Creation of Al-Qaeda, Creation of ISIS (Daesh), Piazza Fontana bombing,Kidnapping attempt and assassination of
General René Schneider,The Contras,Propaganda,Cuban exiles,Orlando Bosch,Luis Posada Carriles
This document provides an overview of the historical origin and definitions of terrorism. It discusses:
- The earliest known terrorist groups dating back to 1st century AD Jewish groups.
- How the term "terrorism" originated during the French Revolution's Reign of Terror period.
- Definitions of terrorism from legislation in the UK, US, and Canada that involve use of violence for political, religious, or ideological goals.
- Challenges in defining terrorism given different perspectives on what constitutes justified vs unjustified violence.
- Types of terrorism like state-sponsored, bio-, and cyber-terrorism.
To win a war against the most powerful military in the world, General George Washington employed a vast network of spies to gather intelligence and deceive the enemy with misinformation. As the commander-in-chief’s “principal and most confidential aid,” Alexander Hamilton provided Washington with indispensable assistance in developing and managing his secret service. Hamilton scholar and biographer Michael E. Newton describes how Alexander Hamilton received intelligence from his own informants and from Washington’s spies, distributed these reports to the relevant military officers and political officials, leaked misinformation to the enemy, and even acted on incoming intelligence in Washington’s absence, activities that covertly helped the United States win the American Revolution.
This document discusses various theories and models of urban terrorism and revolutionary movements. It provides examples of the Tupamaros group in Uruguay in the 1960s-1970s that followed Carlos Marighella's model of urban terrorism and decentralized violence. Their tactics included bank robberies, kidnappings, and developing a covert organizational structure. The document also summarizes Maoist terrorist groups like Peru's Shining Path and discusses the decline of leftist terrorism in Europe by the late 20th century.
The document discusses how the media plays a role in socially constructing images of terrorism through its reporting practices and how terrorists are aware of the media's ability to influence perceptions; it also examines tensions between security forces and the media, the use of the internet by terrorists and the media to spread propaganda and communicate, and debates around censorship and biases in media coverage of terrorism issues.
This document provides a preface and introduction to a book about international terrorism and U.S. foreign policy. The preface discusses how the concept of "terrorism" is applied differently depending on who commits the act, with acts committed by enemies being labeled terrorism while similar acts by allies like Israel and the U.S. are not. It argues the Reagan administration heightened focus on international terrorism was really a cover to pursue policies like transferring wealth to the rich and increasing military spending. The introduction notes that while 9/11 was a major terrorist attack, far worse atrocities have been committed by powerful states with little attention or reaction, and examines the previous "war on terror" declared in the 1980s with similar rhetoric and goals
The document defines terrorism as acts that cause great fear and discusses its origins and causes. It notes that terrorism has no agreed-upon definition. It summarizes the 9/11 terrorist attacks and how Al Qaeda trained bombers to believe they would go to heaven. The document also outlines the human costs of terrorism from 2001-2008, some political and economic causes of terrorism, and effects on Pakistan like deaths and economic impact. Finally, it suggests ways to reduce terrorism like addressing feelings of injustice, changing militant policies, and improving technology and anti-terrorism forces.
Cia analysis-of-the-warsaw-pact-forces-the-importance-of-clandestine-reportinghttps://www.cia.gov.com
The document summarizes the founding of the Warsaw Pact in 1955. Key points:
- The Soviet Union established the Warsaw Pact as a military alliance of communist states in Eastern Europe, modeling it after NATO.
- The treaty established a combined military command similar to NATO's Supreme Headquarters Allied Powers Europe (SHAPE).
- While the Soviet Union drafted the treaty without consulting its allies, it was intended to address Soviet security concerns in Europe following the inclusion of West Germany in NATO and its remilitarization.
- The treaty affirmed the desire to create a collective security system in Europe involving all states, and ensured the security of its signatories in response to the increased threat posed by the expansion of NATO.
C05.8 gender roles, tactics, and force multipliers in terrorMatthew Boutross
This document outlines the key learning objectives and content covered in Chapter 5, which discusses gender roles, tactics, and force multipliers in terrorism. The chapter covers modern terrorism tactics, four common force multipliers, the roles and impacts of women in terrorism, technological threats like cyberterrorism and weapons of mass destruction, the roles of the media and targeting of industries like tourism and transportation, and theories of suicide bombing. Discussion questions are provided throughout to enhance understanding of the concepts.
This document provides an overview of the historical origin and definitions of terrorism. It discusses:
- The earliest known terrorist groups dating back to 1st century AD Jewish groups.
- How the term "terrorism" originated during the French Revolution's Reign of Terror period.
- Definitions of terrorism from legislation in the UK, US, and Canada that involve use of violence for political, religious, or ideological goals.
- Challenges in defining terrorism given different perspectives on what constitutes justified vs unjustified violence.
- Types of terrorism like state-sponsored, bio-, and cyber-terrorism.
To win a war against the most powerful military in the world, General George Washington employed a vast network of spies to gather intelligence and deceive the enemy with misinformation. As the commander-in-chief’s “principal and most confidential aid,” Alexander Hamilton provided Washington with indispensable assistance in developing and managing his secret service. Hamilton scholar and biographer Michael E. Newton describes how Alexander Hamilton received intelligence from his own informants and from Washington’s spies, distributed these reports to the relevant military officers and political officials, leaked misinformation to the enemy, and even acted on incoming intelligence in Washington’s absence, activities that covertly helped the United States win the American Revolution.
This document discusses various theories and models of urban terrorism and revolutionary movements. It provides examples of the Tupamaros group in Uruguay in the 1960s-1970s that followed Carlos Marighella's model of urban terrorism and decentralized violence. Their tactics included bank robberies, kidnappings, and developing a covert organizational structure. The document also summarizes Maoist terrorist groups like Peru's Shining Path and discusses the decline of leftist terrorism in Europe by the late 20th century.
The document discusses how the media plays a role in socially constructing images of terrorism through its reporting practices and how terrorists are aware of the media's ability to influence perceptions; it also examines tensions between security forces and the media, the use of the internet by terrorists and the media to spread propaganda and communicate, and debates around censorship and biases in media coverage of terrorism issues.
This document provides a preface and introduction to a book about international terrorism and U.S. foreign policy. The preface discusses how the concept of "terrorism" is applied differently depending on who commits the act, with acts committed by enemies being labeled terrorism while similar acts by allies like Israel and the U.S. are not. It argues the Reagan administration heightened focus on international terrorism was really a cover to pursue policies like transferring wealth to the rich and increasing military spending. The introduction notes that while 9/11 was a major terrorist attack, far worse atrocities have been committed by powerful states with little attention or reaction, and examines the previous "war on terror" declared in the 1980s with similar rhetoric and goals
The document defines terrorism as acts that cause great fear and discusses its origins and causes. It notes that terrorism has no agreed-upon definition. It summarizes the 9/11 terrorist attacks and how Al Qaeda trained bombers to believe they would go to heaven. The document also outlines the human costs of terrorism from 2001-2008, some political and economic causes of terrorism, and effects on Pakistan like deaths and economic impact. Finally, it suggests ways to reduce terrorism like addressing feelings of injustice, changing militant policies, and improving technology and anti-terrorism forces.
Cia analysis-of-the-warsaw-pact-forces-the-importance-of-clandestine-reportinghttps://www.cia.gov.com
The document summarizes the founding of the Warsaw Pact in 1955. Key points:
- The Soviet Union established the Warsaw Pact as a military alliance of communist states in Eastern Europe, modeling it after NATO.
- The treaty established a combined military command similar to NATO's Supreme Headquarters Allied Powers Europe (SHAPE).
- While the Soviet Union drafted the treaty without consulting its allies, it was intended to address Soviet security concerns in Europe following the inclusion of West Germany in NATO and its remilitarization.
- The treaty affirmed the desire to create a collective security system in Europe involving all states, and ensured the security of its signatories in response to the increased threat posed by the expansion of NATO.
C05.8 gender roles, tactics, and force multipliers in terrorMatthew Boutross
This document outlines the key learning objectives and content covered in Chapter 5, which discusses gender roles, tactics, and force multipliers in terrorism. The chapter covers modern terrorism tactics, four common force multipliers, the roles and impacts of women in terrorism, technological threats like cyberterrorism and weapons of mass destruction, the roles of the media and targeting of industries like tourism and transportation, and theories of suicide bombing. Discussion questions are provided throughout to enhance understanding of the concepts.
The document discusses terrorism and the September 11, 2001 attacks on the World Trade Center. It provides a firsthand account of the author's experience on 9/11 and describes how the two planes crashed into the towers, killing over 2,800 people. It explains that the World Trade Center was targeted because it represented capitalism and Western influence. In response to 9/11, laws like the Patriot Act were passed to increase surveillance and prevent future terrorist attacks. Homeland Security was also established to better coordinate counterterrorism efforts across different government agencies.
This document discusses the causes and history of terrorism. It begins by defining terrorism and tracing its origins and original meaning. It then examines different perspectives on how terrorists should be classified and treated. The document then explores five main drivers of terrorism: 1) ethno-nationalism, 2) alienation and discrimination, 3) religion, 4) socio-economic factors, and 5) political grievances. For each cause, it provides historical examples and explains how the cause can contribute to radicalization and terrorist activities.
The document discusses the history and nature of terrorism. It notes that terrorism has been used for political ends throughout history, from resistance to Roman occupation to modern nationalist and religious conflicts. While the death rate from terrorism increased after 9/11, it remains much lower than rates from other causes like accidents or disease. The document examines different types, methods, and motives for terrorism, as well as approaches for preventing and responding to terrorist acts.
The document discusses the history and nature of terrorism. It notes that terrorism has been used for political ends throughout history, from resistance to Roman occupation to modern religiously-motivated attacks. While the death rate from terrorism increased after 9/11, it remains much lower than rates from other causes like accidents or disease. The document examines different types, methods, and motives for terrorism, as well as approaches for prevention and response. Overall, it aims to educate about terrorism while arguing the main thing to fear is fear itself rather than the actual risk, which remains relatively low.
This document outlines and discusses various definitions and perspectives on terrorism. It explores the differences between "new" and "old" terrorism in terms of characteristics like martyrdom, the role of religion versus politics, and organizational structure. The document also examines government reactions to terrorism such as counterterrorism and anti-terrorism approaches, and debates around the effectiveness of military force versus political negotiations. Overall, terrorism involves the use of violence for political goals, but definitions and viewpoints vary considerably.
Terrorism has become a global phenomenon with a 61% increase in the number of people killed in terrorist attacks over the last year. The 2014 Global Terrorism Index provides a fact-based understanding of terrorism and its impact.
There is an urgent need for world community to fight terrorism together. There can not be good terrorist and bad terrorist A terrorist is a terrorist
Genesis of suicide attacks in Pakistani society.
A suicide attack is an attack on a military or civilian target, in which an attacker intends to kill others, and knows that they will either certainly or most likely die in the process.
The Bush era has seen remarkable change in the US foreign policy. After 9/ 11 attacks, President Bush (the son) initiated the Bush Doctrine and started his war on terror which had such implications as the invasion of Afghanistan in 2011, and the invasion of Iraq in 2003.
presentation report on WAR AND TERRORISM. and yes for better viewing experience, please download the file so that you can get all the info because the slides are animated.
This chapter discusses models of terrorism including rural, urban and insurgent models. It examines the evolution of terrorist organizational structures from cells to columns to umbrella organizations. Financing terrorism is also addressed, outlining legal and illegal sources of funds as well as underground financial networks like hawala used to transfer money. The chapter concludes that terrorist organizations are complex groups hampered by their need for secrecy but designed to accomplish missions through guerrilla or terrorist means.
Quote 120923 NYTimes - Attack in Libya Was Major Blow to C.I.A. EffortsWolfgang Pusztai
The attack in Benghazi, Libya that killed Ambassador Stevens and three others dealt the CIA a major intelligence loss. About a dozen CIA operatives and contractors in Benghazi played a crucial role in surveillance of militant groups like Ansar al-Sharia and Al Qaeda in the Islamic Maghreb. However, these operatives had to be evacuated after the attack, representing a significant loss of intelligence collection efforts in the unstable region. While other intelligence methods still provide some information, the CIA presence in Benghazi covertly built up since 2011 provided important on-the-ground informants and support to other agencies that will be difficult to replace.
‘They’re calling me a terrorist’ (but they probably shouldn’t): The Social Co...NickPendergrast
Audio for this is talk here: https://archive.org/details/NickPe
That link also has further information about the talk, the conference where the talk was given etc.
The American General Wesley Clark and NATO's Intervention in Libyaiakovosal
The document discusses the NATO intervention in Libya during the Arab Spring and counters conspiracy theories about it. It notes that the Arab League, not the US, pushed for the intervention and that France, not the US, led the attacks against Gaddafi. The document provides context about regional politics, including that Syria and Algeria opposed intervention due to their ties with Libya and Iran, while other Arab countries and the Arab League supported action. It argues the intervention cannot be characterized as an American or French conspiracy given these regional dynamics.
Six coup attempts were made from 1986 to 1987 to overthrow Philippine President Corazon Aquino's government. Some coups supported the exiled former president Ferdinand Marcos while others were launched by military rebels. All of the coup attempts ended in failure. The most serious attempt was in December 1989 and resulted in 99 deaths, including 50 civilians, and 570 wounded. The United States supported the Aquino government by using airpower from aircraft carriers to deter the rebels.
The document summarizes several coup attempts in the Philippines between 1986 and 1987, including the February 1986 People Power Revolution. It describes the emergence of RAM (Reform the Armed Forces Movement), a group of military officers led by Defense Minister Juan Ponce Enrile that organized to counter corruption and promote reforms. RAM grew in influence through the recruitment of other officers and held several meetings to draft statements of principles. The most significant development was the emergence of the military as a powerful political force in the country.
The document discusses terrorism and provides context on its definition, history, and types of terrorist acts. It details how terrorism has been used for centuries in various forms by groups seeking political, social, or religious goals. Specific terrorist groups and their tactics are examined, including Al Qaeda and the types of weapons of mass destruction that may be used. The document also reviews how different government agencies work to counter terrorism within the United States and abroad through intelligence gathering and analysis.
The document analyzes whether the US is winning the war on terror. It discusses the US campaigns in Afghanistan, Pakistan, and Iraq since 2001, which have cost over $1.4 trillion and resulted in hundreds of thousands of civilian casualties. However, terrorist activities and attacks have increased over 600% according to some reports. Military force alone has not been able to eradicate terrorism. Education of children to prevent the rise of new terrorists is also needed but has not been adequately addressed. Overall, the conclusion is that the US is not winning the war on terror.
Rise of the Third Reich and the HolocaustRia Crisp
This is a lengthy and two part ppt with clips and pictures explaining the rise of the Third Reich and then the Holocaust, including people who helped etc.
This document discusses definitions of terrorism. It notes that there is no universally agreed upon definition, but most definitions reference elements like violence, political motives, creating fear, and planned/organized actions. The document also discusses different types of terrorism like state, state-sponsored, and insurgent terrorism. It argues that the term "terrorism" is a politically constructed label used to delegitimize certain actors and justify state responses. Overall, the document examines the complexities around defining and conceptualizing terrorism.
The difference between natural and man-made disasters is the element of human intent or negligence that leads to human suffering and environmental damage; many mirror natural disasters, yet man has a direct hand in their occurrence.Another man-made disaster that seems to be happening more frequently is explosions. One of the most stunningly visual ones was in Puerto Rico in 2009. It was so intense, it even set off a natural disaster - an earthquake. The actual explosion was caused by a large gasoline tank at the Caribbean Petroleum Corporation oil refinery and oil depot. The smoke plume reached as high as 30,000 feet.
This document summarizes an article from the Stanford Journal of International Relations about the democratic onset in Chile. It discusses how initially, international factors like support from the US hindered Chilean democracy by backing Pinochet's military dictatorship. However, by the 1980s, as Pinochet's regime faced economic crisis and growing domestic opposition, the international community played a significant role in destabilizing Pinochet and galvanizing pro-democracy political forces, which ultimately led to Chile's transition back to democracy in the late 1980s.
This document summarizes how Richard Nixon rose to power through clandestine means similar to those used by Hitler and the Nazis in Germany. It describes how hundreds of political assassinations in both Germany and the US paved the way for authoritarian regimes to gain control. Nixon served the hidden strategic interests of the military-industrial complex and helped cover up evidence in controversial cases like the Alger Hiss trial to smear opponents and advance his own career for their benefit. The document draws parallels between Nixon's path to power and Hitler's rise in Germany through illegal means.
The document discusses terrorism and the September 11, 2001 attacks on the World Trade Center. It provides a firsthand account of the author's experience on 9/11 and describes how the two planes crashed into the towers, killing over 2,800 people. It explains that the World Trade Center was targeted because it represented capitalism and Western influence. In response to 9/11, laws like the Patriot Act were passed to increase surveillance and prevent future terrorist attacks. Homeland Security was also established to better coordinate counterterrorism efforts across different government agencies.
This document discusses the causes and history of terrorism. It begins by defining terrorism and tracing its origins and original meaning. It then examines different perspectives on how terrorists should be classified and treated. The document then explores five main drivers of terrorism: 1) ethno-nationalism, 2) alienation and discrimination, 3) religion, 4) socio-economic factors, and 5) political grievances. For each cause, it provides historical examples and explains how the cause can contribute to radicalization and terrorist activities.
The document discusses the history and nature of terrorism. It notes that terrorism has been used for political ends throughout history, from resistance to Roman occupation to modern nationalist and religious conflicts. While the death rate from terrorism increased after 9/11, it remains much lower than rates from other causes like accidents or disease. The document examines different types, methods, and motives for terrorism, as well as approaches for preventing and responding to terrorist acts.
The document discusses the history and nature of terrorism. It notes that terrorism has been used for political ends throughout history, from resistance to Roman occupation to modern religiously-motivated attacks. While the death rate from terrorism increased after 9/11, it remains much lower than rates from other causes like accidents or disease. The document examines different types, methods, and motives for terrorism, as well as approaches for prevention and response. Overall, it aims to educate about terrorism while arguing the main thing to fear is fear itself rather than the actual risk, which remains relatively low.
This document outlines and discusses various definitions and perspectives on terrorism. It explores the differences between "new" and "old" terrorism in terms of characteristics like martyrdom, the role of religion versus politics, and organizational structure. The document also examines government reactions to terrorism such as counterterrorism and anti-terrorism approaches, and debates around the effectiveness of military force versus political negotiations. Overall, terrorism involves the use of violence for political goals, but definitions and viewpoints vary considerably.
Terrorism has become a global phenomenon with a 61% increase in the number of people killed in terrorist attacks over the last year. The 2014 Global Terrorism Index provides a fact-based understanding of terrorism and its impact.
There is an urgent need for world community to fight terrorism together. There can not be good terrorist and bad terrorist A terrorist is a terrorist
Genesis of suicide attacks in Pakistani society.
A suicide attack is an attack on a military or civilian target, in which an attacker intends to kill others, and knows that they will either certainly or most likely die in the process.
The Bush era has seen remarkable change in the US foreign policy. After 9/ 11 attacks, President Bush (the son) initiated the Bush Doctrine and started his war on terror which had such implications as the invasion of Afghanistan in 2011, and the invasion of Iraq in 2003.
presentation report on WAR AND TERRORISM. and yes for better viewing experience, please download the file so that you can get all the info because the slides are animated.
This chapter discusses models of terrorism including rural, urban and insurgent models. It examines the evolution of terrorist organizational structures from cells to columns to umbrella organizations. Financing terrorism is also addressed, outlining legal and illegal sources of funds as well as underground financial networks like hawala used to transfer money. The chapter concludes that terrorist organizations are complex groups hampered by their need for secrecy but designed to accomplish missions through guerrilla or terrorist means.
Quote 120923 NYTimes - Attack in Libya Was Major Blow to C.I.A. EffortsWolfgang Pusztai
The attack in Benghazi, Libya that killed Ambassador Stevens and three others dealt the CIA a major intelligence loss. About a dozen CIA operatives and contractors in Benghazi played a crucial role in surveillance of militant groups like Ansar al-Sharia and Al Qaeda in the Islamic Maghreb. However, these operatives had to be evacuated after the attack, representing a significant loss of intelligence collection efforts in the unstable region. While other intelligence methods still provide some information, the CIA presence in Benghazi covertly built up since 2011 provided important on-the-ground informants and support to other agencies that will be difficult to replace.
‘They’re calling me a terrorist’ (but they probably shouldn’t): The Social Co...NickPendergrast
Audio for this is talk here: https://archive.org/details/NickPe
That link also has further information about the talk, the conference where the talk was given etc.
The American General Wesley Clark and NATO's Intervention in Libyaiakovosal
The document discusses the NATO intervention in Libya during the Arab Spring and counters conspiracy theories about it. It notes that the Arab League, not the US, pushed for the intervention and that France, not the US, led the attacks against Gaddafi. The document provides context about regional politics, including that Syria and Algeria opposed intervention due to their ties with Libya and Iran, while other Arab countries and the Arab League supported action. It argues the intervention cannot be characterized as an American or French conspiracy given these regional dynamics.
Six coup attempts were made from 1986 to 1987 to overthrow Philippine President Corazon Aquino's government. Some coups supported the exiled former president Ferdinand Marcos while others were launched by military rebels. All of the coup attempts ended in failure. The most serious attempt was in December 1989 and resulted in 99 deaths, including 50 civilians, and 570 wounded. The United States supported the Aquino government by using airpower from aircraft carriers to deter the rebels.
The document summarizes several coup attempts in the Philippines between 1986 and 1987, including the February 1986 People Power Revolution. It describes the emergence of RAM (Reform the Armed Forces Movement), a group of military officers led by Defense Minister Juan Ponce Enrile that organized to counter corruption and promote reforms. RAM grew in influence through the recruitment of other officers and held several meetings to draft statements of principles. The most significant development was the emergence of the military as a powerful political force in the country.
The document discusses terrorism and provides context on its definition, history, and types of terrorist acts. It details how terrorism has been used for centuries in various forms by groups seeking political, social, or religious goals. Specific terrorist groups and their tactics are examined, including Al Qaeda and the types of weapons of mass destruction that may be used. The document also reviews how different government agencies work to counter terrorism within the United States and abroad through intelligence gathering and analysis.
The document analyzes whether the US is winning the war on terror. It discusses the US campaigns in Afghanistan, Pakistan, and Iraq since 2001, which have cost over $1.4 trillion and resulted in hundreds of thousands of civilian casualties. However, terrorist activities and attacks have increased over 600% according to some reports. Military force alone has not been able to eradicate terrorism. Education of children to prevent the rise of new terrorists is also needed but has not been adequately addressed. Overall, the conclusion is that the US is not winning the war on terror.
Rise of the Third Reich and the HolocaustRia Crisp
This is a lengthy and two part ppt with clips and pictures explaining the rise of the Third Reich and then the Holocaust, including people who helped etc.
This document discusses definitions of terrorism. It notes that there is no universally agreed upon definition, but most definitions reference elements like violence, political motives, creating fear, and planned/organized actions. The document also discusses different types of terrorism like state, state-sponsored, and insurgent terrorism. It argues that the term "terrorism" is a politically constructed label used to delegitimize certain actors and justify state responses. Overall, the document examines the complexities around defining and conceptualizing terrorism.
The difference between natural and man-made disasters is the element of human intent or negligence that leads to human suffering and environmental damage; many mirror natural disasters, yet man has a direct hand in their occurrence.Another man-made disaster that seems to be happening more frequently is explosions. One of the most stunningly visual ones was in Puerto Rico in 2009. It was so intense, it even set off a natural disaster - an earthquake. The actual explosion was caused by a large gasoline tank at the Caribbean Petroleum Corporation oil refinery and oil depot. The smoke plume reached as high as 30,000 feet.
This document summarizes an article from the Stanford Journal of International Relations about the democratic onset in Chile. It discusses how initially, international factors like support from the US hindered Chilean democracy by backing Pinochet's military dictatorship. However, by the 1980s, as Pinochet's regime faced economic crisis and growing domestic opposition, the international community played a significant role in destabilizing Pinochet and galvanizing pro-democracy political forces, which ultimately led to Chile's transition back to democracy in the late 1980s.
This document summarizes how Richard Nixon rose to power through clandestine means similar to those used by Hitler and the Nazis in Germany. It describes how hundreds of political assassinations in both Germany and the US paved the way for authoritarian regimes to gain control. Nixon served the hidden strategic interests of the military-industrial complex and helped cover up evidence in controversial cases like the Alger Hiss trial to smear opponents and advance his own career for their benefit. The document draws parallels between Nixon's path to power and Hitler's rise in Germany through illegal means.
The document discusses media coverage of terrorism and the War on Terrorism. It provides examples of media coverage of 9/11 and the US response. On 9/11, media coverage was chaotic as events unfolded but lacked meaningful context. In subsequent days, media reported intelligence linking Al Qaeda to the attacks. When the US declared war on terrorism on September 20th, media editorials urged building allies but warned of strengthening terrorist groups through indiscriminate military action. As the US invaded Afghanistan, media initially supported the mission but cautioned the need for care in military targets and awareness of political consequences in the Islamic world.
#
Date
Type
Dead
Injured
Location(s)
Details
Perpetrator
64
1970s
Bombing
5
69+
New York City/Chicago, Illinois
The most active perpetrators of terrorism in New York City were Fuerzas Armadas de Liberación Nacional (FALN), a Puerto Rican separatist group, responsible for 40 NYC attacks in this decade. The Jewish Defense League (JDL), which engaged in attacks against targets it perceived to be anti-Semitic, launched 27 attacks during this period, none deadly. Both the Independent Armed Revolutionary Commandos (CRIA), another Puerto Rican separatist group, and Omega 7, an anti-Castro Cuban organization, were also each responsible for 16 attacks during this period.[51]
Fuerzas Armadas de Liberación Nacional
65
April 1970
Riot
0
Unknown
Stanford, California
At Stanford University, over a period of several nights, bands of student radicals systematically set fires, broke windows and threw rocks.[47]
Left-wing student radicals
66
May 1970
Firebombing
0
0
Fresno, California
In reaction to the U.S. invasion of Cambodia, Kent State shootings, and Jackson State killings, a Fresno State College computer center is destroyed by a firebomb. While reaction to these three events was massive, most were peaceful.[47]
Left-wing student radicals
67
August 24, 1970
Bombing
1
3
Madison, Wisconsin
Sterling Hall bombing: Sterling Hall at the University of Wisconsin–Madison is bombed in protest of the Army Mathematics Research Center and the Vietnam War, killing one. Bombers Karleton Armstrong, Dwight Armstrong, David Fine, and Leo Burt claimed the death of physicist Robert Fassnacht was unintentional but acknowledged that they knew the building was occupied when they planted the bomb.
Karleton Armstrong, Dwight Armstrong, David Fine, and Leo Burt
68
November 21, 1970
Bombing
0
1
Portland, Oregon
Bombing of the City Hall of Portland, Oregon in an attempt to destroy the state's bronze Liberty Bell replica. The late night explosion destroyed the display foyer, blew out the building doors, damaged the council hall, and blew out windows more than a block away. The night janitor was injured in the blast. The crime remains unsolved, though a number of local anti-war and radical leftist groups of the era remain the primary suspects.
Left-wing extremists (suspected)
69
1970
Bombing
0
0
New York City, New York
The Jewish Defense League was linked to a bomb explosion outside of Aeroflot's New York City office in protest of the treatment of Soviet Jews.
Jewish Defense League
70
1971
Bombing
0
0
New York City, New York
The Jewish Defense League was linked to a detonation outside of Soviet cultural offices in Washington, D.C. and rifle fire into the Soviet mission to the United Nations.
Jewish Defense League
71
March 1, 1971
Bombing
0
0
Washington, D.C.
The radical leftist group Weatherman exploded a bomb in the United States Capitol to protest the U.S. invasion of Laos.
Weatherman
72
June 1, 1973
Shooting
1
0
Chevy Chase, Maryland
Yosef Alon, the Israeli Air Force attache in Was ...
#
Date
Type
Dead
Injured
Location(s)
Details
Perpetrator
64
1970s
Bombing
5
69+
New York City/Chicago, Illinois
The most active perpetrators of terrorism in New York City were Fuerzas Armadas de Liberación Nacional (FALN), a Puerto Rican separatist group, responsible for 40 NYC attacks in this decade. The Jewish Defense League (JDL), which engaged in attacks against targets it perceived to be anti-Semitic, launched 27 attacks during this period, none deadly. Both the Independent Armed Revolutionary Commandos (CRIA), another Puerto Rican separatist group, and Omega 7, an anti-Castro Cuban organization, were also each responsible for 16 attacks during this period.[51]
Fuerzas Armadas de Liberación Nacional
65
April 1970
Riot
0
Unknown
Stanford, California
At Stanford University, over a period of several nights, bands of student radicals systematically set fires, broke windows and threw rocks.[47]
Left-wing student radicals
66
May 1970
Firebombing
0
0
Fresno, California
In reaction to the U.S. invasion of Cambodia, Kent State shootings, and Jackson State killings, a Fresno State College computer center is destroyed by a firebomb. While reaction to these three events was massive, most were peaceful.[47]
Left-wing student radicals
67
August 24, 1970
Bombing
1
3
Madison, Wisconsin
Sterling Hall bombing: Sterling Hall at the University of Wisconsin–Madison is bombed in protest of the Army Mathematics Research Center and the Vietnam War, killing one. Bombers Karleton Armstrong, Dwight Armstrong, David Fine, and Leo Burt claimed the death of physicist Robert Fassnacht was unintentional but acknowledged that they knew the building was occupied when they planted the bomb.
Karleton Armstrong, Dwight Armstrong, David Fine, and Leo Burt
68
November 21, 1970
Bombing
0
1
Portland, Oregon
Bombing of the City Hall of Portland, Oregon in an attempt to destroy the state's bronze Liberty Bell replica. The late night explosion destroyed the display foyer, blew out the building doors, damaged the council hall, and blew out windows more than a block away. The night janitor was injured in the blast. The crime remains unsolved, though a number of local anti-war and radical leftist groups of the era remain the primary suspects.
Left-wing extremists (suspected)
69
1970
Bombing
0
0
New York City, New York
The Jewish Defense League was linked to a bomb explosion outside of Aeroflot's New York City office in protest of the treatment of Soviet Jews.
Jewish Defense League
70
1971
Bombing
0
0
New York City, New York
The Jewish Defense League was linked to a detonation outside of Soviet cultural offices in Washington, D.C. and rifle fire into the Soviet mission to the United Nations.
Jewish Defense League
71
March 1, 1971
Bombing
0
0
Washington, D.C.
The radical leftist group Weatherman exploded a bomb in the United States Capitol to protest the U.S. invasion of Laos.
Weatherman
72
June 1, 1973
Shooting
1
0
Chevy Chase, Maryland
Yosef Alon, the Israeli Air Force attache in Was ...
#
Date
Type
Dead
Injured
Location(s)
Details
Perpetrator
64
1970s
Bombing
5
69+
New York City/Chicago, Illinois
The most active perpetrators of terrorism in New York City were Fuerzas Armadas de Liberación Nacional (FALN), a Puerto Rican separatist group, responsible for 40 NYC attacks in this decade. The Jewish Defense League (JDL), which engaged in attacks against targets it perceived to be anti-Semitic, launched 27 attacks during this period, none deadly. Both the Independent Armed Revolutionary Commandos (CRIA), another Puerto Rican separatist group, and Omega 7, an anti-Castro Cuban organization, were also each responsible for 16 attacks during this period.[51]
Fuerzas Armadas de Liberación Nacional
65
April 1970
Riot
0
Unknown
Stanford, California
At Stanford University, over a period of several nights, bands of student radicals systematically set fires, broke windows and threw rocks.[47]
Left-wing student radicals
66
May 1970
Firebombing
0
0
Fresno, California
In reaction to the U.S. invasion of Cambodia, Kent State shootings, and Jackson State killings, a Fresno State College computer center is destroyed by a firebomb. While reaction to these three events was massive, most were peaceful.[47]
Left-wing student radicals
67
August 24, 1970
Bombing
1
3
Madison, Wisconsin
Sterling Hall bombing: Sterling Hall at the University of Wisconsin–Madison is bombed in protest of the Army Mathematics Research Center and the Vietnam War, killing one. Bombers Karleton Armstrong, Dwight Armstrong, David Fine, and Leo Burt claimed the death of physicist Robert Fassnacht was unintentional but acknowledged that they knew the building was occupied when they planted the bomb.
Karleton Armstrong, Dwight Armstrong, David Fine, and Leo Burt
68
November 21, 1970
Bombing
0
1
Portland, Oregon
Bombing of the City Hall of Portland, Oregon in an attempt to destroy the state's bronze Liberty Bell replica. The late night explosion destroyed the display foyer, blew out the building doors, damaged the council hall, and blew out windows more than a block away. The night janitor was injured in the blast. The crime remains unsolved, though a number of local anti-war and radical leftist groups of the era remain the primary suspects.
Left-wing extremists (suspected)
69
1970
Bombing
0
0
New York City, New York
The Jewish Defense League was linked to a bomb explosion outside of Aeroflot's New York City office in protest of the treatment of Soviet Jews.
Jewish Defense League
70
1971
Bombing
0
0
New York City, New York
The Jewish Defense League was linked to a detonation outside of Soviet cultural offices in Washington, D.C. and rifle fire into the Soviet mission to the United Nations.
Jewish Defense League
71
March 1, 1971
Bombing
0
0
Washington, D.C.
The radical leftist group Weatherman exploded a bomb in the United States Capitol to protest the U.S. invasion of Laos.
Weatherman
72
June 1, 1973
Shooting
1
0
Chevy Chase, Maryland
Yosef Alon, the Israeli Air Force attache in Was ...
Augusto Pinochet rose through the ranks of the Chilean military, becoming Commander-in-Chief of the Army in 1973. That year, he led a coup that overthrew the socialist president Salvador Allende, establishing a military junta in power. Under Pinochet's rule, thousands of suspected political opponents were arrested, tortured, and killed. Pinochet suspended civil liberties and banned political parties, consolidating power as a dictator. While he claimed to be saving Chile from communism, his regime was responsible for an estimated 3,000 deaths and thousands more tortured in response to political dissent. Though indicted later for human rights abuses, Pinochet died before facing conviction.
The CIA: Is It The Largest Terrorist Organization On The Planet? RBG Communiversity
The document discusses whether the CIA can be considered the largest terrorist organization in the world based on its covert operations and interference in other countries that have caused millions of deaths. It provides examples of CIA operations that overthrew governments in Iran and Chile and estimates that the CIA has been responsible for 6 million deaths globally. It argues that while the CIA portrays itself as an intelligence agency, its actions make it a tool for advancing US economic and political interests through violent means around the world, making it a state-sponsored terrorist organization.
Essay on Terrorism
Essay on Terrorism
Essay On State Sponsored Terrorism
Essay on terrorism
Essay on Terrorism
Terrorism Essay
Terrorism : A Global Issue Essay
Terrorism Essay
Militaries Role In Combating Terrorism
Definition Essay: Terrorism
Essay on Solutions for Terrorism
The Evolution Of Politicical Violence And TerrorismElizabeth Hall
This document discusses the evolution of political violence and terrorism throughout history. It defines political crimes and terrorism, and provides examples from early history including the assassination of Julius Caesar and terrorist acts becoming favored methods for nationalist groups after World War I. The document then examines different forms of contemporary terrorism such as revolutionary, political, eco, and retributive terrorism. It analyzes terrorist groups and motivations and concludes that combating terrorism requires global solutions given its expanded and growing nature.
The Evolution Of Politicical Violence And TerrorismElizabeth Hall
This document discusses the evolution of political violence and terrorism throughout history. It defines political crimes and terrorism, and provides examples from early history including the assassination of Julius Caesar and terrorist acts becoming favored methods for nationalist groups after World War I. The document then examines different forms of contemporary terrorism such as revolutionary, political, eco, and retributive terrorism. It analyzes terrorist groups and motivations and concludes that combating terrorism requires global solutions given its expanded and growing nature.
Terrorism has existed for over 2000 years, with the term being coined during the French Revolution. The UN defines terrorism as acts intended to cause death or harm to civilians to intimidate a population or government. Terrorism uses violence and fear to achieve political goals such as gaining attention, support, and coercing policy changes. Various terrorist groups have different ideological motivations such as nationalism, religion, politics, and anarchism. Major terrorist attacks over the years have caused thousands of deaths and injuries. Prevention of terrorism is important and requires education, surveillance, protection of citizens, and addressing root causes.
Essay on Islam and Terrorism
Essay on Terrorism
Essay on Terrorism
Terrorism Essay
Essay on terrorism
Essay on Terrorism
Essay on History of Terrorism
Essay on Solutions for Terrorism
Essay On State Sponsored Terrorism
Similar to United states regime and support for terrorism (14)
Mending Clothing to Support Sustainable Fashion_CIMaR 2024.pdfSelcen Ozturkcan
Ozturkcan, S., Berndt, A., & Angelakis, A. (2024). Mending clothing to support sustainable fashion. Presented at the 31st Annual Conference by the Consortium for International Marketing Research (CIMaR), 10-13 Jun 2024, University of Gävle, Sweden.
Candidate young stellar objects in the S-cluster: Kinematic analysis of a sub...Sérgio Sacani
Context. The observation of several L-band emission sources in the S cluster has led to a rich discussion of their nature. However, a definitive answer to the classification of the dusty objects requires an explanation for the detection of compact Doppler-shifted Brγ emission. The ionized hydrogen in combination with the observation of mid-infrared L-band continuum emission suggests that most of these sources are embedded in a dusty envelope. These embedded sources are part of the S-cluster, and their relationship to the S-stars is still under debate. To date, the question of the origin of these two populations has been vague, although all explanations favor migration processes for the individual cluster members. Aims. This work revisits the S-cluster and its dusty members orbiting the supermassive black hole SgrA* on bound Keplerian orbits from a kinematic perspective. The aim is to explore the Keplerian parameters for patterns that might imply a nonrandom distribution of the sample. Additionally, various analytical aspects are considered to address the nature of the dusty sources. Methods. Based on the photometric analysis, we estimated the individual H−K and K−L colors for the source sample and compared the results to known cluster members. The classification revealed a noticeable contrast between the S-stars and the dusty sources. To fit the flux-density distribution, we utilized the radiative transfer code HYPERION and implemented a young stellar object Class I model. We obtained the position angle from the Keplerian fit results; additionally, we analyzed the distribution of the inclinations and the longitudes of the ascending node. Results. The colors of the dusty sources suggest a stellar nature consistent with the spectral energy distribution in the near and midinfrared domains. Furthermore, the evaporation timescales of dusty and gaseous clumps in the vicinity of SgrA* are much shorter ( 2yr) than the epochs covered by the observations (≈15yr). In addition to the strong evidence for the stellar classification of the D-sources, we also find a clear disk-like pattern following the arrangements of S-stars proposed in the literature. Furthermore, we find a global intrinsic inclination for all dusty sources of 60 ± 20◦, implying a common formation process. Conclusions. The pattern of the dusty sources manifested in the distribution of the position angles, inclinations, and longitudes of the ascending node strongly suggests two different scenarios: the main-sequence stars and the dusty stellar S-cluster sources share a common formation history or migrated with a similar formation channel in the vicinity of SgrA*. Alternatively, the gravitational influence of SgrA* in combination with a massive perturber, such as a putative intermediate mass black hole in the IRS 13 cluster, forces the dusty objects and S-stars to follow a particular orbital arrangement. Key words. stars: black holes– stars: formation– Galaxy: center– galaxies: star formation
EWOCS-I: The catalog of X-ray sources in Westerlund 1 from the Extended Weste...Sérgio Sacani
Context. With a mass exceeding several 104 M⊙ and a rich and dense population of massive stars, supermassive young star clusters
represent the most massive star-forming environment that is dominated by the feedback from massive stars and gravitational interactions
among stars.
Aims. In this paper we present the Extended Westerlund 1 and 2 Open Clusters Survey (EWOCS) project, which aims to investigate
the influence of the starburst environment on the formation of stars and planets, and on the evolution of both low and high mass stars.
The primary targets of this project are Westerlund 1 and 2, the closest supermassive star clusters to the Sun.
Methods. The project is based primarily on recent observations conducted with the Chandra and JWST observatories. Specifically,
the Chandra survey of Westerlund 1 consists of 36 new ACIS-I observations, nearly co-pointed, for a total exposure time of 1 Msec.
Additionally, we included 8 archival Chandra/ACIS-S observations. This paper presents the resulting catalog of X-ray sources within
and around Westerlund 1. Sources were detected by combining various existing methods, and photon extraction and source validation
were carried out using the ACIS-Extract software.
Results. The EWOCS X-ray catalog comprises 5963 validated sources out of the 9420 initially provided to ACIS-Extract, reaching a
photon flux threshold of approximately 2 × 10−8 photons cm−2
s
−1
. The X-ray sources exhibit a highly concentrated spatial distribution,
with 1075 sources located within the central 1 arcmin. We have successfully detected X-ray emissions from 126 out of the 166 known
massive stars of the cluster, and we have collected over 71 000 photons from the magnetar CXO J164710.20-455217.
Anti-Universe And Emergent Gravity and the Dark UniverseSérgio Sacani
Recent theoretical progress indicates that spacetime and gravity emerge together from the entanglement structure of an underlying microscopic theory. These ideas are best understood in Anti-de Sitter space, where they rely on the area law for entanglement entropy. The extension to de Sitter space requires taking into account the entropy and temperature associated with the cosmological horizon. Using insights from string theory, black hole physics and quantum information theory we argue that the positive dark energy leads to a thermal volume law contribution to the entropy that overtakes the area law precisely at the cosmological horizon. Due to the competition between area and volume law entanglement the microscopic de Sitter states do not thermalise at sub-Hubble scales: they exhibit memory effects in the form of an entropy displacement caused by matter. The emergent laws of gravity contain an additional ‘dark’ gravitational force describing the ‘elastic’ response due to the entropy displacement. We derive an estimate of the strength of this extra force in terms of the baryonic mass, Newton’s constant and the Hubble acceleration scale a0 = cH0, and provide evidence for the fact that this additional ‘dark gravity force’ explains the observed phenomena in galaxies and clusters currently attributed to dark matter.
(June 12, 2024) Webinar: Development of PET theranostics targeting the molecu...Scintica Instrumentation
Targeting Hsp90 and its pathogen Orthologs with Tethered Inhibitors as a Diagnostic and Therapeutic Strategy for cancer and infectious diseases with Dr. Timothy Haystead.
When I was asked to give a companion lecture in support of ‘The Philosophy of Science’ (https://shorturl.at/4pUXz) I decided not to walk through the detail of the many methodologies in order of use. Instead, I chose to employ a long standing, and ongoing, scientific development as an exemplar. And so, I chose the ever evolving story of Thermodynamics as a scientific investigation at its best.
Conducted over a period of >200 years, Thermodynamics R&D, and application, benefitted from the highest levels of professionalism, collaboration, and technical thoroughness. New layers of application, methodology, and practice were made possible by the progressive advance of technology. In turn, this has seen measurement and modelling accuracy continually improved at a micro and macro level.
Perhaps most importantly, Thermodynamics rapidly became a primary tool in the advance of applied science/engineering/technology, spanning micro-tech, to aerospace and cosmology. I can think of no better a story to illustrate the breadth of scientific methodologies and applications at their best.
The debris of the ‘last major merger’ is dynamically youngSérgio Sacani
The Milky Way’s (MW) inner stellar halo contains an [Fe/H]-rich component with highly eccentric orbits, often referred to as the
‘last major merger.’ Hypotheses for the origin of this component include Gaia-Sausage/Enceladus (GSE), where the progenitor
collided with the MW proto-disc 8–11 Gyr ago, and the Virgo Radial Merger (VRM), where the progenitor collided with the
MW disc within the last 3 Gyr. These two scenarios make different predictions about observable structure in local phase space,
because the morphology of debris depends on how long it has had to phase mix. The recently identified phase-space folds in Gaia
DR3 have positive caustic velocities, making them fundamentally different than the phase-mixed chevrons found in simulations
at late times. Roughly 20 per cent of the stars in the prograde local stellar halo are associated with the observed caustics. Based
on a simple phase-mixing model, the observed number of caustics are consistent with a merger that occurred 1–2 Gyr ago.
We also compare the observed phase-space distribution to FIRE-2 Latte simulations of GSE-like mergers, using a quantitative
measurement of phase mixing (2D causticality). The observed local phase-space distribution best matches the simulated data
1–2 Gyr after collision, and certainly not later than 3 Gyr. This is further evidence that the progenitor of the ‘last major merger’
did not collide with the MW proto-disc at early times, as is thought for the GSE, but instead collided with the MW disc within
the last few Gyr, consistent with the body of work surrounding the VRM.
The cost of acquiring information by natural selectionCarl Bergstrom
This is a short talk that I gave at the Banff International Research Station workshop on Modeling and Theory in Population Biology. The idea is to try to understand how the burden of natural selection relates to the amount of information that selection puts into the genome.
It's based on the first part of this research paper:
The cost of information acquisition by natural selection
Ryan Seamus McGee, Olivia Kosterlitz, Artem Kaznatcheev, Benjamin Kerr, Carl T. Bergstrom
bioRxiv 2022.07.02.498577; doi: https://doi.org/10.1101/2022.07.02.498577
Travis Hills of MN is Making Clean Water Accessible to All Through High Flux ...Travis Hills MN
By harnessing the power of High Flux Vacuum Membrane Distillation, Travis Hills from MN envisions a future where clean and safe drinking water is accessible to all, regardless of geographical location or economic status.
Microbial interaction
Microorganisms interacts with each other and can be physically associated with another organisms in a variety of ways.
One organism can be located on the surface of another organism as an ectobiont or located within another organism as endobiont.
Microbial interaction may be positive such as mutualism, proto-cooperation, commensalism or may be negative such as parasitism, predation or competition
Types of microbial interaction
Positive interaction: mutualism, proto-cooperation, commensalism
Negative interaction: Ammensalism (antagonism), parasitism, predation, competition
I. Mutualism:
It is defined as the relationship in which each organism in interaction gets benefits from association. It is an obligatory relationship in which mutualist and host are metabolically dependent on each other.
Mutualistic relationship is very specific where one member of association cannot be replaced by another species.
Mutualism require close physical contact between interacting organisms.
Relationship of mutualism allows organisms to exist in habitat that could not occupied by either species alone.
Mutualistic relationship between organisms allows them to act as a single organism.
Examples of mutualism:
i. Lichens:
Lichens are excellent example of mutualism.
They are the association of specific fungi and certain genus of algae. In lichen, fungal partner is called mycobiont and algal partner is called
II. Syntrophism:
It is an association in which the growth of one organism either depends on or improved by the substrate provided by another organism.
In syntrophism both organism in association gets benefits.
Compound A
Utilized by population 1
Compound B
Utilized by population 2
Compound C
utilized by both Population 1+2
Products
In this theoretical example of syntrophism, population 1 is able to utilize and metabolize compound A, forming compound B but cannot metabolize beyond compound B without co-operation of population 2. Population 2is unable to utilize compound A but it can metabolize compound B forming compound C. Then both population 1 and 2 are able to carry out metabolic reaction which leads to formation of end product that neither population could produce alone.
Examples of syntrophism:
i. Methanogenic ecosystem in sludge digester
Methane produced by methanogenic bacteria depends upon interspecies hydrogen transfer by other fermentative bacteria.
Anaerobic fermentative bacteria generate CO2 and H2 utilizing carbohydrates which is then utilized by methanogenic bacteria (Methanobacter) to produce methane.
ii. Lactobacillus arobinosus and Enterococcus faecalis:
In the minimal media, Lactobacillus arobinosus and Enterococcus faecalis are able to grow together but not alone.
The synergistic relationship between E. faecalis and L. arobinosus occurs in which E. faecalis require folic acid
ESA/ACT Science Coffee: Diego Blas - Gravitational wave detection with orbita...Advanced-Concepts-Team
Presentation in the Science Coffee of the Advanced Concepts Team of the European Space Agency on the 07.06.2024.
Speaker: Diego Blas (IFAE/ICREA)
Title: Gravitational wave detection with orbital motion of Moon and artificial
Abstract:
In this talk I will describe some recent ideas to find gravitational waves from supermassive black holes or of primordial origin by studying their secular effect on the orbital motion of the Moon or satellites that are laser ranged.
Authoring a personal GPT for your research and practice: How we created the Q...Leonel Morgado
Thematic analysis in qualitative research is a time-consuming and systematic task, typically done using teams. Team members must ground their activities on common understandings of the major concepts underlying the thematic analysis, and define criteria for its development. However, conceptual misunderstandings, equivocations, and lack of adherence to criteria are challenges to the quality and speed of this process. Given the distributed and uncertain nature of this process, we wondered if the tasks in thematic analysis could be supported by readily available artificial intelligence chatbots. Our early efforts point to potential benefits: not just saving time in the coding process but better adherence to criteria and grounding, by increasing triangulation between humans and artificial intelligence. This tutorial will provide a description and demonstration of the process we followed, as two academic researchers, to develop a custom ChatGPT to assist with qualitative coding in the thematic data analysis process of immersive learning accounts in a survey of the academic literature: QUAL-E Immersive Learning Thematic Analysis Helper. In the hands-on time, participants will try out QUAL-E and develop their ideas for their own qualitative coding ChatGPT. Participants that have the paid ChatGPT Plus subscription can create a draft of their assistants. The organizers will provide course materials and slide deck that participants will be able to utilize to continue development of their custom GPT. The paid subscription to ChatGPT Plus is not required to participate in this workshop, just for trying out personal GPTs during it.
1. United States and state-sponsored terrorism
From Wikipedia, the free encyclopedia
The United States has at various times in recent history provided support to terrorist and paramilitary
organizations around the world. It has also provided assistance to numerous authoritarian regimes that have
used state terrorism as a tool of repression.[1][2]
United States support for non-state terrorists has been prominent in Latin America, the Middle-East, and
Southern Africa.[1] From 1981 to 1991, the United States provided weapons, training, and extensive financial
and logistical support to the Contra rebels in Nicaragua, who used terror tactics in their fight against the
Nicaraguan government.[3] At various points the United States also provided training, arms, and funds to
terrorists among the Cuban exiles, such as Orlando Bosch and Luis Posada Carriles.
Various reasons have been provided to justify such support. These include destabilizing political movements
that might have aligned with the Soviet Union during the Cold War, including popular democratic and socialist
movements.[4] Such support has also formed a part of the war on drugs.[2] Support was also geared toward
ensuring a conducive environment for American corporate interests abroad, especially when these interests
came under threat from democratic regimes.[4][5]
Contents
1 Kashmir Princess incident
2 Years of Lead
2.1 Piazza Fontana bombing
3 Kidnapping attempt and assassination of General René Schneider
4 The Contras
4.1 Background
4.2 Covert operations
4.3 Propaganda
4.4 International Court of Justice ruling
5 Cuban exiles
5.1 Orlando Bosch
5.2 Luis Posada Carriles
6 See also
7 References
8 Sources
Kashmir Princess incident
On 11 April 1955 the “Kashmir Princess,” an Air India Constellation passenger airliner, was damaged in midair
by a bomb explosion and crashed into the South China Sea while en route from Mumbai, India, and Hong Kong
to Jakarta, Indonesia.[6] Sixteen of those on board were killed, while three survived.[7][8] The explosion had
been caused by a time bomb placed aboard the aircraft by a Kuomintang secret agent who was attempting to
assassinate Chinese Premier Zhou Enlai, who had been scheduled to board the plane to attend the conference
but had changed his travel plans at the last minute.[7] The day after the crash, China's Foreign Ministry issued a
statement that described the bombing as "a murder by the special service organizations of the United States and
Chiang Kai-shek."[9]
2. The Hong Kong authorities offered HK$100,000 for information leading to the arrest of those responsible.
They questioned 71 people connected with the servicing of the Air India flight. When police began to focus on
Chow Tse-ming, a janitor for Hong Kong Aircraft Engineering Co., he stowed away to Taiwan on a CIA-owned
Civil Air Transport aircraft. The Hong Kong police reported that a warrant charging a murder conspiracy was
issued, but the man with the name Chow Tse-ming in the warrant had flown to Taiwan on 18 May 1955, and
Chow Tse-ming had three aliases.[10]
China had from the outset accused the United States of involvement in the bombing, but while the CIA had
considered a plan to assassinate Zhou Enlai at this time,[11] the Church Committee reported that these plans
were disapproved of and "strongly censured" by Washington.[12] In a 1971 face-to-face meeting in the Great
Hall of the People in Beijing, Zhou directly asked Henry Kissinger about US involvement in the bombing.
Kissinger responded, "As I told the Prime Minister the last time, he vastly overestimates the competence of the
CIA."[13]
Years of Lead
The Years of Lead was a period of socio-political turmoil in Italy that lasted from the late 1960s into the early
1980s. This period was marked by a wave of terrorism carried out by both right- and left-wing paramilitary
groups. It was concluded that the former were supported by the United States as a strategy of tension.[14][15][16]
General Gianadelio Maletti, commander of the counter-intelligence section of the Italian military intelligence
service from 1971 to 1975, stated that his men in the region of Venice discovered a right-wing terrorist cell that
had been supplied with military explosives from Germany, and he alleged that US intelligence services
instigated and abetted right-wing terrorism in Italy during the 1970s.[17]
According to the investigations of the Italian judge Guido Salvini, the neo-fascist organizations involved in the
strategy of tension, "La Fenice, Avanguardia nazionale, Ordine nuovo" were the "troops" of "occult armed
forces", directed by components of the "state apparatus related to the CIA."[18]
Any relationship of the CIA to the terrorist attacks perpetrated in Italy during the Years of Lead is the subject of
debate. Switzerland and Belgium have had parliamentary inquiries into the matter.[19]
Piazza Fontana bombing
The Piazza Fontana Bombing was a terrorist attack that occurred on December 12, 1969 at 16:37, when a bomb
exploded at the headquarters of Banca Nazionale dell'Agricoltura (National Agrarian Bank) in Piazza Fontana
in Milan killing 17 people and wounding 88. The same afternoon, three more bombs were detonated in Rome
and Milan, and another was found undetonated.[20]
In 1998, Milan judge Guido Salvini indicted U.S. Navy officer David Carrett on charges of political and
military espionage for his participation in the Piazza Fontana bombing et al. Salvini also opened up a case
against Sergio Minetto, an Italian official of the U.S.-NATO intelligence network, and "collaboratore di
giustizia" Carlo Digilio (Uncle Otto), who served as CIA coordinator in Northeastern Italy in the sixties and
seventies. The newspaper la Repubblica reported that Carlo Rocchi, CIA's man in Milan was discovered in
1995 searching for information concerning Operation Gladio.[15]
A 2000 parliamentary report published by the center-left Olive Tree coalition claimed that "U.S. intelligence
agents were informed in advance about several right-wing terrorist bombings, including the December 1969
Piazza Fontana bombing in Milan and the Piazza della Loggia bombing in Brescia five years later, but did
nothing to alert the Italian authorities or to prevent the attacks from taking place." It also alleged that Pino Rauti
(current leader of the MSI Fiamma-Tricolore party), a journalist and founder of the far-right Ordine Nuovo
(New Order) subversive organization, received regular funding from a press officer at the U.S. embassy in
3. Plaque in memory of the 17
victims of the terrorist
bombing in Piazza Fontana
General René Schneider.
Rome. "So even before the 'stabilising' plans that Atlantic circles had prepared
for Italy became operational through the bombings, one of the leading
members of the subversive right was literally in the pay of the American
embassy in Rome", the report says.[21]
Paolo Emilio Taviani, the Christian Democrat co-founder of Gladio (NATO's
stay-behind anti-Communist organization in Italy), told investigators that the
SID military intelligence service was about to send a senior officer from Rome
to Milan to prevent the bombing, but decided to send a different officer from
Padua in order to put the blame on left-wing anarchists. Taviani also alleged in
an August 2000 interview to Il Secolo XIX newspaper: "It seems to me certain,
however, that agents of the CIA were among those who supplied the materials
and who muddied the waters of the investigation."[22]
Guido Salvini said "The role of the Americans was ambiguous, halfway
between knowing and not preventing and actually inducing people to commit
atrocities."[23]
According to Vincenzo Vinciguerra, the terrorist attack was supposed to push
then Interior Minister Mariano Rumor to declare a state of emergency.[15]
Kidnapping attempt and assassination of
General René Schneider
After leftist Salvador Allende's victory at the polls for presidency
in Chile on 4 September 1970, the US Government and the Central
Intelligence Agency (CIA) were aware of and agreed with Chilean
putschist officers’ assessment that the abduction of General René
Schneider, the Chilean Army’s Commander in September 1970,
was an essential step in any coup plan to prevent him from coming
to power (or unseat him).
In the time between Allende's election and Allende's accession to
the presidency on 4 November, the CIA dismissed putschist
(retired) General Roberto Viaux's group as incompetent and
supported General Camilo Valenzuela. His group was well known
by the CIA-Station and was judged to have the capability to carry
out a successful coup. CIA provided this group — which also saw
the abduction of General Schneider as essential to any coup — with
three submachine guns, ammunition, and 8 to 10 tear gas grenades
on 22 October (the CIA asserts that these weapons were later
returned unused to the Station) for the abduction of Rene
Schneider. On October 22, 1970, two days before Allende's confirmation by Congress, the Viaux plotters
attempted to kidnap Schneider. His official car was ambushed at a street intersection in Santiago de Chile.
Schneider drew a gun to defend himself, and was shot point-blank several times. He was rushed to a military
hospital, but the wounds proved fatal and he died three days later, on October 25. Valenzuela’s representative
insisted his group had nothing to do with Schneider’s killing and that Viaux acted on his own. In November
1970 a member of the Viaux group who avoided capture recontacted the Agency and requested financial
assistance on behalf of the group. The CIA asserts that "although the Agency had no obligation to the group
because it acted on its own, in an effort to keep the prior contact secret, maintain the good will of the group,
and for humanitarian reasons, $35,000 was passed".[24]
4. The U.S.-supported Nicaraguan
Contras
Although contact with the Viaux group was ended, a cable from CIA headquarters to the Santiago station
reveals that the CIA did arrange the delivery of submachine guns and ammunition to a group led by General
Valenzuela; Schneider was shot later that same day.[25] The weapons, along with $50,000, were later recovered
by U.S. military attaché to Chile Colonel Wilmert after he "pistol-whipped" General Valenzuela, who at first
refused to hand the money over. Wilmert then drove to Viña del Mar, where he threw the submachine guns into
the Pacific Ocean.[26]
The Contras
From 1979 to 1990, the United States provided financial, logistical and military support to the Contra rebels in
Nicaragua, who used terrorist tactics in their war against the Nicaraguan government[3][27][28][29][30][31] and
carried out more than 1300 terrorist attacks.[32] This support persisted despite widespread knowledge of the
human rights violations committed by the Contras.[28]
Background
In 1979, the Sandinista National Liberation Front (FSLN) overthrew the
dictatorial regime of Anastasio Somoza Debayle, and established a
revolutionary government in Nicaragua.[33] The Somoza dynasty had
been receiving military and financial assistance from the United States
since 1936.[34] Following their seizure of power, the Sandinistas ruled
the country first as part of a Junta of National Reconstruction, and later
as a democratic government following free and fair elections in
1984.[35]
The Sandinistas did not attempt to create a communist economic
system; instead, their policy advocated a social democracy and a mixed
economy.[36][37][38][39][40][41] The government sought the aid of
Western Europe, who were opposed to the U.S. embargo against
Nicaragua, to escape dependency on the Soviet Union. However, the
U.S. administration viewed the leftist Sandinista government as
undemocratic and totalitarian under the ties of the Soviet-Cuban model and tried to paint the Contras as
freedom fighters.[42][43]
The Sandinista government headed by Daniel Ortega won decisively in the 1984 Nicaraguan elections.[44] The
U.S. government explicitly planned to back the Contras, various rebel groups collectively that were formed in
response to the rise of the Sandinistas, as a means to damage the Nicaraguan economy and force the Sandinista
government to divert its scarce resources toward the army and away from social and economic programs.[45]
Covert operations
The United States began to support Contra activities against the Sandinista government by December 1981,
with the CIA at the forefront of operations.[46] The CIA provided the Contras with planning and operational
direction and assistance, weapons, food, and training, in what was described as the "most ambitious" covert
operation in more than a decade.[47][48] One of the purposes the CIA hoped to achieve by these operations was
an aggressive and violent response from the Sandinista government which in turn could be used as a pretext for
proper military actions.[49]
The Contra campaign against the government included frequent and widespread acts of terror.[3][50][51][52] The
economic and social reforms enacted by the government enjoyed some popularity; as a result, the Contras
attempted to disrupt these programs.[50] This campaign included the destruction of health centers and hospitals
5. A mug shot of Oliver North, who
conducted covert operations in
support of the Contras
that the Sandinista government had established, in order to disrupt their control over the populace.[50][51]
Schools were also destroyed, as the literacy campaign conducted by the government was an important part of
its policy.[50] The Contras also committed widespread kidnappings, murder, and rape; several thousand people,
mostly civilians, were killed, and many more were "disappeared."[51][52] The kidnappings and murder were a
product of the "Low-Intensity Warfare" that the Reagan Doctrine prescribed as a way to disrupt social
structures and gain control over the population. Also known as "unconventional warfare", advocated for and
defined by the World Anti-Communist League's (WACL) retired U.S. Army Major General John Singlaub as,
"low intensity actions, such as sabotage, terrorism, assassination and guerrilla warfare".[51][53] In some cases,
more indiscriminate killing and destruction also took place.[51][52] The Contras also carried out a campaign of
economic sabotage, and disrupted shipping by planting underwater mines in Nicaragua's Port of
Corinto.[54][55][56][57][58] The Reagan administration supported this by imposing a full trade embargo.[59]
In the fiscal year 1984, the U.S. Congress approved $24 million in
contra aid.[46] However, the Reagan administration lost a lot of support
for its Contra policy after CIA involvement in the mining of Nicaraguan
ports became public knowledge, and a report of the Bureau of
Intelligence and Research commissioned by the State Department found
that Reagan had exaggerated claims about Soviet interference in
Nicaragua.[46][60] Congress cut off all funds for the contras in 1985 by
the third Boland Amendment.[46][61] As a result, the Reagan
administration sought to provide funds through other sources.[62]
Between 1984 and 1986, $34 million was routed through third countries
and $2.7 million through private sources.[63] These funds were run
through the National Security Council, by Lt. Col. Oliver North, who
created an organization called "The Enterprise" which served as the
secret arm of the NSC staff and had its own airplanes, pilots, airfield,
ship, and operatives.[63] It also received assistance from other
government agencies, especially from CIA personnel in Central
America.[63] These efforts culminated in the Iran-Contra Affair of
1986–1987, which facilitated funding for the Contras through the
proceeds of arms sales to Iran. Money was also raised for the Contras
through drug trafficking, which the United States was aware of.[64] Senator John Kerry's 1988 Committee on
Foreign Relations report on Contra drug links concluded that "senior U.S. policy makers were not immune to
the idea that drug money was a perfect solution to the Contras' funding problems".[65]
Propaganda
Throughout the Nicaraguan civil war, the Reagan government conducted a campaign to shift public opinion in
favor of support to the Contras, and to change the vote in Congress in favor of such support.[66] For this
purpose, the National Security Council authorized the production and distribution of publications looking
favorably at the Contras, also known as "white propaganda," written by paid consultants who did not disclose
their connection to the administration.[66] It also arranged for speeches and press conferences conveying the
same message.[66] The U.S. government continually discussed the Contras in highly favorable terms; Reagan
called them the "moral equivalent of the founding fathers."[67] Another common theme the administration
played on was the idea of returning Nicaragua to Democracy, which analysts characterized as "curious,"
because Nicaragua had been a U.S. supported dictatorship prior to the Sandinista revolution, and had never had
a democracy.[68] There were also continued efforts to label the Sandinistas as undemocratic despite the 1984
Nicaraguan elections being generally declared fair by historians.[69] Commentators stated that this was all a
part of an attempt to return Nicaragua to the state in which its Central American neighbors were; that is, where
6. The International Court of Justice in
session
traditional social structures remained and U.S. "imperialist" ideas were not threatened.[70][71][72] The
investigation into the Iran Contra affair revealed information that led to the operation being called a massive
exercise in psychological warfare.[73][74][75]
The CIA wrote a manual for the Contras, entitled Psychological Operations in Guerrilla Warfare (Operaciones
sicológicas en guerra de guerrillas), which focused mainly on how "Armed Propaganda Teams" could build
political support in Nicaragua for the Contra cause through deceit, intimidation, and violence.[76] The manual
discussed assassinations.[77] The CIA claimed that the purpose of the manual was to "moderate" the extreme
violence already being used by the Contras.[78]
Leslie Cockburn writes that the CIA, and therefore indirectly the U.S. government and President Reagan, were
encouraging Contra terrorism by issuing the manual to the contras violating Reagan's own Presidential
Directive.
The manual, Psychological Operations in Guerrilla Warfare, clearly advocated a strategy of terror
as the means to victory over the hearts and minds of Nicaraguans. Chapter headings such as
‘Selective Use of Violence for propagandistic Effects' and ‘Implicit and Explicit Terror' made that
fact clear enough. ... The little booklet thus violated President Reagan's own Presidential
Directive 12333, signed in December 1981, which prohibited any U.S. government employee—
including the CIA—from having anything to do with assassinations.[79]
International Court of Justice ruling
In 1984 the Nicaraguan government filed a suit in the International
Court of Justice (ICJ) against the United States. Nicaragua stated that
the contras were completely created and managed by the U.S.[80]
Although this claim was rejected, the court found overwhelming and
undeniable evidence of a very close relationship between the Contras
and the United States.[80] The U.S. was found to have had a very large
role in providing financial support, training, weapons, and other
logistical support to the Contras over a lengthy period of time, and that
this support was essential to the Contras.[80]
In 1984, the ICJ ordered that the United States should stop mining
Nicaraguan harbors, and that the U.S. should respect Nicaraguan
sovereignty.[81] A few months later the court ruled that it had jurisdiction in the case, contrary to what the U.S.
had argued.[81] The ICJ found that the U.S. had encouraged violations of international humanitarian law by
assisting paramilitary actions in Nicaragua. The court also criticized the production of a manual on
psychological warfare by the U.S. and its dissemination of the Contras.[81] The manual, amongst other things,
provided advice on rationalizing the killing of civilians, and on targeted murder. The manual also included an
explicit description of the use of "implicit terror."[81]
Having initially argued that the ICJ lacked jurisdiction in the case, the United States withdrew from the
proceedings in 1985.[81] The court eventually ruled in favor of Nicaragua, and judged that the United States
was required to pay reparations for its violation of International law.[81] The U.S. used its veto on the United
Nations Security Council to block the enforcement of the ICJ judgement, and thereby prevented Nicaragua
from obtaining any compensation.[82]
Cuban exiles
7. A memorial to Cubana Flight 455
The United States government provided support to several Cuban exiles
after the success of the Cuban Revolution in 1959, especially under the
administration of George H. W. Bush. Among the most prominent of
these were Orlando Bosch and Luis Posada Carriles, who were
implicated in the 1976 bombing of a Cuban plane. Bosch was also held
to be responsible for 30 other terrorist acts, while Carriles was a former
CIA agent convicted of numerous terrorist acts committed while he was
linked to the agency.[83][84][85][86] Other Cuban exiles involved in
terrorist acts, Jose Dionisio Suarez and Virgilio Paz Romero, two other
Cuban exiles who assassinated the Chilean diplomat Orlando Letelier in
Washington in 1976, were also released by the administration of George
H.W. Bush.[87]
Orlando Bosch
Bosch was a contemporary of Fidel Castro at the University of Havana,
where he was involved with the student cells that eventually became a
part of the Cuban revolution.[88] However, Bosch became disillusioned
with Castro's regime, and participated in a failed rebellion in 1960.[88] He became the leader of the
Insurrectional Movement of Revolutionary Recovery (MIRR), and also joined a CIA effort to assassinate
Castro, along with Luis Posada Carriles.[85] The CIA later confirmed that they had backed him as an
operative.[89] He was the head of Coordination of United Revolutionary Organizations, which the FBI has
described as "an anti-Castro terrorist umbrella organization".[89] Former U.S. Attorney General Dick
Thornburgh called Bosch an "unrepentant terrorist".[90]
In 1968, he was convicted of firing a bazooka at a Polish cargo ship bound for Havana that had been docked in
Miami. He was sentenced to 10 years in prison and released on parole in 1974. He immediately broke parole
and traveled around Latin America.[85] He was eventually arrested in Venezuela for planning to bomb the
Cuban embassy there. The Venezuelan government offered to extradite him to the United States, but the offer
was declined. He was released quickly and moved to Chile, and according to the US government, spent two
years attempting postal bombings of Cuban embassies in four countries.[85]
Bosch eventually ended up in the Dominican Republic, where he joined the CIA effort to consolidate Cuban
exile groups into the Coordination of United Revolutionary Organizations (CORU). The CORU's operations
included the failed assassination of the Cuban ambassador to Argentina, and the bombing of the Mexican
Embassy in Guatemala City. Along with Posada, he worked with a CIA agent to plant the assassination of
Letelier, which was carried out in September 1976.[85][87][89] He was also implicated in the 1976 bombing of a
Cuban plane flying to Havana from Venezuela in which all 73 civilians on board were killed, although Posada
and he were acquitted after a lengthy trial. Documents released subsequently showed that the CIA had advance
knowledge of the bombing.[85][87][91] He returned to Miami, where he was arrested for violating parole. The
Justice department recommended that he be deported. However, Bush overturned this recommendation, and
had him released from custody with the stipulation that he "renounce" violence.[85]
Luis Posada Carriles
Luis Posada Carriles, a former CIA agent who has been designated by scholars and journalists as a
terrorist,[92][93][94][95][96][97][98] also came into contact with Castro during his student days, but fled Cuba after
the 1959 revolution, and helped organize the failed Bay of Pigs invasion.[99] Following the invasion, Carriles
was trained for a time at the Fort Benning station of the U.S. Army.[99][100] He then relocated to Venezuela,
where he came into contact with Orlando Bosch.[101] Along with Orlando Bosch and others, he founded the
Coordination of United Revolutionary Organizations, which has been described as an umbrella of anti-Castro
8. Luis Posada at Fort Benning,
Georgia, U.S., 1962
terrorist groups.[102] In 1976, Cubana Flight 455 was blown up in mid-air,
killing all 78 people on board. Carriles was arrested for masterminding
the operation, and later acquitted. He and several CIA-linked anti-Castro
Cuban exiles and members of the Venezuelan secret police DISIP were
implicated by the evidence. Political complications quickly arose when
Cuba accused the US government of being an accomplice to the attack.
CIA documents released in 2005 indicate that the agency "had concrete
advance intelligence, as early as June 1976, on plans by Cuban exile
terrorist groups to bomb a Cubana airliner." Carriles denies involvement
but provides many details of the incident in his book Los caminos del
guerrero (The Warrior's Paths).[83][103][104][105][106][107]
After a series of arrests and escapes, Carriles returned to the CIA fold in
1985 by joining their support operations to the Contra terrorists in
Nicaragua, who were being run by Oliver North. His job included
dropping military supplies, for which he was paid a significant salary, and
later he admitted to playing a part in the Iran-Contra
affair.[97][101][108][109] In 1997, a series of terrorist bombings occurred in
Cuba, in which Carriles was implicated. They were said to be targeted at
the growing tourism there. Carriles admitted that the lone convict in the case had been a mercenary under him,
and also made a confession (later retracted) that he had planned the incident.[110][111][112] Human Rights Watch
stated that although Carriles may have stopped receiving active assistance, he benefited from the tolerant
attitude that the U.S. government took.[113] In 2000, Carriles was arrested and convicted in Panama of
attempting to assassinate Fidel Castro.[101]
In 2005, Posada was held by U.S. authorities in Texas on the charge of illegal presence on national territory
before the charges were dismissed on May 8, 2007. On September 28, 2005 a U.S. immigration judge ruled that
Posada cannot be deported, finding that he faces the threat of torture in Venezuela.[114] Likewise, the US
government has refused to send Posada to Cuba, saying he might face torture. His release on bail on April 19,
2007 elicited angry reactions from the Cuban and Venezuelan governments.[115] The U.S. Justice Department
had urged the court to keep him in jail because he was "an admitted mastermind of terrorist plots and attacks", a
flight risk and a danger to the community. On September 9, 2008 the United States Court of Appeals for the
Fifth Circuit reversed the District Court's order dismissing the indictment and remanded the case to the District
Court.[116] On April 8, 2009 the United States Attorney filed a superseding indictment in the case. Carriles' trial
ended on April 8, 2011 with a jury acquitting him on all charges.[117] Peter Kornbluh described him as "one of
the most dangerous terrorists in recent history" and the "godfather of Cuban exile violence."[106]
See also
Jundallah (Iran)#United States and Israel
1985 Beirut car bombing
American war crimes
Iran and state-sponsored terrorism
Israel and state-sponsored terrorism
Pakistan and state-sponsored terrorism
Qatar and state-sponsored terrorism
Saudi Arabia–United States relations#Allegations of funding terrorism
Terrorism and the Soviet Union
United States and state terrorism
References
9. 1. George, Alexander (1991)."Introduction"(https://books.google.com/books?id=5ENiQgAACAAJ&dq). In George,
Alexander. Western State Terrorism. New York: Routledge. ISBN 0415904730.
2. Blakeley, Ruth (December 2006). "State Terrorism by Northern Democratic States: Critical for a "Critical" Terrorism
Studies".British International Studies AssociationConference. Cork, Ireland.
3. Feldmann, Andreas E.; Maiju Perälä (July 2004). "Reassessing the Causes of Nongovernmental Terrorism in Latin
America".Latin American Politics and Society. 46 (2): 101–132.doi:10.1111/j.1548-2456.2004.tb00277.x(https://doi.or
g/10.1111%2Fj.1548-2456.2004.tb00277.x).
4. Greg Grandin; Gilbert M. Joseph (2010).A Century of Revolution: Insurgent and Counterinsurgent Violence during
Latin America’s Long Cold War (https://books.google.com/books?id=YJ7ZBGy0wsIC&pg=PA397). Durham, North
Carolina: Duke University Press. pp. 397–414.ISBN 0822392852.
5. Noam Chomsky(1985). Turning the Tide: U.S. Intervention in Central America and the Struggle for Peace(https://book
s.google.com/books?id=d_Kua_fO8WoC). Boston, Massachusetts: South End Press. p. 60. ISBN 0896082660.
6. "Criminal Occurrence description"(http://aviation-safety.net/database/record.php?id=19550411-1). Aviation Safety
Network. Retrieved31 May 2015.
7. "China spills Zhou Enlai secret"(http://www.chinadaily.com.cn/english/doc/2004-07/21/content_350313.htm). China
Daily. 21 July 2004. Retrieved31 May 2015.
8. Mendis, Sean (26 July 2004)."Air India : The story of the aircraft"(http://www.airwhiners.net/whine_cheez/20040726.h
tm). Airwhiners.net. Retrieved31 May 2015.
9. Tsang, Steven (2006).The Cold War's Odd Couple: The Unintended Partnership Between the Republic of China and the
UK, 1950-1958(https://books.google.com/books/about/The_Cold_War_s_Odd_Couple.html). New York: I.B. Tauris.
p. 181. ISBN 1850438420.
10. "Police Seek Chinese in Crash Case"(https://news.google.com/newspapers?nid=1873&dat=19550903&id=AooeAAAA
IBAJ&sjid=fcsEAAAAIBAJ&pg=3327,318235). The Daytona Beach News-Journal. Hong Kong. 3 September 1955.
p. 5. Retrieved25 May 2015.
11. Minnick, Wendell L. "Target: Zhou Enlai", Far Eastern Economic Review, 1995-07-13, pages 54–55.
12. Arthur M. Schlesinger, Robert Kennedy and His Times (Boston: Houghton Mifflin, 1978), 517.
13. Memorandum of conversation (Henry Kissinger, Zhou Enlai, and staff), Foreign, Relations of the United States, 1969–
1976, Volume E-13, Documents on China, 1969–1972, United States Department of State, 21 October 1971
14. "Commissione parlamentare d'inchiesta sul terrorismo in Italia e sulle cause della mancata individuazione dei
responsabili delle stragi (1995 Parliamentary Commission of Investigation on Terrorism in Italy and on the Causes of
the Failing of the Arrests of the Responsibles of the Bombings)"(https://web.archive.org/web/20060819211212/http://w
ww.isn.ethz.ch/php/documents/collection_gladio/report_ital_senate.pdf)(PDF) (in Italian). 1995. Archived fromthe
original (http://www.isn.ethz.ch/php/documents/collection_gladio/report_ital_senate.pdf)(PDF) on 2006-08-19.
Retrieved2006-05-02.
15. "Strage di Piazza Fontana – spunta un agente Usa"(http://www.repubblica.it/online/fatti/fontana/fontana/fontana.html)
(in Italian).La Repubblica. February 11, 1998. Retrieved2006-05-02. (With links to juridical sentences and
Parliamentary Report by the Italian Commission on Terrorism)
16. (in English)/(in Italian)/(in French)/(in German)"Secret Warfare: Operation Gladio and NATO's Stay-Behind Armies"
(https://web.archive.org/web/20060425182721/http://www.isn.ethz.ch/php/collections/coll_gladio.htm#Documents).
Swiss Federal Institute of Technology / International Relation and Security Network. Archived from the original(http://
www.isn.ethz.ch/php/collections/coll_gladio.htm#Documents)on 2006-04-25. Retrieved2006-05-02.
17. Willan, Philip (26 March 2001)."Terrorists 'helped by CIA' to stop rise of left in Italy"(https://www.theguardian.com/w
orld/2001/mar/26/terrorism). The Guardian. Milan. Retrieved28 May 2015.
18. Terrorists 'helped by CIA' to stop rise of left in Italy(https://www.theguardian.com/international/story/0,3604,462976,0
0.html), The Guardian, March 26, 2001
19. "Belgian parliamentary report concerning the stay-behind network"(http://www.senate.be/lexdocs/S0523/S05231297.pd
f), named "Enquête parlementaire sur l'existence en Belgique d'un réseau de renseignements clandestin international" or
"Parlementair onderzoek met betrekking tot het bestaan in België van een clandestien internationaal inlichtingenetwerk"
pp. 17–22
20. "1969: Deadly bomb blasts in Italy"(http://news.bbc.co.uk/onthisday/hi/dates/stories/december/12/newsid_3953000/395
3999.stm). BBC News. 12 December 1969. Retrieved28 May 2015.
21. US 'supported anti-left terror in Italy'(http://www.cambridgeclarion.org/press_cuttings/us.terrorism_graun_24jun2000.h
tml), The Guardian, June 24, 2000
22. Paolo Emilio Taviani (https://www.theguardian.com/obituaries/story/0,,510075,00.html), obituary byPhilip Willan, in
The Guardian, June 21, 2001
23. Willan, Philip (2 July 2001)."Three jailed for 1969 Milan bomb"(https://www.theguardian.com/world/2001/jul/02/phili
pwillan). The Guardian. Rome. Retrieved28 May 2015.
24. "CIA Activities in Chile"(https://www.cia.gov/library/reports/general-reports-1/chile/index.html#15). www.cia.gov.
Central of Intelligence of America. September 18, 2000. Retrieved5 February2015.
25. CIA, Cable Transmissions on Coup Plotting, October 18, 1970(http://www.gwu.edu/~nsarchiv/NSAEBB/NSAEBB8/ch
27-01.htm)
10. 26. Kornbluh, Peter (2003).The Pinochet File: A Declassified Dossier on Atrocity and Accountability. New York: The New
Press. p. 30.ISBN 1-56584-936-1.
27. Chomsky, Noam (1988).The Culture of Terrorism. Black Rose Books. pp. 111, 130. ISBN 9780921689287.
28. Grandin, p. 89
29. Todd, Dave (26 February 1986)."Offensive by Nicaraguan "Freedom Fighters" May be Doomed as Arms, Aid Dry Up"
(https://news.google.com/newspapers?id=aK8yAAAAIBAJ&sjid=pe8FAAAAIBAJ&pg=1173,187657&dq=nicaragua&
hl=en). Ottawa Citizen. Retrieved27 June 2011.
30. Albert J. Jongman;Alex P. Schmid (1988). Political Terrorism: A New Guide To Actors, Authors, Concepts, Data Bases,
Theories, And Literature (https://books.google.com/books&id=NgDks1hUjhMC). Transaction Publishers. pp. 17–18.
ISBN 978-1-41280-469-1. Retrieved27 May 2015.
31. Athan G. Theoharis; Richard H. Immerman(2006). The Central Intelligence Agency: Security Under Scrutiny(https://b
ooks.google.com/books?id=-nj4RLdHCU0C). Greenwood Publishing Group. p. 216. ISBN 0313332827.
32. Gary LaFree; Laura Dugan; Erin Miller (2014).Putting Terrorism in Context: Lessons from the Global Terrorism
Database(https://books.google.com/books?id=_TGLBQAAQBAJ). Routledge. p. 56. ISBN 1134712413.
33. States, Ideologies, and Social Revolutions: A Comparative Analysis of Iran, Nicaragua, and the Philippines by Misargh
Parsa for Cambridge University Press. Page 224.
34. Gould, Jeffrey (2010). Grandin, Greg; Joseph, Gilbert M., eds.On the Road to "El Porvenir". Duke University Press.
pp. 87–120.
35. "On This Day: 1984: Sandinistas claim election victory"(http://news.bbc.co.uk/onthisday/hi/dates/stories/november/5/n
ewsid_2538000/2538379.stm). BBC News. 5 November 2005. Retrieved31 May 2014.
36. LaFeber, p. 350
37. LaFeber, p. 238
38. Latin American Studies Association, p. 5
39. "Soviet posture in the Western Hemisphere"(http://www.scribd.com/doc/109252703/The-Jacobsen-Report-Soviet-postu
re-in-the-Western-Hemisphere-hearing-before-the-Subcommittee-on-Western-Hemisphere-Affairs-of-the-Committee-on
-Forei) Carl G. Jacobsen, 28 February 1985, p. 6
40. Gould, Jeffrey (2010). "One the Road to "El Porvenir"". In Gilbert M. Joseph, Greg Grandin.A Century of Revolution.
Durham, North Carolina: Duke University Press. pp. 88–121.
41. Grandin, p. 112
42. "Paris Defends Plan To Sell Arms To Managua"(https://www.nytimes.com/1982/01/09/world/paris-defends-plan-to-sell
-arms-to-managua.html)New York Times, Jan 9, 1982
43. "Ortega collects warm words of support on European trip. Yet his visit is unlikely to drum up much concrete aid"(http://
www.csmonitor.com/1985/0516/oteg.html)Christian Science Monitor, May 16, 1985
44. "BBC ON THIS DAY | 5 | 1984: Sandinistas claim election victory"(http://news.bbc.co.uk/onthisday/hi/dates/stories/no
vember/5/newsid_2538000/2538379.stm). BBC News. Retrieved2014-08-18.
45. Grandin, p. 116
46. Hamilton & Inouye, "Report of the Congressional Committees Investigating the Iran-Contra Affair", p. 3
47. Hamilton & Inouye, "Report of the Congressional Committees Investigating the Iran-Contra Affair", p. 33
48. "Reagan versus the Sandinistas: the undeclared war on Nicaragua", Thomas W. Walker, Westview Press, Aug 5, 1987, p.
25
49. "Case Concerning Military and Paramilitary Activities in and Against Nicaragua (Nicaragua V. United States of
America): Application instituting proceedings", Nicaragua, International Court of Justice, United States, David
Macmichael testimony, p. 50
50. LaRamee, Polakoff, Pierre, Erica (1999).Undermining of the Sandinista Revolution. New York: Palgrave Macmillan.
pp. 141–205.
51. Tully, Sheila R. (1995). "A painful purgatory: grief and the Nicaraguan mothers of the disappeared". Social Science &
Medicine. 40 (12): 1597–1610.doi:10.1016/0277-9536(94)00346-U(https://doi.org/10.1016%2F0277-9536%2894%29
00346-U).
52. Chomsky, Noam (1985).Turning the Tide. Boston, MA: South End Press. pp. 24–28.
53. "Inside the League: The Shocking Exposé of how Terrorists, Nazis, and Latin American Death Squads Have Infiltrated
the World Anti-Communist League", Scott Anderson, Jon Lee Anderson, Dodd, Mead, 1986, p. 120
54. Truver, SC. "Mines and Underwater IEDs in U.S. Ports and Waterways..."(http://www.mast.udel.edu/873/Spring%2020
07/ScottTruves.pdf)(PDF). p. 4. Retrieved2007-08-21.
55. "International Court of Justice, Case Concerning The Military And Paramilitary Activities In And Against Nicaragua
(Nicaragua v. United States Of America)"(https://web.archive.org/web/20070308063434/http://www.icj-cij.org/icjww
w/icases/inus/inus_isummaries/inus_isummary_19860627.htm). Archived fromthe original(http://www.icj-cij.org/icjw
ww/icases/inus/inus_isummaries/inus_isummary_19860627.htm)on March 8, 2007.
56. "The New York Times, Oct. 10 Assault On Nicaraguans Is Laid To C.I.A."(http://select.nytimes.com/gst/abstract.html?r
es=F10B16FF3E5C0C7B8DDDAD0894DC484D81&n=Top%2fReference%2fTimes%20Topics%2fSubjects%2fM%2f
Mercenaries). April 18, 1984. Retrieved2006-11-10.
11. 57. "NBC Evening News for Tuesday, Oct 11, 1983" (http://tvnews.vanderbilt.edu/program.pl?ID=526828). Retrieved
2006-11-10.
58. "Photograph showing the burning oil tanks, Un comando de la CIA y fuerzas especiales SEAL bombardean refineria en
Corinto, Nicaragua, 1983."(https://www.flickr.com/photos/wirobinson/132697349/).
59. "US Policy: Economic Embargo: The War Goes On" (http://www.envio.org.ni/articulo/2695). Envío. Central American
University – UCA. Retrieved2007-08-21.
60. "U.S. Delayed Report on Soviets in Nicaragua"(http://nl.newsbank.com/nl-search/we/Archives?p_multi=MH). Miami
Herald. 18 September 1984. Retrieved6 June 2014.
61. Riesenfeld, Stefan A. (January 1987). "The Powers of Congress and the President in International Relations: Revisited".
California Law Review. California Law Review, Inc. 75 (1): 405.JSTOR 3480586 (https://www.jstor.org/stable/348058
6). doi:10.2307/3480586(https://doi.org/10.2307%2F3480586).
62. Thorpe, Rebecca U. (16 April 2014).The American Warfare State: The Domestic Politics of Military Spending(https://b
ooks.google.com/books?id=QOgeAwAAQBAJ&dq=Reagan+NSD+17&source=gbs_navlinks_s). University of Chicago
Press. p. 173.ISBN 9780226124100. Retrieved6 June 2014.
63. Hamilton & Inouye, "Report of the Congressional Committees Investigating the Iran-Contra Affair", p. 4
64. National Security Archive."The Contras, cocaine, and covert operations: Documentation of official U.S. knowledge of
drug trafficking and the Contras"(http://www2.gwu.edu/~nsarchiv/NSAEBB/NSAEBB2/nsaebb2.htm). The National
Security Archive/George Washington University.
65. "The Oliver North File"(http://www.gwu.edu/~nsarchiv/NSAEBB/NSAEBB113/index.htm). George Washington
University. Retrieved17 August2011.
66. Hamilton & Inouye, p. 5
67. Wieseltier, Leon (15 December 1986)."Crisis in the White House"(https://news.google.com/newspapers?nid=1301&dat
=19861215&id=EypWAAAAIBAJ&sjid=aOQDAAAAIBAJ&pg=5468,11185737). Sydney Morning Herald. Retrieved
6 June 2014.
68. Carothers, p. 97
69. LaFeber, p. 310
70. Grandin, p. 88
71. LaFeber, p. 15-19
72. Carothers, p. 249
73. "NSC OVERSAW CAMPAIGN TO SWAY CONTRA AID VOTE"(http://nl.newsbank.com/nl-search/we/Archives).
Miami Herald. 19 July 1987. Retrieved6 June 2014.
74. Parry, Robert (4 September 1988)."Reagan's Pro-Contra Propaganda Machine"(http://www.highbeam.com/doc/1P2-12
77009.html). The Washington Post. Retrieved6 June 2014.
75. "Public Diplomacy and Covert Propaganda: The Declassified Record of Otto Juan Reich"(http://www.gwu.edu/~nsarchi
v/NSAEBB/NSAEBB40/)The National Security Archive, 2 March 2001
76. Leogrande, William M. (1 February 2000). "Peace Offensive".Our Own Backyard: The United States in Central
America, 1977-1992. University of North Carolina Press. p. 363.ISBN 0-8078-4857-3.
77. Kepner, Timothy J. (Spring 2001)."Torture 101: The Case Against the United States for Atrocities Committed by
School of the Americas Alumni"(http://bailey83221.livejournal.com/77479.html). Dickinson Journal of International
Law. 19: 487. Footnote 105
78. "International Law PSCI 0236 > International Law PSCI 0236 > Introduction"(https://segue.middlebury.edu/index.php?
action=site&site=psci0236a-f06). middlebury.edu. Retrieved2006-09-05.
79. Cockburn, Leslie. Out of Control: the story of the Reagan Administration's secret war in Nicaragua, the illegal arms
pipeline, and the Contra drug connection, London: Bloomsbury, 1988, p. 7.
80. Gill, Terry D. (1989).Litigation Strategy at the International Court: A Case Study of the Nicaragua V. United States
Dispute (https://books.google.com/books?id=HTPpRIirnqsC&dq). Martinus Nijhoff Publishers. pp. 328–9.
ISBN 9780792303329. Retrieved6 June 2014.
81. Sklar, Holly (1988).Washington's War on Nicaragua(https://books.google.com/books?id=IbFXs7_LutMC&vq). South
End Press. pp. 169–180, 313–315.ISBN 9780896082953. Retrieved6 June 2014.
82. Morrison, Fred L. (January 1987)."Legal Issues in The Nicaragua Opinion"(http://bailey83221.livejournal.com/55750.
html). American Journal of International Law. 81 (1): 160–166.JSTOR 2202146
(https://www.jstor.org/stable/2202146). doi:10.2307/2202146(https://doi.org/10.2307%2F2202146). "Appraisals of the
ICJ's Decision. Nicaragua vs United State (Merits)"
83. Peter Kornbluh (10 May 2005).Luis Posada Carriles(http://www2.gwu.edu/~nsarchiv/NSAEBB/NSAEBB153/index.ht
m) (Report). National Security Archive. Retrieved30 May 2014.
84. Martin, Dougles (27 April 2011). "Orlando Bosch, Cuban Exile, Dies at 84"(https://www.nytimes.com/2011/04/28/us/2
8bosch.html?pagewanted=all&_r=0). New York Times. Retrieved29 May 2014.
85. Carlson, Michael (20 June 2011). "Orlando Bosch: CIA-backed Cuban exile implicated in numerous anti-Castro terrorist
operations"(http://www.independent.co.uk/news/obituaries/orlando-bosch-ciabacked-cuban-exile-implicated-in-numero
us-anticastro-terrorist-operations-2304468.html). The Independent. Retrieved29 May 2014.
12. 86. Lacey, Marc (8 October 2006)."Castro Foe Puts U.S. in an Awkward Spot"(https://www.nytimes.com/2006/10/08/worl
d/americas/08posada.html). New York Times. Retrieved30 May 2014.
87. Campbell, Duncan (2002-12-02)."The Bush dynasty and the Cuban criminals"(https://www.theguardian.com/world/20
02/dec/02/usa.books). London: Guardian. Retrieved2011-06-07.
88. Miami Herald, 27 April 2011, "Prominent exile militant Orlando Bosch dead in Miami at 84, family says"(http://www.
miamiherald.com/2011/04/27/v-fullstory/2188315/prominent-exile-militant-orlando.html)
89. Kornbluh, Peter (9 June 2005)"The Posada File: Part II."(http://www.gwu.edu/~nsarchiv/NSAEBB/NSAEBB157/inde
x.htm) National Security Archive.
90. Landau, Saul(25 July 2002)"At Our Expense: The Costly Relationship between Jeb Bush and Right Wing Cuban
Exiles." (http://www.tni.org/detail_page.phtml?page=archives_landau_jeb1)Transnational Institute
91. Kornbluh, Peter (5 October 2005)"Bombing of Cuban Jetliner"(http://www2.gwu.edu/~nsarchiv/NSAEBB/NSAEBB2
02/index.htm)National Security Archive.
92. "Terrorist Cuban Exile Luis Posada Carriles Seeking Political Asylum in U.S."(http://www.democracynow.org/2005/5/
9/terrorist_cuban_exile_luis_posada_carriles). Democracy Now!. Retrieved6 December2014.
93. "A terrorist walks"(http://articles.latimes.com/2007/apr/20/opinion/ed-posada20). Los Angeles Times. Retrieved
6 December2014.
94. "Ruiz: Terrorist's day in court may be here"(http://articles.nydailynews.com/2011-01-13/local/29442135_1_venezuelan-
jail-immigration-fraud-string-of-hotel-bombings). NY Daily News. Retrieved6 December2014.
95. Associated Press: Cuban exile, accused terrorist informed on allies(https://www.google.com/hostednews/ap/article/ALe
qM5g_OordiARXloytYJykj9YZR8dmXgD9B5S0600)
96. "National Briefing"(https://www.nytimes.com/2006/04/27/us/27brfs.html). New York Times. April 27, 2006. Retrieved
2009-02-17.
97. National Security Archive. "Luis Posada Carriles, The Declassified Record"(http://www.gwu.edu/~nsarchiv/NSAEBB/
NSAEBB153/index.htm).
98. Declassified document, October 1976(http://www.latinamericanstudies.org/posada/19761016.pdf). (PDF) . Retrieved on
2011-04-25.
99. Candiotti, Susan (2005-05-18)."Alleged anti-Castro terrorist Posada arrested"(https://web.archive.org/web/2008060208
4518/http://edition.cnn.com/2005/US/05/17/posada.arrest/). CNN. Archived fromthe original(http://edition.cnn.com/20
05/US/05/17/posada.arrest/)on 2008-06-02. Retrieved2008-05-22.
100. Peter Kornbluh (10 May 2005).CIA declassified report on Luis Posada(http://www2.gwu.edu/~nsarchiv/NSAEBB/NS
AEBB202/HSCA00000346.pdf)(PDF) (Report). National Security Archive. Retrieved30 May 2014.
101. Bardach, Ann Louise. Cuba Confidential: Love and Vengeance in Miami and Havana. p180-223.
102. Kornbluh, Peter (June 9, 2005)"The Posada File: Part II."(http://www.gwu.edu/~nsarchiv/NSAEBB/NSAEBB157/inde
x.htm) National Security Archive.
103. Posada Carriles, Luis 1994 (accessed 4-13-07) Los Caminos del Guerrero. Latin American Studies[1] (http://www.latin
americanstudies.org/caminos-guerrero.htm)
104. "Luis Posada Carriles: The Declassified Record"(http://www.gwu.edu/~nsarchiv/NSAEBB/NSAEBB153/). gwu.edu.
105. Ruiz, Albor (13 January 2011). "Cuban-born terrorist Luis Posada Carriles's day in court may be here"(http://www.nyda
ilynews.com/new-york/brooklyn/cuban-born-terrorist-luis-posada-carriles-day-court-article-1.154045). Daily News.
Retrieved30 May 2014.
106. Peter Kornbluh(2011), Former CIA Asset Luis Posada Goes to Trial (http://www.thenation.com/print/article/157510/for
mer-cia-asset-luis-posada-goes-trial), The Nation, retrieved30 May 2014
107. Selsky, Andrew O. (May 4, 2007). "Link found to bombing". Associated Press.
108. US v. Luis Posada Carriles, No. 07-CR-87 (appeal of mag decision)(http://www.txwd.uscourts.gov/opinions/cases/posa
dacarriles/docs/cr87doc44.pdf). (PDF) . Retrieved on 2011-04-25.
109. Bardach, Ann Louise; Larry Rohter (1998-07-13)."A Bomber's Tale: Decades of Intrigue"(http://query.nytimes.com/gs
t/fullpage.html?res=9C02E2DD1331F930A25754C0A96E958260). The New York Times. The New York Times
Company. Retrieved2014-05-20.
110. Organizations Demand Cuban Militant's Arrest(http://www.local10.com/news/4402775/detail.html). Local10.com
(2005-04-21). Retrieved on 2011-04-25.
111. Christian Science Monitor, May 20, 2005,US tiptoes between terror, Castro's policies(http://www.csmonitor.com/2005/
0520/p02s02-usfp.html)
112. LA Times, 20 April 2007,U.S. criticized as Cuban exile is freed(http://www.latimes.com/news/nationworld/world/la-fg-
posada20apr20,1,2202043.story?coll=la-headlines-world&ctrack=2&cset=true)
113. "The U.S. and Cuban Exile Violence" (https://www.hrw.org/reports/1999/cuba/Cuba996-12.htm). Human Rights Watch.
Retrieved30 May 2014.
114. "No deportation for Cuban militant"(http://news.bbc.co.uk/2/hi/americas/4289136.stm). BBC News. BBC. 28
September 2005. Retrieved3 June 2014.
115. Push to free convicted Cuban spies reaches D.C.(http://www.miami.com/mld/miamiherald/news/world/americas/15578
403.htm), Miami Herald, September 22, 2006
13. Sources
LaFeber, Walter (1993). Inevitable Revolutions: The United States in Central America. W. W. Norton &
Company. ISBN 9780393309645.
Latin American Studies Association (1984). The Electoral Process in Nicaragua: Domestic and
International Influences. Latin American Studies Association.
Grandin, Greg (2006). Empire's Workshop: Latin America, the United States, and the Rise of the New
Imperialism. Macmillan. ISBN 9781429959155.
Hamilton, Lee H.; Inouye, Daniel K. (1995). Report of the Congressional Committees Investigating the
Iran/Contra Affair. DIANE Publishing. ISBN 9780788126024.
Carothers, Thomas (1993). In the Name of Democracy: U.S. Policy Toward Latin America in the Reagan
Years. University of California Press. ISBN 9780520082601.
Retrieved from "https://en.wikipedia.org/w/index.php?title=United_States_and_state-
sponsored_terrorism&oldid=787862942"
Categories: Foreign relations of the United States Terrorism committed by the United States
State-sponsored terrorism Nicaraguan Revolution Presidency of Ronald Reagan Terrorism in Cuba
Opposition to Fidel Castro Cuba–United States relations Central Intelligence Agency operations
CIA activities in the Americas
This page was last edited on 28 June 2017, at 00:49.
Text is available under the Creative Commons Attribution-ShareAlike License; additional terms may
apply. By using this site, you agree to the Terms of Use and Privacy Policy. Wikipedia® is a registered
trademark of the Wikimedia Foundation, Inc., a non-profit organization.
116. United States v. Luis Posada Carriles, Western District of Texas (http://www.txwd.uscourts.gov/opinions/cases/posadaca
rriles/default.asp). Txwd.uscourts.gov. Retrieved on 2011-04-25.
117. Alfonso Chardy and Frances Robles (April 8, 2011). "Texas jury acquits Cuban militant Posada"(http://www.mcclatchy
dc.com/2011/04/08/111894/texas-jury-acquits-cuban-militant.html). Miami Herald. RetrievedApril 22,2015.