with 2008 hospitals will be under the administration and control of local authorities. That is good opportunities for local authorities and public health office to tailor the activity of the hospitals to the real needs in the area of responsibility, and to allocate the suitable budget for them. Commonly hospitals are not fully prepared to respond to massive casualty disaster of any kind, either i their capacity to care for large numbers of victims or in their ability to provide care in coordination with a regional or national incident command structure. Preparedness activities to respond properly to chemical or biological attack including the adequate logistic, the principle of training and drill for the hospital emergency units and medical personal, communication and integration of the hospital team in local and regional civil response team are developed by the author.(author)

  20. Review of Studies of the Economic Impact of the September 11, 2001, Terrorist Attacks on the World Trade Center

    Science.gov (United States)

    2002-05-29

    of the Budget, • New York City Partnership and Chamber of Commerce , Washington, DC 20548 Report Documentation Page Report Date 29MAY2002 Report Type...700R Impact of Terrorist Attacks on the World Trade Center 10 Eight Studies (cont’d) ! New York City Partnership and Chamber of Commerce , Economic...Center 29 Observations Observations The New York City Partnership and Chamber of Commerce study generated the most comprehensive estimates—direct and

  1. Continuity and Change in the Operational Dynamics of the Islamic State

    Directory of Open Access Journals (Sweden)

    James Regens

    2017-03-01

    Full Text Available In this article we estimate the influence of leadership changes on the operational dynamics associated with terrorist attacks conducted by the Islamic State and its predecessors. Because the focus of our research is empirical, the study uses data for 2,131 successful attacks between October 2002 and December 2014 to examine differentials in operational tempo, attack severity, primary tactics employed, and principal targets. The data are aggregated on a monthly basis to estimate the probabilities associated with specific attack sequences in terms of the following primary tactics: (1 firearms, (2 explosives, (3 hostage-taking/kidnapping, and (4 attacks involving combinations of (1, (2, and/or (3. The analysis is placed in a broad historical and strategic context in order to explore two key issues: (1 The effect of leadership change on terrorist group activity and (2 The implications for counterterrorism and counterinsurgency efforts. Our analysis reveals a myriad of conceptual, theoretical, and policy implications.

  2. Austerity Urbanism and Olympic Counter-legacies: Gendering, Defending and Expanding the Urban Commons in East London

    OpenAIRE

    Gillespie, Tom; Hardy, Kate; Watt, Paul

    2018-01-01

    This article reflects on an occupation led by single mothers to contest the destruction of social housing in post-Olympics East London. In the process, it argues for a more gendered theorisation of the urban commons. Drawing on auto-ethnography, participant observation and qualitative interviews, the article argues three central points: First, that the occupation demonstrates the gendered nature of the urban commons and the leadership of women in defending them from enclosure; second that the...

  3. The Utility of the MMPI-2 Malingering Discriminant Function Index in the Detection of Malingering: A Study of Criminal Defendants

    Science.gov (United States)

    Toomey, Joseph A.; Kucharski, L. Thomas; Duncan, Scott

    2009-01-01

    This study examined the utility of the Minnesota Multiphasic Personality Inventory-2's (MMPI-2) malingering discriminant function index (M-DFI), recently developed by Bacchiochi and Bagby, in the detection of malingering in a forensic sample. Criminal defendants were divided into "malingering" and "not malingering" groups using…

  4. War on Terror: Fantasy and Fiction Behind the Mythology of Terrorist Financing

    Directory of Open Access Journals (Sweden)

    El-Fatih A. Abdel Salam

    2009-06-01

    Full Text Available Documentary evidence shows that the series of financial crackdowns initiated since 9/11 have had virtually no impact on terrorism. This is because these efforts are based on a fundamental misconception on how terrorism works. The financial warriors’ predisposition to stereotypes about “Arabs and their money” allowed unsubstantiated rumours–such as Bin Laden’s personal fortune of $300 million–to become established as facts. This study exposes the extent to which Washington policymakers simply transposed the template for the war on drugs on to the war on terror, despite the fact that terrorism is not a profit–driven enterprise. The collateral damage inflicted on organisations like Al-Barakaat, the Somali remittance network, wrongly accused of channeling money to the terrorists, and others are counter-productive as they dent the image of the US in the Muslim world.

  5. Organizational change in the Ministry of Justice and Public Security after the terrorist attacks on 22 July 2011

    OpenAIRE

    Jensen, Susan Bahia

    2016-01-01

    This paper examines changes in the Ministry of Justice and Public Security (MJ) after the terrorist attacks in Norway 22 July 2011 until 2016. The focus is on the MJ’s internal and external formal organization, internal and external procedures, and demographic profile. A main finding is that the MJ has been subject to several small incremental changes, which collectively have resulted in a considerable development of the Ministry’s governance capacity in the field of societal s...

  6. Screening Cargo Containers to Remove a Terrorist Threat

    International Nuclear Information System (INIS)

    Hazi, A

    2005-01-01

    Each year some 48 million cargo containers move between the world's ports. More than 6 million of these enter the U.S., but only about 2 percent are opened and inspected when they arrive at U.S. seaports. The West Coast ports of Los Angeles-Long Beach, Oakland, and Seattle alone process 11,000 containers per day, or about 8 containers per minute. Because of this high traffic volume, U.S. seaports are especially vulnerable to a terrorist attack. Illicit radioactive materials could be hidden in any one of the cargo-filled containers that arrive at U.S. ports. Yet, searching every shipment would be bring legitimate commercial activities to a halt. Improving security at U.S. ports is thus one of the nation's most difficult technical and practical challenges because the systems developed for screening cargo must operate in concert with ongoing seaport activities. Working at this intersection of commerce and national security, Lawrence Livermore researchers are applying their expertise in radiation science and detection to develop improved technologies for detecting hidden radioactive materials. One new technology being designed and tested at the Laboratory is a neutron interrogation system for cargo containers. This system will quickly screen incoming shipments to ensure that nuclear materials such as plutonium and highly enriched uranium (HEU) are not smuggled into the U.S

  7. Who establishes the presence of a mental disorder in defendants : Medicolegal considerations on a European court of human rights case

    NARCIS (Netherlands)

    Kooijmans, Tijs; Meynen, Gerben

    2017-01-01

    Legal insanity is a peculiar element of criminal law, because it brings together two very different disciplines: psychiatry and psychology on the one hand and the law on the other. One of the basic questions regarding evaluations of defendants concerns the question of who should establish “true

  8. Neuropsychological features of indigent murder defendants and death row inmates in relation to homicidal aspects of their crimes.

    Science.gov (United States)

    Hanlon, Robert E; Rubin, Leah H; Jensen, Marie; Daoust, Sarah

    2010-02-01

    Neuropsychological features of 77 indigent murder defendants and death row inmates were examined in relation to criminal variables underlying their homicidal acts. Clinically, the sample was characterized by elevated rates of developmental disorders (49%), personality disorders (54%), Axis I psychiatric disorders (45%), substance abuse (86%), and history of violence (43%). By statute, killing more than one person is an aggravating factor in many jurisdictions that renders a murder defendant eligible for the death penalty. Individuals who committed a single murder were characterized by executive dysfunction, lower intelligence, slower speed of information processing, and a higher frequency of developmental disorders (58%), relative to those charged and/or convicted of killing two or more people, who were characterized by a significantly higher rate of personality disorders (79%) and a lower rate of developmental disorders (34%). Additionally, using the FBI criminal classification system for categorizing homicide by motive, a significant difference in the frequency of psychosis was found among subgroups associated with the following motives: Criminal enterprise; personal cause; and sex. The collective neuropsychological profile of the sample revealed that executive functions were significantly decreased, relative to memory functions, with over half of the sample (55%) demonstrating executive dysfunction.

  9. CSAIO: exchanging experience to better defend the interests of the staff

    CERN Multimedia

    Staff Association

    2014-01-01

    Two representatives of the CERN Staff Association took part in the 15th Annual Conference of Staff Associations of International Organizations (CSAIO), which took place on Thursday 16th and Friday 17th of October in one of the centres of the European Space Agency (ESA) in Frascati (Italy). The CSAIO brings together staff representatives from international organizations based in Europe, as well as institutions of the European Union, in order to promote and defend the interests of their personnel. This allows the CERN Staff Association to follow the evolution of working and social conditions in other organizations. This year, 51 delegates from about 30 organizations travelled to Frascati to attend the conference. Themes addressed at the conference were: Salary adjustment method presentations: European Commission, CERN, European Council, and FICSA (Federation of International Civil Servants’ Association). Performance evaluation presentations: OECD (Organization for Economic Co-operation and...

  10. Narratives from caregivers of children surviving the terrorist attack in Beslan: issues of health, culture, and resilience.

    Science.gov (United States)

    Moscardino, Ughetta; Axia, Giovanna; Scrimin, Sara; Capello, Fabia

    2007-04-01

    Acts of terrorism have an extremely negative impact on the mental health of children and families. The school siege in Beslan, Russia, in 2004, represents a particularly traumatizing event as it was directed specifically at children and involved the entire community. This qualitative study aims to: (a) examine caregiver reactions to the terrorist attack in Beslan as reported 3 months after the traumatic event; (b) determine the extent to which indigenous cultural values and religious belief systems play a role in Beslan's caregivers' reactions to such event; and (c) identify variables that may function as sources of resilience to caregivers. A convenience sample of 17 primary caregivers from Beslan with at least one child who survived the school siege were asked to participate in semi-structured interviews. Narratives generated from the interviews were qualitatively analyzed using a thematic approach; nine major themes were identified. Caregivers' concerns centered on children's physical and psychological well-being, the reorganization of family life, and the disruption of community ties. Cultural values of pride, heroism, courage, and revenge emerged as relevant aspects shaping caregivers' reactions to the traumatic event. Possible sources of resilience included the willingness to return to normality, social support, and the reaffirmation of positive, culturally shared values in face of the perceived threat of future terrorist attacks. Findings are discussed in terms of their theoretical implications on the effects of trauma on children and families as well as interventions with highly traumatized populations in diverse cultural settings.

  11. Long-Term Memory for the Terrorist Attack of September 11: Flashbulb Memories, Event Memories, and the Factors that Influence Their Retention

    Science.gov (United States)

    Hirst, William; Phelps, Elizabeth A.; Buckner, Randy L.; Budson, Andrew E.; Cuc, Alexandru; Gabrieli, John D. E.; Johnson, Marcia K.; Lustig, Cindy; Lyle, Keith B.; Mather, Mara; Meksin, Robert; Mitchell, Karen J.; Ochsner, Kevin N.; Schacter, Daniel L.; Simons, Jon S.; Vaidya, Chandan J.

    2009-01-01

    More than 3,000 individuals from 7 U.S. cities reported on their memories of learning of the terrorist attacks of September 11, as well as details about the attack, 1 week, 11 months, and/or 35 months after the assault. Some studies of flashbulb memories examining long-term retention show slowing in the rate of forgetting after a year, whereas…

  12. Does the Statue of Liberty Still Face out? The Diversion of Foreign Students from the United States to Canada in the Post 9/11 Period

    Science.gov (United States)

    Mueller, Richard E.

    2009-01-01

    The terrorist attacks of September 11, 2001, have resulted in the increased scrutiny of both immigrants and non-immigrants entering the United States. The latter group includes students who enter the country on temporary visas to complete programs of higher education. Depending on the source, the number of foreign students in the United States has…

  13. Meeting blood requirements following terrorist attacks: the Israeli experience.

    Science.gov (United States)

    Shinar, Eilat; Yahalom, Vered; Silverman, Barbara G

    2006-11-01

    Blood services worldwide must be prepared to meet surges in demand for blood components needed by casualties of domestic disasters and acts of terrorism. Israel's National Blood Services, operated by Magen David Adom, has extensive experience in managing blood collections and supply in emergencies. This review summarizes the structure and function of Magen David Adom's national blood program, and relates its experience to other practices that have been reported in the medical literature. Between 2000 and 2005, 7497 victims (85% civilians) were involved in 1645 terrorist attacks in Israel. On-site triage resulted in 967 (13%) deaths at the scene, 615 (8%) with severe injuries, 897 (12%) with moderate injuries and 5018 (67%) with mild injuries. Requests for blood averaged 1.3 blood units and 0.9 components per casualty, or 6.7 units and 4.5 components per severe and moderately injured patient. Public appeals for blood donations were managed centrally to match supply with demand and prevent wastage. This experience illustrates the advantages of a comprehensive program for managing blood operations in emergency situations. A coordinated national program can stabilize in-hospital inventories during routine activities, ensure instant access to precisely defined inventories, facilitate sufficient supply in times of disasters, and minimize outdating and wastage.

  14. The Case for Nation-building: Why and How to Fix Failed States

    Science.gov (United States)

    2011-12-01

    Asia), pandemic disease (AIDS), and ecologi - cal disaster—to say nothing of the occasional global terrorist organization. Time and time again...borders. And piracy along the east coast of Africa has increased over the last two decades since Somalia’s collapse into anarchy . These threats...ignore the problems, allow anarchy to consume failed states, and pay ever higher costs to isolate themselves and repair any damage after the fact. But

  15. Foreign (Terrorist Fighter Estimates: Conceptual and Data Issues

    Directory of Open Access Journals (Sweden)

    Alex P. Schmid

    2015-10-01

    Full Text Available This Policy Brief – a short version of a larger Research Paper to be released by ICCT in late 2015 – focuses on the phenomenon of foreign (terrorist fighters (FTFs as it relates to Syria and Iraq. It concentrates on recruits to jihad and the astonishing growth in numbers from less than 1,000 in 2011 to more than 3,500 in 2012, 8,500+ in 2013, 18,000+ in 2014 to more than 25,000 by fall 2015. By October 2015, nearly 30,000 militants from more than 100 countries had become foreign fighters with the so-called “Islamic State” (IS in Syria and Iraq and other militant groups. This Policy Brief first discusses various definitions of FTFs by disaggregating the “foreign”, “terrorist” and “fighters” elements of FTFs of the UN Security Council definition in resolution 2178 (2014. Subsequently, an attempt is made to bring some structure and order to the widely diverging estimates of the numbers of foreign fighters and their origins, with tables presenting the best available estimates for different sides of the conflict at different moments in time since 2011. UN estimates on foreign fighters are juxtaposed with estimates from other sources. The biggest uncertainty is the ratio of foreign fighters to IS own core manpower. It is likely that at least 40 percent of the fighters of IS are foreigners and many more if Iraqis in Syria are counted as such.

  16. Frequency and Detection of Malingering in Homicide Defendants Undergoing Criminal Responsibility Evaluations Using the Schedule for Nonadaptive and Adaptive Personality

    Directory of Open Access Journals (Sweden)

    Wade C. Myers

    2016-04-01

    Full Text Available This retrospective study reports on (a the prevalence of malingering in a sample of 20 homicide defendants seen in jail settings for criminal responsibility evaluations, and (b the feasibility of the Schedule for Nonadaptive and Adaptive Personality (SNAP for malingering detection in this sample. Based on previous non-clinical simulation research, it was hypothesized that the SNAP validity scales would predict group membership for homicide defendants malingering psychopathology. Those with intellectual disabilities or psychotic disorders were excluded. Diagnostically, nearly one half of the sample had Diagnostic and Statistical Manual of Mental Disorders (4th ed., text rev.; DSM-IV-TR personality and substance use disorders. Point prevalence of malingering was 30%. Using the criterion of any SNAP validity scale score in the clinical range (T ≥ 65, a reasonable sensitivity was demonstrated in the detection of malingering (83%, yet this outcome was hindered by a high false positive rate (64%. This study suggests further exploration of the SNAP for assessing malingering in forensic populations is warranted.

  17. The Use of Force in Modern Counter-Terrorism: International Legal and Political Aspects

    Directory of Open Access Journals (Sweden)

    Elizaveta Sergeevna Gromoglasova

    2016-12-01

    Full Text Available The paper reviews the recent practice of the use of military force in extraterritorial counter-terrorist operations. It argues that nowadays we're witnessing a new stage in the 'war on terror' that's still going on. Although the most of the modern counter-terrorist operations like, for example, the US-led coalition against ISIL in Iraq are being conducted at the request of the affected government, the major risks of expanding and misuse of the right on individual or collective self-defense enshrined in the UN Charter are still present. This can be illustrated by reference to the US air strikes on ISIL in Syria that have been undertaken without consent of Syrian government. But the challenges emerging from 'failed states' and rise of new more radical and militant terrorist movements (ISIL, Ash-Shabaab, Boko Haram and others change the perceptions of legality of extraterritorial counter-terrorist force. The approach which reaffirms responsibility of the state for suppressing terrorist groups operating from within its territory seems to become more and more acceptable. Accordingly, if the state can't suppress terrorist activity it should accept the counter-terrorist intervention on its territory. Nevertheless, jus in bello norms (first of all international humanitarian law remain stringent legal framework for actual use of counter-terrorist military force. The paper concludes that overall political legitimacy of the modern military counter-terrorist operations should be accessed in terms of their humanitarian impact and consequences.

  18. The EU Legislative Framework Against Money Laundering and Terrorist Finance:A Critical Analysis in the Light of Evolving Global Standards

    OpenAIRE

    Gilmore, William; Mitsilegas, Valsamis

    2007-01-01

    This article examines the evolution of the EU anti-money laundering legislative framework (which in recent years has also included measures to counter terrorist finance), by focusing in particular on recent legislation such as the third money laundering Directive and the Regulation on controls of cash entering the EU, both adopted in 2005. The analysis highlights the relationship between these instruments and international initiatives in the field (in particular FATF standards), and addresses...

  19. Formal Criteria for the Concept of Human Flourishing: The First Step in Defending Flourishing as an Ideal Aim of Education

    Science.gov (United States)

    Wolbert, Lynne S.; de Ruyter, Doret J.; Schinkel, Anders

    2015-01-01

    Human flourishing is the topic of an increasing number of books and articles in educational philosophy. Flourishing should be regarded as an ideal aim of education. If this is defended, the first step should be to elucidate what is meant by flourishing, and what exactly the concept entails. Listing formal criteria can facilitate reflection on the…

  20. The State of Integrated Air and Missile Defense Held in Laurel, Maryland on July 14, 2011

    Science.gov (United States)

    2011-07-14

    compromised from servers (-22%) 86% were discovered by a third party (+25%) 96% of breaches were avoidable (+-0) Source 2011 Data Breach Investigations...Foreign Espionage - Terrorists - State Sponsored Attacks UNCLASSIFIED UNCLASSIFIED 11 What commonalities exist? How do breaches occur? Verizon Data ... Breach Study “Breaching organizations still doesn’t typically require highly sophisticated attacks, most victims are a target of opportunity rather

  1. The United States Army Medical Department Journal. April-June 2010

    Science.gov (United States)

    2010-06-01

    against civilians residing in the United States). On the other hand, it is evident that terrorists are willing to both kill their countrymen and to...would have killed most men. By 1836 he was clearly in decline, but his reputation and force of personality were still such that most of the Alamo’s...War. New York, NY: Putnam; 1971:131-170. 26. James M. The Raven. Atlanta, GA: Mockingbird Books, Inc;1977:31. 27. Prucha FP. The Sword of the

  2. The threat of nuclear terrorism: Nuclear weapons or other nuclear explosive devices

    International Nuclear Information System (INIS)

    Maerli, Morten Bremer

    2001-01-01

    Full text: Conventional weaponry and tactics are likely to remain the primary terrorist means for a definitive majority of sub-national groups. No non-state actors have ever deployed or used a nuclear device. However, recent developments in international terrorism may point in the direction of future terrorist uses of weapons of mass destruction, including nuclear devices. Some terrorist groups with a high international profile have showed disturbing interests in acquiring nuclear weapon capabilities. As the 'terrorist nuclear weapon standards' are likely to be lower than the strict requirements for traditional state nuclear weapons, technical barriers should not be considered sufficient to avoid future nuclear terrorist violence. Preventing any extremist group from achieving their goals of large-scale nuclear killing is likely best done by preventing the access to fissile materials through state compliances to rigorous standards of Material Protection, Control and Accountability (MPC and A). (author)

  3. The Right to Health of Persons with Disabilities and the Promotional Role of The Healths Protection Center of the Public Defender's Office in the State of Ceará

    Directory of Open Access Journals (Sweden)

    Cecilia Barroso de Oliveira

    2015-12-01

    Full Text Available The article aims to analysis the performance of Healths Protection Center of the Public Defender's Office in the State of Ceará in the years 2013 and 2014, notably with regard to the protection of rights of persons with disabilities. This is a specialized service in the demands of health, whose performance has been excelling in the protection of the right to health of the hypossufficient. Judicialization of public policy as an instrument of implementation of the fundamental  right  to  health  is  a  topic  widely  discussed  at  the  Academy  who  makes increasingly practical importance, due to its impact on reality and the involvement of various social actors, with different ideas and interests. This article intended to talk regarding the right to health of persons with disabilities, approaching the challenges to be overcome for their effectiveness and evoking questions about social inclusion. For the understanding of the object, the study used bibliographical research and documentary, with use of theoretical references of documents kept in files of public institution and statistical data elaborated by specialized institutes. In order to obtain detailed information and reports from experience, the study used too an interview with interactive and unstructured nature and exploratory bias. In the end, it was concluded that the performance of the Healths Protection Center has excelled in the awareness of the rights and in the solution of the request by means of health benefits, judicial or outside a court. However, it is necessary that there should be greater dialogue between public authorities, institutions and society, to empower the citizenship of persons with disabilities.

  4. Inter-unit Doctoral Program in Nursing of the University of São Paulo: characterization of graduates and theses defended in a decade.

    Science.gov (United States)

    Garbin, Livia Maria; de Castro Sajioro Azevedo, Ana Lídia; da Silva, Leandra Terezinha Roncolato; Laus, Ana Maria; Chaves, Lucieli Dias Pedreschi; Gualda, Dulce Maria Rosa; Rossi, Lídia Aparecida

    2010-01-01

    This descriptive study aimed to characterize the graduates of the Inter-unit Doctoral Program in Nursing of the School of Nursing of the University of São Paulo, who defended their theses in the period 1998-2008, in relation to the location they developed their Masters and their pre and post-doctoral employment, also to investigate the theses defended in relation to the thematic areas and methodological approaches used. Data were collected from the Fenix-USP System and the Lattes Curriculum System. Of the 190 graduates, 178 had curricula available online. Of those, 58.4% performed teaching and research activities when they entered the doctoral program, which were activities mainly developed at Federal Universities (34.8%). This predominance was maintained after the conclusion of the doctoral studies. The thematic areas most studied were Women's Health (20.5%) and Adults/Elderly Health (13.2%). Regarding the methodological approach, 68.4% used qualitative methods. The data evidenced the contributions of this Program to research.

  5. The United States Department of Homeland Security Concept of Regionalization - Will It Survive the Test

    Science.gov (United States)

    2006-09-01

    used to explain in general an individual state’s focus including restrictions on the application of regionalization and the impact of home rule...terrorist attack. Didn’t New York City Mayor Michael Bloomberg exhibit big city egoism over a reduction in homeland security funding? Some...been missed in the turmoil at DHS. Several states have eased legislative restrictions that interfere with regionalization. Indiana for example, has an

  6. Modeling cascading failures in interdependent infrastructures under terrorist attacks

    International Nuclear Information System (INIS)

    Wu, Baichao; Tang, Aiping; Wu, Jie

    2016-01-01

    An attack strength degradation model has been introduced to further capture the interdependencies among infrastructures and model cascading failures across infrastructures when terrorist attacks occur. A medium-sized energy system including oil network and power network is selected for exploring the vulnerabilities from independent networks to interdependent networks, considering the structural vulnerability and the functional vulnerability. Two types of interdependencies among critical infrastructures are involved in this paper: physical interdependencies and geographical interdependencies, shown by tunable parameters based on the probabilities of failures of nodes in the networks. In this paper, a tolerance parameter α is used to evaluation of the overloads of the substations based on power flow redistribution in power transmission systems under the attack. The results of simulation show that the independent networks or interdependent networks will be collapsed when only a small fraction of nodes are attacked under the attack strength degradation model, especially for the interdependent networks. The methodology introduced in this paper with physical interdependencies and geographical interdependencies involved in can be applied to analyze the vulnerability of the interdependent infrastructures further, and provides the insights of vulnerability of interdependent infrastructures to mitigation actions for critical infrastructure protections. - Highlights: • An attack strength degradation model based on the specified locations has been introduced. • Interdependencies considering both physical and geographical have been analyzed. • The structural vulnerability and the functional vulnerability have been considered.

  7. Combined evaluations of competency to stand trial and mental state at the time of the offense: An overlooked methodological consideration?

    Science.gov (United States)

    Kois, Lauren; Wellbeloved-Stone, James M; Chauhan, Preeti; Warren, Janet I

    2017-06-01

    Combined evaluations of competency to stand trial (CST; competency) and mental state at the time of the offense (MSO; sanity) frequently co-occur. However, most research examines the 2 as discrete constructs without considering 4 potential combined evaluation outcomes: competent-sane, incompetent-sane, competent-insane, and incompetent-insane. External validity can be improved if research more closely mirrored practice. It may be incorrect to assume incompetent defendants are similar across CST-only and combined evaluations, and insane defendants are similar across MSO-only and combined evaluations. Using a sample of 2,751 combined evaluations, we examined demographic, clinical, offense, evaluation, and psycholegal characteristics associated with evaluators' combined evaluation opinions. Multinomial regression analyses revealed older defendants were more likely to be opined incompetent-insane. Defendants with psychotic disorders were more often opined insane, regardless of competency status. Affective diagnoses predicted competent-insane opinions. Developmental disorders were closely related to incompetence, regardless of sanity status. Defendants with organic disorders tended to have global psycholegal impairment, in that they were more often opined incompetent-insane, incompetent-sane, or competent-insane, relative to competent-sane. Prior hospitalization predicted competent-insane relative to competent-sane opinions. Defendants not under the influence of a substance during the offense or with no prior convictions were more likely to be opined insane, regardless of competency status. We interpret these findings in light of psycholegal theory and provide recommendations for research and practice. Collectively, results suggest incorporation of combined evaluations into CST and MSO research is an important methodological consideration not to be overlooked. (PsycINFO Database Record (c) 2017 APA, all rights reserved).

  8. Education to defend professional values in the new corporate age.

    Science.gov (United States)

    Relman, A S

    1998-12-01

    The corporate transformation of medicine raises questions about the basic purposes and values of the profession and the physician's social role that have not been adequately considered in medical school and residency curricula. Medical schools and graduate programs need to make students and trainees more aware of the conflict between traditional professional values and the imperatives of the market, so they will be better prepared to defend these values in the new business climate. Otherwise, medical schools and teaching hospitals could simply become trade schools, turning out sophisticated technicians, future entrepreneurs, and managers. As a starting point for educational reform, the author suggests that students (1) learn the social and political history of the medical profession of the United States over the past 200 years; (2) be introduced to the economic dimensions of health care--where the money comes from and how it is spent; (3) learn the history of health maintenance organizations, and understand the different forms of managed care and how they work; (4) become familiar with the health care reforms proposed by the Clinton Administration in the early 1990s, and understand why they were defeated and what has happened to health care reform since then; (5) examine the conflict between the culture of business managers and that of practicing physicians, and consider the recent efforts to achieve "quality control" as a balance to the emphasis on price; (6) be challenged to think about the important ethical, legal, and professional issues raised by the industrialization of health care; and (7) consider the political and professional options that might preserve the most important principles of medical professionalism while still addressing the social objectives of cost control, community service, and universal access. The author concludes that to prevent medicine from becoming merely a technologic business, the medical profession will have to become more actively

  9. A media discursive genre: The defender of the viewer

    Directory of Open Access Journals (Sweden)

    Víctor Alfonso Barragán Escarpeta

    2016-08-01

    Full Text Available The following article presents the progress of the research called “A media discursive genre: The defender of the viewer” and has the objective to characterize this particular genre. This research is based on the ideas of Bajtin (1982, Carranza (2012 as well as Social-Communicative Perspective of Charaudeau (2012 about genres, in the way that they give theoretical and methodological elements to the establishment of this characterization, and, in the same way, for being perspectives that emphasize on the social component of texts, let us to understand aspects such as relations between participants and the influence of these in discourse. To do this, our methodology analyzes two different programs of public television channels through making transcripts and images, selected from the establishment of the following categories: the field of social practice, the overall situation of communication (SGC and the specific situation of communication (SEC; also discursive properties and the formal properties; flexible frameworks and the subject agent. In this way, this article makes a practical-theoretical exercise of an inductive nature which rescues how categories of the communicative situation and the analysis of elements such as supports allow a greater deepening of different dimensions in the media discursive practices (social relation, themes, etc. as well as observing to what extent we are talking about discursive genders and sub genders in daily life.

  10. Responding to Terrorist Incidents in Your Community: Flammable-Liquid Fire Fighting Techniques for Municipal and Rural Firefighters

    Energy Technology Data Exchange (ETDEWEB)

    Denise Baclawski

    2010-03-08

    The University of Nevada, Reno Fire Science Academy (FSA) applied for grant funding to develop and deliver programs for municipal, rural, and volunteer firefighters. The FSA specializes in preparing responders for a variety of emergency events, including flammable liquid fires resulting from accidents, intentional acts, or natural disasters. Live fire training on full scale burnable props is the hallmark of FSA training, allowing responders to practice critical skills in a realistic, yet safe environment. Unfortunately, flammable liquid live fire training is often not accessible to municipal, rural, or volunteer firefighters due to limited department training budgets, even though most department personnel will be exposed to flammable liquid fire incidents during the course of their careers. In response to this training need, the FSA developed a course during the first year of the grant (Year One), Responding to Terrorist Incidents in Your Community: Flammable-Liquid Fire Fighting Techniques for Municipal and Rural Firefighters. During the three years of the grant, a total of 2,029 emergency responders received this training. In Year Three, two new courses, a train-the-trainer for Responding to Terrorist Incidents in Your Community and Management of Large-Scale Disasters for Public Officials were developed and pilot tested during the Real-World Disaster Management Conference held at the FSA in June of 2007. Two research projects were conducted during Years Two and Three. The first, conducted over a two year period, evaluated student surveys regarding the value of the flammable liquids training received. The second was a needs assessment conducted for rural Nevada. Both projects provided important feedback and a basis for curricula development and improvements.

  11. Construction of War Discourse on International News Agencies: Case Study Terrorist attacks November 13th 2015

    Directory of Open Access Journals (Sweden)

    Ángel TORRES-TOUKOUMIDIS

    2017-01-01

    Full Text Available This study analyzes warmongering rhetoric presented by international agencies Reuters, Al Arabiya, Al Jazeera and Associated Press (AP of the information related to the terrorist attacks in Paris on November 13th, 2015 for 15 days after the event. We have started from a quantitative and qualitative analysis of 550 information units using the software MAXQDA (v. 11.0.11. Subsequently, the semantic criteria of media discourse: functionality, significance and direction of the goal was applied on the selected sample. The results demonstrate the prevailing demonization of Islam, the exaltation of fear and panic in the discursive construction and it highlighted the spectacle of the information as a communicative strategy on the rhetorical guidance.

  12. The adaptive safety analysis and monitoring system

    Science.gov (United States)

    Tu, Haiying; Allanach, Jeffrey; Singh, Satnam; Pattipati, Krishna R.; Willett, Peter

    2004-09-01

    The Adaptive Safety Analysis and Monitoring (ASAM) system is a hybrid model-based software tool for assisting intelligence analysts to identify terrorist threats, to predict possible evolution of the terrorist activities, and to suggest strategies for countering terrorism. The ASAM system provides a distributed processing structure for gathering, sharing, understanding, and using information to assess and predict terrorist network states. In combination with counter-terrorist network models, it can also suggest feasible actions to inhibit potential terrorist threats. In this paper, we will introduce the architecture of the ASAM system, and discuss the hybrid modeling approach embedded in it, viz., Hidden Markov Models (HMMs) to detect and provide soft evidence on the states of terrorist network nodes based on partial and imperfect observations, and Bayesian networks (BNs) to integrate soft evidence from multiple HMMs. The functionality of the ASAM system is illustrated by way of application to the Indian Airlines Hijacking, as modeled from open sources.

  13. Ask the Experts: How Can New Students Defend Behavior Analysis from Misunderstandings?

    Science.gov (United States)

    Becirevic, Amel

    2014-10-01

    The success of behavior analysis as a field depends on the successes of its students, researchers, practitioners, and advocates. A new generation of graduate students will ultimately speak on the behalf of the field. In order to further promote the field, students must not only learn about what behavior analysis is, but also about what behavior analysis is not. We must prepare ourselves to adequately defend behavior analysis from those who disseminate misperceptions and misunderstandings. As such, an electronic survey designed to glean some information on how behavior analysts would respond to various inaccuracies or misunderstandings of behavior analysis was distributed through behavior-analytic listservs and social media websites. Findings show that the majority of respondents indicate that any graduate student ought to correct the misunderstandings about the field. What do seasoned behavior analysts have to say about the majority opinion about the responsibilities of graduate students and what recommendations do they have for new graduate students who come across misunderstandings about behavior analysis?

  14. State of the art on defenses against wormhole attacks in wireless sensor networks

    DEFF Research Database (Denmark)

    Prasad, Neeli R.; Giannetsos, T.; Dimitriou, T.

    2009-01-01

    describe the wormhole attack, a severe routing attack against sensor networks that is particularly challenging to defend against. We detail its characteristics and study its effects on the successful operation of a sensor network. We present state-of-the-art research for addressing wormhole related...... the possibility of using more sophisticated methods, like intrusion detection systems, to achieve a more complete and autonomic defense mechanism against wormhole attackers. We present our work on intrusion detection and introduce a lightweight IDS framework, called LIDeA, designed for wireless sensor networks....... LIDeA is based on a distributed architecture, in which nodes overhear their neighboring nodes and collaborate with each other in order to successfully detect an intrusion. We conclude by highlighting how such a system can be used for defending against wormhole attackers....

  15. Developing Health-Based Pre-Planning Clearance Goals for Airport Remediation Following a Chemical Terrorist Attack: Decision Criteria for Multipathway Exposure Routes

    OpenAIRE

    Watson, Annetta; Dolislager, Fredrick; Hall, Linda; Raber, Ellen; Hauschild, Veronique D.; Love, Adam H.

    2011-01-01

    In the event of a chemical terrorist attack on a transportation hub, post-event remediation and restoration activities necessary to attain unrestricted facility re-use and re-entry could require hours to multiple days. While timeframes are dependent on numerous variables, a primary controlling factor is the level of pre-planning and decision-making completed prior to chemical release. What follows is the second of a two-part analysis identifying key considerations, critical information and de...

  16. The annotative review of researches for applicants of the Doctor and the Candidate of the history specialities which were defended in the Oles Honchar Dnipropetrovsk National University in 2014

    Directory of Open Access Journals (Sweden)

    Boiko, O. V.

    2016-04-01

    Full Text Available A subject and maintenance of dissertations for the degree of Doctor and the Candidate of historical sciences which were defended in the specialized scientific advice D 08.051.14 in the Oles Honchar Dnipropetrovsk National University in 2014 is considered. For a year 4 dissertations for the degree of Doctor (specialty 07.00.01 – «Нistory of Ukraine» and 3 dissertations for the degree of the Candidate (specialty 07.00.01 – «Нistory of Ukraine» – 1 work, 07.00.06 – «Нistoriography, a source study and special historical disciplines» – 2 works were defended. 6 dissertations (besides thesis defended by A. V. Bortnikova were ratified by the Department of education and science of Ukraine. It is given the following information on every research work: theme, specialty, place (department of work implementation, date of defense of dissertation, scientific consultant (for doctoral thesis or leader (for candidate’s thesis, his scientific degree and rank, place of work, data about official opponents. Considerable attention is spared to the compressed review of the personal achievements of authors especially to scientific novelty of their researches.

  17. Fears of Children in the United States: An Examination of the American Fear Survey Schedule with 20 New Contemporary Fear Items

    Science.gov (United States)

    Burnham, Joy J.

    2005-01-01

    Twenty contemporary fears (e.g., terrorist attacks, drive-by shootings, having to fight in a war) were added to E. Gullone and N. J. King's (1992) Australian Fear Survey Schedule for Children-II for use in the United States. The revised survey, the American Fear Survey Schedule for Children (J. J. Burnham, 1995), was investigated. The component…

  18. Defendant's or convict's competency to stand trial - forensic psychiatric evaluation.

    Science.gov (United States)

    Cynkier, Przemysław N

    2017-01-01

    The purpose of this paper was to draw attention to particularly important aspects of pronouncing forensic psychiatric judgment regarding the accused or convicted individuals' competency to stand trial. The level of a person's mental capacity should be established using a structured psychiatric interview concerning a variety of aspects of a trial. Emphasis should be placed on evaluating the defendant's consciousness of the charges, knowledge of the potential punishment, ability to make significant decisions and be engaged in defense, knowledge about the role that particular people present in the courtroom play, understanding of the meaning of the evidence gathered in the case, the risk of aggression. The analysis should take into account the specificity of the mental disorder, the influence of proceedings on the course of disorder, as well as the presence of reactive disorders. Using testing tools by the expert can facilitate the process of evaluation to a certain degree. Forensic psychiatric evaluations can give rise to difficulties for the experts, what with the changing legal regulations and their interpretations. It would be justified to develop the standards of evaluation in this kind of cases, which would on the one hand apply to experts but which would also be respected by the judicial organ.

  19. Ethical Frameworks in Public Health Decision-Making: Defending a Value-Based and Pluralist Approach.

    Science.gov (United States)

    Grill, Kalle; Dawson, Angus

    2017-12-01

    A number of ethical frameworks have been proposed to support decision-making in public health and the evaluation of public health policy and practice. This is encouraging, since ethical considerations are of paramount importance in health policy. However, these frameworks have various deficiencies, in part because they incorporate substantial ethical positions. In this article, we discuss and criticise a framework developed by James Childress and Ruth Bernheim, which we consider to be the state of the art in the field. Their framework distinguishes aims, such as the promotion of public health, from constraints on the pursuit of those aims, such as the requirement to avoid limitations to liberty, or the requirement to be impartial. We show how this structure creates both theoretical and practical problems. We then go on to present and defend a more practical framework, one that is neutral in avoiding precommitment to particular values and how they ought to be weighted. We believe ethics is at the very heart of such weightings and our framework is developed to reflect this belief. It is therefore both pluralist and value-based. We compare our new framework to Childress and Bernheim's and outline its advantages. It is justified by its impetus to consider a wide range of alternatives and its tendency to direct decisions towards the best alternatives, as well as by the information provided by the ranking of alternatives and transparent explication of the judgements that motivate this ranking. The new framework presented should be useful to decision-makers in public health, as well as being a means to stimulate further reflection on the role of ethics in public health.

  20. Developing Health-Based Pre-Planning Clearance Goals for Airport Remediation Following a Chemical Terrorist Attack: Decision Criteria for Multipathway Exposure Routes

    Science.gov (United States)

    Watson, Annetta; Dolislager, Fredrick; Hall, Linda; Raber, Ellen; Hauschild, Veronique D.; Love, Adam H.

    2011-01-01

    In the event of a chemical terrorist attack on a transportation hub, post-event remediation and restoration activities necessary to attain unrestricted facility re-use and re-entry could require hours to multiple days. While timeframes are dependent on numerous variables, a primary controlling factor is the level of pre-planning and decision-making completed prior to chemical release. What follows is the second of a two-part analysis identifying key considerations, critical information and decision criteria to facilitate post-attack and post-decontamination consequence management activities. Decision criteria analysis presented here provides first-time, open-literature documentation of multi-pathway, health-based remediation exposure guidelines for selected toxic industrial compounds, chemical warfare agents, and agent degradation products for pre-planning application in anticipation of a chemical terrorist attack. Guideline values are provided for inhalation and direct ocular vapor exposure routes as well as percutaneous vapor, surface contact, and ingestion. Target populations include various employees as well as transit passengers. This work has been performed as a national case study conducted in partnership with the Los Angeles International Airport and The Bradley International Terminal. All recommended guidelines have been selected for consistency with airport scenario release parameters of a one-time, short-duration, finite airborne release from a single source followed by compound-specific decontamination. PMID:21399674

  1. Influencing the Behavior of General Chang Wanquan to Protect United States Space Assets

    Science.gov (United States)

    2009-04-01

    China. The terrorist group, East Turkistan Islamic Movement, is active in this portion of the China, and since the terrorist attacks in the US on...Washington, D.C: White House], 2006. 31 AU/ACSC/BERGREN/AY09 Weber, Max. The Religion of China: Confucianism and Taoism . Edited and translated by Hans H

  2. Stabilisation and humanitarian access in a collapsed state: the Somali case.

    Science.gov (United States)

    Menkhaus, Ken

    2010-10-01

    Somalia today is the site of three major threats: the world's worst humanitarian crisis; the longest-running instance of complete state collapse; and a robust jihadist movement with links to Al-Qa'ida. External state-building, counter-terrorism and humanitarian policies responding to these threats have worked at cross-purposes. State-building efforts that insist humanitarian relief be channelled through the nascent state in order to build its legitimacy and capacity undermine humanitarian neutrality when the state is a party to a civil war. Counter-terrorism policies that seek to ensure that no aid benefits terrorist groups have the net effect of criminalising relief operations in countries where poor security precludes effective accountability. This paper argues that tensions between stabilisation and humanitarian goals in contemporary Somalia reflect a long history of politicisation of humanitarian operations in the country. © 2010 The Author(s). Journal compilation © Overseas Development Institute, 2010.

  3. "The Islamic State Of Iraq And The Levant" (ISIL In The System Of Threats To The National Security Of Russia

    Directory of Open Access Journals (Sweden)

    Pavel V. Agapov

    2014-09-01

    Full Text Available In the present work authors analyze political, economic, military and many other aspects of the "Islamic State of Iraq and Levant" activity as essential factor of the destabilization in the region of the Middle East. Authors investigate destructive consequences of this terrorist religious group's positions strengthening for the national security of the Russian Federation and border states. Authors note that actions in Syria and Iraq have indirect, but transnational effect, pose threat to the interests of the national security of Russia, especially including one, conducted in Crimea with the use of Islamic radicals for this purpose, who are on the peninsula and territory of the Ukraine. In the present article authors note that every year in the process of the population's psychological fatigue strengthening, new losses among the military personnel and the intelligence services staff and also death of peaceful citizens, their positions will only amplify. "Defeatism" will become a powerful political force. Problem of the international legal aspect of the counteraction to the threat from the actions of foreign fighters-terrorists who are hired or accepted with ISIL, al-Nusra Front and other groups and organizations of the terrorist orientation is connected with the implementation of the UN Security Council Resolution 2178 (2014 made on September 24, 2014. It’s main objective – development of the nonviolent ways of the conflicts prevention and settlement for the purposes of the radicalization to the level generating terrorism risk degree decrease. In the conclusion authors argument that it is especially actual for the Russian regions, which is extremely vulnerable to extremism (North Caucasus, Volga Region.

  4. Threat Assessment of Potential Terrorist Attacks to the Transport Infrastructure

    Directory of Open Access Journals (Sweden)

    Gabriel Nowacki

    2014-06-01

    Full Text Available The paper presents threat assessment of potential terrorist attacks to the transport infrastructure. The range of transportation infrastructure has spread and includes railway, inland waterways, road, maritime, air, intermodal transport infrastructure and intelligent transport systems (ITS. ITS service is the provision of an ITS application through a well-defined organisational and operational framework with the aim of contributing to the user safety, efficiency, comfort and/or to facilitate or support transport and travel operations. Terrorism means acts of violence committed by groups that view themselves as victimized by some notable historical wrong. Although these groups have no formal connection with governments, they usually have the financial and moral backing of sympathetic governments. Typically, they stage unexpected attacks on civilian targets, including transport infrastructure, with the aim of sowing fear and confusion. Based on the analyses, transportation infrastructure is potentially threatened with terrorism attacks, especially road and rail infrastructure (about 23 %, and to a smaller degree the maritime and air transport infrastructure (about 2 %. There were 90,3% of incidents involve land transport (74,5% – vehicles, 9,5% – buses, 6,3% - rail covered the 41-year period 1967-2007 in the USA. Legal steps to fight terrorism have been taken on the international level, furthermore, some institutions have been established for this purpose.

  5. The three constituencies of the state: why the state has lost unifying energy.

    Science.gov (United States)

    King, Desmond; Le Galès, Patrick

    2017-11-01

    We address resurgent populism by examining structural processes of state transformation in the UK, the US and France. Scholars stress the 'unifying energy of the state', a set of institutions and policies capable of limiting inequalities and defending legal regimes. One characteristic of modern Western statehood were packages of policies designed to integrate social groups and territories in part by ensuring common standards of provision and social citizenship across the nation state. This echoes James Scott's critical analysis of the modernist project of the state (1998). This 'unifying energy' had different origins including nationalist movements, combatting external influence or powers, war, and preparing citizens for the rigours of industrialization. Overcoming class differences and territorial differences (including cultural, social and economic differences) was a major source of mobilization to feed this 'unifying energy of the state' in France, Italy or Spain for instance. Political and cultural identities are related in significant part to respective nation states. We argue that this 'unifying energy' was an essential component of statehood in Europe and in the US. It is now largely lost. We explain why and the significance of its displacement. © London School of Economics and Political Science 2017.

  6. Latin America: Terrorism Issues

    National Research Council Canada - National Science Library

    Sullivan, Mark P

    2005-01-01

    .... In its annual report on worldwide terrorism, the State Department highlights threats in Colombia, Peru, and the tri-border region of Argentina, Brazil, and Paraguay. The State Department also has designated four terrorist groups (three in Colombia and one in Peru) as Foreign Terrorist Organizations, and Cuba has been listed as a state sponsor of terrorism since 1982.

  7. Phillips v Eyre and its application to multi-state torts in Nigeria: A ...

    African Journals Online (AJOL)

    What determines the jurisdiction of a court is different from what informs which law is applicable to a matter. In multi-state tort actions, it is a general principle of traditional English common law that a forum court applies the forum law to such actions provided 'double liability' of the defendant is proved. This is what is known as ...

  8. The Dilemma of Combating Terrorism in Democratizing States: A Case Study of the Republic of Uganda

    Science.gov (United States)

    2015-03-01

    systems, the Uganda Police Force underwent through reforms and created a new Directorate of Counter-Terrorism (CT) with Aviation, Tourism , and Crime...Paul Wilkinson,113. 178 Edward Anyoli and Farooq Kasule, “July 2010 Bomb Suspects Face Trail ,” New Vision Newspaper, November 11th 2011. 66...been noted in the way suspected terrorist trails have been handled in these 180 U.S. Department of State Bureau of Counterterrorism, “Chapter 2. Country

  9. Toxicology of organophosphorus compounds in view of an increasing terrorist threat.

    Science.gov (United States)

    Worek, Franz; Wille, Timo; Koller, Marianne; Thiermann, Horst

    2016-09-01

    The implementation of the Chemical Weapon Convention (CWC), prohibiting the development, production, storage and use of chemical weapons by 192 nations and the ban of highly toxic OP pesticides, especially class I pesticides according to the WHO classification, by many countries constitutes a great success of the international community. However, the increased interest of terrorist groups in toxic chemicals and chemical warfare agents presents new challenges to our societies. Almost seven decades of research on organophosphorus compound (OP) toxicology was mainly focused on a small number of OP nerve agents despite the fact that a huge number of OP analogues, many of these agents having comparable toxicity to classical nerve agents, were synthesized and published. Only limited physicochemical, toxicological and medical information on nerve agent analogues is available in the open literature. This implies potential gaps of our capabilities to detect, to decontaminate and to treat patients if nerve agent analogues are disseminated and may result in inadequate effectiveness of newly developed countermeasures. In summary, our societies may face new, up to now disregarded, threats by toxic OP which calls for increased awareness and appropriate preparedness of military and civilian CBRN defense, a broader approach for new physical and medical countermeasures and an integrated system of effective detection, decontamination, physical protection and treatment.

  10. 75 FR 57159 - Continuation of the National Emergency With Respect to Persons Who Commit, Threaten to Commit, or...

    Science.gov (United States)

    2010-09-20

    ... economy of the United States constituted by the grave acts of terrorism and threats of terrorism committed by foreign terrorists, including the terrorist attacks on September 11, 2001, in New York and... security, foreign policy, and economy of the United States, the national emergency declared on September 23...

  11. 76 FR 58999 - Continuation of the National Emergency With Respect to Persons Who Commit, Threaten To Commit, Or...

    Science.gov (United States)

    2011-09-22

    ... economy of the United States constituted by the grave acts of terrorism and threats of terrorism committed by foreign terrorists, including the terrorist attacks on September 11, 2001, in New York and... security, foreign policy, and economy of the United States, the national emergency declared on September 23...

  12. How do defendants choose their trial court? Evidence for a heuristic processing account

    Directory of Open Access Journals (Sweden)

    Mandeep K. Dhami

    2013-09-01

    Full Text Available In jurisdictions with two or more tiers of criminal courts, some defendants can choose the type of trial court to be tried in. This may involve a trade-off between the probability of acquittal/conviction and the estimated severity of sentence if convicted. For instance, in England and Wales, the lower courts have a higher conviction rate but limited sentencing powers, whereas the higher courts have a higher acquittal rate but greater sentencing powers. We examined 255 offenders' choice of trial court type using a hypothetical scenario where innocence and guilt was manipulated. Participants' choices were better predicted by a lexicographic than utility maximization model. A greater proportion of ``guilty'' participants chose the lower court compared to their ``innocent'' counterparts, and estimated sentence length was more important to the former than latter group. The present findings provide further support for heuristic decision-making in the criminal justice domain, and have implications for legal policy-making.

  13. A novel fiber-optical vibration defending system with on-line intelligent identification function

    Science.gov (United States)

    Wu, Huijuan; Xie, Xin; Li, Hanyu; Li, Xiaoyu; Wu, Yu; Gong, Yuan; Rao, Yunjiang

    2013-09-01

    Capacity of the sensor network is always a bottleneck problem for the novel FBG-based quasi-distributed fiberoptical defending system. In this paper, a highly sensitive sensing network with FBG vibration sensors is presented to relieve stress of the capacity and the system cost. However, higher sensitivity may cause higher Nuisance Alarm Rates (NARs) in practical uses. It is necessary to further classify the intrusion pattern or threat level and determine the validity of an unexpected event. Then an intelligent identification method is proposed by extracting the statistical features of the vibration signals in the time domain, and inputting them into a 3-layer Back-Propagation(BP) Artificial Neural Network to classify the events of interest. Experiments of both simulation and field tests are carried out to validate its effectiveness. The results show the recognition rate can be achieved up to 100% for the simulation signals and as high as 96.03% in the real tests.

  14. Cyber Attacks During the War on Terrorism: A Predictive Analysis

    National Research Council Canada - National Science Library

    Vatis, Michael

    2001-01-01

    .... Just as the terrorist attacks of September 11, 2001 defied what many thought possible, cyber attacks could escalate in response to United States and allied retaliatory measures against the terrorists...

  15. Self-knowledge and attribution of mental states in Theory of Mind

    Directory of Open Access Journals (Sweden)

    Skidelsky, Liza

    2011-05-01

    Full Text Available Many philosophers consider that self-knowledge reflects the particularity that we can know what we think, believe, desire, in a different way in which we know the mental states of other people. This is the claim of an asymmetry between first and third person. Several approaches han been offered in the epistemological literature in order to account for this asymmetry. Nonetheless, unlike the expected compatibility between adjacent fields, the literature related to the attribution and self-attribution of mental states or, in general, what is called Theory of Mind, does not seem either to preserve this asymmetry or the attempt to preserve it undermines the fundamental role of the different Theory of Mind proposals. This paper will show this in two parts. Firstly, it addresses how the asymmetry thesis han been defended in the epistemological literature. The aim of this section is to offer a geography of the different approaches. Secondly, two proposals in Theory of Mind, the theory theory and simulation theory, will be evaluated in order to show why they do not account for the asymmetry thesis, and some of the consequences that would be gather from the attempt to conciliate these Theory of Mind proposals with the epistemological approaches that defend the asymmetry thesis will be analized.

  16. Defending the F-22

    National Research Council Canada - National Science Library

    Day, John

    1998-01-01

    The purpose of this paper is to establish the critical need for the continued development and introduction of the F-22 Raptor as the air superiority fighter for the joint forces of the United States...

  17. THE FAILURE OD THE INTELLIGENCE COMMUNITY OF THE UNITED STATES ON SEPTEMBER 11. SYSTEMIC OR HUMAN FLAWS?

    Directory of Open Access Journals (Sweden)

    FRANKLIN BARRIENTOS RAMÍREZ

    2018-01-01

    Full Text Available The terrorist attacks of September 11th, put the blame on to the US’ intelligence community, and mainly the CIA, FBI and the NSA, because they failed to set an early warning alert of the incoming terrorist threat. The Senate’s Intelligence Committee and the Intelligence Permanent Committee of the House of Representatives were the first to create an investigation commission to analyze the causes that drove to the 911 attacks. Later on, and due to the citizen’s pressure, President Bush installed the National Investigation Commission for the Terrorist Attacks to the US. Beyond of the criticisms both commission received, it can be said that they perform an honest and accurate work over the real causes of the terrorist attacks. Among the aws and mistakes of the security and intelligence agencies, organizational, cultural, systemic and human flaws were detected.

  18. U.S. Policy Towards Cuba as a Two Level Game or: Defending Executive Policy Discretion in the Face of Domestic Pressure

    Science.gov (United States)

    2008-03-01

    Foreign Policy Agenda,” International Security 8:1 (1983): 113-128. Dominguez, Jorge I. “ Taming the Cuban Shrew ,” Foreign Policy 10 (1973): 94-116...CUBA AS A TWO LEVEL GAME OR: DEFENDING EXECUTIVE POLICY DISCRETION IN THE FACE OF DOMESTIC PRESSURE by Kevin G. Werry, JR. March 2008...No. 0704-0188 Public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for

  19. Weaponizing the Final Frontier: The United States and the New Space Race

    Science.gov (United States)

    2017-06-09

    prepare to defend these systems from attack.41 The next logical step is the development and execution of this philosophy to secure national interests...fourth argument impacting the weaponization of space references is the question of morality . In the article, Moral and Ethical Decisions Regarding Space...Warfare, Col (now General) John Hyten and Dr. Robert Uy describe the moral and ethical considerations to evaluate as the United States shapes

  20. Conserving the Connections: A Nationwide Inventory of State-Based Habitat Connectivity Analysis

    OpenAIRE

    Feinberg, Jesse

    2007-01-01

    Habitat fragmentation is among the most serious threats to species and biological diversity. Highways can divide wildlife habitat into smaller patches, reducing or prohibiting necessary wildlife movement between core habitat areas for foraging, mating, and other life functions. Defenders of Wildlife reviewed all 50 states to identify those that are working to address habitat connectivity in the context of transportation planning. The goal of these plans is to facilitate interagency c...