1. The document discusses the risks of kidnapping for employees working in global hotspots, where incidents of kidnapping and violence are common. It provides details of one Canadian man, Robert Croke, who was kidnapped along with others from an oil rig off the coast of Nigeria.
2. Companies operating in high-risk locations need to have realistic crisis management and kidnapping response plans in place. They should also educate employees on security practices and acquire kidnap and ransom insurance.
3. While negotiating ransom is often necessary to secure releases, response experts emphasize the need for discretion and treating each case as a financial transaction to minimize encouraging further kidnappings.
Hillary blumenthal drumheller original documents maghreb 3AnonDownload
The document discusses intelligence sharing between Algeria, Libya, Tunisia, and France regarding the reported deaths of two AQIM leaders in Mali. There is skepticism about one of the reported deaths. Concerns are raised that AQIM may carry out retaliatory attacks in Libya due to its unstable security situation. Algeria intends to continue meeting with the remaining AQIM leader to try to protect Algerian interests, while stepping up intelligence monitoring in Libya.
1) Colonel Gaddafi claimed that the protests in Libya were caused by al-Qaeda, and that he was merely fighting terrorism, but many see this as a way for Gaddafi to gain international support for staying in power.
2) While al-Qaeda does have a presence in North Africa, there is no evidence they are directly involved in the Libyan protests, which seem primarily focused on ending corruption.
3) However, if the protests drag on and the rebels grow desperate, they may turn to al-Qaeda for aid, undermining future security in the region. International intervention aims to replace Gaddafi quickly before this can happen.
Three attackers arrived by taxi at Istanbul's Ataturk Airport and attempted to pass through security. Two men opened fire indiscriminately while the third detonated an explosive vest. A total of 41 people were killed and 239 injured in the coordinated attack. Survivors described scenes of carnage as victims were gunned down. One attacker was shot by a heroic police officer but subsequently detonated his suicide vest. The Islamic State has since claimed responsibility for the attack.
Hillary blumenthal drumheller original documents hrc memo more_magariaf_priva...AnonDownload
1. Libyan President Mohammed Yussef el Magariaf told advisors that the death of the U.S. Ambassador at the hands of Islamist militia represents a threat to Libya's new government and its ability to protect non-Islamic allies. Security officials believe the attack was carried out by the Ansar al Sharia brigade, former members of the Libyan Islamic Fighting Group, some loyal to General Abdelhakim Belhaj.
2. The attack on the U.S. consulate in Benghazi was inspired by protests against an anti-Islam film, but was a planned assault by approximately 21 Ansar al Sharia fighters who infiltrated the protest and opened fire with rocket prop
This document summarizes CIA's response to the September 11th attacks. It describes how each of CIA's four main directorates - Intelligence, Science and Technology, National Clandestine Service, and Support - mobilized their unique skills and resources in response. It provides context on Afghanistan and al-Qaeda's presence there. It also highlights Director George Tenet's leadership in directing CIA to track down those responsible for the attacks and work with the Northern Alliance to overthrow the Taliban government in Afghanistan.
Genesis of suicide attacks in Pakistani society.
A suicide attack is an attack on a military or civilian target, in which an attacker intends to kill others, and knows that they will either certainly or most likely die in the process.
GLOBALIZING TORTURE: CIA SECRET DETENTION AND EXTRAORDINARY RENDITION Valentin Vesa
This document summarizes a report about the CIA's secret detention and extraordinary rendition programs following the September 11, 2001 terrorist attacks. It describes how the CIA secretly detained over 100 suspected terrorists in black site prisons around the world and engaged in extraordinary rendition, transferring detainees to foreign countries without legal process for interrogation under torture. The CIA conducted these operations with the participation of at least 54 foreign governments who hosted CIA prisons, detained and tortured individuals, assisted with captures and secret flights, and more. However, the full scale of foreign government involvement and number of victims remains unknown due to extreme secrecy. The document calls for the U.S. and partner governments to acknowledge and be held accountable for their roles in these human rights violating programs
Economic policy has no sense
of direction and this is largely
because Planning Commission,
with all its deficiencies....was a
positive dynamic instrument of
steering the country’s economy and much more..
Hillary blumenthal drumheller original documents maghreb 3AnonDownload
The document discusses intelligence sharing between Algeria, Libya, Tunisia, and France regarding the reported deaths of two AQIM leaders in Mali. There is skepticism about one of the reported deaths. Concerns are raised that AQIM may carry out retaliatory attacks in Libya due to its unstable security situation. Algeria intends to continue meeting with the remaining AQIM leader to try to protect Algerian interests, while stepping up intelligence monitoring in Libya.
1) Colonel Gaddafi claimed that the protests in Libya were caused by al-Qaeda, and that he was merely fighting terrorism, but many see this as a way for Gaddafi to gain international support for staying in power.
2) While al-Qaeda does have a presence in North Africa, there is no evidence they are directly involved in the Libyan protests, which seem primarily focused on ending corruption.
3) However, if the protests drag on and the rebels grow desperate, they may turn to al-Qaeda for aid, undermining future security in the region. International intervention aims to replace Gaddafi quickly before this can happen.
Three attackers arrived by taxi at Istanbul's Ataturk Airport and attempted to pass through security. Two men opened fire indiscriminately while the third detonated an explosive vest. A total of 41 people were killed and 239 injured in the coordinated attack. Survivors described scenes of carnage as victims were gunned down. One attacker was shot by a heroic police officer but subsequently detonated his suicide vest. The Islamic State has since claimed responsibility for the attack.
Hillary blumenthal drumheller original documents hrc memo more_magariaf_priva...AnonDownload
1. Libyan President Mohammed Yussef el Magariaf told advisors that the death of the U.S. Ambassador at the hands of Islamist militia represents a threat to Libya's new government and its ability to protect non-Islamic allies. Security officials believe the attack was carried out by the Ansar al Sharia brigade, former members of the Libyan Islamic Fighting Group, some loyal to General Abdelhakim Belhaj.
2. The attack on the U.S. consulate in Benghazi was inspired by protests against an anti-Islam film, but was a planned assault by approximately 21 Ansar al Sharia fighters who infiltrated the protest and opened fire with rocket prop
This document summarizes CIA's response to the September 11th attacks. It describes how each of CIA's four main directorates - Intelligence, Science and Technology, National Clandestine Service, and Support - mobilized their unique skills and resources in response. It provides context on Afghanistan and al-Qaeda's presence there. It also highlights Director George Tenet's leadership in directing CIA to track down those responsible for the attacks and work with the Northern Alliance to overthrow the Taliban government in Afghanistan.
Genesis of suicide attacks in Pakistani society.
A suicide attack is an attack on a military or civilian target, in which an attacker intends to kill others, and knows that they will either certainly or most likely die in the process.
GLOBALIZING TORTURE: CIA SECRET DETENTION AND EXTRAORDINARY RENDITION Valentin Vesa
This document summarizes a report about the CIA's secret detention and extraordinary rendition programs following the September 11, 2001 terrorist attacks. It describes how the CIA secretly detained over 100 suspected terrorists in black site prisons around the world and engaged in extraordinary rendition, transferring detainees to foreign countries without legal process for interrogation under torture. The CIA conducted these operations with the participation of at least 54 foreign governments who hosted CIA prisons, detained and tortured individuals, assisted with captures and secret flights, and more. However, the full scale of foreign government involvement and number of victims remains unknown due to extreme secrecy. The document calls for the U.S. and partner governments to acknowledge and be held accountable for their roles in these human rights violating programs
Economic policy has no sense
of direction and this is largely
because Planning Commission,
with all its deficiencies....was a
positive dynamic instrument of
steering the country’s economy and much more..
The document provides information on suicide/homicide bombings including identification of bombers, tactics, targets, and interdiction considerations. It notes bombers can be any age, gender, or appearance and use various disguises. Tactics discussed include secondary devices, the use of vehicles and bicycles, and targeting responders. Guidelines are presented for responding personnel including maintaining a safe perimeter and waiting for bomb squads to approach suspects.
A booklet recounting “highlights” of the administration’s “accomplishments and results.” With big type, much white space, children’s-book-like trivia boxes titled “Did You Know?” and lots of color photos of the Bushes posing with blacks and troops, its 52 pages require a reading level closer to “My Pet Goat” than “L'Etranger.”
This document is the literary correlative to “Mission Accomplished.” Bush kept America safe (provided his presidency began Sept. 12, 2001). He gave America record economic growth (provided his presidency ended December 2007). He vanquished all the leading Qaeda terrorists (if you don’t count the leaders bin Laden and al-Zawahri). He gave Afghanistan a thriving “market economy” (if you count its skyrocketing opium trade) and a “democratically elected president” (presiding over one of the world’s most corrupt governments). He supported elections in Pakistan (after propping up Pervez Musharraf past the point of no return). He “led the world in providing food aid and natural disaster relief” (if you leave out Brownie and Katrina).
[description by Frank Rich http://www.nytimes.com/2009/01/04/opinion/04rich.html]
Nick salzano discusses un seems to do nothing to prevent yemen abusesNick Salzano
Nick Salzano- news writer who writes on various topics happening in the world. Nick Salzano, a journalist from New Jersey, has done extensive research on the Yemen abuses.
Hillary blumenthal drumheller original documents hrc memo magariaf,_attack_on...AnonDownload
Magariaf was shaken by attacks on US missions in Libya and gave permission for security forces to open fire to break up crowds. A senior security officer told Magariaf the attacks were inspired by a sacrilegious video and the attack in Egypt. However, Magariaf noted the atmosphere fostering the attacks was due to publicity around Western intelligence cooperation with Qaddafi from 2004-2010. Magariaf's opponents are trying to exploit his suspected CIA links at a time when Western intelligence is under scrutiny in Libya. He is working with Islamist groups to defuse tensions as he tries to organize the government and disarm militias amid religious conflicts that grew after Qaddafi.
The document discusses factors that influenced U.S. decisions regarding intervention in Rwanda from April to July 1994. Key actors included the UN, France, Belgium, and NGOs. The U.S. initially took a cautious approach due to lessons from Somalia. As the RPF neared victory and disease outbreaks grew severe in refugee camps, humanitarian concerns mounted. This shifted U.S. risk calculations, leading President Clinton to commit forces to Operation Support Hope on July 22nd.
The document discusses two topics related to radicalization and extremism:
1) Prevention of extremist radicalization. It notes the problem of radicalization occurring in unexpected places like Sweden and discusses how groups like ISIL have used sophisticated social media campaigns for radicalization.
2) Securing movement of refugees. It briefly mentions that extremist actions often cause humanitarian crises and refugee movements, and states have developed internal crisis responses and policies around this.
1) While a terrorist threat is always possible, the likelihood of an attack in America is low based on the facts. If terrorists wanted to attack the US, they likely would have done so by now through methods like bombings or poisonings.
2) Intelligence estimates from 2002 indicated there were 5000 al Qaeda terrorists and supporters in the US, but the FBI has since arrested many and the threat has been reduced.
3) Dramatic attacks like 9/11 have increased global anti-terrorism efforts and made it harder for groups like al Qaeda to operate freely. The best approach is to assess the facts objectively and not be driven by fear.
1. In March 2015, Saudi Arabia launched an invasion of Yemen called Operation Decisive Storm to reinstate the resigned Yemeni president Mansur Hadi, who was an ally of Saudi Arabia, and undermine the Houthi movement.
2. Saudi airstrikes on Yemen, supported by US intelligence, have destroyed Yemen's infrastructure while over 2,500 Yemenis including 400 children have been killed and more injured.
3. An American analyst observed that the Yemen war is actually a proxy war between Iran and the US, not Saudi Arabia, and that the US supported radical groups in Yemen to avoid direct conflict with Houthis until launching the invasion.
The document discusses international intervention in the Sierra Leone civil war from 1991 to 2002. It analyzes the various attempts at intervention, including: coercive intervention by ECOMOG which was ineffective; mercenary intervention by Executive Outcomes which succeeded militarily but was controversial; UN monitoring and peacekeeping missions which struggled due to lack of resources and clashes with ECOMOG; and unilateral British intervention which successfully rescued hostages and helped end the war by enforcing a diamond embargo. Ultimately, the document argues that international intervention was crucial and effective in ending the conflict, though the UN and ECOMOG interventions faced significant challenges and could have been improved.
Iraqi journalists face many dangers, including threats from militias, politicians, and suicide bombers. To help protect journalists, training programs have been established to teach them safety and security skills. One such program trained 75 Iraqi journalists in topics like first aid, scanning environments for danger, and using encryption. The journalists said the training was their first exposure to important safety information and could help save their lives both on the battlefield and in everyday life in Iraq. However, more extensive training is still needed, and the psychological trauma experienced by many Iraqi journalists also needs support.
Globalization of the World after the terrorists attack on 9/11. Focus on not only the economic and political impact but also on a social-cultural scale.
This article discusses how the Department of Defense (DOD) counters terrorism through partnerships. Domestically, DOD counterintelligence agents work with the FBI on Joint Terrorism Task Forces to investigate terrorist threats and protect DOD personnel and assets. Overseas, DOD partners with the State Department on Force Protection Detachments to share intelligence with military commanders transiting high-risk areas. The article cites an example of a DOD agent assisting an FBI investigation that led to the arrest of a former Navy sailor providing terrorist support.
We must avoid the temptation to engage in simplistic assumptions and/or consequent conclusions that what Islam is in the text is what the religion is in different contexts of Muslim societies across the contemporary world. It is however arguable to say that the greater issue confronting the Islamic world today is that of violent extremism or terrorism. The latter, which has variously been described as “Islamic Jihadist” movement, has enjoyed much popularity for improving cross-cultural dialogue across the world but notoriety for its promotion of violence. Represented in the West African sub-region by the Boko Haram group, the activities of these so-called Islamic movements have equally raised questions about original teachings of Islam – the precepts and principles established by Prophet Muhammad for interreligious dialogue and perhaps most importantly the position of Islam on freedom of, in and within religion. This presentation explores and engages the dialectics in these perspectives, rereads factors for the incidence of violent extremism in the West African sub-region and offer suggestions by which the region could achieve greater intercultural and interreligious rapprochement, through the exploration of intra-Islamic peace-building strategies and instruments.
Unity, Betrayal and Failed States in Modern TimesDr. Dan EKONGWE
The politics of identity and wars of fragmentation of states stern from broken promises by political leaders and state authorities to respect the convenants reached by founding fathers of most modern states thereby leading to increasing ethno/cultural nationalism and wars of identity. We have seen these across the literature from former Yugoslavia and Czechoslovakia, Rwanda, Sudan, Cameroon, Togo, Ghana, Central African Republic, Zimbabwe, Nigeria and Ivory Coast.. The application of the Responsibility to Protect (R2P) in its pre UN non approval in Europe to the post application by UN in Lybia has given us the reason to believe that sustainable peace in each state must respect the foundation doctrine of which each country was created, else Africa in particular will continue to witnessed endless wars in age when drone technology and assymetric warfare has gained currency.
The document discusses counterintelligence (CI) and some of the challenges involved. It notes that CI aims to protect a country's intelligence operations from hostile penetration. While CI should permeate all aspects of intelligence, it is often seen as just a security issue. The document also discusses different types of CI (collection, defensive, offensive). It highlights problems that can arise in assessing CI operations, such as covert penetrations being difficult to detect and tendencies to trust one's own people. Problems in uncovering spies like Aldrich Ames and Robert Hanssen are examined.
Presented is my genre analysis essay, the culimantion of my coursework in Integrated Seminar, completed at the University of Idaho in the Spring 2017 semester.
Running head DARK DAYS OF BONDAGE1DARK DAYS OF BONDAGE8.docxsusanschei
Running head: DARK DAYS OF BONDAGE 1
DARK DAYS OF BONDAGE 8
Dark Days of Bondage: Human Trafficking as Modern Day Slavery
John Doe
University of Maryland University College
Psychology 332
Professor Darrin Campen
September 11, 2011
Dark Days of Bondage: Human Trafficking as Modern Day Slavery
What do we think of when we think of slavery? There is the slavery that existed in prehistoric times. Countries such as China, India, and Korea all have a history of slavery that predates current history (Encyclopædia Britannica, n.d.). Many of the magnificent structures seen in Egypt were built with the forced labor of slaves. There are passages that can be found throughout the Bible that reference this practice. From Deuteronomy 7: 8 (New International Version): “But it was because the LORD loved you and kept the oath he swore to your ancestors that he brought you out with a mighty hand and redeemed you from the land of slavery, from the power of Pharaoh king of Egypt.” Anyone who has studied American History is well-aware of the plight of Africans who were taken from their land and brought across the Atlantic to what is now the United States to serve as slaves for primarily white owners. Thankfully, with the passage of many laws and with a new awareness of human rights, those practices were brought to an end. However, what can be said of slavery today? Despite various laws and regulations, there is still very much a type of modern day slavery in the form of human trafficking.
To begin the argument in support of the idea that human trafficking is a modern day form of slavery, we can begin by examining slavery itself. Merriam-Webster defines slavery as, “submission to a dominating influence” and “the state of a person who is a chattel of another.” Dictionary.com gives an alternative definition as, “a person who is the property of and wholly subject to another; a bond servant” and “a person entirely under the domination of some influence or person.” Both definitions boil down to the same idea: that slavery is the stripping of a human being of their most basic rights. The balance of power is completely one-sided, with the master having complete control. The slave, as property, is not allowed a paycheck; is not allocated vacation time; cannot quit his or her “job”; and is more than likely held against his or her will.
Next, we can explore human trafficking a little further. In December 2000, the United Nations sponsored a treaty against transnational organized crime. One of the protocols therein, entitled the Protocol to Prevent, Suppress and Punish Trafficking in Persons, describes human trafficking as:
the recruitment, transportation, transfer, harbouring or receipt of persons, by means of the threat or use of force or other forms of coercion, of abduction, of fraud, of deception, of the abuse of power or of a position of vulnerability or of the giving or receiving of payments or benefits to achieve the conse ...
1) The document summarizes 10 major events that occurred between 1993-2010, ranking them from #10 to #1 in order of importance.
2) The #1 ranked event was the Rwandan Genocide of 1994 where 800,000 Tutsi people, making up 20% of Rwanda's population, were killed by Hutu militias over the course of 100 days.
3) Other top events included 9/11, the US "War on Terror", the Human Genome Project, Hurricane Katrina, the Oklahoma City Bombing, and the Virginia Tech Massacre.
The document discusses the start of the Iraq War, including the Iran-Iraq War in the 1980s where the US supported Iraq against Iran. It then discusses the Gulf War in the 1990s where the US led a coalition against Iraq after it invaded Kuwait. This sets the stage for the US invasion of Iraq in 2003 over claims that Iraq possessed weapons of mass destruction, though it was later revealed that Iraq did not have active WMD programs. The document also examines the human costs of the war through civilian casualties, refugee crises, torture of prisoners, and the mental health impact on soldiers including high suicide rates.
The document discusses several topics related to globalization including:
1. Globalization represents a complex process that reshapes the international scenario and roles of global players as companies become more multinational and states face new challenges in regulating economic activity.
2. Migration, human/sex trafficking, and transnational organized crime tend to increase with globalization as borders become more porous, but states still have alternatives for effectively participating in globalization.
3. Human/sex trafficking definitions, statistics, and country tier rankings according to compliance with anti-trafficking standards are reviewed, noting it remains a problem in the US as well as globally.
4. Transnational organized criminal groups like drug cartels present strategic
The document provides information on suicide/homicide bombings including identification of bombers, tactics, targets, and interdiction considerations. It notes bombers can be any age, gender, or appearance and use various disguises. Tactics discussed include secondary devices, the use of vehicles and bicycles, and targeting responders. Guidelines are presented for responding personnel including maintaining a safe perimeter and waiting for bomb squads to approach suspects.
A booklet recounting “highlights” of the administration’s “accomplishments and results.” With big type, much white space, children’s-book-like trivia boxes titled “Did You Know?” and lots of color photos of the Bushes posing with blacks and troops, its 52 pages require a reading level closer to “My Pet Goat” than “L'Etranger.”
This document is the literary correlative to “Mission Accomplished.” Bush kept America safe (provided his presidency began Sept. 12, 2001). He gave America record economic growth (provided his presidency ended December 2007). He vanquished all the leading Qaeda terrorists (if you don’t count the leaders bin Laden and al-Zawahri). He gave Afghanistan a thriving “market economy” (if you count its skyrocketing opium trade) and a “democratically elected president” (presiding over one of the world’s most corrupt governments). He supported elections in Pakistan (after propping up Pervez Musharraf past the point of no return). He “led the world in providing food aid and natural disaster relief” (if you leave out Brownie and Katrina).
[description by Frank Rich http://www.nytimes.com/2009/01/04/opinion/04rich.html]
Nick salzano discusses un seems to do nothing to prevent yemen abusesNick Salzano
Nick Salzano- news writer who writes on various topics happening in the world. Nick Salzano, a journalist from New Jersey, has done extensive research on the Yemen abuses.
Hillary blumenthal drumheller original documents hrc memo magariaf,_attack_on...AnonDownload
Magariaf was shaken by attacks on US missions in Libya and gave permission for security forces to open fire to break up crowds. A senior security officer told Magariaf the attacks were inspired by a sacrilegious video and the attack in Egypt. However, Magariaf noted the atmosphere fostering the attacks was due to publicity around Western intelligence cooperation with Qaddafi from 2004-2010. Magariaf's opponents are trying to exploit his suspected CIA links at a time when Western intelligence is under scrutiny in Libya. He is working with Islamist groups to defuse tensions as he tries to organize the government and disarm militias amid religious conflicts that grew after Qaddafi.
The document discusses factors that influenced U.S. decisions regarding intervention in Rwanda from April to July 1994. Key actors included the UN, France, Belgium, and NGOs. The U.S. initially took a cautious approach due to lessons from Somalia. As the RPF neared victory and disease outbreaks grew severe in refugee camps, humanitarian concerns mounted. This shifted U.S. risk calculations, leading President Clinton to commit forces to Operation Support Hope on July 22nd.
The document discusses two topics related to radicalization and extremism:
1) Prevention of extremist radicalization. It notes the problem of radicalization occurring in unexpected places like Sweden and discusses how groups like ISIL have used sophisticated social media campaigns for radicalization.
2) Securing movement of refugees. It briefly mentions that extremist actions often cause humanitarian crises and refugee movements, and states have developed internal crisis responses and policies around this.
1) While a terrorist threat is always possible, the likelihood of an attack in America is low based on the facts. If terrorists wanted to attack the US, they likely would have done so by now through methods like bombings or poisonings.
2) Intelligence estimates from 2002 indicated there were 5000 al Qaeda terrorists and supporters in the US, but the FBI has since arrested many and the threat has been reduced.
3) Dramatic attacks like 9/11 have increased global anti-terrorism efforts and made it harder for groups like al Qaeda to operate freely. The best approach is to assess the facts objectively and not be driven by fear.
1. In March 2015, Saudi Arabia launched an invasion of Yemen called Operation Decisive Storm to reinstate the resigned Yemeni president Mansur Hadi, who was an ally of Saudi Arabia, and undermine the Houthi movement.
2. Saudi airstrikes on Yemen, supported by US intelligence, have destroyed Yemen's infrastructure while over 2,500 Yemenis including 400 children have been killed and more injured.
3. An American analyst observed that the Yemen war is actually a proxy war between Iran and the US, not Saudi Arabia, and that the US supported radical groups in Yemen to avoid direct conflict with Houthis until launching the invasion.
The document discusses international intervention in the Sierra Leone civil war from 1991 to 2002. It analyzes the various attempts at intervention, including: coercive intervention by ECOMOG which was ineffective; mercenary intervention by Executive Outcomes which succeeded militarily but was controversial; UN monitoring and peacekeeping missions which struggled due to lack of resources and clashes with ECOMOG; and unilateral British intervention which successfully rescued hostages and helped end the war by enforcing a diamond embargo. Ultimately, the document argues that international intervention was crucial and effective in ending the conflict, though the UN and ECOMOG interventions faced significant challenges and could have been improved.
Iraqi journalists face many dangers, including threats from militias, politicians, and suicide bombers. To help protect journalists, training programs have been established to teach them safety and security skills. One such program trained 75 Iraqi journalists in topics like first aid, scanning environments for danger, and using encryption. The journalists said the training was their first exposure to important safety information and could help save their lives both on the battlefield and in everyday life in Iraq. However, more extensive training is still needed, and the psychological trauma experienced by many Iraqi journalists also needs support.
Globalization of the World after the terrorists attack on 9/11. Focus on not only the economic and political impact but also on a social-cultural scale.
This article discusses how the Department of Defense (DOD) counters terrorism through partnerships. Domestically, DOD counterintelligence agents work with the FBI on Joint Terrorism Task Forces to investigate terrorist threats and protect DOD personnel and assets. Overseas, DOD partners with the State Department on Force Protection Detachments to share intelligence with military commanders transiting high-risk areas. The article cites an example of a DOD agent assisting an FBI investigation that led to the arrest of a former Navy sailor providing terrorist support.
We must avoid the temptation to engage in simplistic assumptions and/or consequent conclusions that what Islam is in the text is what the religion is in different contexts of Muslim societies across the contemporary world. It is however arguable to say that the greater issue confronting the Islamic world today is that of violent extremism or terrorism. The latter, which has variously been described as “Islamic Jihadist” movement, has enjoyed much popularity for improving cross-cultural dialogue across the world but notoriety for its promotion of violence. Represented in the West African sub-region by the Boko Haram group, the activities of these so-called Islamic movements have equally raised questions about original teachings of Islam – the precepts and principles established by Prophet Muhammad for interreligious dialogue and perhaps most importantly the position of Islam on freedom of, in and within religion. This presentation explores and engages the dialectics in these perspectives, rereads factors for the incidence of violent extremism in the West African sub-region and offer suggestions by which the region could achieve greater intercultural and interreligious rapprochement, through the exploration of intra-Islamic peace-building strategies and instruments.
Unity, Betrayal and Failed States in Modern TimesDr. Dan EKONGWE
The politics of identity and wars of fragmentation of states stern from broken promises by political leaders and state authorities to respect the convenants reached by founding fathers of most modern states thereby leading to increasing ethno/cultural nationalism and wars of identity. We have seen these across the literature from former Yugoslavia and Czechoslovakia, Rwanda, Sudan, Cameroon, Togo, Ghana, Central African Republic, Zimbabwe, Nigeria and Ivory Coast.. The application of the Responsibility to Protect (R2P) in its pre UN non approval in Europe to the post application by UN in Lybia has given us the reason to believe that sustainable peace in each state must respect the foundation doctrine of which each country was created, else Africa in particular will continue to witnessed endless wars in age when drone technology and assymetric warfare has gained currency.
The document discusses counterintelligence (CI) and some of the challenges involved. It notes that CI aims to protect a country's intelligence operations from hostile penetration. While CI should permeate all aspects of intelligence, it is often seen as just a security issue. The document also discusses different types of CI (collection, defensive, offensive). It highlights problems that can arise in assessing CI operations, such as covert penetrations being difficult to detect and tendencies to trust one's own people. Problems in uncovering spies like Aldrich Ames and Robert Hanssen are examined.
Presented is my genre analysis essay, the culimantion of my coursework in Integrated Seminar, completed at the University of Idaho in the Spring 2017 semester.
Running head DARK DAYS OF BONDAGE1DARK DAYS OF BONDAGE8.docxsusanschei
Running head: DARK DAYS OF BONDAGE 1
DARK DAYS OF BONDAGE 8
Dark Days of Bondage: Human Trafficking as Modern Day Slavery
John Doe
University of Maryland University College
Psychology 332
Professor Darrin Campen
September 11, 2011
Dark Days of Bondage: Human Trafficking as Modern Day Slavery
What do we think of when we think of slavery? There is the slavery that existed in prehistoric times. Countries such as China, India, and Korea all have a history of slavery that predates current history (Encyclopædia Britannica, n.d.). Many of the magnificent structures seen in Egypt were built with the forced labor of slaves. There are passages that can be found throughout the Bible that reference this practice. From Deuteronomy 7: 8 (New International Version): “But it was because the LORD loved you and kept the oath he swore to your ancestors that he brought you out with a mighty hand and redeemed you from the land of slavery, from the power of Pharaoh king of Egypt.” Anyone who has studied American History is well-aware of the plight of Africans who were taken from their land and brought across the Atlantic to what is now the United States to serve as slaves for primarily white owners. Thankfully, with the passage of many laws and with a new awareness of human rights, those practices were brought to an end. However, what can be said of slavery today? Despite various laws and regulations, there is still very much a type of modern day slavery in the form of human trafficking.
To begin the argument in support of the idea that human trafficking is a modern day form of slavery, we can begin by examining slavery itself. Merriam-Webster defines slavery as, “submission to a dominating influence” and “the state of a person who is a chattel of another.” Dictionary.com gives an alternative definition as, “a person who is the property of and wholly subject to another; a bond servant” and “a person entirely under the domination of some influence or person.” Both definitions boil down to the same idea: that slavery is the stripping of a human being of their most basic rights. The balance of power is completely one-sided, with the master having complete control. The slave, as property, is not allowed a paycheck; is not allocated vacation time; cannot quit his or her “job”; and is more than likely held against his or her will.
Next, we can explore human trafficking a little further. In December 2000, the United Nations sponsored a treaty against transnational organized crime. One of the protocols therein, entitled the Protocol to Prevent, Suppress and Punish Trafficking in Persons, describes human trafficking as:
the recruitment, transportation, transfer, harbouring or receipt of persons, by means of the threat or use of force or other forms of coercion, of abduction, of fraud, of deception, of the abuse of power or of a position of vulnerability or of the giving or receiving of payments or benefits to achieve the conse ...
1) The document summarizes 10 major events that occurred between 1993-2010, ranking them from #10 to #1 in order of importance.
2) The #1 ranked event was the Rwandan Genocide of 1994 where 800,000 Tutsi people, making up 20% of Rwanda's population, were killed by Hutu militias over the course of 100 days.
3) Other top events included 9/11, the US "War on Terror", the Human Genome Project, Hurricane Katrina, the Oklahoma City Bombing, and the Virginia Tech Massacre.
The document discusses the start of the Iraq War, including the Iran-Iraq War in the 1980s where the US supported Iraq against Iran. It then discusses the Gulf War in the 1990s where the US led a coalition against Iraq after it invaded Kuwait. This sets the stage for the US invasion of Iraq in 2003 over claims that Iraq possessed weapons of mass destruction, though it was later revealed that Iraq did not have active WMD programs. The document also examines the human costs of the war through civilian casualties, refugee crises, torture of prisoners, and the mental health impact on soldiers including high suicide rates.
The document discusses several topics related to globalization including:
1. Globalization represents a complex process that reshapes the international scenario and roles of global players as companies become more multinational and states face new challenges in regulating economic activity.
2. Migration, human/sex trafficking, and transnational organized crime tend to increase with globalization as borders become more porous, but states still have alternatives for effectively participating in globalization.
3. Human/sex trafficking definitions, statistics, and country tier rankings according to compliance with anti-trafficking standards are reviewed, noting it remains a problem in the US as well as globally.
4. Transnational organized criminal groups like drug cartels present strategic
Essay Of Mice And Men. A Review of Of Mice and Men - GCSE English - Marked by...Rocio Garcia
Of Mice and Men Essay - GCSE English - Marked by Teachers.com. School essay: Of mice and men essay introduction. Of Mice and Men: Character Analysis, Five-Paragraph Essay | TpT. Of Mice and Men Essay Writing by SimonDarcy - Teaching Resources - Tes. Of Mice and Men Essay Assignment. Of Mice And Men Lennie Essays. Of Mice and Men Notes for Essay Topics by Deana's House of English Arts. Of Mice and Men Essay. Mice and Men Essay Prompts. Summary On Of Mice And Men - Tranny Body Perfect. Of mice and men george and lennie friendship essay. Of Mice And Men - GCSE English - Marked by Teachers.com. Essay of mice and men | John Steinbeck | Hero. Of Mice and Men. - GCSE English - Marked by Teachers.com. Example intro and Body for Of Mice and Men Essay. The theme of loneliness in his novel 'Of Mice and Men' Essay - Free .... of mice and men essay | John Steinbeck | Books. Of mice and men - GCSE English - Marked by Teachers.com. Essay - of Mice and Men Is A Book About Desperation and Despair. Of Mice and Men - GCSE English - Marked by Teachers.com. Of Mice and Men Essay | English (Advanced) - Year 11 HSC | Thinkswap. Of Mice and Men essay | Teaching Resources. Of Mice and Men Essay Question - Document in GCSE English Literature. A Review of 'Of Mice and Men' - GCSE English - Marked by Teachers.com. Of mice and men essay. - GCSE English - Marked by Teachers.com. Of Mice and Men Essay - Journey | English (Standard) - Year 11 HSC .... A* Of Mice and Men exemplar essay | Teaching Resources. Of Mice And Men - Critical Essay - GCSE English - Marked by Teachers.com. Of Mice and Men: Literary Essay Essay Of Mice And Men
Essay Of Mice And Men. A Review of Of Mice and Men - GCSE English - Marked by...
CIRM-03 Hostile Zones
1. 26 Canadlan lnsurance | risk manager summer 2011 www.citopbroker.com www.citopbroker.com summer 2011 Canadlan lnsurance | risk manager 27
>> by Brynna Leslie
Forget about Hollywood
myths when it comes to
protecting employees in
global hotspots where
kidnappings and political
violence are common
emergency procedure dictated half
the crew would be mustering. But an
unlocked freezer door led the militants
into the safety area through the galley
kitchen where approximately 30 men
were lying on the floor. The gunmen
demanded to see the captain. When no
one stepped forward, the leader shot a
single bullet into the floor. It ricocheted
and hit Croke, shattering his foot.
After failed attempts to bribe the
militants with thousands of dollars
in cash and computer equipment,
another man was shot in the leg. Then
“they gathered all the white people,”
including Croke, two Americans, and
two French nationals, and loaded them
into four boats. Croke lost his shoes in
the dark ocean water. The militants
hijacked a supply vessel near the rig
guarded by Indonesian soldiers and
took two more hostages. For the next
nine days, Croke was led, bloodied and
barefoot, by boat along through the
narrow rivers of the scorching Nigerian
jungle, sleeping in tents, sustained
with instant noodles and, some days,
water. Only when the Nigerian Navy
began bombing overhead did the mili-
tants agree to negotiate the release of
the hostages in return for amnesty.
The Business of Kidnapping
While it may sound like a Hollywood
movie, incidents like this occur every
day. Although worldwide kidnapping
statistics are generally underreported
and unreliable, ASI Global, a U.S.-
based kidnap response firm, unofficially
estimates that abductions in hot zones
worldwide—including Latin America,
Africa and the Middle East—are
increasing both in frequency and scope.
Numbers are so varied that estimates
from myriad sources suggest there are
anywhere from thousands to tens of
thousands of abductions each year.
“Many victims’ families opt to resolve
cases without involving the authorities,”
says Mason Wilder, an intelligence
analyst at ASI Global. “There are typi-
cally large discrepancies between offi-
cial statistics and unofficial estimates,
and there are blurry definitions of what
constitutes kidnapping.”
The company has compiled an
unofficial list of the countries where
kidnapping for ransom occurs most
often, including Mexico, Venezuela,
Colombia, Honduras, Nigeria,
Pakistan, Afghanistan, India, Russia,
and Philippines. Statistics Canada data
show that approximately 1.8 million
Canadians travelled to these hot zones
in 2009. Many of these countries share
the reputation of being politically
unstable, resource-rich nations, which
often reluctantly become host to large
international firms.
“In Nigeria, for example, most
kidnappings occur in the Niger Delta
region due to the rebel activity and
high concentration of foreign compa-
nies there,” explains Wilder. “Poverty,
unemployment and poor police capa-
bilities are the primary driving forces
behind the growing kidnapping rate.”
The majority of victims are local pol-
iticians, oil workers and their families.
Many of them, like Croke, are expatri-
ates in the oil and gas industry or con-
struction sector. Extended muggings
have also become common, where a
foreign business person is detained long
enough to travel from ATM to ATM
and deplete cash finances. And while
Croke was fortunate to be released in a
timely fashion, many hostages are held
for months, and forced to pay exor-
bitant ransom fees; some are injured
or even killed during the abduction
process or rescue attempts.
“There’s been a trend away from a
few high-dollar targets to more of a
volume business model among kidnap-
pers,” explains Dan Johnson, chief of
operations at ASI Global. “There’s a
view that the upper and middle class
What Every
Risk Manager
Should Know
1 An up-to-date and realistic
crisis management plan is
essential for every company,
every employee, in every
location. “If your kidnap
response plan includes military
intervention from the FBI or
the Canadian embassy,” says
Johnson, “you may want to
revisit it.”
2 All Canadian travellers should
register with the Canadian
Diplomatic and Consular
Services. In the event of an
emergency, things can get done
more quickly if the government
is aware an individual is out of
the country.
3 Prepare the traveller before they
travel. “That includes educating
them on the culture, telling them
what the crime rates are, which
areas are safe or not, and what
to do if something goes wrong,”
says Johnson.
4 Kidnap and Ransom insurance
is available. However, most
products are reimbursement-
based and the upfront costs of
resolving a kidnap situation can
be quite high. For companies
operating in hot zones, this
product is essential. But keep
it close to your chest. Individual
employees and their families
need not know the details of
the coverage.
In
Harm’s
Way
S
hortly after midnight on November 8, 2010, PPI
Technology Services employee Robert Croke was get-
ting ready for bed on an Afren PLC oil rig, 11 kilome-
tres off the coast of Nigeria. Against safety protocol,
Croke was in a trailer adjacent to the helicopter deck, far from
the confined centre of the rig where 70 others were bedding
down for the night, and a handful still working. He heard a
garbled announcement over the loudspeaker, followed by the
single ring of a bell. Croke walked up five stairs to investigate,
and found himself looking down the barrel of a gun.
“My mouth went dry as if I’d eaten a full bottle of Tums, I
just had no saliva,” Croke recalled in a telephone interview from
his home in Torbay, Newfoundland.
Eight Nigerian militants forced him at gunpoint to tour the rig.
Expecting the rest of the crew to be in lockdown, Croke obeyed.
They reached the watertight, bolted doors to the galley, where
GettyImages
2. 28 Canadlan lnsurance | risk manager summer 2011 www.citopbroker.com www.citopbroker.com summer 2011 Canadlan lnsurance | risk manager 29
can’t afford security and other mea-
sures, offering kidnappers the path of
least resistance.”
K&R Myths and Realities
Former British Prime Minister
Margaret Thatcher famously declared
that negotiating with terrorists
would only serve to fuel terrorism.
Firms like ASI Global, and its com-
petitor, UK-based Terra Firma Risk
Management, (which declined to
comment for this article), have their
fair share of critics. They, along with
their partner insurance companies
who provide kidnap and ransom
(K&R) coverage, are seen by pundits
as perpetuating the worldwide kidnap
for ransom business.
The increase in global response
firms and K&R products has paralleled
the upward trend in abductions, but
Johnson believes it’s a chicken-and-egg
argument. Kidnapping may simply be
an offshoot of the overall increase in
international business transactions, he
says. As for ransom negotiations, “how
else are you going to get them out?”
he asks rhetorically.
“There’s not a lot of support that
comes out of diplomatic channels and
if you think the Canadian government
is going to send in 10 highly trained
ninjas to get you out, you are mis-
taken,” says Johnson. “And contrary to
Hollywood depictions, such as in the
2000 movie Proof of Life, there are no
Russell Crowe-type, ex-military cowboys
who make stealth entries into mountain
camps, kick down doors, shoot down
militants and pull your man out.
“Russell Crowe and I are both
incredibly good-looking and that’s
where the reality of that movie
ended,” jokes Johnson. “We believe
that kidnap for ransom is entirely a
financial negotiation and that we can
bring about a resolution financially
by coming to an agreed price with
the kidnappers. We are guided with
one principle and that is the safe and
timely release of the victim.”
In the event of kidnap for ransom,
family members are best-placed to
conduct direct negotiations with the
kidnappers based on an established
set of protocols. Often, says Johnson,
both the abducted and the kidnappers
remain unaware of third-party inter-
vention, including if and when there is
an insurance policy in place.
“If you are abducted, there is a
natural tendency to feel that you have
to self-negotiate,” explains Johnson.
“You show value so you won’t be
killed or won’t be abused. The prob-
lem is, if you say you’ve got a million
Who’s Responsible?
The special case of overseas freelance employees
In February, 20-year-old journalist Jonathan Pednault was in Egypt,
unofficially working on a story for L’actualité, a Quebec news magazine,
when he was assaulted and then detained by Egyptian officials. When
editor Carole Beaulieu heard of his arrest, she immediately began the
process of getting him out.
Technically, Beaulieu was not responsible for Pednault’s release.
“The rules say that independent journalists are independent journalists,”
says Beaulieu. “They are expected to be responsible for their own security
and insure themselves. But in reality, we had a duty to take care of him.
It was a moral duty, and I expect that as an organization we would not be
able to resist the international pressure to avoid this duty.”
The team were fortunate that Pednault had been travelling with two
others, one a television cameraman from New Zealand who was able to
contact his embassy to negotiate their release. Although the ordeal was
over in less than 24 hours, Beaulieu learned more about crisis management
planning in that short time than she had in two decades as a journalist.
When hiring freelancers, Beaulieu now insists on having minimal emer-
gency contact information, including a copy of the passport and the name
of immediate family. She also encourages independent journalists to travel
in groups, and to maintain regular contact with the news room.
dollars in a retirement account and
a three-million-dollar home, it raises
the expectations of the kidnappers.
So there’s a lot of secrecy around the
K&R policy, who has the policy and
who doesn’t. Often the people that
have this type of insurance don’t even
know they have it.”
ASI Global is the responder for
clients of Travelers Insurance, while
Ironshore Canada is in the final stages
of putting together a program around
K&R in partnership with Terra Firma
Risk Management. Both insurers were
shy about discussing the details around
these products with the media.
“This is incredibly tightly controlled
information,” says Johnson. “Even we
don’t know who among our clients has
insurance with Travelers.”
Managing Hot-Zone Risk
While there are no data on the num-
ber of Canadians working abroad,
Statistics Canada data show Canadians
made 53 million cross-border visits in
2009. Because many Canadians fail to
register with consular services when
outside of the country, this may repre-
sent only a portion of the actual trips.
“Corporations need to be focusing
on providing proper ‘duty of care’ for
their employees when living and travel-
ling outside of their country’s borders,”
says Mark Hall, vice-president of
business development for medical,
safety and security solutions company
FrontierMEDEX Group, the parent
company of ASI Global which spe-
cializes in emergency medical and
political evacuations. “That includes
medical assistance and evacuation
support, and also security, providing
proper intelligence, monitoring and
support to keep them safe while living
and travelling overseas.”
Both ASI Global and
FrontierMEDEX Group provide
customized training, focused on reduc-
ing risks and preparing individuals to
respond to fluid conditions generated
by unforeseen circumstances, and
be more security-savvy. The primary
training goals entail the protection
of human lives, corporate image and
reputation, proprietary information
and operational assets.
“Every country has its own laws that
you must obey and unique customs to
be aware of,” explains Hall. “It’s really
important to be informed about the
simple things like how to meet and
greet, how to blend in and how not
to offend the host culture. People are
looking for cultural faux pas as oppor-
tunities, and this is something that can
get you into trouble pretty quickly.”
But companies also need to have
a crisis management plan in place,
which includes who is responsible
for overseeing response, and who to
contact in case of emergency. Without
established protocols, an emergency
situation has a tendency to be mis-
handled, or ignored until it reaches a
devastating climax.
“In almost every case, there are
series of events that we’re monitoring
through our intelligence division that
we can proactively anticipate before
events unfold,” says Hall. “A majority
of our clients hire our company to
basically tell them when to worry, so
that they can focus on their day-to-
day responsibilities.”
In Canada, World Travel Protection
Canada Inc. (WTP) offers a travel
tracking and monitoring program on
a mobile smart device (BlackBerry),
keeping clients up-to-date on politi-
cal and medical risk in various coun-
tries, and the relative location of their
employees. As the service arm for
Zurich Insurance and many white-label
clients that use WTP emergency medi-
cal, travel security and travel assistance
services around the world, WTP is one
of the largest of its kind in Canada.
“Most corporations have a very good
understanding of their fixed assets
abroad—their property, their equip-
ment and services—and they do take
precautions,” says Abasse Asgaraly,
director of new business develop-
ment for WTP. “But when it comes to
mobile assets—travellers and expatri-
ates—they usually have a very substan-
dard understanding of the risks.”
It is essential, says Asgaraly, to have a
firm like WTP providing intelligence
and advice on potential hot zones,
and to have established emergency
protocols on what to do in the event
of a political or medical evacuation.
For large-scale evacuations, much of
the advance work is about locating
hospitals in the vicinity, how good the
roads are, and if there is a possibility of
bringing in aircraft.
“We are there to help clients for-
mulate a contingency plan to evacu-
ate people in case of political risk,”
says Asgaraly. “When it comes to very
specific operations like mining or
energy companies, in our business,
we cannot improvise. If we improvise,
we lose too much time.” RM
“ There’s not a lot of support from diplomatic
channels and if you think the Canadian
government is going to send in 10 highly trained
ninjas to get you out, you are mistaken.
”