Academic literature on the topic 'Terrorist Indicators'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Terrorist Indicators.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Terrorist Indicators"

1

Korobeev, Alexander, Dmitriy Lobach, and Nguyen Hung. "Features of Terrorist-Oriented Criminality in the Socialist Republic of Vietnam and Measures of Legal Response to Fight it at the Present Stage." Russian Journal of Criminology 14, no. 3 (June 30, 2020): 400–410. http://dx.doi.org/10.17150/2500-4255.2020.14(3).400-410.

Full text
Abstract:
This article examines distinguishing features of terrorist-oriented criminality in the Socialist Republic of Vietnam, exploring quantitative indicators of certain types of crimes. It is concluded that the current level of political violence in Vietnam is low. Using a wide range of data sources on composite indicators (Global Terrorism Index, Global Terrorism Database and Global Peace Index), it is concluded that to date Vietnam has recorded a low level of political violence. The research explores basic «criminogenic» conditions or factors that lead to relevant risk of growth of political violence. It should be noted that to some extent ethnic tensions still exist in Vietnam. There is also a great concern about criminal activity of a number of domestic and international terrorist organizations, which, in the short or long term, could disrupt domestic political situation and escalate terrorism. The researchers argue that although political and religious motives (e.g. establishing an Islamic state) underlie certain terrorist activities of international terrorist organizations and the fact that Muslims in Vietnam make up about 0,1 % of the countrys population, Vietnams international commitment to counter-terrorism is likely to make it a target of retaliation by these organizations. In addition, there is a possibility that these organizations may commit terrorist acts within the territory of the Socialist Republic of Vietnam to support and fund terrorist activities in the future. We summarized that as at present in force Criminal Code of the Socialist Republic of Vietnam includes special provisions that carry liability for individual acts showing signs of terrorism (arts. 113, 299, 300 CC SRV) and norms within international obligations that cover criminal liability for other crimes of terrorist nature (crimes with indicators of terrorization). The comparative legal analysis of anti-terrorist statutes presented in the 2015 version of the Criminal Code of the Socialist Republic of Vietnam reveals legal and technical defects in certain material elements of terrorist offences. It is noted that Vietnamese legislator distinguishes two forms of terrorism: «traditional» terrorism, which pursues political aims (criminal acts against the peoples government, committed for the purpose of combating it) and terrorism aimed at creating a climate of fear in society.
APA, Harvard, Vancouver, ISO, and other styles
2

Madžuls, Juris. "THE ROLE OF FOREIGN TERRORIST FIGHTERS PROFILING METHODOLOGY." BORDER SECURITY AND MANAGEMENT 2, no. 7 (July 5, 2018): 92. http://dx.doi.org/10.17770/bsm.v2i7.3485.

Full text
Abstract:
The terrorist attacks have highlighted the importance of threats in the cross border dimension in regards to the identification of terrorists, the monitoring of ‘subjects of interest’ and other terrorism-related actors. The essence of research is determined by the dramatic increase of number of terrorists who perpetrated terrorist attacks and had used all available modes of transport, including legal and irregular options for crossing borders. The aim of the paper is to provide assistance in establishing/strengthening identification and profiling mechanisms in order to better distinguish among different categories of persons. The task of the paper is to analyse risk indicators provided by General Secretariat and compare them with European Border and Coast Guard Agency’s developed risk indicators in order to provide a support instrument (methodology for the profiling and identification of the foreign terrorist fighters (hereinafter – FTF) (hereinafter – the Methodology) for risk assessment performed at national level. In order to provide additional support for law enforcement agencies (especially for border guards) the author of the paper will come up with a range of recommendations. Main conclusion: At the national level, it is necessary to develop the Methodology of the FTF. Taking into account Methodology, it is possible to develop a system of risk indicators and apply them in practice to prevent irregular migration, trafficking in human beings etc. Primary methods: content analysis, multidimensional measurement and factor analysis. Achieved results: recommendations made by the author of the paper will improve the border check procedures regarding identification of FTF.
APA, Harvard, Vancouver, ISO, and other styles
3

Gruenewald, Jeff, Brent R. Klein, Grant Drawve, Brent L. Smith, and Katie Ratcliff. "Suspicious preoperational activities and law enforcement interdiction of terrorist plots." Policing: An International Journal 42, no. 1 (February 11, 2019): 89–107. http://dx.doi.org/10.1108/pijpsm-08-2018-0125.

Full text
Abstract:
Purpose The purpose of this paper is to provide a metric for validating the Nationwide Suspicious Activity Reporting (SAR) Initiative’s (NSI) sixteen-category instrument, which is designed to guide law enforcement in the collection and analysis of suspicious behaviors preceding serious crimes, including terrorist attacks. Design/methodology/approach Data on suspicious preoperational activities and terrorism incident outcomes in the USA between 1972 and 2013 come from the American Terrorism Study (ATS). Using a mixed-method approach, the authors conduct descriptive and multivariate analyses to examine the frequencies of the least and most prevalent suspicious activities (or SAR indicators) and how they predict the likelihood of terrorism prevention. In addition, the authors contextualize how configurations of SAR indicators are associated with the successful thwarting of terrorism incidents by law enforcement using an analytical method known as conjunctive analysis of case configurations (CACC). Findings The study reveals several key findings. First, certain behaviors categorized as suspicious, such as making threats, occur more frequently than others. Second, making threats, conducting surveillance and terrorist recruitment/financing predict law enforcement interdiction in terrorism plots, while misrepresentation (or the manufacturing and use of false documents) is more associated with terrorist success. Third, prevalent SAR indicators operate differently in the context of various combinations of suspicious activities to shape the likelihood for law enforcement interdiction. Research limitations/implications The current study’s findings may not be generalizable to other forms of violent extremism and terrorism outside of the USA. Practical implications This study illuminates opportunities for the NSI to provide law enforcement with the necessary tools to reduce terrorism risk and prevent future attacks. Originality/value To our knowledge, no scholarly work to date has assessed how observable behavioral indicators of suspicious preoperational activities affect the outcomes of terrorist plots.
APA, Harvard, Vancouver, ISO, and other styles
4

Gelpi, Christopher, and Nazli Avdan. "Democracies at risk? A forecasting analysis of regime type and the risk of terrorist attack." Conflict Management and Peace Science 35, no. 1 (November 3, 2015): 18–42. http://dx.doi.org/10.1177/0738894215608998.

Full text
Abstract:
How substantial is democracy as a cause of transnational terrorist attacks? Can our identification of democratic political systems help us to anticipate the flow of transnational terrorism? We seek to address these questions by analyzing data on transnational terrorist incidents from 1968 to 2007. We rely on receiver operating curves as a diagnostic tool to assess forecasting ability of various models of terrorist activity. Our analyses yield four central conclusions. First, our model of transnational terrorism provides a fairly strong basis for forecasting attacks—at least at the (relatively broad) level of the country-year. Second, while the overall forecasting capacity of this model is fairly strong, democracy adds very little to our capacity to forecast terrorist attacks relative to a parsimonious model that includes only distance and the prior history of terrorism. Collectively, these two variables perform about as well as a much more broadly specified model in forecasting terrorist attacks out of sample. Third, the model is highly redundant in a predictive sense. That is, many if not most of the other variables appear to provide similar information in terms of identifying terrorist attacks. Finally, we suggest that scholars focus on the development of more fine-grained and time-variant predictive indicators in order to improve our ability to forecast transnational terrorism.
APA, Harvard, Vancouver, ISO, and other styles
5

Novikov, Andrey Vadimovich. "Forecasting the risk of terrorist attacks based on machine learning algorithms." Национальная безопасность / nota bene, no. 1 (January 2022): 28–44. http://dx.doi.org/10.7256/2454-0668.2022.1.36596.

Full text
Abstract:
This article is devoted to the analysis and prediction of the risk of terrorist acts based on a comparison of various machine learning algorithms. In order to determine the most important indicators, more than thirty external and internal risk factors are comprehensively considered by quantifying them and an initial set of initial data is built. The study analyzes multidimensional socio-economic and political data for 136 countries for the period from 1992 to 2020. Four indicators are also predicted, reflecting the expected success of terrorist attacks, the likelihood of socio-economic consequences and general damage from terrorism. In addition to the classical analysis models, the effectiveness of the other four machine learning algorithms that can be used to analyze multidimensional data is compared. To predict the risk of terrorist attacks, a random forest model is created, and the effectiveness and accuracy of the model are evaluated based on statistical criteria. To determine the most important initial indicators, the method of recursive elimination of features in a random forest was used. The main result of this study is to identify the most important indicators for predicting the risk of terrorism and to reduce redundant indicators, which makes it possible to improve understanding of the main characteristics of attacks. Meanwhile, the results show that it is necessary to take appropriate proactive measures not only in the form of forceful detention, intelligence and response operations, but also to improve the stability of the state, achieve social balance and improve the quality of life of citizens.
APA, Harvard, Vancouver, ISO, and other styles
6

Tejkal, Martin, Jakub Odehnal, and Jaroslav Michálek. "Economic and Political Determinants of Terrorism in Selected European Countries." Acta Universitatis Agriculturae et Silviculturae Mendelianae Brunensis 68, no. 6 (2020): 1019–31. http://dx.doi.org/10.11118/actaun202068061019.

Full text
Abstract:
In this paper, we aim to assess the connection between terrorist attacks and socioeconomic and political indicators through an empirical study of selected 16 European countries. In order to reduce the dimension of the problem, factor analysis is applied in order to transform the indicator variables into factors. The countries are classified into clusters based on similarity of their economic and political indicator development, using loadings of the indicators onto the factors. For countries in each cluster, the connection of their political and socioeconomic indicators with terrorist attacks is then studied via correlation analysis of the attacks and the aforementioned factors. We propose two hypotheses – the hypothesis of opportunity costs, and the hypothesis of economic deprivation. For countries in each cluster, the hypotheses are examined with the use of correlation analysis. The results indicate that economic development affects the frequency of terrorist attacks in Belgium, France, Italy, the Netherlands, Luxembourg, Portugal, Spain, the United Kingdom, Ireland, and Switzerland.
APA, Harvard, Vancouver, ISO, and other styles
7

Сагайдак, Альбина, Albina Sagaidak, Наталья Корсикова, and Natalia Korsikova. "Deterministic features of terrorism in modern Russia." Vestnik of the St. Petersburg University of the Ministry of Internal Affairs of Russia 2019, no. 2 (July 12, 2019): 178–84. http://dx.doi.org/10.35750/2071-8284-2019-2-178-184.

Full text
Abstract:
The article is devoted to the criminological analysis of the causes and conditions conducive to the manifestation of crimes of a terrorism nature in the Russian Federation? Focusing on the activities of the internal affairs bodies in countering terrorism. The coat characteristic of quantitative indicators of crimes of a terrorist nature for 2015-2018 is given. The article summarizes the scientific experience of studying the main factors causing terrorist manifestations in the Russian Federation. The authors focus on the ode of the main factors contributing to terrorism in the Russian Federation - the presence of radical groups that promote their ideology among the teenage generation. The authors determined the place of the «Concept of the State Migration Policy of the Russian Federation for 2019-2025» in the system of prevention of modern terrorism, and also analyzed the main legal acts that are the legal «foundation» in this area. The content of the opposition implemented by the internal affairs bodies is emphasized.
APA, Harvard, Vancouver, ISO, and other styles
8

Tikhomirov, N. P., and A. V. Novikov. "Risks of acts of terrorism and specific features of their estimation." Vestnik of the Plekhanov Russian University of Economics, no. 2 (April 22, 2019): 198–210. http://dx.doi.org/10.21686/2413-2829-2019-2-198-210.

Full text
Abstract:
The article studies specific features of relatively new risks of declining the level of social and economic stability of states due to acts of terrorism and approaches to their estimation and prevention. Specificity of these risks are shown, which are connected with unlimited spheres of activity and methods of terrorists, vagueness of their reasoning and so on, which determines the high level of uncertainty in probability estimation, damages and other consequences of their activity. The structure of damages was systemized, within the frames of which direct and indirect damages in different fields of national economy and population of global community were identified. Estimation of such damaged which took place in different countries was provided. Unique characteristics of risks of terroristic attacks were given, which differ from other types of economic risks and predetermine the necessity to develop specific steps and strategies of their prevention. Key lines in the activity aimed at reducing risks of terroristic threats were discussed that stipulate disclosing basic factors promoting their appearance, estimation of conditions and trends in their development and elaboration of methods counteracting such threats. Legal basis of counteracting terrorism in the Russian Federation was considered that imply strengthening the role of state in the struggle against this phenomenon, for example by allocation of necessary finance resources directed to the development of accessible network of information, to the improvement of objects’ safeguarding, insurance protection of the population and other lines in anti-terrorist activity. The author discusses possible approaches to estimation of probability of terroristic attacks by using binary and multiple choice with regard to indicators showing conditions of their conducting.
APA, Harvard, Vancouver, ISO, and other styles
9

Chen, Lin, and Fengyun Mu. "Spatiotemporal characteristics and driving forces of terrorist attacks in Belt and Road regions." PLOS ONE 16, no. 3 (March 11, 2021): e0248063. http://dx.doi.org/10.1371/journal.pone.0248063.

Full text
Abstract:
To achieve the strategic goals of the Belt and Road Initiative (BRI), it is necessary to deepen our understanding of terrorist attacks in BRI countries. First, we selected data for terrorist attacks in BRI regions from 1998 to 2017 from the Global Terrorism Database and analyzed their time distribution using trend analysis and wavelet analysis. Then, we used honeycomb hexagons to present the spatial distribution characteristics. Finally, based on the Fragile States Index, we used GeoDetector to analyze the driving forces of the terrorist attacks. The following conclusions were obtained: (1) During 1998–2017, the number of events was the highest on Mondays and the lowest on Fridays. In addition, the incidence of events was high between Monday and Thursday but was the lowest on Fridays and Saturdays. The number of events was the largest in January, May, July, and November and was the lowest in June and September; the incidence of terrorist attacks from April to May and July to August was high. (2) Terrorist attacks showed a 10-year cycle during the study period. Terrorist attacks in the last 10 years of the study period were broader in scope and higher in number compared with the previous 10 years. In addition, China, Russia, Saudi Arabia, and northeastern Europe saw many new terrorist attacks during the latter 10 years. (3) The number of terrorist attacks by bombing/explosion was the largest, followed by armed attack; assassination, kidnapping, and infrastructure attacks were the least frequent. The core areas of the terrorist attacks were Iraq, Israel, Afghanistan, Pakistan, and India. (4) The driving force analysis revealed that the indicators “security apparatus,” “human flight and brain drain,” and “external intervention” contributed the most to BRI terrorist attacks.
APA, Harvard, Vancouver, ISO, and other styles
10

Hunter, Lance Y., Joseph W. Robbins, and Martha H. Ginn. "TERRORISM AND RIGHT-PARTY VOTE SHARES IN LEGISLATIVE ELECTIONS." World Affairs 184, no. 4 (November 19, 2021): 441–71. http://dx.doi.org/10.1177/00438200211050905.

Full text
Abstract:
This study examines the electoral consequences for ideologically right-leaning political parties in the wake of terrorist attacks by employing an original dataset that captures political party vote shares and multiple terrorist indicators. Our analysis extends the partisan voting hypothesis to 56 democracies from multiple regions and levels of development between 1975–2014. Specifically, we find that the origins of terrorist perpetrators, the severity of terrorist attacks, and the frequency of terrorist incidents decrease right-party vote shares in legislative contests when incorporating standard controls. All told, these findings reinforce political psychological reasoning that contends terrorist attacks impact citizens’ emotions and voting calculations.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Terrorist Indicators"

1

SORMANI, RAUL. "Criticality assessment of terrorism related events at different time scales TENSOR clusTEriNg terroriSm actiOn pRediction." Doctoral thesis, Università degli Studi di Milano-Bicocca, 2016. http://hdl.handle.net/10281/125509.

Full text
Abstract:
Law Enforcement Agencies (LEAs) are nowadays taking advantage of a wide range of information and intelligence sources (e.g., human intelligence (HUMINT), open source intelligence (OSINT), image analysis (IMINT)) to anticipate potential terroristic actions. Urban environments are nowadays associated with a wide range of vulnerabilities, which create fertile ground for terrorists planning actions against assets and/or citizens. These vulnerabilities stem from the characteristics of the urban environment (e.g., presence of civilians, availability of many and diverse physical infrastructures, complex social/cultural/governmental interactions, high value targets, etc.) have been repeatedly manifested as part of major terrorist attacks, which took place in some of the world’s most important cities (e.g., New York, London, and Madrid). The mitigation of security concerns in the urban environment is therefore a top priority in the social and political agendas of cities. ICT technologies provide help in this direction, for example through surveillance of urban areas, using the proliferating number of low-cost multi-purpose sensors in conjunction with emerging Big Data processing techniques for analyzing them. The thesis illustrates the TENSOR (clusTEriNg terroriSm actiOn pRediction) framework, a near real-time reasoning framework for early identification and prediction of potential threat situations (e.g. terrorist actions). The main objective of TENSOR is to show how patterns of strategic terroristic behaviors, identified analyzing large longitudinal data sets, can be linked to short term activity patterns identified analyzing feeds by “usual” surveillance technologies and that this fusion allows a better detection of terrorist threats. The framework consists of three different modules with the aim of collecting and processing information of the surrounding environment from a variety of sources including physical sensors (e.g. surveillance cameras) and “virtual” sensors (e.g. police officers, citizens). The proposed TENSOR framework processes information sources at different abstraction levels (e.g. sensor information, police inputs, external semantic crafted data sources) and, thru the proposed layered architecture, simulates the three main expert user roles (i.e. operational, tactical and strategic user roles), as indicated in the intelligence analysis domain literature. The framework transforms all the sensors gathered data into symbolic events of interest following a generic scenario-agnostic semantics for terrorist attacks described in literature as terrorist indicators. Thru different reasoning and fusion techniques, the framework proactively detects threats and depicts the situation in near real-time. The framework results have been tested and validated in the European project FP7 PROACTIVE.
APA, Harvard, Vancouver, ISO, and other styles
2

Danková, Diana. "(Anti) Money laundering and its macroeconomic and microeconomic perspective." Master's thesis, Vysoká škola ekonomická v Praze, 2016. http://www.nusl.cz/ntk/nusl-262293.

Full text
Abstract:
The primary objective of this diploma thesis is to comprehensively present the issue of money laundering not only on a macro level but also in terms of commercial bank and its microeconomic response to it. The main contribution of this diploma thesis is to identify the global indicators, which should be considered when drafting strategies in the fight against the legalization of proceeds from crimes. This diploma thesis addresses the changes caused by current globalization and highlights the dangerous effects it has on evolution of this consequent criminal activity together with evaluation of its potential in the future. Due to the tense situation in Europe caused by the series of terrorist attacks, part of the work is dedicated to the explanation of the relationship between terrorist financing and money laundering.
APA, Harvard, Vancouver, ISO, and other styles
3

Irwin, Travis Shane. "SOCIAL STRUCTURE AND CULTURE: APPLYING CROSS-NATIONAL INDICATORS OF CRIMINAL VIOLENCE TO DOMESTIC TERRORISM." OpenSIUC, 2010. https://opensiuc.lib.siu.edu/theses/333.

Full text
Abstract:
Despite the increase in terrorism research post September 11, 2001, little is known about domestic terrorism though it occurs at overwhelmingly higher rates as compared to transnational terrorism. Although the use of criminological theory and methods to study terrorism has increased recently, there are relatively few terrorism studies within the criminological literature. Drawing upon extant criminological theories of violence among countries, this study uses the recently created Global Terrorism Database to examine the distribution and correlates of domestic terrorism among 72 developed nations between 1970 and 1997. This study examined the following questions. First, do prior established predictors of criminal violence (i.e., economy, inequality, social welfare, political orientation, ethnic fractionalization, population, and pre-existing violence) also predict domestic terrorism at the country level? Second, is the relationship between these macro-structural and cultural variables in the same direction as found in the previously published literature? Using a series of contemporaneous cross-sectional analyses and lagged cross-sectional analysis, the results from this study indicate that there is considerable similarity between the correlates of cross-national homicide and correlates of domestic terrorism. There was considerable evidence for the relationship between population size and overall levels of domestic terrorism. This relationship was robust across short time intervals (1970s), the full time span (1970-1997), as well as in the long and short term lagged analyses (1970-1990 predictors of domestic terrorism in 1991-1997 and 1991-1994 predictors on 1995-1997 domestic terrorism). On the contrary I did not find evidence that large youth populations are significantly related to higher levels of domestic terrorism. Income inequality (GINI) also emerged as a significant correlate of domestic terrorism in the long and short term contemporaneous analyses. Those countries that had higher overall levels of income inequality for the entire time span also had higher levels of domestic terrorism, compared to those countries with low levels of income inequality. Contrary to theoretical expectations yet supportive of prior criminological research, this study found that stronger democracies actually have more domestic terrorism. In particular, those countries with more restrictions placed on executive decision-making power, tend to have more domestic terrorism events, compared to those countries with less restrictive executive decision-making processes. This study concludes with a discussion of the results within the larger criminological literature as well as future avenues of research.
APA, Harvard, Vancouver, ISO, and other styles
4

Navarrete, Reynoso Ramón. "MODELO DE BIOSEGURIDAD EN LA CADENA DE SUMINISTROS DE PRODUCTOS ALIMENTICIOS, TENIENDO EN CUENTA LA GESTIÓN DE LA CADENA DE SUMINISTROS Y LA VISIÓN DE PROCESOS DE NEGOCIO. APLICACIÓN A LA INDUSTRIA ALIMENTICIA, DE LA ZONA DEL BAJÍO (MÉXICO)." Doctoral thesis, Universitat Politècnica de València, 2013. http://hdl.handle.net/10251/19159.

Full text
Abstract:
El Terrorismo alimentario ha sido definido por la Organización Mundial de la saludos como "un acto o intento deliberado de contaminación de alimentos para consumo humano con agentes químicos, físicos o microbiológicos para el propósito de causar daño o muerte a poblaciones civiles o para interrumpir la estabilidad social, política o económica"(WHO,2008) La biodiversidad, según la Association of food and drug Officials de los EEUU, abarca los medios para prevenir y eliminar cualquier acción intencional de adulteración de alimentos destinada a provocar consecuencias negativas graves para la salud o la muerte de personas o animales, ocasionar daños a las economías de los paises como consecuencia de retricciones comerciales internacionales derivadas de la aparición de enfermedades y la falta de confianza en los controles sanitarios locales...
Navarrete Reynoso, R. (2013). MODELO DE BIOSEGURIDAD EN LA CADENA DE SUMINISTROS DE PRODUCTOS ALIMENTICIOS, TENIENDO EN CUENTA LA GESTIÓN DE LA CADENA DE SUMINISTROS Y LA VISIÓN DE PROCESOS DE NEGOCIO. APLICACIÓN A LA INDUSTRIA ALIMENTICIA, DE LA ZONA DEL BAJÍO (MÉXICO) [Tesis doctoral no publicada]. Universitat Politècnica de València. https://doi.org/10.4995/Thesis/10251/19159
Palancia
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Terrorist Indicators"

1

Using behavioral indicators to help detect potential violent acts: A review of the science base. Santa Monica: RAND, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

United States. Congress. House. Committee on Homeland Security. Subcommittee on the Prevention of Nuclear and Biological Attack. Building a nuclear bomb: Identifying early indicators of terrorist activities : hearing before the Subcommittee on Prevention of Nuclear and Biological Attack of the Committee on Homeland Security, House of Representatives, One Hundred Ninth Congress, first session, May 26, 2005. Washington: U.S. G.P.O., 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

1925-, Lévy Janine, ed. L'affaire Degaev: Terreur et trahison dans la Russie tsariste. Paris: De Fallois, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

United States. Government Accountability Office. Homeland security: Some progress made, but many challenges remain on U.S. visitor and immigrant status indicator technology program : report to Congressional committees. Washington, D.C: Government Accountability Office, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Congress, United St, United States House of Representatives, and Committee on Homeland Security and Export Controls. Building a Nuclear Bomb: Identifying Early Indicators of Terrorist Activities. Independently Published, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Building a Nuclear Bomb: Identifying Early Indicators of Terrorist Activities: Hearing Before the Subcommittee on Prevention of Nuclear and Bio. Not Avail, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Forecasting Terrorism: Indicators and Proven Analytic Techniques. The Scarecrow Press, Inc., 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Staff, International Monetary Fund. Uruguay: Report on the Observance of Standards and Codes on Anti-Money Laundering and Combating the Financing of Terrorism. International Monetary Fund, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Bertolo, Angelo. Burqa and the Miniskirt: The Burqa and High Birth Rates As Indicator of Progress the Miniskirt and Low Fertility As Indicator of Regress the Suicide Terrorists. Westwood Books Publishing, 2022.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Bertolo, Angelo. THE BURQA AND THE MINISKIRT: The burqa and high birth rates as indicator of progress The miniskirt and low fertility as indicator of regress The suicide terrorists. Westwood Books Publishing, 2022.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Terrorist Indicators"

1

Khalsa, Sundri K. "Forecasting Terrorism: Indicators and Proven Analytic Techniques." In Intelligence and Security Informatics, 561–66. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11427995_59.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Pentland, Steven J., Lee Spitzley, Xunyu Chen, Xinran (Rebecca) Wang, Judee K. Burgoon, and Jay F. Nunamaker. "Behavioral Indicators of Dominance in an Adversarial Group Negotiation Game." In Terrorism, Security, and Computation, 99–122. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-54383-9_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Frindte, Wolfgang, Daniel Geschke, and Sebastian Wagner. "Terrorism - Orchestrated Staging and Indicator of Crisis." In The Handbook of International Crisis Communication Research, 200–211. Hoboken, NJ: John Wiley & Sons, Inc, 2016. http://dx.doi.org/10.1002/9781118516812.ch19.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Sawyer, John P., and Justin Hienz. "What Makes Them Do It? Individual-Level Indicators of Extremist Outcomes." In The Handbook of the Criminology of Terrorism, 47–61. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2017. http://dx.doi.org/10.1002/9781118923986.ch3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Jo, Hyeran, Brian J. Phillips, and Joshua Alley. "Can Blacklisting Reduce Terrorist Attacks?" In The Power of Global Performance Indicators, 271–99. Cambridge University Press, 2020. http://dx.doi.org/10.1017/9781108763493.010.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Williams, Phil. "5. Warning Indicators and Terrorist Finances." In Terrorism Financing and State Responses, 72–90. Stanford University Press, 2007. http://dx.doi.org/10.1515/9780804768221-008.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Morse, Julia C. "Blacklists, Market Enforcement, and the Global Regime to Combat Terrorist Financing." In The Power of Global Performance Indicators, 61–97. Cambridge University Press, 2020. http://dx.doi.org/10.1017/9781108763493.004.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Abrahms, Max. "11. Can Terrorism Be Rational?" In Contemporary Terrorism Studies, 201–17. Oxford University Press, 2022. http://dx.doi.org/10.1093/hepl/9780198829560.003.0011.

Full text
Abstract:
This chapter looks into the rationality of terrorism. It starts off by looking into the paradox of terrorism. Political scientists typically view terrorists as rational political actors. However, empirical research on terrorism suggests that terrorism is in fact an ineffective political tactic. Evidence indicates that in instances where there has been terrorist attacks on civilians, governments rarely grant concessions. This might explain why terrorism is often selected as a tactic only if alternative options are no longer viable. The chapter uses Al-Qaeda and the Islamic State as case studies to examine broader patterns of terrorism. Knowing the priority of terrorists is vital for governments when considering counterterrorism actions. Having an understanding of the grievances of terrorists helps political actors predict which targets the terrorists will attack.
APA, Harvard, Vancouver, ISO, and other styles
9

Das, Ramesh Chandra, and Sovik Mukherjee. "Determinants of Terrorism in South Asia." In Cyber Warfare and Terrorism, 1598–617. IGI Global, 2020. http://dx.doi.org/10.4018/978-1-7998-2466-4.ch094.

Full text
Abstract:
Terrorist activities in the post-Paris Peace Treaties have emerged as one of the most perilous agendas that are troubling the world economies and political figures in securing their nations and regions. Several socio-economic factors were evidenced to be the crucial factors in determining terrorist activities all around the world. The present article strives to identify the significance of several socio economic factors, namely, refugee population, access to good sanitation facilities, youth unemployment rate, percentage of education expenditure to GDP, percentage of military expenditure to GDP, per capita GDP and political stability in the panel of seven South Asian countries and China for the period 2002-2016. By applying both static and dynamic panel models, the article observes that all of the selected variables explain the terrorism index with expected signs. The article thus prescribes that the governments of the selected countries should concentrate on allocating their budgets on the improvements of sectors underlying the associated indicators.
APA, Harvard, Vancouver, ISO, and other styles
10

Bouhana, Noémie, Emily Corner, and Paul Gill. "A Risk Analysis Framework of Lone-Actor Terrorism." In Lone-Actor Terrorism, 287–303. Oxford University Press, 2022. http://dx.doi.org/10.1093/med/9780190929794.003.0023.

Full text
Abstract:
In the rush to explain lone-actor terrorist radicalization and behavior, analyses highlighted a diversity of risk factors. This chapter organizes this knowledge into a general framework, the risk analysis framework (RAF). The framework incorporates theories that advance explanations about the role these factors play in producing the outcome of interest (e.g., radicalization). More specifically, the RAF draws on a well-developed general theory of crime causation known as situational action theory (SAT). The authors systematically articulate how the kinds of risk factors discussed in the prior literature review interact to produce one or the other. They differentiate between those factors which may act as indicators (needed for the design of detection and mitigation measures) of lone-actor extremist events and those which may be considered causes (needed for the design of prevention and disruption measures).
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Terrorist Indicators"

1

Salem, Shady, Manuel Campidelli, Wael El-Dakhakhni, and Michael Tait. "Blast Resilient Design of Infrastructure Subjected to Ground Threats." In ASME 2017 Pressure Vessels and Piping Conference. American Society of Mechanical Engineers, 2017. http://dx.doi.org/10.1115/pvp2017-65205.

Full text
Abstract:
The growing number of terrorist attacks in the past decade has focused the public’s attention on the severity of such a man–made hazard. The rising threat of improvised explosive devices — one of the most successful attack strategies — has significantly increased the number of threats on the ground, in the form of suicide–bombs, vehicle–bombs, etc., thereby requiring the development of more effective blast risk mitigation measures. However, the modern proliferation of such measures poses the problem of evaluating their cost–effectiveness, which prompts the need for a comprehensive optimization methodology — capable of maximizing the resilience of the built environment. The aim of this paper is to lay out the foundations of a resilience–based framework for quantifying the performance of different infrastructure elements incurring blast threats, by means of functionality and resilience indicators. The proposed framework can quantify the consequences of multiple outdoor explosions typified by the emblematic car–bomb scenario. The level of localized damage is evaluated via pressure–impulse diagrams; local failures are then aggregated into the definition of resilience and functionality indicators, designed to provide the analyst with a comprehensive picture of global damage, residual functionality, and downtime of the structural system.
APA, Harvard, Vancouver, ISO, and other styles
2

McDaniel, David, and Gregory Schaefer. "A data fusion approach to indications and warnings of terrorist attacks." In SPIE Sensing Technology + Applications, edited by Barbara D. Broome, David L. Hall, and James Llinas. SPIE, 2014. http://dx.doi.org/10.1117/12.2050501.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Soldatos, John, Anastasios Pantazidis, Katerina Margariti, Pantelis Velanas, and Bogdan Gornea. "Virtual Reality Training of Law Enforcement Officers in Predicting Terroristic Attacks Indicators." In 2022 International Conference on Interactive Media, Smart Systems and Emerging Technologies (IMET). IEEE, 2022. http://dx.doi.org/10.1109/imet54801.2022.9929511.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Romero Faz, David, and Alberto Camarero Orive. "Security assessment in harbours: parameters to be considered." In CIT2016. Congreso de Ingeniería del Transporte. Valencia: Universitat Politècnica València, 2016. http://dx.doi.org/10.4995/cit2016.2016.3181.

Full text
Abstract:
The ports are the main node in the supply chain and freight transportation. The terrorist attacks of September 11, 2001 marked a turning point in global security. Following this event, and from then on, there is a widespread fear of an attack on commercial ports. The development of the International Ship and Port Facility Security (ISPS) Code of the International Maritime Organization (IMO), and the implementation of the measures derived from it, have significantly improved security at port facilities. However, the experience in recent decades indicates the need for adjustments in the security assessment, in order to improve risk assessment, which is sometimes either underestimated or overestimated. As a first result of the investigation, new parameters for assessing security are proposed considering new aspects on the basis of an analysis of the main methodologies specific to port facilities, the analysis of surveys of the responsible managers for the security of the Spanish port system, and the analysis of the security statistics obtained through security forces.DOI: http://dx.doi.org/10.4995/CIT2016.2016.3181
APA, Harvard, Vancouver, ISO, and other styles
5

Strickland, W. S., Mark Anderson, and Dov Dover. "Blast-Resistant Window Concepts." In ASME 2003 Pressure Vessels and Piping Conference. ASMEDC, 2003. http://dx.doi.org/10.1115/pvp2003-1831.

Full text
Abstract:
Terrorist bombs threaten American civilians and military personnel both at home and abroad. Analysis of data from previous terror attacks indicates the largest number of injuries result from projected glass shards from shattered windows and facades. Three key issues have led to increased interest in new window materials, as well as changes in building design codes: (1) actual terror attacks; (2) the threat of future terror attacks; and (3) monetary losses due to hurricanes. New protective products include a wide variation of films and laminated glasses for retrofit / replacement. Air Force Research Laboratory (AFRL) research has shown that these protective films will reduce the fragmentation of the enclosed glass. However, protective films that are not anchored will not provide retention of the film/glass system under the severe blast loadings expected from terror bombs. The paper introduces the Flex window, a patent-pending blast-resistant window developed at AFRL, along with key design concepts. In addition, the paper presents results from actual blast tests of the Flex window. Tabular data and photo-documentation is used to illustrate the ability of the Flex window to handle blast pressures a full order of magnitude greater than the typical commercial “blast proof” window. New AFRL methods for modeling both exterior and interior loading functions are presented. In addition, possible response modes are discussed, based on observations of high-speed video recordings.
APA, Harvard, Vancouver, ISO, and other styles
6

Shi, Caleb, Robert Chang, and Donna Leonardi. "The Effects of Mechanical Vibration on Cellular Health in Differentiated Neuroblastoma Cells." In ASME 2018 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. American Society of Mechanical Engineers, 2018. http://dx.doi.org/10.1115/detc2018-86280.

Full text
Abstract:
The effects of mechanical impact forces on neurological health is a critical concern, likely due to issues of traumatic brain injury (TBI) in sports and brain damage stemming from the potential of “sonic terrorism.” The quantitative analysis and evaluation of such forces on brain tissue function is very difficult. To address this issue, this research proposes a novel approach of using a cellular model subjected to mechanical vibration for analysis. Here, neuron-like differentiated neuroblastoma cells were subjected to vibration at frequencies of 20, 200, 2000, and 20000 Hz for a period of 24 hours at constant amplitude. Cell proliferation and inflammatory cytokine production, including IL-6, IL-1β, and TGF-β1, was measured as response of the cells and indicators of cellular health after vibrational treatment. Cell proliferation was found to increase after 20, 200, and 20000 Hz treatments; p<0.05) and decrease after 2000 Hz treatment (p<0.05). IL-6 production was found to decrease after 200 and 20000 Hz treatments (p<0.01) and increase after 20 and 2000 Hz treatments (p<0.01). IL-1β protein production was found to decrease after 20 Hz and increase after 200 Hz treatments (p<0.001), while TGF-β1 was found to decrease after 200 Hz treatment (p<0.001). The results suggest that cell proliferation and cytokine production serve as a sensitive measure to external impact forces applied to the cells. In addition, it is suggested that inflammatory mechanisms exhibit inhibitory “cross-talk” between IL-6 and IL-1β signaling pathways at 20 and 200 Hz. Inflammatory cytokine data suggest frequency-specific responses, which can be used not only to better understand the mechanism of vibration induced cellular damage, but also to unveil the cellular signaling processes.
APA, Harvard, Vancouver, ISO, and other styles
7

Tabidze, A. A. "ПСИХОФИЗИОЛОГИЧЕСКИЕ И ПСИХОЛОГИЧЕСКИЕ ДЕТЕРМИНАНТЫ АГРЕССИВНОСТИ И ЭМОЦИОНАЛЬНОЙ ЗРЕЛОСТИ ЛИЧНОСТИ КАК ОСНОВА НАЦИОНАЛЬНОЙ БЕЗОПАСНОСТИ." In ПЕРВЫЙ МЕЖКОНТИНЕНТАЛЬНЫЙ ЭКСТЕРРИТОРИАЛЬНЫЙ КОНГРЕСС «ПЛАНЕТА ПСИХОТЕРАПИИ 2022: ДЕТИ. СЕМЬЯ. ОБЩЕСТВО. БУДУЩЕЕ». Crossref, 2022. http://dx.doi.org/10.54775/ppl.2022.29.23.001.

Full text
Abstract:
The “National Security Strategy of the Russian Federation” gives the following concept: “National security is a state of security of the personality, society and the state from internal and external threats”. If the concept of “external threats” is clear and obvious, then the concept of “internal threats” is still outside the serious scientific research. In this work, as “internal threats”, internal psychological causes (determinants, mechanisms) of the aggressiveness of a particular person are considered, motivating him to addictive behavior and pushing him into the ranks of criminal elements, drug addicts, alcoholics, recidivists, terrorists, etc. A new measured psychological indicator is proposed – the degree of emotional maturity. It is shown that the emotional immaturity of a person at an unconscious level, or rather, unconsciously, forces him to get on an aggressive path. The relevance and production of such a study of the psychological reasons for human aggressiveness in modern times is extremely high. Дополненный и переработанный доклад на Секции «Геополитика и безопасность» Российской Академии Естественных Наук, опубликованный в Сборнике материалов научно-практической конференции, посвящённой 25- летию Секции « Геополитика и безопасность» РАЕН, Москва, 2 февраля, 2017 г., стр. 55-62. В «Стратегии национальной безопасности Российской Федерации» даётся следующее понятие: «Национальная безопасность – это состояние защищённости личности, общества и государства от внутренних и внешних угроз» / 1 /. Если понятие «внешние угрозы» является ясным и очевидным, то понятие «внутренние угрозы» до сих пор находится за пределами серьёзного научного исследования. В настоящей работе в качестве «внутренних угроз» рассматриваются внутренние психологические причины (детерминанты, механизмы) агрессивности конкретного человека, мотивирующие его на аддиктивное поведение и толкающие в ряды преступных элементов, наркоманов, алкоголиков, рецидивистов, террористов и др. Предложен новый измеряемый психологический показатель – степень эмоциональной зрелости. Показано, что эмоциональная незрелость человека на неосознаваемом уровне, а точнее – бессознательно, ВЫНУЖДАЕТ его вставать на агрессивный путь. Актуальность и постановка подобного исследования психологических причин агрессивности человека в новейшее время чрезвычайно высока.
APA, Harvard, Vancouver, ISO, and other styles
8

Wong, C. Channy, Douglas R. Adkins, Ronald P. Manginell, Gregory C. Frye-Mason, Peter J. Hesketh, and Thomas Stanczyk. "Development of a Latching Valve for Micro-Chem-Lab™." In ASME 1999 International Mechanical Engineering Congress and Exposition. American Society of Mechanical Engineers, 1999. http://dx.doi.org/10.1115/imece1999-0301.

Full text
Abstract:
Abstract An integrated microsystem to detect traces of chemical agents (μChemLab™) is being developed at Sandia for counter-terrorism and nonproliferation applications. This microsystem has two modes of operation: liquid and gas phase detection. For the gas phase detection, we are integrating these critical components: a preconcentrator for sample collection, a gas chromatographic (GC) separator, a chemically selective flexural plate wave (FPW) array mass detector, and a latching valve onto a single chip. By fabricating these components onto a single integrated system (μChemLab™ on a chip), the advantages of reduced dead volume, lower power consumption, and smaller physical size can be realized. In this paper, the development of a latching valve will be presented. The key design parameters for this latching valve are: a volumetric flow rate of 1 mL/min, a maximum hold-off pressure of 40 kPa (6 psi), a relatively low power, and a fast response time. These requirements have led to the design of a magnetically actuated latching relay diaphragm valve. Magnetic actuation is chosen because it can achieve sufficient force to effectively seal against back pressure and its power consumption is relatively low. The actuation time is rapid, and valve can latch in either an open or closed state. A corrugated parylene membrane is used to separate the working fluid from internal components of the valve. Corrugations in the parylene ensure that the diaphragm presents minimum resistance to the actuator for a relativley large deflection. Two different designs and their performance of the magnetic actuation have been evaluated. The first uses a linear magnetic drive mechanism, and the second uses a relay mechanism. Preliminary results of the valve performance indicates that the required driving voltage is about 10 volts, the measured flow rate is about 50 mL/min, and it can hold off pressure of about 5 psi (34 kPa). Latest modifications of the design show excellent performance improvements.
APA, Harvard, Vancouver, ISO, and other styles
9

إسماعيل جمعه, كويان, and محمد إسماعيل جمعه. ""Forced displacement and its consequences Khanaqin city as a model"." In Peacebuilding and Genocide Prevention. University of Human Development, 2021. http://dx.doi.org/10.21928/uhdicpgp/36.

Full text
Abstract:
"Humanity has known (forced displacement) as one of the inhuman phenomena, and international law considers it a war crime, and the forcibly displaced area is subjected to various types of psychological, physical, cultural and ethnic torture. Khanaqin has been subjected to more displacement compared to the rest of Iraq's cities, and forced displacement is a systematic practice carried out by governments or armed groups intolerant towards groups that differ from them in religion, sect, nationalism, belief, politics, or race, with the aim of evacuating lands and replacing groups other population instead. Forced displacement is either direct, i.e. forcibly removing residents from their areas of residence, or indirect, such as using means of intimidation, persecution, and sometimes murder. This phenomenon varies in the causes and motives that depend on conflicts and wars, and greed, as well as dependence on cruelty in dealing and a tendency to brutality and barbarism. With regard to forced displacement in Iraq before the year 2003 AD, it was a systematic phenomenon according to a presidential law away from punishment, and it does not constitute a crime, as evidenced by the absence of any legal text referring to it in the Iraqi Penal Code, but after the year 2003 AD, criminal judgments were issued against the perpetrators of forced displacement. For the period between 17/7/1967 to 1/5/2003 CE, displacement cases were considered a terrorist crime, and consideration of them would be the jurisdiction of the Iraqi Central Criminal Court. The deportations from the city of Khanaqin were included in the forced displacement, by forcibly transferring the civilian population from the area to which they belong and reside to a second area that differs culturally and socially from the city from which they left. Al-Anbar governorate identified a new home for the displaced residents of Khanaqin, first, and then some of the southern governorates. We find other cases of forced displacement, for example, what happened to the Faili Kurds. They were expelled by a presidential decision, and the decision stated: (They were transferred to Nakra Salman, and then they were deported to Iran). These cases of deportation or displacement have led to the emergence of psychological effects on the displaced, resulting from the feeling of persecution and cultural extermination of the traditions of these people, and the obliteration of their national identity, behavior and practices. After the year 2003 AD, the so-called office for the return of property appeared, and there was a headquarters in every governorate, Except in Diyala governorate, there were two offices, the first for the entire governorate, and the second for Khanaqin district alone, and this indicates the extent of injustice, displacement, deportation, tyranny, and extermination that this city was subjected to. The crimes of forced displacement differ from one case to another according to their causes, origins, goals and causes - as we mentioned - but there are expansive reasons, so that this reason is limited to greed, behavior, cruelty, brutality and barbarism. But if these ideas are impure and adopted by extremists, then they cause calamity, inequality and discrimination, forcing the owners of the land to leave. In modern times, the crime of forced displacement has accompanied colonial campaigns to control other countries, so that displacement has become part of the customs of war, whether in conflicts external or internal. Forced displacement has been criminalized and transformed from an acceptable means of war to a means that is legally and internationally rejected by virtue of international law in the twentieth century, especially after the emergence of the United Nations charter in 1945 AD And the two Additional Protocols attached to the Geneva Conventions of 1977 AD, as well as declarations, , conventions and international conferences that included explicit legal texts criminalizing forced displacement as a universal principle of genocide. My approach in this study is a field-analytical approach, as I present official data and documents issued by the competent authorities and higher government agencies before the year 2003 AD, and indicate the coordinates and modalities of the process of displacement and deportation, as well as an interview with the families of the displaced, taking some information and how to coexist with their new imposed situation. forcibly on them."
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Terrorist Indicators"

1

Cralley, William E., Andrew J. Garfield, and Carlos Echeverria. Understanding Terrorism Lessons of the Past - Indicators for the Future. Fort Belvoir, VA: Defense Technical Information Center, September 2004. http://dx.doi.org/10.21236/ada430547.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Lewis, Dustin, Radhika Kapoor, and Naz Modirzadeh. Advancing Humanitarian Commitments in Connection with Countering Terrorism: Exploring a Foundational Reframing concerning the Security Council. Harvard Law School Program on International Law and Armed Conflict, December 2021. http://dx.doi.org/10.54813/uzav2714.

Full text
Abstract:
The imperative to provide humanitarian and medical services on an urgent basis in armed conflicts is anchored in moral tenets, shared values, and international rules. States spend tens of billions of dollars each year to help implement humanitarian programs in conflicts across the world. Yet, in practice, counterterrorism objectives increasingly prevail over humanitarian concerns, often resulting in devastating effects for civilian populations in need of aid and protection in war. Not least, confusion and misapprehensions about the power and authority of States relative to the United Nations Security Council to set policy preferences and configure legal obligations contribute significantly to this trajectory. In this guide for States, we present a framework to reconfigure relations between these core commitments by assessing the counterterrorism architecture through the lens of impartial humanitarianism. We aim in particular to provide an evidence base and analytical frame for States to better grasp key legal and policy issues related to upholding respect for principled humanitarian action in connection with carrying out the Security Council’s counterterrorism decisions. We do so because the lack of knowledge regarding interpretation and implementation of counterterrorism resolutions matters for the coherence, integrity, and comprehensiveness of humanitarian policymaking and protection of the humanitarian imperative. In addition to analyzing foundational concerns and evaluating discernible behaviors and attitudes, we identify avenues that States may take to help achieve pro-humanitarian objectives. We also endeavor to help disseminate indications of, and catalyze, States’ legally relevant positions and practices on these issues. In section 1, we introduce the guide’s impetus, objectives, target audience, and structure. We also describe the methods that we relied on and articulate definitions for key terms. In section 2, we introduce key legal actors, sources of law, and the notion of international legal responsibility, as well as the relations between international and national law. Notably, Security Council resolutions require incorporation into national law in order to become effective and enforceable by internal administrative and judicial authorities. In section 3, we explain international legal rules relevant to advancing the humanitarian imperative and upholding respect for principled humanitarian action, and we sketch the corresponding roles of humanitarian policies, programs, and donor practices. International humanitarian law (IHL) seeks to ensure — for people who are not, or are no longer, actively participating in hostilities and whose needs are unmet — certain essential supplies, as well as medical care and attention for the wounded and sick. States have also developed and implemented a range of humanitarian policy frameworks to administer principled humanitarian action effectively. Further, States may rely on a number of channels to hold other international actors to account for safeguarding the humanitarian imperative. In section 4, we set out key theoretical and doctrinal elements related to accepting and carrying out the Security Council’s decisions. Decisions of the Security Council may contain (binding) obligations, (non-binding) recommendations, or a combination of the two. UN members are obliged to carry out the Council’s decisions. Member States retain considerable interpretive latitude to implement counterterrorism resolutions. With respect to advancing the humanitarian imperative, we argue that IHL should represent a legal floor for interpreting the Security Council’s decisions and recommendations. In section 5, we describe relevant conduct of the Security Council and States. Under the Resolution 1267 (1999), Resolution 1989 (2011), and Resolution 2253 (2015) line of resolutions, the Security Council has established targeted sanctions as counterterrorism measures. Under the Resolution 1373 (2001) line of resolutions, the Security Council has adopted quasi-“legislative” requirements for how States must counter terrorism in their national systems. Implementation of these sets of resolutions may adversely affect principled humanitarian action in several ways. Meanwhile, for its part, the Security Council has sought to restrict the margin of appreciation of States to determine how to implement these decisions. Yet international law does not demand that these resolutions be interpreted and implemented at the national level by elevating security rationales over policy preferences for principled humanitarian action. Indeed, not least where other fields of international law, such as IHL, may be implicated, States retain significant discretion to interpret and implement these counterterrorism decisions in a manner that advances the humanitarian imperative. States have espoused a range of views on the intersections between safeguarding principled humanitarian action and countering terrorism. Some voice robust support for such action in relation to counterterrorism contexts. A handful call for a “balancing” of the concerns. And some frame respect for the humanitarian imperative in terms of not contradicting counterterrorism objectives. In terms of measures, we identify five categories of potentially relevant national counterterrorism approaches: measures to prevent and suppress support to the people and entities involved in terrorist acts; actions to implement targeted sanctions; measures to prevent and suppress the financing of terrorism; measures to prohibit or restrict terrorism-related travel; and measures that criminalize or impede medical care. Further, through a number of “control dials” that we detect, States calibrate the functional relations between respect for principled humanitarian action and countering terrorism. The bulk of the identified counterterrorism measures and related “control dials” suggests that, to date, States have by and large not prioritized advancing respect for the humanitarian imperative at the national level. Finally, in section 6, we conclude by enumerating core questions that a State may answer to help formulate and instantiate its values, policy commitments, and legal positions to secure respect for principled humanitarian action in relation to counterterrorism contexts.
APA, Harvard, Vancouver, ISO, and other styles
3

Hutchinson, Jade, Julian Droogan, Lise Waldek, and Brian Ballsun-Stanton. Violent Extremist & REMVE Online Ecosystems: Ecological Characteristics for Future Research & Conceptualization. RESOLVE Network, August 2022. http://dx.doi.org/10.37805/remve2022.5.

Full text
Abstract:
Despite this increasing focus on violent extremist ecosystems in the online sphere, it is unclear the extent to which ecological terms in literature on extremism—and particularly literature focused on the online space—are empirically validated or even consistently used. Indeed, there remain fundamental gaps in understanding and defining what we mean when we discuss the ecology of violent extremism and online violent extremist ecosystems. These gaps have notable implications for defining what an online ecosystem actually is—including its characteristics, impact, scope, and reach—and identifying appropriate policy responses to address them. This is of particular importance in the context of the growing volume of studies looking at racially and ethnically motivated (REMVE) communities online and across multiple platforms. Based on findings from a structured literature review examining the use of terms “ecosystem” and “ecology” in terrorism and violent extremism studies and related disciplines, this research brief presents a list of ten ecological characteristics for further consideration by those working in research, policy, and practice focused on online violent extremist ecosystems. Brief examples are provided of how these characteristics might be conceptualized in research into REMVE online ecosystems, given the increased attention REMVE online ecosystems have garnered in recent years. This review of the literature indicates that the concepts and terms “ecosystem” and “ecology” have potential, if limited, analytical utility for policymakers and academics, beyond their descriptive and currently largely metaphorical use in the literature. Despite the clear limitations which accompany the translation of natural science terminology into terrorism and violent extremism studies, certain characteristics of ecosystems may present specific analytical perspectives useful to those seeking to address or study terrorism and violent extremism online. For instance, although digital environments are not true ecological systems in the biological sense, delineating and defining conceptual components of an ecosystem may provide a shared conception when used to describe how extremist violence emerges from online environments, or when used to interpret these descriptions in a policy and practice setting. Descriptive definitions and the proposed advantages and limitations of using characteristics related to ecosystems are addressed in the following sections.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography