首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 343 毫秒
1.
Terrorism is frequently argued to be the product of poverty and poor levels of economic development in countries. Examining the distribution of terrorist attacks and casualties due to terrorism across the states of India, this article demonstrates that the phenomenon of terrorism is not a clear product of poor economic development but rather exacerbated by unresolved and poorly managed political conflict. Poorer states in India are not necessarily more prone to terrorism, but states that have outstanding and poorly addressed political disputes do experience a disproportionately high level of terrorist activity. This study examines six sources of political conflict that contribute to terrorism in India—separatist movements, ethnic conflict, communal conflict, the presence of scheduled castes and tribes, high population growth, and the phenomenon of stateless areas—and makes several observations on the successes and failures of Indian counterterrorism policy.  相似文献   

2.
Abstract

Europe has been the preferred operational area for Middle Eastern terrorist groups—some 418 attacks from 1980–1989. Unlike European Marxist revolutionary or separatist terrorist groups, the Middle Eastern groups present Europe with a regional security problem. The most dangerous element in this Middle Eastern terrorist threat is the state‐sponsored activities of Iran, Libya, Syria, and Iraq. These countries provided the fuel for a decade of Middle Eastern terrorist bloodshed in Europe. Given the problems of solving the various political conflicts and feuds in the Middle East and the continuing attractiveness of Europe as a substitute battlefield for Middle Eastern terrorist elements, the threat of Middle Eastern terrorist activity in Europe should continue into the 1990s.  相似文献   

3.

One of the distinguishing features of international terrorism the past fifteen years has been the resurgence and proliferation of terrorist groups motivated by a religious imperative. Such groups are far more lethal than their secular counterparts, regarding violence as a divine duty or sacramental act conveyed by sacred text and imparted by clerical authority. Moreover, religious terrorism is not restricted to Islamic terrorist groups exclusively in the Middle East. The same characteristics—the legitimization of violence based on religious precepts, the sense of profound alienation and isolation, and the attendant preoccupation with the elimination of a broadly defined category of “enemies”—are also apparent among American Christian white supremacists, among some radical Jewish messianic terrorist movements in Israel, and among radical Sikh movements in India. Finally, as many of these groups embrace strong millennialist or apocalyptic beliefs, we may be on the cusp of a new and potentially more dangerous era of terrorism as the year 2000—the literal millennium—approaches.  相似文献   

4.
This article examines the effect terrorism has on civil liberties and political rights across a wide range of democracies and regions. This study includes an analysis of the influence domestic and international terrorist attacks have on civil liberties and political rights in 48 democratic states from 1971–2007. The results from a time series cross-national analysis reveal that terrorism weakens civil liberties and political rights. However, certain types of democracies are more affected by terrorism than others. These findings have important implications for democracy and counterterrorism strategies in democratic states.  相似文献   

5.
Spain and the United Kingdom have experienced similar types of political violence. Since the 1960s, both countries have suffered casualties as a result of long-standing ethno-nationalist conflicts as well as terrorist attacks by Al Qaeda–inspired groups. In spite of these similarities, the two countries display a striking variation in the attitudes to victims. In Spain, Associations of Victims of Terrorism have been highly visible and influential, whereas United Kingdom-based organizations have not captured the public's imagination and the attention of policymakers in the same way. Spanish associations of victims have been present in the public sphere and have routinely provided their opinions on counterterrorist policy and appropriate government legislation whereas this sort of political activity is difficult to trace in the United Kingdom. As a result of this puzzle, the article tries to answer the following question: Why are associations of victims of terrorism by Al Qaeda–inspired attacks more influential in Spain than in the United Kingdom? The article will argue that political and sociocultural variables account for the difference. More specifically, the article demonstrates that the experience of both ethno-nationalist and jihadist political violence has affected party systems and cultural frames differently, hence providing distinct sets of political opportunities for victims’ associations to carry out their lobbying strategies.  相似文献   

6.
Since 11 September 2001, terrorism has been a global security threat. One of the partners in the war on terrorism is Kenya. Considering Kenya"s recent experience with terrorist acts, their effects on its public psyche, and Kenya"s reactions to them in domestic and foreign policies, this study presents perceptions on terrorism from an exploratory survey in Kenya. Respondents feel most threatened not by terrorism but by AIDS and local criminals. Among terrorist acts, the most threatening include suicide terrorism, a plane crash, and stabbing attacks. Media reports on terrorism not only intensify feelings of anxiety and helplessness but also strengthen feelings for both peaceful and revengeful reactions. In order to prevent terrorist attacks, routine security checks, recognizing a Palestinian right to statehood, and intelligence collaboration with the CIA and Mosad are considered the most effective measures. Kenya"s commitment to the war on terrorism may be less a response to Kenyans" perceptions of terrorist threats than a policy to support the United States against terrorists in exchange for U.S. support against AIDS and for political stability, democracy, pluralism, and economic development.  相似文献   

7.
While much of the focus of terrorism research is on successful terrorist attacks, the most significant lessons for terrorism prevention may come from examination of terrorist plots and attacks that do not succeed. This article analyzes 176 terrorist plots against American targets that have been thwarted or otherwise failed during the past 25 years. It considers what kinds of intelligence and security measures are most useful in counterterrorism, and argues that the conventional wisdom about why intelligence fails—because analysts and agencies are unable to “connect the dots”—is wrong. Most plots, especially domestic terrorist plots, are not foiled through imaginative analysis, but through conventional law enforcement efforts and aggressive domestic intelligence collection that reveal to authorities just what the plotters are up to.  相似文献   

8.
The aim of this article is to identify characteristics of communities where persons indicted under terrorism charges lived, planned, and prepared prior to carrying out a terrorist act. Guided by a model of community deterioration and using data from the Terrorism and Extremist Violence in the United States database, findings indicate: (1) half of all census tracts where terrorists planned and prepared for attacks were located in the western United States; nearly one fourth were in the Northeast; (2) nationally, terrorist pre-incident activity is more likely to occur in census tracts with lower percentages of high school graduates for Al Qaeda and associated movements (AQAM) terrorism but not for far-right terrorism, higher percentages of households living below the poverty level, more urban places, and more unemployed; and (3) communities with terrorist pre-incident activity are different types of places compared to those where there was no pre-incident activity, generally between different regions of the country, and specifically in terms of differences across far-right and AQAM terrorist movements.  相似文献   

9.
Criminal syndicates and terrorist organizations are inherently different, one motivated by profit and the other by political goals. Yet their difference enables them to cooperate for their mutual benefit. Nowhere has this been more evident than in the drug trade; from harvesting and trafficking in illegal substances, it has been an easy transition to counterfeiting and disseminating medications. Hezbollah, in particular, has become involved in the production, smuggling and distribution of counterfeit medications in North America, Africa and the Middle East as a means of raising immense sums of money to finance its terrorist activities. Hezbollah's infiltration into the pharmaceuticals industry illustrates the danger posed by the marriage of terrorism and crime, which arises both from enhanced resources for terrorism, and from the corruption of a legitimate and necessary industry. Understanding the nature and extent of this danger is the first step in preparing to meet it.  相似文献   

10.
This article reports results of a survey on consumer perceptions about agroterrorism conducted in October and November of 2004. As part of a more general survey the authors asked respondents who the most likely perpetrator of an agroterrorist attack would be. Of American consumers, 47.52% believed that the most likely attack would come from a state-sponsored terrorist organization or government, 23.47% from a non-state–sponsored terrorist organization, and only 14.46% for domestic terrorism. The article argues that at the time of the survey these perceptions of risk were at odds, in terms of history and the conventional wisdom, which would place higher likelihoods first on domestic terrorism, then foreign non-state–sponsored terrorism, and then foreign state–sponsored terrorism. These results are explored in detail using a combination of cross tabulation and PROBIT analysis and find that a key variable (among others) in risk perception is political affiliation. The article then discusses the role of political communication via the Iraq War and Al Qaeda to explain the results.  相似文献   

11.
The 11 September 2001 terrorist attacks on the World Trade Center and the Pentagon marked the advent of an unprecedented preoccupation with terrorism. Although Australia's actual terrorist risk profile remains marginal in comparison with other mortality risks, in times of crisis, the reasoned negotiation of risk is marginalised. Drawing on the findings of qualitative research, this article offers an analysis of how Australians are responding to the threat of terrorism embodied in a developing discourse of the war on terror and how they construct their perceptions of terrorist risk. The findings implicate community fear as a factor that should be considered in the development of counter terrorism strategies that emphasize community engagement as a mechanism for challenging radicalisation in democratic states.  相似文献   

12.
This article examines the strategic utility of suicide terrorism. Suicide terrorism, we suggest, can be thought of as a form of strategic "signaling." We define terrorism as a signaling game in which terrorist attacks are used to communicate a group's character and objectives to a set of target audiences. This is followed by an examination of the utility of suicide attacks as a signaling tactic. The relative effectiveness of suicide operations is evaluated in relation to other tactical options that are traditionally available to terrorist organizations. We go on to examine the institutional and social context of suicide terrorism, concluding with an examination of the evolutionary use of suicide attacks by Palestinian terrorist organizations and the Liberation Tigers of Tamil Eelam.‐  相似文献   

13.
ABSTRACT

Although often considered to be safe havens, schoolhouses have a darker side: they are places where students are victimized. Research in the United States shows that students are victimized by various forms of misconduct, ranging from property-related crime (e.g., theft, destruction) to violent behavior (e.g., assault, homicide) in schools. Notably, international studies reveal that school victimization is a serious concern across the globe. In this context, the present study provides an overview of the extent and nature of school victimization from international perspective. Special attention is given to bullying, a form of victimization found across the globe. Important school-based prevention efforts developed outside the United States are discussed. Finally, this study raises awareness to another type of serious victimization—terrorist attacks—that are on the rise, particularly among nations located in the Middle East, Southeast Asia, and Africa.  相似文献   

14.
Analyzing newspaper coverage of the 1998 Nairobi and 2002 Mombasa terrorist attacks by the Nairobi Daily Nation and East African Standard finds that generalizations from Western sources, such as newsworthiness criteria and coverage of government officials and terrorists, appear similar in Kenyan media, although interpretation of the attacks were colored by a “developing world” perspective in some respects. Terrorists also ironically are more prominent in subsequent attacks, although perhaps only when they fail to inflict heavy damage and casualties. The second attack also brought far more criticism on the Kenyan government, which may have implications for similar events in other countries.

Adhabu ya kaburi aijau maiti (The corpse knows the torment of the grave).

—Swahili proverb  相似文献   

15.
Although the Popular Revolutionary Army (EPR) has committed more terrorist attacks than the Zapatista National Revolutionary Army (EZLN), it has typically not received the media attention that the EZLN attracts. With the exception of their violent uprising in 1994, the EZLN has focused more on political dialogue, whereas the Marxist inspired EPR has primarily relied on terrorism to highlight social inequities in the state of Guerrero. The EZLN is older and larger, but unlike the EPR, it has refrained from conducting terrorist attacks since its initial uprising.  相似文献   

16.
This article argues that much of the historical analysis of terror and terrorism in history has been weak in understanding the limits on terrorist activity and how terrorist campaigns eventually end. Reviewing three recent studies that examine various aspects of terrorism and the language of terror, the article seeks to show that states often play a major role in the way terrorist movements develop and eventually end up either defeated or moving into mainstream political engagement. The article points to a number of examples to illuminate this including the Carbonara in nineteenth century Italy, the Paris Commune and the ending segregation in the U.S. South in the 1960s.  相似文献   

17.
The consequences of states’ reactions to terrorist attacks can far outweigh the effects of the attacks themselves. Yet risk analysis, widely accepted as the proper analytical basis for assessing terrorist threats, largely ignores the consequences from potential reactions to attacks. It also generally fails to consider how the anticipation of these reactions may influence terrorists’ attack preferences. Policymakers should therefore be wary of the limitations of risk analysis as currently practiced. Further, states should strive to avoid reactions to attacks that unwittingly further their adversaries’ agendas, a goal that may be aided by strengthening public resilience to terrorism.  相似文献   

18.
Abstract

Concentrating on terrorism in West Germany, Italy, and the Basque provinces of Spain, the author presents a detailed picture of the motivations, the strategies, and the ‘'achievements” of a number of the best known groups which for alleged political purposes take the law into their own hands. The Red Armee Faction, perhaps the best known West German terrorist group, and the 2nd of June Movement as well as such organizations as the Revolutionary Cells and the Guerilla Diffusa are described and their aims and activities are scrutinized. German right‐wing terrorism is also shown to wield great power, its contacts with terrorists in Lebanon and Algeria rivaling those of leftist organizations. Italian terrorism is also fully covered in this paper, with the activities of the Red Brigades, the best‐known of the leftist organizations, and its international connections, as well as other groups and the individuals involved being dealt with in some detail. The events in Spain, past and present, due especially to Basque terrorism, are considered, and the Soviet influence, represented by terrorist organizations in Europe, the Middle East, Africa, and Cuba, is discussed as is also the outlook for the future.  相似文献   

19.
As terrorism on all scales continues, it is necessary to improve understanding of terrorist and insurgent activities. This article takes a Geographic Information Systems (GIS) approach to advance the understanding of spatial, social, political, and cultural triggers that influence terrorism incidents. Spatial, temporal, and spatiotemporal patterns of terrorist attacks are examined to improve knowledge about terrorist systems of training, planning, and actions. The results of this study aim to provide a foundation for understanding attack patterns and tactics in emerging havens as well as inform the creation and implementation of various counterterrorism measures.  相似文献   

20.
Efforts to prevent and preempt further terrorist attacks in the United States and other developed countries have intruded into many spheres of public and private life. This article provides a short assessment of the redeployment of anti-money laundering regimes to combat the financing of terrorism. This expansion of financial surveillance is directed by international organizations and domestic legislation in the belief that terrorists and their financiers may be found, identified and detained. After providing background to the anti-money laundering regime, the article looks at the domestic and extraterritorial application of the USA PATRIOT Act. One conclusion of this analysis finds that a financial panopticon has coalesced out of the wide range of financial and non-financial businesses now required to report “suspicious financial activity.”  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号