Wednesday, October 30, 2019

The Nature and Importance of Leadership Essay Example | Topics and Well Written Essays - 2500 words

The Nature and Importance of Leadership - Essay Example Ms. Rodgers served as an Assistant Manager of a local state bank for more than 10 years before assuming the position of a Unit Manager for the health institution. She had been the Unit Manager for five years now. Through her educational background, having graduated with a master’s degree in business administration from a reputable university; in conjunction with years of experience in a managerial position, makes her the perfect candidate for the current project. Leadership was deemed to be crucial in the organization Ms. Rodgers serve due to the relevance of according high quality in patient care. As such, she asserted that the subordinates who she governs should be regularly motivated, monitored, and evaluated to perform according to explicitly defined roles, responsibilities, and goals. Likewise, she believes that learning to lead is important for students like me so that we would imbibe the pertinent theories and discern how these should be applied in current and future se ttings. As a coach and motivator: She was asked to design strategies to motivate the followers into achieving identified goals; while taking into account the needs, drives, and professional growth of her followers. As a technical problem solver: As a manager, she has addressed various problems in the work-setting which required evaluating various alternative courses of action and selecting the option which maximized the benefits and minimized costs. As an entrepreneur: She makes decisions after taking the perspectives of senior management, or the real entrepreneurs; and assumes a proactive role in capturing opportunities, as well as addressing threats in the external environment. As a strategic planner: Ms. Rodgers noted that she is consistently a strategic planner through acknowledgment of goals as her standards and designing strategies that facilitate the attainment of these goals.

Managing hypoglycemia in primary care as a practice nurse Essay

Managing hypoglycemia in primary care as a practice nurse - Essay Example Many patients opt to increase their food intake to an extent where hyperglycemia becomes inevitable. Others respond by being psychologically upset which in turn compromises their quality of lif e. Long-term consequences may include a less productive lifestyle coupled with feelings of anxiety and fear. Glucose acts as the primary fuel for the large variety of functions that nervous system performs. Despite the fact that glucose is vital for neuronal survival, the local storage of glucose within the substance of brain is limited; astrocytes contain glycogen which may produce glucose for a very limited period of time. For this reason, neuronal survival is mainly dependent upon a sustained supply of glucose through the blood brain barrier. Consequently, brain becomes one of the primary targets of hypoglycemia and suffers the first insult when blood glucose level starts to fall below a certain level (65 mg/dl). Irregular electrical activity at neuronal level may precipitate seizures when the level falls below 40mg/dl. Neuronal electrical activity ceases to exist when blood glucose level is below the 10mg/dl range (Ahrens et al, 2010). Since the control mechanism related to glycemia is affected in diabetes, it is common for diabetics to encounter hypoglycemic events due to reduced food intake, altered level of activity or overuse of glucose-lowering drugs. In severe cases, hypoglycemia may bring forth worst prognostic outcomes like coma or death. Due to the fact that different symptoms like hunger, irritability or anxiety are often attributed to hypoglycemia by health care workers without documenting actual hypoglycemia, the exact incidence of hypoglycemia cannot be determined with certainty. Among people presenting with symptoms suggestive of hypoglycemia, only 5-10% are actually hypoglycemic i.e. blood sugar levels below 50 mg/dL. Moreover, the incidence

Monday, October 28, 2019

Why I Want to Teach Essay Example for Free

Why I Want to Teach Essay Why I Want to Teach A teacher is defined as someone who gives instruction as well as communicates skills. Teaching is on the top of my list of potential careers, though I am not certain it is going to be right for me. This essay should shed some light on my incentives and hesitations concerning education as a career path and I’ll hopefully gain some insight as well. I can think of many positive reasons to become a teacher. For one, teachers do something relatively different every day and also get an entirely new class every year (in theory). This gives educators a huge opportunity to make a difference in an extraordinary amount of young lives. If I were to become a teacher, it would most likely be at the primary school level, not for the course material, but because of how much I enjoy being around kids. The past few summers I worked as a counselor at a day-camp for elementary aged children, which really showed me how enjoyable and fulfilling a child-centered job can be. I really like the thought of having a summer break for the rest of my career, as well, and not to mention snow days. Traveling is a passion of mine, therefore another reason I am considering teaching is that I would like to join the Peace Corps, teaching English as a second language in other countries. Though helping people in other countries is my goal, the largest part of why I want to become an educator can be attributed to the teachers who’ve influenced me, positively and negatively. I have been inspired by teachers who had a passion for maki ng a difference in the lives of their students, and I have been motivated to surpass, in skill and influence, the sub-par teachers I have had. There are also a few negative aspects of teaching I’d like to address. First and foremost, there is the issue of a teacher’s income, which is generally somewhat low. Though my career plans are not fiscally centered, paying for a higher education and then receiving a lower income than a garbage man or an air traffic controller is not something I find appealing. With teaching there is also a lot of bureaucracy that comes with the job; a lot of red tape, so to speak. Labor laws, non-performance-reflecting salaries, and standardized testing are just a few examples of this. Part of the bureaucracy within the education system can be attributed to the stigma  involving teachers that goes â€Å"Those who can, do; those who can’t, teach† which suggests, frustrating as it may be, how teaching as a profession is viewed by our society. They are few, but my hesitations regarding teaching are powerful nonetheless.

Sunday, October 27, 2019

Designing A Creep Testing Machine Engineering Essay

Designing A Creep Testing Machine Engineering Essay A Creep Testing Machine is one that accurately measures the creep of a material under constant load and at elevated temperatures until final rupture. Basically, it demonstrates the effect of Temperature on Creep. Creep is defined as the time dependant deformation of a material under constant load at constant elevated temperature. The resulting strain is a function of applied stress, temperature and time. Creep is increasingly important in industry in many different applications ranging from turbine rotors, high pressure steam tubes, suspended cables, tightened bolts where materials are subjected to extremely high temperatures and stresses which may cause them to change size, shape and lead to rupture. So the main objective of a creep test is to measure how a given material will perform under constant loads and elevated temperatures to make sure they are ready for use in industry under such conditions. In a creep test, a tensile specimen is subjected to a constant load inside a furnace set to a specified temperature maintained at a constant high temperature. The material will go through 3 phases of creep; primary, secondary (steady state, lengthiest stage) and tertiary until it ruptures. The test may run on for days until eventually the specimen fails and the creep properties are recorded. http://spaceflight.esa.int/impress/text/education/Images/MechanicalProperties/image075.png Applications in industry Creep testing is increasingly important in large areas of industry. There are three types of high temperature industry applications. Displacement limited applications: where precise dimensions must be maintained, examples of which are in turbine rotors/aircraft turbine blades. Rupture limited applications: where fracture must be avoided, such as in steam tubes. Stress-relaxation limited applications: where initial tension relaxes with time such as in suspended cables and tightened bolts. Aims and Objectives: To fully design a Creep Testing Machine within a hard budget in the given time frame by the end of the semester in week 13. The reason behind the project is to provide AUT Engineering School with its first working Creep Machine. It will provide an opportunity for materials to be tested for Creep under extremely high temperatures for research or educational purposes after the project is completed. The very high temperatures will allow for testing stronger more complex materials such as alloys with higher melting points. A fully detailed, clear and FEA tested 3D CAD drawing will be produced, effectively demonstrating the complete final design of the Creep Testing Machine in all of its dimensions and absolute properties. Deliverables: The machine will be designed to be cheap, practical, robust, reliable, easy to use, relatively lightweight, safe (to the touch), long lasting and professional looking. The project meets the academic requirements of my qualification as it will require a great deal of knowledge I have obtained from papers such as: material science, manufacturing technology, CAD/solidworks engineering design, quantitative techniques, thermodynamics, solid mechanics and heat transfer papers. Potential Industry organisations involved: Steel suppliers high temperature material suppliers high temperature measuring/control device distributers electronic and electrical control distributers insulation material suppliers Resources (likely required): Solidworks/CAD design programs, matlab/computer programming programs, Microsoft excel, electrical/electronic equipment. Workshop machines: milling, lathe, drilling, soldering, welding machines and more. Project Plan Plan/chart will be subject to refinement throughout the duration of the project. Project Information This project is supposed to be carried on through until the end of the 4th year industrial project. From now until the end of the semester we will be designing the Creep Testing Machine completely, putting the designs through numerous tests and immense scrutiny until it is certain that the design will be achievable and the project a total success. Our supervisor, Tim, informed us with the estimated budget for this project of around $5,000NZ. This is a hard budget and we are not to exceed it under any circumstances. Therefore an important goal of this project is to stay under budget (by a decent sized margin if possible) and design a relatively cheap Creep Testing Machine that can be delivered realistically for the 4th year industrial project (where the machine should be produced). The Creep machine consists of several main components that fit into three categories; Heat, mechanics and control. The components are as follows: Frame, Furnace, Control, Electronics + Data acquisition, Strain measurement device (extra), Emergency shut off, Temperature measurement device, Grip system, Timer, On/Off switch and Loading mechanism. The furnace should be designed to reach exceedingly high temperatures of up to 800C so that it may be suitable for creep testing on a wide range of specimen materials (high T alloys etc) for research and educational purposes at the AUT Engineering department. During our first group meeting after the first formal meeting with our supervisor, we (the project team) assigned several components to each of us to carry out detailed research and gather our findings before the next meeting with Tim. The larger, more complex components namely the furnace and loading mechanism were both shared between me and Ramez, Steven and John-Paul respectively. The full details are illustrated in my logbook. Literature review So the components assigned to me for research were the Furnace, strain measuring device and the frame. I began dissecting the furnace into its individual components and features. A standard muffle furnace consists of insulation, the body, heating element, temperature measurement/controller and door with locking mechanism, compartments for other components (load train, measuring apparatus), mounting kit and air vents. After I completed some general research I developed a good and original idea of what our Creep testing machine will consist of: Furnace insulation will either consist of two different materials namely refractory firebrick and refractory ceramic fibre blanket or solely just ceramic fibre blanket/wool. These are highly heat resistance materials (one that has especially low thermal conductivity value k). Fire brick; would be the first line of insulation and the main barrier to heat loss from the furnace chamber with a k value of ~ 0.21 (@800C). Ceramic fibre; would be the surrounding/main layer of insulation and will be put around the fire brick and on the inner door surface. It has a k value of ~ 0.22 (@800C). There are several types of suitable fibre and one will be chosen based on its cost and thermal properties. The reason that firebrick is being considered as a layer of insulation is because of the ease of fitting it with heating elements. However they are more bulky and considerably heavier than ceramic blankets. The insulation choices will be theoretically tested for suitability using standard thermal resistance equations: Qtransfer = à ¢Ã‹â€ Ã¢â‚¬  T/Rth Rth = (1/hiA)+(L/kA)+ (1/hoA) Where; L is the minimum thickness of insulation, k is its thermal conductivity, h is the convection heat transfer coefficient and Rth is the total heat resistance. Choice and list of possible heating elements + why chosen. Take into accnt start up hting time The minimum insulation thickness required is found as follows; Properties: Power in: 1.6kW heating element à ¢Ã‹â€ Ã¢â‚¬  T = TMAX TAMB Insulation, Ceramic fibre: k = 0.22W/m2K hi = 10W/mK, ho = 40W/mK Rth = (1/hiA)+(L/kA)+ (1/hoA) Rth = (1/10*0.35*0.15)+(L/0.22*0.35*0.15)+ (1/40*0.35*0.15) L = 21.87mm L Specimen HC H WC WW Body Chamber Initial Dimensions: Specimen ASTM: Round dog bone: Length, L = 127mm Flat dog bone: Length, L = 101mm Gripping mechanism: Length, L ~ 40mm Only round dog bone specimens will tested ASTM creep/fatigue specimens. Full dimensions below: ((+ gripping mechanism size)) The bottom pull rod will be fixed in place but the top pull rod will be adjustable such that the specimen can be placed into the gripping mechanisms. Therefore this will be considered when estimating the height of the furnace and its chamber. Preferably, the chamber should be small in size such that it can be heated up quicker and use up less energy thereby increasing the efficiency of the furnace. Therefore, Chamber width, WC = 150mm Chamber Length, LC = 150mm Chamber Height, HC = 350mm As the minimum insulation thickness ranges from 21 to27mm (depending on the heating elements power rating) therefore, it will be necessary to have two layers of 25mm thick insulation around the chamber. So the outer body dimensions will be about: Width, W = 250mm Length, L = 200mm Height, H = 450mm The main body will almost certainly be made from mild steel due to its relatively low cost and robust, tough nature. The heating element will have to be either kanthal A1 or Nichrome most probably in wire form so that it may be easily routed into specially made grooves in the firebrick. With temperature ranges up to 1800C and relatively low cost kanthal A1 may be more suitable in this case. The time for the furnace to reach its required temperature will also be taken into account and the choice of heating element (power rating, shape and material) will be based on the time it takes to heat the chamber to a stable working temperature and the thickness of insulation required to work at such energy inputs. Also whether or not the heating element can be fitted into the insulation material will be a factor. Temperature measurement and control device will most probably be a standard high temperature thermocouple. There are many different types, shapes and sizes but most are relatively cheap and affordable regarding the project budget. The thermocouple will give the give the reading and control the temperature in the chamber (keeping it at a constant working temperature) by clicking the relay on and off when necessary. The furnace body will have to be made from a hard, tough and relatively thick material. This is why I think that mild steel sheets should be purchased and formed to the desired shape. Processes such as bending and cutting can be undertaken at the mechanical engineering workshop at AUT. Mild steel plates/sheets prices per quantity + list of possible materials, choose most suitable. An idea that I have deemed suitable for the furnace is that a simple solid, robust steel filing cabinet could be converted into a furnace body. Simple tools and workshop resources available at AUT can be used to machine the necessary features to make it work as a muffle furnace. This could potentially save a great deal of investment that could be used in other areas where it is needed more (concerning the project). The strain measuring device will have to be one that works efficiently under the high temperatures experienced with muffle furnaces. I have narrowed it down to either a high temperature extensometer or an LVDT. The most suitable device is the high temperature extensometer as they are specifically suited to such elevated temperatures and give an extremely accurate strain/displacement measurement beyond ASTM standards. They can also be attached easily to standard creep testing furnaces. However, a strain measuring device is an optional extra as the specimen displacement can be accurately measured after the specimen ruptures and simple calculations can be used to determine the strain experienced. A strain measuring device would be for convenience purposes only. List of strain measuring devices, filter to high temp use devices, then the only suitable model + prices and deem if actually suitable. Speak with Wassim. Extensometer or LVDT. Resources Introduction to Engineering Design, Andrew Samuel and John Weir Manufacturing Engineering and Technology, Serope Kalpakjian Heat and Mass Transfer a practical approach, Yunus A Cengel Thermodynamics an Engineering approach, Cengel and Boles Materials Science and Engineering an Introduction, William D Callister Jr http://www.atspa.com/3110_r2.pdf http://www.scielo.br/scielo.php?script=sci_arttextpid=S1516-14392005000400008 http://www.mts.com/ucm/groups/public/documents/library/dev_003704.pdf http://www.zwick.de/en/products/static-materials-testing-machines/creep-test-machines.html http://www.epsilontech.com/3448.htm http://www.ariindustries.com/thermocouples/high_temperature_thermocouples.php3

Saturday, October 26, 2019

Unferth in Beowulf and Odysseus in Homer’s Odyssey :: comparison compare contrast essays

Unferth in Beowulf and Odysseus in the Odyssey   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Kemp Malone in   his essay â€Å"Beowulf† comments that the hero’s swimming match with Breca, an episode of more than 100 lines, is â€Å"not told as such,† but set in a frame: â€Å"the flitting between Unferth and Beowulf† (Malone 144). This contention or challenge between the hero and a rude challenger appears not only in Beowulf but in other heroic poetry like the Odyssey.    When Beowulf and his crew of brave Geat warriors arrive to the court of King Hrothgar of Denmark, one of the king’s retainers, Unferth by name, has been drinking too heavily of the mead. This puts him into a drunken state of mind wherein he unwisely and rudely challenges the hero regarding a swimming contest sometime earlier:    Unferth, Ecglaf’s son,  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   rose to speak, who sat at the fee  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   of the lord of the Scyldings; he unbound a battle-rune -  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   the journey of Beowulf, the brave seafarer,  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   caused him chagrin, for he would not grant    that any other man under the heavens  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   might ever care more for famous deeds  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   than he himself: â€Å"Are you the same Beowulf  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   who challenged Breca to a swimming match  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   on the open sea? There out of pride  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   you both tested sea-ways, through foolish boasting risked lives on the deep. None could dissuade you,  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   friend or foe, keep either of you  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   from that hapless trip, when you went swimming  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   out of the bay, your arms embracing  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   the crests, sea-currents, flung out your hands  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   to measure the sea-roads, the ocean of wind.  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   The steep seas boiled in winter’s pourings.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   You both toiled seven nights driven by the waves,   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   and in that swimming he overcame you,  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   had greater strength.(499ff.)    So far Unferth, a proud warrior himself, tells Beowulf that the hero is foolish and that he has been bested in this sea-competition by his opponent – both of which are big, embarrassing putdowns. Unferth continues to rub it in:    The sea cast him up   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   on the Heatho-Raems’ shore; from there at daybreak   he sought his homeland, beloved by his people,  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   came back to the Brondings, fair peace-fort  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   where he had subjects, stronghold, and treasures.  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   The good son of Beanstan had truly fulfilled  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   his whole boast against you(519ff.)    Nothing like siding 100% with the foe! Before even hearing both sides of the story! Finally, in concluding, Unferth states his minimal expectations of Beowulf considering the latter’s utter failure against Breca:

Friday, October 25, 2019

Method Of Communication And Different Uses Of Communication Essay

Method of Communication and Different Uses of Communication With the development of civilization and written languages came the need for more frequent and reliable methods of communication allowing messages to reach longer distances. This was essential to the control of trade and other affairs between nations and empires.   Ã‚  Ã‚  Ã‚  Ã‚  Early man used cave walls as the media on which messages could be transcribed, this was common for many years, until the Egyptians discovered a special kind of rush (Papyrus) that could be woven to form a portable writing material. In about 105AD the Chinese discovered a way to make a similar substance from wood pulp.   Ã‚  Ã‚  Ã‚  Ã‚  Over the next few centuries printing techniques advanced rapidly, especially through the use of steam power. The first typesetting machine, the Linotype, was patented in 1884 by the German-American Ottmar Mergenthaler. In the meantime, postal services and moved from being privately to nationally owned, and long distance postal services became an affordable option. For the first time, an ordinary person could correspond with people in other countries. A visual semaphore system was also implemented in both Europe and the United States, providing a way of ‘echoing' messages nationally via large towers placed in strategic positions; however this proved slow as each method had to be verified to ensure message accuracy. Following the discovery and partial understanding of electricity in t...

Thursday, October 24, 2019

Dying to Babysit :: Creative Writing Essays

Dying to Babysit      Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   It all began one day when I was over my friend Susan's house.   Her parents had just left for vacation to Texas, leaving her home by herself.   I was allowed to stay that weekend while her parents were away.   Susan and I were sitting down eating when she got a call from the house where a new family just moved into.   The Smith's had asked her to babysit for them.   They said it was all right if I came too.   They wanted us to come over about six that evening.      Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   When we got over there Mrs. Smith introduced her two year old daughter named Julie to us.   Mr. and Mrs. Smith didn't leave right away because they wanted Julie to get to know us better.   Mrs. Smith told Susan and I that Julie could stay up until 8:00 P.M.. She also told us she had been having problems with her telephone.   There must have been something wrong with the connection because when it rang there would be no one on the other end.   Someone was coming tomorrow to take a look at it.      Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Mr. and Mrs. Smith informed us that they would be a little late coming home because it was their anniversary and they had a long night planned.   We told them to have a nice time and they both grabbed their coats and left.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Julie started crying just as they closed the door. We gave her a bottle and put her down to watch some TV.   Then the phone rang and Susan and I looked at each other, seeing who was going to answer it.      Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   I answered the phone but no one was there.   I said hello again, but still no answer. All I could hear was someone breathing heavily.   It was loud, gasping, and very frightening.   I said hello again and   heard a faint, masculine voice.   As I began to tremble, the voice   whispered, "I'm coming."      Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   All of a sudden the lights went out.   Susan, Julie and I let out a loud shriek.   I ran over to Susan and Julie and hid my head.   Susan started laughing and told me it was probably because of the storm outside.   We both looked out the window when a bolt of lighting struck across the sky.   Julie began to cry and we comforted her and told her it would be all right.      Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Susan was going to go down into the basement to find the fuse box so she could turn the lights back on.   It was time for Julie to go to bed so I grabbed

Petrarch and Wyatt Compared

In the world of poetry, imitation occurs at every turn. Many poets will take an original form of poetry and copy the style. This can be said about Sir Thomas Wyatt who attempts to mimic Petrarch's form; when the symbols, tone, images, rhyme, and setting in Wyatt's poem â€Å"Whoso list to hunt† are compared to Petrarch's Rime 190 it becomes apparent that he failed to embody the essence of Petrarch in his writing. Symbolism plays a large role in most poems. â€Å"A pure-white doe in an emerald glade/Appeared to me, with two antlers of gold† (Petrarch lines 1-2) is a perfect example of symbolism is poetry. Petrarch is not actually talking about a white deer with golden antlers, he's talking about a beautiful woman with golden hair. Wyatt also uses a deer as a symbol: â€Å"Whoso list to hunt, I know where is an hind† (Wyatt line 1) a hind is a deer and Wyatt is also using the deer as a symbol for a woman. This is the first similarity, or imitation, between Wyatt and Petrarch. The second symbolism the two poems share is the collar around the doe's neck. In Petrarch's poem it says â€Å"I spied on her neck, â€Å"No one dares touch me†,/Graven in topaz and diamond stones,/†For Caesar wills I should always run free. † (Petrarch lines 9-11). In Wyatt's poem it says: â€Å"And graven in diamonds in letters plain/There is written, her fair neck round about,/†Noli me tangere, for Caesar's I am,/And wild to hold, though I seem tame† (Wyatt lines 11-14). The two are similar only in the idea of a collar and Caesar. Petrarch's doe's collar claims she is free while Wyatt's doe's collar claims she is property. Although many strive to assimilate famous poets, sometimes they fall flat. Such is the case of Sir Thomas Wyatt's attempt to parallel Petrarch's tone. In Petrarch's Rime 190, the tone is reverence towards a woman's purity and beauty in the lines â€Å"A snow white doe in an emerald glade/To me appeared, with antlers soft of gold† (Petrarch lines 5-8). Wyatt's tone is more of sexual desire for an unavailable good looking woman who isn't necessarily pure: â€Å"Whoso list to hunt, I know where is an hind† (Wyatt line 1) hints that this woman is chased by a large amount of men for her looks (also hinting that she isn't pure); â€Å"But as for me, helas! I may no more† shows Wyatt's sexual desire for this woman and his disappointment in her unavailability to him. Petrarch's woman is a pure and beautiful woman while Wyatt's is a sexy, impure temptress. Another aspect Wyatt did not compare to Petrarch is visual imagery. Petrarch has a very beautiful way of using visual images which he proves with the lines one through four: â€Å"A snow white doe in an emerald glade/To me appeared, with antlers soft of gold,/And leapt two streams, under a laurel's shade,/Near sunrise, in the winter's bitter cold. (Petrarch lines 1-4). The closest visual image in Wyatt's version is â€Å"And graven in diamonds in letters plain† (Wyatt line 11) which is still very far away from being good visual imagery. Rhyme is a defining point of Petrarch's poetry with a rhyme scheme of abba abba cde cde. Wyatt kept the rhyme scheme of the octave but changed the sestet to cdd cee. â€Å"There is written, her fair neck round about,/Noli me tangere, for Caesar's I am,/And wild to hold, though I seem tame. (Wyatt line 12-14) is an example of the changed rhyme scheme. Wyatt also resorted to eye-rhyme which is also shown in the quotation for the words am and tame. Petrarch's poems held firm to the original rhyme scheme of abba abba cde cde and each rhyme is a complete rhyme rather than Wyatt's lazy eye-rhyming. Petrarch's rhyme scheme, however, is almost always only visible in the Italian form and it loses rhyme scheme when translated into English. Una candida cerva l'erba/Verde m'apparve, con duo corna d'oro/Fra due riviere, all'ombra d'un alloro,/Levando ‘l sole, a la stagione ascerba† (Petrarch line 1-4) this Italian passage from the poem follows the abba format of rhyming with perfect rhymes which his whole poem follows without using a single eye-rhyme. The setting of Petrarch's Rime 190 is beautifully described in the very first stanza: â€Å"A snow white doe in an emerald glade/To me appeared, with antlers soft of gold,/And leapt two streams, under a laurel's shade,/Near sunrise, in the winter's bitter cold. (Petrarch lines 1-4). The reader automatically knows that the poem takes place in a forest with two streams. On the other hand, Wyatt's poem has no setting to show for. There are almost no descriptive aspects of his poem. After analyzing these five aspects of poetry, it becomes clear that Wyatt's imitation of Petrarch only goes so deep. Wyatt merely used Petrarch's ideas but failed to perfect Petrarch's unique and beautiful language; where Petrarch shows beauty, Wyatt shows nothing. Wyatt took a pure form and warped it into something not as good as the original.

Wednesday, October 23, 2019

People today freely use The Internet Essay

People today freely use The Internet, E-mail, and Online Messaging to communicate with other people. It’s a great way to talk to loved ones who live far away, conduct business, and just have fun with friends, but there is a downside. People who we don’t know can obtain information about us by tracking e-mails and messages and unless these things are encrypted, everything we write can be pulled up and used against us. That is why people who use the Internet need to be much more aware of their online privacy and security. The Internet started in 1969 by the U. S. overnment. They wanted a communication system that couldn’t be destroyed in the event of an emergency. It consisted of four computers linked together called DARPANET. In the 1970’s people found that they could use this system to send messages between the computers to get to other people. More and more people started using this system and by the end of the 70’s, it was international. The earliest found company to use instant messaging was Mirabilis in November of 1996. Instant messaging is like a telephone conversation done between two people on the computer in real time. Popular companies that have instant messaging are AOL, Yahoo, and NET Messenger Service. E-mail or Electronic Mail is a way of composing, sending, and receiving messages over the computer. E-mail started in 1965, which means it actually began before the Internet and in fact helped start the Internet. First e-mail was used for multiple users to communicate through a mainframe computer. Now even though the government does not have control over the Internet in present day, they can still monitor what individuals are writing especially after September 11th. â€Å"The Sept. 1 terrorists relied heavily on the Internet, and the hijackers appear to have plotted their carnage using Yahoo e-mail. † The FBI believes they can now catch suspected terrorists by looking at suspicious email, but what constitutes suspicious? They have developed a program called Carnivore that looks through e-mail to find suspicious information. But, critics of this are not so sure of it’s benefits becau se it can be used to look for keywords such as â€Å"hijack† in mass amounts of e-mails, and whenever it finds an e-mail or message that has that word the FBI is entitled to read that message. If someone is just asking another person through e-mail about the current terrorist situation will that set off an alarm with the FBI and now that person’s e-mails will be tracked? Very possibly. The PATRIOT (Provide Appropriate Tools Required to Intercept and Obstruct Terrorism) Act provides investigators with more flexibility to pursue interception of e-mail messages, and monitoring of Web surfing and other PC-based communications. But does the general public believe that that government should have the right to look into private e-mails if they could catch a terrorist by doing it? According to a survey of PCWorld. m, â€Å"a total of 60 percent said they had serious concerns about giving the government more access to personal e-mail while 38 percent said they had little or no concern. † While the government and FBI feel that this is a completely legitimate way to weed out the terrorists in America, many others find it a complete invasion of privacy. This isn’t only a government vs. he people issue. As of 2004, â€Å"1 in 5 companies has had employees’ electronic messages subpoenaed in the course of a lawsuit or regulatory investigation† and â€Å"another 13 percent of 840 companies surveyed this year have battled workplace lawsuits triggered by employee e-mail. This means that private emails being sent while at work can be retrieved and used against a person in a court of law. The right to privacy is completely being revoked in these situations. That is why Americans need to be more aware of how to protect their privacy and there are ways to do this. First is by looking at the actual disclaimers that most people just sign without actually reading. American Online or AOL and Yahoo are two major providers of both e-mail and instant messaging. Looking into what their privacy policies are, you find this. Your AIM information consists of personally identifiable information collected or received about you when you register. Your AIM information may be shared within AOL and its business divisions. Your AIM information, including the contents of your online communications, may be accessed and disclosed in response to legal process (for example, a court order, search warrant or subpoena), or in other circumstances in which AOL has a good faith belief that AIM or AOL are being used for unlawful purposes. AOL may also access or disclose your AIM information when necessary to protect the rights or property of AIM or AOL, or in special cases such as a threat to your safety or that of others. (http://www. aol. com/info/p_privacy. adp. ) Yahoo’s disclaimer is similar saying that â€Å"Yahoo! collects personally identifiable information when you register for a Yahoo! account,† and â€Å"we reasonably believe it is necessary to share information in order to investigate, prevent, or take action regarding illegal activities. Basically both are stating that, for the most part, our privacies are protected unless there is a need to look at the e-mails or messages being sent. That is a big but though. People should read that and decipher that the government or business we work at could basically make up a story as to why they need to read an email and both of these e-mail companies would have to comply. That really isn’t protecting us. At least we should know ahead of time though that these are the company policies so it shouldn’t come as a surprise if our privacy was breached. This brings us to the concept of encryption. â€Å"Chances are that nobody is watching the data you send out, but unless the information is over a secure (encrypted) connection, you can’t be reasonably sure that it’s safe. † The definition of encryption is â€Å"the process of encoding information in such a way that only the person (or computer) with the key can decode it. † There are different encryption systems, but essentially two computers have secret codes that hold the key to decoding the messages sent between them. So if a message is encrypted, only your friend’s computer will be able to read what you sent to them. Does this type of security interest the common person? It definitely should and is quite easy to obtain. There are messenger services that provide e-mail and instant messaging. One is called Hushmail, which includes encryption enhancements. All you have to do is sign up for it just like you would Yahoo! or AOL and the only downside is that storage space is limited. But the option is out there for people to choose safety over unnecessary storage. Yahoo! nd AOL are the trusted and most used e-mail and instant message companies so most people just subscribe to these two, but really need to research what else is out there in regards to encrypted messaging companies like Hushmail. Customers of AOL though can upgrade to AIM 5. 2, which uses encrypted messages. Yahoo! on the other hand only has a form of encryption. The â€Å"system sends the message unprotected to Yahoo’s server. The recipient is given a URL to view the document on an SSL-protected web page. † Consumers feel this is a weak link because the message is still being sent without it being secure, but it is a step forward. There are other simple general steps that a consumer should do or at least think about before signing onto an e-mailing system. One is to always know the software that you are downloading onto your computer. Many programs appear to be legitimate, but they really just want to get your information and use it for bad reasons that veer into your personal privacy. Also, if a person shares a computer with many people, like a college library system, that person needs to make sure they clear their passwords and personal information before leaving their seat. And basically people just need to be more suspicious. Even though that’s a bad outlook, if you’re messages are not encrypted, then you need to be more aware of what you’re writing. If you think it could be construed in a negative way, then you shouldn’t send it over an unprotected system that could one-day work against you. In conclusion, â€Å"although companies and other entities operating in the online or electronic commerce environment have a responsibility to ensure the privacy of personally identifiable information online, the Online Privacy Alliance believes that consumers also have a role to play. Consumers should look for privacy policies on the web sites they visit as well as be aware of the various self-enforcement mechanisms currently available. †After the tragedy of September 11th, the government does need to do certain things in order to further protect our country against another attack, but this shouldn’t mean attacking American’s privacy and security. Americans shouldn’t have to live in constant fear of Big Brother looking into our personal letters and messages to loved ones and friends, and also shouldn’t be afraid that some things being said are going to be taken the wrong way. That is the opposite of making us feel more secure and safe because that basically means we’re being attacked from within our own government. Saying that, there are many things that we, as consumers, are responsible for knowing what is out there to give us more security. There is encryption and the big companies out there that provide e-mail and instant messaging are getting on board and providing encrypted programs for us to use. We should also be responsible enough to actually read all disclaimers that we usually don’t bother to read so that we are not shocked when we learn that the government just looked at our private message to someone. It’s hard as one person to fight something like Carnivore, but we can do simple things like read disclaimers, be smart about what e-mail programs we subscribe to and be safe and responsible when we are on the Internet.

Trends in Modern International Terrorism

Trends in Modern International Terrorism Boaz Ganor Abstract This chapter examines some of the most widely researched trends and developments within the phenomenon of modern international terrorism, providing policy recommendations on how to counter its emerging threats – particularly that of the Global Jihad movement and â€Å"homegrown† terrorism. The magnitude of the modern terrorist threat was demonstrated by the attacks of September 11, and ever since, the field has experienced a renewal of sorts, attracting unprecedented attention by both scholars and the mainstream public.This chapter will introduce readers to the main schools of thoughts within the academic field that explain terrorism. It will also present the many disciplines applicable to the study of terrorism, demonstrating that the phenomenon is multifaceted in nature, requiring a cohesive international and broad-based response. In covering a number of dilemmas facing terrorism experts, the chapter explore s the debate over a definition of terrorism, providing a proposed definition that distinguishes acts of terrorism from criminal acts.The chapter continues on to explore the phenomenon of modern terrorism, the role of traditional crime within the terror sphere, and the growing threat of Global Jihadi terrorism – including terror networks and homegrown cells and activists who have emerged as a result of the spread of radical Islamic ideology. The role of terrorism in democratic states and the economic ramifications of terrorism are also explored. Finally, the chapter ends with recommendations on how governments should effectively respond to terrorism and discuses room for further research.Trends in Modern International Terrorism In recent years, the academic world has witnessed a surge of research and academic programs in the field of homeland security and counterterrorism. After the attacks of 9/11, the threat of global terrorism immediately topped the international agenda. B. Ganor Lauder School of Government, International Institute for Counter-Terrorism (ICT), Interdisciplinary Center (IDC), Herzliya, Israel e-mail: [email  protected] ac. il D. Weisburd et al. (eds. ), To Protect and To Serve: Policing in an Age of Terrorism, DOI 10. 007/978-0-387-73685-3_2,  © Springer Science + Business Media, LLC 2009 11 12 B. Ganor Growing recognition of the threat, combined with an increase in government spending, spurred the development of academic research institutions, think tanks, and new higher education programs in the study of homeland security and counterterrorism. The trend was particularly prominent in the United States, as researchers sought a basic understanding of the characteristics of terrorism and agencies sought ways to effectively cope with the phenomenon.This trend was accompanied by a significant increase in the number of researchers focusing on the phenomenon of terrorism. These researchers came from a wide array of academic disciplines, applying varied quantitative and qualitative research tools and methods in their analysis of the threat. In understanding the phenomenon and preventing future terrorist attacks, researchers have focused primarily on understanding the rationale of terrorist organizations in general and Global Jihad organizations in particular – their cost-benefit calculations and their decision-making processes. Trends† in terrorism have also been explored – often focusing on the introduction, transition, or prominence of a specific modus operandi or a method, such as suicide bombings, the Global Jihad movement, or the use of unconventional weapons. Reviewing these trends and themes in terrorism – and the academic research that has accompanied them – is crucial in determining how far we have come and how far we have to go, both in terms of the governments designing and deciding on counterterrorism policy and the academics informing such decisions.In exploring the phe nomenon of modern international terrorism, this chapter will first introduce readers to the various schools of thought and academic approaches used in explaining terrorism – drawing on a wide range of disciplines and theories. Discussion will then move to one of the most basic components of the terrorism dilemma, with implications on how the term – and thus phenomenon of terrorism itself – is treated, applied, and understood by the international community – the debate over defining terrorism.As will be demonstrated, definitions of terrorism vary widely – with equally as wide implications – yet there is still a general consensus among most leading scholars as to the essential nature of the threat. â€Å"Modern terrorism,† the next theme that will be explored in this chapter, is regarded as a form of psychological warfare intended to spread fear and anxiety among the target population. This fear is translated into political pressure on decision makers to change policies in such a manner that will serve the terrorist’s interests.As such, modern terrorists attempt to exploit the liberal values of democratic states, forcing governments to adhere to their demands as a result of the physical, psychological, and economic ramifications of terrorist attacks. The nature of terrorism in relation to the democratic state will be explored in a later section of this chapter as well. As terrorist groups are usually engaged in a long war of attrition, terrorist organizations need ongoing support and funds to ensure they can maintain their activities.In fact, one of the main sources of funding for many terrorist organizations is criminal activity: smuggling, counterfeiting, extortion, and narcotics. At the beginning of the twenty-first century, the threat of international terrorism grew with the spread of Global Jihad terrorism. Made up of complex networks of hierarchal terrorist organizations, proxy and affiliate organizat ions, local and international terror 2 Trends in Modern International Terrorism 13 etworks, sleeper cells, and indoctrinated radical activists, all these actors share a common extreme ideology and the readiness to use violence in general – and terrorism in particular – in order to achieve their goals. The economic ramifications of these activities only further exacerbate the damage posed by terrorist attacks, another focus of terrorism research. This dynamic terrorist phenomenon has threatened an increasing number of states while involving more terror organizations, networks, activists, and supporters worldwide.The growing level of the threat, its international scope, its lethality,1 and the possible use of nonconventional terrorism (CBRN – chemical, biological, radiological, and nuclear weapons) necessitate future multidisciplinary research in the field and a more cohesive, international response. Explaining Terrorism In general, two schools of thought explaini ng the phenomenon of modern terrorism have emerged out of the collection of academic work within the discipline – the â€Å"psychological-sociological† school of thought and the â€Å"political-rational† school of thought.Both schools maintain that terrorism seeks to achieve political goals by instilling fear and anxiety among the target population, but each stresses a different aspect of the explanation. The psychological-sociological school, represented most recently by scholars such as Dr. Jerrold Post (1998) and John Horgan (2005), stresses the phenomenon’s psychological component, maintaining that the immediate and central goal of terrorism is to instill fear and anxiety, while its political goals are long term. Terror as a clinical term refers to a psychological state of constant dread or fearfulness, associated with an abnormally high level of psych-physiological arousal. This is central to what terrorists aim to achieve, since after all, while the y have some ultimate set of political objectives, it is an immediate goal of most terrorist groups to cause terror† (Horgan, 2005:14). The psychological-sociological school addresses both the desired effect of terrorism and its root causes, relying primarily on social group dynamics and the psychological profile of an individual terrorist actor.Some early psychological explanations of terrorism have focused on the disruptive or psychopathological personalities of terrorist operatives, analyzing terrorists based on characteristics or disorders associated with violent or aggressive behaviors (De la Corte et al. , 2007). Some of the common psychological characteristics that have been attributed to alleged terrorists Analysis of terrorist incidents over the last 35 years confirms that terrorist attacks, while arguably decreasing in quantity, are growing more deadly over time, as the number of fatalities per attack has increased (LaFree and Dugan, in this volume).Such data, however , rely on a definition of terrorism that LaFree and Dugan themselves note is relatively â€Å"inclusive. † The Global Terrorism Database (GTD), on which their analysis is based, excludes â€Å"attacks on the military by guerilla organizations,† but includes military targets attacked by substate actors motivated by political, economic, or social motives (See LaFree and Dugan; in this volume). 1 14 B. Ganor re paranoia, antisocial and narcissistic personalities (Millon, 1981; Post, 1987), lack of empathy with victims, hostility toward parents, dogmatic or ideological mentality, or a simplistic or utopian worldview (Victoroff, 2005). At one end of the spectrum within such literature is the assertion – and at times assumption – that terrorists are to some degree psychologically â€Å"abnormal,† possessing personality disorders that qualify them as insane or psychopathic (as discussed by Cooper, 1978; Hacker, 1976; Lasch, 1979; Pearce, 1977; Taylor, 198 8).Despite early research providing psychological profiles of terrorists, other terrorism researchers have come to the general conclusion that there is no universal terrorist personality pattern; most terrorist operatives are not necessarily â€Å"psychopaths† (Silke, 1998), nor do they show traces of being clearly or consistently mentally ill (Crenshaw, 2000; Post, 1998; Stahelski, 2004). Early studies on the topic have been largely disproved or debunked, in fact, even within the psychological-social school of thought.Further research has shown that terrorists rarely meet the criteria for insanity,2 but rather may possess some â€Å"particular personality dispositions† related to psychological conditions or disorders (Post, 1987). Dr. Jerrold Post, an expert in political psychology, maintains that even though terrorists fit within the spectrum of â€Å"normality,† a large number have demonstrated specific personality characteristics that indicate a minor psycho pathology, such as aggression, activism, thrill seeking, an externalist psychological mechanism and factionalism.These are characteristics of narcissistic disorders and borderline personalities (Post, 1998:25–27). While Post stops short of actually diagnosing terrorists with such disorders or characteristics, he does claim they tend to have high frequency among terrorists, contributing to a uniform rhetorical style and logic (Silke, 1998:65). According to Post, there is a unique logic that characterizes a terrorist’s thought process – a â€Å"terrorist psycho-logic. Post claims that terrorists are motivated by psychological influences when they choose to conduct violent acts, as expressed in rhetoric that relies on â€Å"us versus them† and â€Å"good versus evil† dichotomies. He further claims that lodged in a terrorist’s permanent logic is the notion that the regime must be toppled, which is a result of the terrorist’s search for i dentity. In an attack against the regime, a terrorist is actually trying to destroy the inner enemy within him.However, even as some researchers cite it as the primary cause, a terrorist’s individual psychological profile is not the only significant explanation for the phenomenon of terrorism. Rather, group psychology and sociology may be significant explanatory factors behind terrorist attacks. Various researchers have cited group pressure as a variable to explain recruitment, methods of operation and involvement in terrorism (Merari, 2004). Others have applied the cult model to terrorist organizations (Morgan, 2001). Studies by Heskin (1984), Rasch (1979), and Taylor (1988) have all cited evidence discrediting the assumption that terrorists are psychologically â€Å"abnormal. † 2 Trends in Modern International Terrorism 15 It is in this context that Post emphasizes the group as a framework in which a sense of belonging and importance for its members is created. He cl aims that ideology plays an important role in supporting a unifying environment for the group.Shared ideology justifies the group’s activity and quickly transforms into the group’s moral guide. The psychological-sociological school relies, therefore, on psychological and sociological characteristics, motives, and grievances in explaining the phenomenon of terrorism. In contrast, the â€Å"political-rational† school of thought views terrorism as a rational method of operation intended to promote various interests and attain concrete political goals (Crenshaw, 2000; Hoffman, 1998; Shprinzak, 1998).Rational choice theory has been adopted by a number of terrorism researchers within this school, and maintains that terrorist action derives from a conscious, rational, calculated decision to choose one route of action over another (Crenshaw, 1992; Sandler et al. , 1983; Sandler and Lapan, 1988; Wilson, 2000). 3 Leading researcher Martha Crenshaw explains that an organiz ation chooses terrorism among several operational alternatives in order to promote their mutual values and preferences.In making a rational calculation of the costs and benefits, terrorism is deliberately chosen as the preferred method of political activity because it is perceived to be the most effective of the operating alternatives – the benefits exceed the costs. In this context, Ehud Shprinzak similarly stressed that the phenomenon of terrorism is not the result of disturbed human activity or a random thoughtless attack. This is a process that almost always begins without violence or terrorist activity (Shprinzak, 1998:78).Rand terrorism expert Bruce Hoffman further clarified the â€Å"rationalist† approach: â€Å"I have been studying terrorists and terrorism for more than twenty years. Yet I am still always struck by how disturbingly ‘normal’ most terrorists seem when one actually sits down and talks to them†¦ Many are in fact highly articulate and extremely thoughtful individuals for whom terrorism is (or was) an entirely rational choice†¦Ã¢â‚¬  (Hoffman, 1998:7)The dispute between the rationalist and psychological approach is important in understanding the root causes of terrorism, allowing experts and security professionals to identify characteristics of the threat and formulate effective counterstrategies. While the two schools may seem to fundamentally clash, an interdisciplinary explanation of terrorism may actually be the most effective way to approach the phenomenon. In a sense, these two schools can complement and complete each other.In the Israeli setting, for example, the case of a suicide bombing is likely motivated by a combination of the rational calculations of the organization, a cost-benefit analysis made by the attackers themselves, social pressure from the attackers’ peer group, and personal psychological, social, cultural, and religious motivations. The decisionmaking process functions on a number of levels, in which both political-rational 3 For an overview of psychological, social, and rational choice theories, see Victoroff, 2005. 16 B. Ganor Psychology H ci ol og ist or y So Law Why Terrorism ? Economics Media & Communication Political Science Fig. 2. 1 Explanatory disciplines to terrorism and the psychological-sociological explanations have their place, demonstrating the multidisciplinary nature of terrorism. As Crenshaw noted, even though an act of terrorism may not be wholly the result of a psychological disorder, that is not to say â€Å"the political decision to join a terrorist organization is not influenced or, in some cases, even determined by subconscious or latent psychological motives† (Crenshaw, 1998:386).It seems that only multivariable explanations based on methodologies and theories from different disciplines can adequately address the complex phenomenon of terrorism, provide explanations for the growth, development and characteristics of th e phenomenon, and suggest methods for effectively dealing with terrorism (Fig. 2. 1). Explanatory Disciplines to Terrorism Different research disciplines may be able to provide answers to fundamental questions at the core of terrorism research, such as:Psychology The field of psychology can provide answers to such questions as: Do terrorists have common psychological characteristics? Do terrorists have a psychological profile? Why do people become terrorists? Which people might become terrorists and which will not? Why do people join a terrorist organization and why do they leave it? When, why, and how does the personal radicalization process take place? (See Post, 1998; Raine, 1993; Hubbard, 1971). 2 Trends in Modern International Terrorism 17 Economics How important are economic variables in explaining the development and motivation of terrorism?To what degree can terrorists’ financial situation explain the motives for their behavior? How much does the economic factor deter mine the scope and characteristics of terrorism activity? 4 (See Abadie, 2004; Kahn and Weiner, 2002; Krueger and Laitin, 2008; Krueger and Maleckova, 2002; Piazza, 2006). Sociology How much influence does one’s peer group have on the decision to join a terrorist group or the motivation to conduct acts of terrorism? How much can processes of socialization and delegitimization by society – ostracizing, discrimination, alienation, etc. serve as variables explaining the motives of terrorism? Why does a certain population at a specific time tend to carry out terrorist attacks while another population with similar characteristics does not choose this course of action? What is the extent of the connection between terrorism and different cultures? 5 (See Bandura, 1973, 1998; Gibbs, 1989; Merari, 2004; Morgan, 2001; Webb, 2002). Criminology To what extent should terrorism be treated as a phenomenon in the criminal sphere? What are the differences between the characteristics of criminal and terrorist activity?What are the similarities and the differences in the organizational characteristics between terrorist and criminal organizations? 6 (See Klein et al. , 2006; Klein and Maxson, 2006; Lafree, 2007). 4 Several studies have focused on refuting the widely claimed link between poverty and terrorism (Harmon, 2000; Hasisi and Pedahzur, 2000; Schmid, 1983). In fact, a 2003 study by Krueger and Maleckova showed that higher-earning Palestinians were more likely to justify the use of terrorism to achieve political goals; and a 2002 study (Krueger and Maleckova, 2002) did not find a link between Hezbollah fighters and impoverished conditions – ather, they were richer and more educated than their counterparts. Another study looked at the biographies of 285 suicide bombers and found them to be richer and more educated than members of the general population (Victoroff, 2005:21). 5 Until September 11, there were few academic studies of terrorism from a strictl y sociological viewpoint. However, Bandura (1973, 1998) used social learning theory to suggest that violence follows observation and imitation of an aggressive model. Friedland (1992) cited the â€Å"frustrationaggression hypothesis† in understanding why terrorists turn to violence (as cited in Victoroff, 2005).Morgan (2001) applied the cult model to understand individual actors and group dynamics within terrorist groups. 6 For the role of policing in counter-terrorism strategies, see Chaps. 3–5 of this volume. LaFree and Dugan (Chap. 2) also briefly discuss the comparison between rates of terrorist attacks and other types of criminal violence. The interplay and linkages between organized crime and terrorism are explored in several anthology volumes, such as Holmes (2007), among many others. 18 B. GanorPolitical Science and International Relations To what extent should terrorism be understood in rational terms (cost-benefit calculation) as an effective method intended to achieve political goals? To what extent can political terms such as sovereignty, power, authority, and social justice serve as variables to explain the phenomenon of terrorism? To what degree is the phenomenon of terrorism connected to certain ideologies or a certain form of government? To what degree does modern terrorism aim to take advantage of the liberal democratic form of government’s values and traits?To what extent is the media component essential in order to explain the strategy of modern terrorism? How are the decision-making processes different in terrorist organizations than other organizations? Can terrorism be understood as a means for states to achieve their interests in the international arena? To what extent can terrorism be dealt with by using deterrent measures in general and deterring state-sponsors of terrorism in particular? (See Crenshaw, 2000; Ganor, 2005; Hoffman, 1998; Nacos, 1994). Theology To what extent is modern terrorism a result of religious extremism?How is incitement to terrorism carried out with the use of religious rationalizations and how can this incitement be dealt with? (See Atran, 2006; Hoffman, 1995; Juergensmeyer, 2003; Ranstorp, 1996; Rapoport, 1984). Hence, nearly every academic research discipline has been, and will continue to be, critical in providing answers to some of the central issues that lie behind understanding the phenomenon of terrorism and the methods for dealing with it. Only this multidisciplinary approach can provide a profound understanding of the phenomenon. The Definition of TerrorismGrowing interest in the field of terrorism and increased funding allotted to academic research and teaching budgets post-9/11 has spurred and supported the publication of hundreds of books and articles in the past few years, many professional and academic conferences, and a general flourishing of the field. Yet, six years after the world recognized the magnitude of the terrorist threat on 9/11, researchers, security professionals, politicians, jurists, and others have still not been able to agree upon its most fundamental component – what is terrorism?Moreover, and somewhat surprisingly, the only consensus these individuals have reached is that it might be impossible, or even unnecessary, to reach an internationally 2 Trends in Modern International Terrorism 19 accepted definition of terrorism. 7 Those who hold this opinion – in fact the majority in the field – usually cite the cliche â€Å"one man’s terrorist is another man’s freedom fighter,† in order to imply that, in their opinion, the issue of definition is subjective. As such, even partial agreement regarding its content cannot be reached. Louis Henkin (1989) captured this entiment in 1990 when he said that: â€Å"Terrorism†¦ is not a useful legal concept. † Those who do not regard a definition as critical believe that the international system – and the security establi shment in particular – can manage without consensus on the issue. They claim that terrorists, in a sense, commit regular crimes – extortion, murder, arson, and other felonies already covered by conventional criminal law. Therefore, they can be tried for committing these felonies without the need for a special criminal classification, and thus definition, for terrorism.Needless to say, there is no shortage of proposed definitions for terrorism. Every researcher, expert, security professional, NGO, country, and politician espouses their own definition, one that likely represents a distinct world view and political stance. By the early 1980s, Schmid and Jongman had already listed 109 definitions of terrorism proposed by researchers in the field (Schmid and Jongman, 1998:5). In their chapter in this volume, LaFree and Dugan touch upon the difficulty in reaching a consensus on a definition of terrorism given its controversial and highly politicized nature.It is within this context that they note the U. S. was reluctant to define the attacks by Contra rebels in Nicaragua as terrorism, while regarding practically all violence in Iraq and Afghanistan as such. They further note that more inclusive definitions of terrorism are often preferred by businesses or private think tanks that are collecting data for the purpose of risk assessment, as such an approach ultimately benefits their clients (LaFree and Dugan, in this volume). Among the hundreds of definitions of terrorism that have been accepted throughout the years, some contain conceptual and phrasing problems (Hoffman, 2004:3).Many researchers note that the only certainty regarding terrorism is the pejorative manner in which the word is generally used and associated (Hoffman, 2006:23; Horgan, 2005:1). As such, when scholars, politicians, or activists describe and analyze the activities of alleged terrorist organizations, they very often use alternative terms that bear more positive connotations, such a s guerilla or underground movements, revolutionaries, militias, militants, commando groups, national liberation movements, etc. (Hoffman, 2006:28).Many in the Western world have accepted the premise that terrorism and national liberation are located on two opposite ends of a spectrum legitimizing the use of violence. The struggle for â€Å"national liberation† is, allegedly, located on the positive 7 In a presentation on the definition of terrorism to the UK Parliament in March 2007, Lord Carlile quoted David Tucker from Skirmishes at the Edge of the Empire, stating that: â€Å"Above the gates of hell is the warning that all that enter should abandon hope. Less dire but to the same effect is the warning given to those who try to define terrorism† (See http://www. amilnation. org/terrorism/ uk/070317carlile. htm); for a reporter’s perspective see Kinsley, 2001; see also Levitt (1986), in which he claims a definition for terrorism is no easier to find than the Hol y Grail. 20 B. Ganor and justified end of the violence spectrum, while terrorism is its unjust and negative polar opposite. Within this framework, it would be impossible for a specific organization to be considered both a terrorist group and a national liberation movement, as Senator Henry Jackson claims: â€Å"The thought that one man’s terrorist is another man’s freedom fighter is unacceptable.Freedom fighters or revolutionaries do not blow up buses with noncombatants; terrorists and murderers do. Freedom fighters do not kidnap and slaughter students, terrorists and murders do†¦Ã¢â‚¬  (As cited in Netanyahu, 1987:18) There is little basis for the claim that â€Å"freedom fighters† cannot carry out acts of terrorism and murder. This approach unintentionally plays into the hands of terrorists, who claim that since they are acting to expel who they consider to be a foreign occupier, they cannot also be considered terrorists.However, many freedom fighters i n modern history committed crimes and purposely targeted innocent civilians. The difference between â€Å"terrorism† and â€Å"freedom fighting† is not a subjective distinction based on the observer’s point of view. Rather, it derives from identifying the perpetrator’s goals and methods of operation. Terrorism is a means – a tool – for achieving an end, and that â€Å"end† can very well be liberating the homeland from the yoke of a foreign occupier. An organization can be, at the same time, both a national liberation movement and a terrorist group.It is not the specific goal – whether â€Å"freedom fighting† or another legitimate political objective – that distinguishes a group as a terrorist organization or justifies its activities. Many groups, however, such as the Muslim World League, do not clearly make this distinction. In a special publication from 2001, the Muslim World League states that: â€Å"Terrorism is an outrageous attack carried out either by individuals, groups or states against the human being (his religion, life, intellect, property and honor).It includes all forms of intimidation, harm, threatening, killing without a just cause†¦ so as to terrify and horrify people by hurting them or by exposing their lives, liberty, security or conditions to danger†¦ or exposing a national or natural resource to danger† (Al-Mukarramah, 2001). In presenting the activities that constitute terrorism as being committed â€Å"without a just cause,† the Muslim World League’s definition infers that such acts committed with a just cause are not considered terrorism.Such definitions are typical of attempts to create confusion between the means and the end, ultimately foiling any possibility of reaching a consensus on a definition. Since September 11, international terrorism has emerged on the top of national and international security agendas, widely perceived as a s evere and very real threat to world peace. It is a threat that necessitates international alignment and cooperation on an unprecedented level. Such a high degree of cooperation cannot be established or sustained however without agreement over the most basic common denominator – the definition of terrorism.Outside intelligence and military circles, the effectiveness of other apparatuses essential in countering the terrorist threat is dependent upon a clear, broad, and objective definition of terrorism that can be accepted internationally. Such a definition is essential in order to: disrupt the financing of terrorism, respond to states and 2 Trends in Modern International Terrorism 21 communities that support terrorism, prevent recruitment and incitement of terrorist operatives, and establish legal measures and guidelines to both outlawed terrorist organizations and activities, and arrest and extradite alleged terrorists.Above all else, the international community must establis h a binding normative system to determine what is allowed and not allowed – what is legitimate and not legitimate – when violence is used for political objectives. A definition that would address all these requirements is: Terrorism is the deliberate use of violence aimed against civilians in order to achieve political goals (nationalistic, socioeconomic, ideological, religious, etc. ) In defining terrorism within the above framework, it is important to note that a terrorist act would not be classified as a â€Å"regular† criminal activity warranting the application of criminal legal norms.Rather, terrorism would be viewed as an act of war, and the countermeasures mounted against it would too be conducted in accordance to the norms and laws of war. The Israeli High Court of Justice has itself struggled with the distinction between criminal acts and acts of war, reflecting the tension facing those studying and responding to terrorism today. According to Justice C heshin, â€Å"a judge’s job is difficult. It is sevenfold as difficult when he comes to deal with a hideously murderous attack such as we have in front of us.The murderer’s action is inherently – though not within the framework of or as part of the formal definition – an act of war, and an act that is inherently an act of war is answered with an act of war, in the ways of war† (Abd Al-Rahim Hassan Nazzal and others vs. the Commander of the IDF forces in Judea and Samaria, 1994). In a different verdict, the judge ruled that a â€Å"criminal code created for daily life in human society does not have an answer for the question† (Federman and others vs. the Attorney General, 1993).The debate over whether terrorism should be considered a criminal act or an act of war remains strong among academics, NGOs, and counter terrorism professionals. Without consensus on the issue, states have applied their own policies in trying and convicting alleged ter rorist suspects – whether as criminals or combatants. Despite the fact that criminal acts can consist of the same actions as terrorism – murder, arson, and extortion – terrorism, unlike an average criminal act, threatens the internal social order, personal and national security, world peace, and the economy. As previously noted, acts of terrorism are intended to achieve various political goals and could thus be considered arguably more severe than criminal violations. In addition, as international law expert and terrorism prosecutor Ruth Wedgwood has argued, criminal law may be â€Å"too weak a weapon† to counter terrorism, as destroying terrorist infrastructure and networks requires diplomacy, use of force, and criminal 8 Resolution 1566 (2004) adopted by the Security Council in its 5053rd meeting, on Oct. 8 2004: â€Å"†¦Reaffirming that terrorism in all its forms and manifestations constitutes one of the most serious threats to peace and security .Considering that acts of terrorism seriously impair the enjoyment of human rights and threaten the social and economic development of all states, they undermine global stability and prosperity. † (See: http://daccessdds. un. org/doc/UNDOC/GEN/N04/542/82/ PDF/N0454282. pdf? OpenElement. ) 22 B. Ganor law combined. She adds that the restrictions embedded in a criminal justice system make sense in civil society where deterrence is a factor, but this may not apply in a fight against a highly networked terrorist organization (Wedgwood and Roth, 2004). Bruce Hoffman points to a fundamental difference between a criminal and a terrorist when he asserts that while a criminal seeks personal material goals, a terrorist usually sees himself as an altruist acting for and in the name of many others (Hoffman, 2006:37). Therefore, a terrorist may be perceived as posing greater danger through his actions, since he is significantly more willing than a criminal to sacrifice in order to achieve his goals – even to the point of self-sacrifice in certain situations. The criminal code in itself does not serve as an adequate platform to define terrorism.The laws of war are better suited as a framework for defining and dealing with terrorism, since the phenomenon is a violent action intended to achieve political goals, often involving the use of pseudo-military methods of operation. By basing the definition of terrorism on an established system of norms and laws, already included in international conventions and accepted by most of the countries in the world, the international community is more likely to reach a broad international agreement on the definition of terrorism – a basic tool in the joint international struggle against terrorism.At the core of the Geneva and The Hague conventions are rules differentiating between two types of personnel involved in military activity: â€Å"combatants,† military personnel who deliberately target enemy military pers onnel; and â€Å"war criminals,† military personnel who, among other actions forbidden by the laws of war, deliberately target civilians. Currently, the moral differentiation between a legitimate combatant and a war criminal is based on the attacked target (military or civilian), and, at least in principle, only applies to state entities and their armies and not to substate entities.In the Israeli setting for example, a Palestinian, considered part of a subnational group, who is involved in a deliberate attack against an Israeli military target, will receive the same treatment and punishment as a Palestinian who deliberately attacks a civilian target. Since there is no distinction made between the two, despite the difference in their targets, the degree of international legitimacy or condemnation of both cases will likely continue to be dependant on the supporter or condemner’s political stance and not necessarily on the character or target of the deliberate operation – its legality under applicable rules and norms.The American government, for example, classifies attacks against its troops in Iraq as terrorist attacks, as it does the October 2000 attack against the USS Cole or the attack against the American military barracks in Dhahran (June 1996). In fact, in an attempt to expand the definition of terrorism to include attacks against soldiers, the U. S. State Department’s definition states that terrorism is the Ruth Wedgewood and Human Rights Watch Director Kenneth Roth debate the US’s treatment of terrorist suspects – as combatants versus criminals – in a series of articles in Foreign Affairs (See Roth, 2004; Wedgwood and Roth, 2004). 2 Trends in Modern International Terrorism 23 deliberate use of violence against â€Å"non-combatant targets,† which includes both civilians and military personnel not on the battle field. 10 While it is natural for victims of terrorism to adopt this broad-based definitio n, terrorist organizations and their supporters can legitimately argue that in seeking to achieve their political goals, they cannot reasonably be required to either not confront military personnel entirely, or do so only when they are fully armed and prepared for war.They claim that they must be given the right to attack and surprise soldiers whatever the circumstances. In applying these considerations, the U. S. State Department’s definition of terrorism could not successfully serve as a common denominator leading to international agreement. It is only in reducing the scope of the definition to the deliberate targeting of civilians – as opposed to â€Å"non-combatants† – that may solve this problem, enabling the establishment of a clear moral boundary that should not be crossed. A terrorist act would be considered, in a sense, the equivalent for a substate entity to a war crime committed by a state. 1 During a state of war, normative principles and the laws of war forbid the deliberate targeting of civilians but allow deliberate attacks on an enemy’s military personnel (in accordance with other applicable regulations). Similarly, in modern asymmetric warfare, a normative rule must be set to address limitations on substate actors, differentiating between guerilla warfare (violence against military personnel) and terrorism (violence against civilians) – just as the rules of war differentiate between legitimate combatants and war criminals.For the purpose of defining terrorism, it is not significant what goal the organization aspires to achieve (as long as it is political); both the terrorist and the guerilla fighter may aspire to achieve the same goals. However, they each chose a different path – a different means – in order to realize these goals. Defining terrorism is critical in ensuring that the same normative standards currently enforced on states are applicable to nonstate actors, defining when thei r use of violence is permissible and when it is prohibited.Paradoxically, what is currently prohibited for states is not yet prohibited for organizations. Defining terrorism does not raise or lower the obligation of states to behave normatively and certainly does not place additional legal burdens upon them. It simply makes organizations accountable for their actions under the same value system currently obligating states. Terrorism is defined by the U. S. State Department as: â€Å"premeditated, politically motivated violence perpetrated against noncombatant targets by sub-national groups or clandestine agents. (from the 22 U. S. C. , 2656f(d)(2); See http://www. state. gov/s/ct/rls/crt/2005/65353. htm. ) 11 The UN short legal definition of terrorism, proposed by terrorism expert Alex P. Schmid, states that an act of terrorism is the â€Å"peacetime equivalent of a war crime. † While such a definition does not consider terrorism an act of war, in drawing a parallel with a w ar crime it notes the importance of the target (civilian vs. military) in legitimizing acts of violence. (See: http://www. unodc. org/ unodc/terrorism_definitions. html. ) 10 24 B. GanorReaching a broad international agreement regarding the definition of terrorism may require the international community to apply laws of war that forbid the deliberate targeting of civilians, but allow for the deliberate attack (in accordance with the other regulations) of an enemy’s military personnel. The definition proposed in this chapter may be capable of eliciting a broad base of support from many countries and organizations, both because it is based on already accepted international norms, and because it seemingly provides subnational organizations the possibility of legitimately using violence in order to achieve their goals.Such a definition would not allow for the artificial distinction that is often made between â€Å"bad† terrorism and â€Å"good† or â€Å"tolerableâ €  terrorism. It instead adheres to the principle that â€Å"terrorism is terrorism is terrorism,† no matter who carries it out – a Muslim, Christian, Jew, or member of any other religion. Terrorism would be considered an illegitimate and forbidden method of operation in all cases, under all circumstances. The ideological or cultural background of the perpetrators; and the religious, political, social or economic motives of the act; would all be irrelevant in classifying an act of terrorism.Many view the effort to achieve a broad international agreement on terrorism as hopeless and naive. However, Security Council Resolution 1566, which was unanimously accepted by Council members in October 2004, may be a basis for hope that countries will overcome prior disputes, rise above their own interests, and reach an agreement in the near future regarding the international definition of terrorism. Resolution 1566, without serving as the definition itself, already establishes one basic principle on which an international definition can be built.It stipulates that terrorism is a crime against civilians, which in no circumstance can be justified by political, philosophical, ideological, racial, ethnic, religious, or other considerations. 12 Modern Terrorism Descriptions of typical terrorist operations and their common characteristics are often included in proposed definitions of modern terrorism – particularly in those that address the fear and anxiety created by terrorist acts. In such definitions, terrorism is presented as a form of violent activity (or threat of violence) that 2 Resolution 1566 (2004): â€Å"Condemns in the strongest terms all acts of terrorism irrespective of their motivation, whenever and by whomsoever committed, as one of the most serious threats to peace and security†¦Recalls that criminal acts, including against civilians committed with the intent to cause death or serious bodily injury or taking hostages with the pur pose to provoke a state of terror in the general public or in a group of persons or particular persons intimidate a population or compel a government or an offences within the scope of and as defined in the international conventions and protocols relating to terrorism, are under no circumstances justifiable by considerations of a political, philosophical, ideological, racial, ethnic religious or other similar nature and calls upon all states to prevent such acts†¦Ã¢â‚¬ . (See: http://daccessdds. un. org/doc/UNDOC/ GEN/N04/542/82/PDF/N0454282. pdf? OpenElement) 2 Trends in Modern International Terrorism 25 intends to frighten a group of people beyond the actual victims (Horgan, 2005:1).After reviewing the development of the definition of terrorism and examining a variety of definitions, Bruce Hoffman reaches the following conclusion in his important book, Inside Terrorism: â€Å"We may therefore now attempt to define terrorism as the deliberate creation and exploitation of fea r through violence or the threat of violence in the pursuit of political change†¦ terrorism is specifically designed to have far-reaching psychological effects beyond the immediate victim(s) or object of the terrorist attack†¦Ã¢â‚¬  (Hoffman, 2006:40). Definitions that refer to terrorism as an act intended to instill fear and anxiety in the public are generally based on the literal meaning and historical use of the term â€Å"terrorism,† its application dating back to the French civil war. 13 Such definitions also rely on what is perceived to be the primary operational tactic of modern terrorism – psychological warfare – which seeks to achieve political goals by instilling fear and anxiety among its target population.While definitions vary widely, there is a general consensus among most leading scholars as to the essential nature of the terrorist threat; researchers will rarely dispute the importance fear and anxiety play in understanding the phenomen on of modern terrorism. However, it is important to note that resulting fear and anxiety may not be an essential variable in defining a terrorist attack. In order to ensure that acts are objectively classified as terrorist attacks, an accepted definition must, in application, serve as a checklist of components. Based on the definition proposed in the previous section, if an act is not violent, does not deliberately target civilians, or does not attempt to achieve a political goal, then it is not a terrorist attack.Adding the element of fear and anxiety to the definition – essentially putting it on the checklist of required components – significantly changes the term’s application. If an attack, which would otherwise be considered an act of terrorism, does not aim to frighten, but rather only seeks to achieve concrete, tangible objectives – such as the release of prisoners or the assassination of a leading political figure – would the action not be considered terrorism? Similarly, a nuclear attack aimed at eradicating the majority of the population or contaminating an extensive area – which ultimately seeks to disable the state and prevent it from operating as an independent political entity – would be widely considered a terrorist attack, even though instilling fear and anxiety is not its primary purpose.Since such circumstances and scenarios can reasonably exist, the â€Å"fear and anxiety element† may not be necessary in defining terrorism; rather, it is valuable in explaining the modus operandi of a significant portion of modern terrorist attacks. 13 The term â€Å"terrorism† comes from the Latin terrere, â€Å"to cause to tremble. † The term became popularized during the â€Å"Reign of Terror† carried out by the revolutionary government in France from 1793 to 1794 (Juergensmeyer, 2003: 5). 26 B. Ganor Indeed, modern terrorism is not necessarily about the numbers. In fact, most mod ern terrorist attacks, while violent in nature, generally produce limited damage or casualties. 4 Instead, they rely on psychological warfare as a tool in achieving their goals, creating fear and anxiety among the general population. In many cases, a terrorist attack is random, aimed not at someone specific, but rather a group that shares a common trait and symbolizes the organization’s broader target (Americans, Israelis, â€Å"infidels,† Westerners, etc. ). By simultaneously transmitting several messages, these attacks intensify the sense of anxiety felt by the target group, which leads civilians to pressure decision makers and their government into changing policies and agreeing to terrorists’ demands. Some of the messages terrorist organizations aim to send through their attacks include: 1.Uncertainty – The randomness of the attack is supposed to instill a sense of uncertainty in the public regarding â€Å"safe behavior,† prompting fear that an yone could be the next victim (Horgan, 2005:3). 2. Vulnerability – A terrorist attack can take place anywhere, anytime, making all citizens feel vulnerable. 3. Helplessness – The state’s security apparatus cannot foil or prevent attacks, or protect civilians. 4. Personalization – You or someone close to you may not have been hurt in a recent attack, but it could very well be you the next time, since the victims have the same pro? le as you (Ganor, 2005:256). 5. Disproportional price – The price the individual must pay due to his government’s policy is very high. For that reason he must act to change national/international priorities in a way that will serve the terrorist’s objectives. 6.Vengeance – The citizen suffers due to the government’s actions against the terrorist organization and its supporters, and for this reason it is in his best interest to pressure the government to avoid this activity. Such attacks aim to c reate anxiety among the target group at a level disproportionate to the actual capabilities of the terrorist organization, forcing members of the target population to reprioritize and shift their concerns from that of national security to personal security. The target population perceives a growing threat from terrorism, which may be viewed by the public as largely fueled by the government’s supposedly dangerous policies.As political tension and criticism against the government in the target country mount, according to the strategy of modern terrorism, the public will pressure decision makers to change their policies in a manner that will suit the interests and goals of the terrorist organizations, or call for a change in administration that will establish policies more favorable to terrorist groups. In order to create this effect of fear, terrorist organizations often choose to escalate their activity in such a manner as to shock the public. According to Crenshaw, a review L aFree and Dugan note that over 53% of terrorist organizations from the Global Terrorism Database included in their study (1974–2004) have never produced a single fatality (LaFree and Dugan, in this volume). 14 2Trends in Modern International Terrorism 27 of the history of terrorism reveals that terrorists have purposely chosen targets considered taboo or unpredictable in order to attract international media coverage (Crenshaw, 1998:14–15). The media component is central to modern terrorism’s strategy. Without media coverage, a terrorist organization has little opportunity to convey its message, let alone shock or scare its target population. The success of a modern terrorist campaign is arguably dependent on the amount of publicity it receives; the â€Å"journalist and television camera are the terrorist’s best friends† (Laqueur, 1987). Terrorism and Traditional CrimeIn seeking funding to support ongoing operations or infrastructure, terrorist orga nizations in Latin America, Europe, the Middle East, and the Far East have increasingly come to rely on â€Å"traditional† criminal activities, such as drug trafficking, counterfeiting, petty crime, human trafficking, and extortion (Vidino and Emerson, 2006; Mili, 2006). In fact, over the last three decades, law enforcement agencies have reported increased cooperation between terrorist organizations and criminal actors and activities – including attacks that have been financed through illegal crimes and suspects who have been prosecuted for crimes in which proceeds were directed to international terrorist organizations like Hezbollah and Al-Qaeda (Noble, 2003).Growing expenses associated with terrorist activity, such as payments to organization personnel, transportation, accommodation, training, and procurement of weapons, have served as incentive for terrorist organizations to get involved in common crime. These activities only further exacerbate the danger posed by t errorist organizations to the global economy and to the safety and wellbeing of the world’s population. By counterfeiting currency, for example, a terrorist organization can damage a country’s economy while it raises funds. Similarly, by producing and smuggling drugs to certain countries, an organization can cause considerable harm to the local population and simultaneously finance its activities.In the early 1970s, terrorist organizations, particularly those not supported financially by states, funded their activities through criminal activities such as bank robberies, kidnappings for ransom, and blackmail. Terrorist organizations, such as the Red Brigades in Italy, cooperated with criminal elements, enlisting them into the ranks of their organization. However, in the late 1970s and more so in the early 1980s, terrorist organizations realized that drug trafficking was far more lucrative than other routine criminal activities, leading to a phenomenon known as â€Å"na rco-terrorism. †15 Terrorist organizations have been involved in producing and selling narcotics throughout the world – in Latin America (Colombia, Peru, Cuba, Bolivia); in Asia and 5 To illustrate the amount of money involved, a survey conducted by the United Nations Office for Drug Control and Crime Prevention described the production, trafficking, and sales of illicit drugs to be an estimated $400-billion-a-year industry. A 2005 UN report estimated that global drug trade generated an estimated $322 billion in 2003, greater than the gross domestic product of 88% of the countries in the world (Pollard, 2005). 28 B. Ganor the Middle East (Sri Lanka, Lebanon, Afghanistan, India, the Philippines, Pakistan); and even in Western countries such as Italy, Spain, Ireland, and the United States. Drug trafficking by terrorist groups in Columbia is of particular concern to western governments. According to reports from the U. S.Bureau of Narcotics and Law Enforcement affairs, rev enues earned from narcotics cultivation, taxation, and distribution have accounted for at least half the funding used to support terrorist activities by two of the country’s largest terrorist groups – the Revolutionary Armed Forces of Colombia (FARC) and the United Self-Defense Groups of Colombia (AUC). The State Department estimates that the FARC receives $300 million a year from drug sales to finance its terrorist activities. 16 The tri-border area (TBA), or â€Å"triple frontier† as it is known, centered along the borders of Paraguay, Argentina, and Brazil, has been widely recognized as another hotbed for terrorism financing and activity, particularly to groups such as Hezbollah and Hamas. Without strict border controls, the area serves as a haven for drugs and arms trafficking, counterfeiting, smuggling and other illegal activities.Tens of millions of dollars are estimated to have been transferred to groups through illegal remittances and other illegal activ ities, according to investigations by local police forces (Madani, 2002; Tri-border Transfers â€Å"funding terror,† 2006). Most terror organizations, however, are not directly involved in actually growing or producing drugs. They are tasked primarily with protecting the drugs and ensuring the safety of growers and producers. They also are active in smuggling narcotics to the marketing centers in countries where the drugs are distributed (Hudson, 2003:24). These organizations usually have a diverse network of contacts, enabling them to cross borders via indirect routes and smuggle weapons, ammunition, and various other products.Terrorist organizations can use the same routes and network used by their supporters in order to smuggle drugs. In some cases, drugs have been used to recruit foreign activists, in a sense bribing them to execute terrorist attacks. In these cases, the activists, who are not members of the organization, are enlisted in order to carry out attacks on beha lf of the terror organizations, sometimes unbeknownst to the activists themselves, in return for a regular supply of drugs. 17 In other cases, terrorist organizations supply their members with drugs in order to increase their dependence on the organization and encourage obedience to its leaders. 8 Some terrorist organizations refer to the distribution of drugs as an alternative form of attack, since drug consumption can harm the national morale and weaken the ability of the population to cope with crises. 16 See Deborah McCarthy’s testimony before the Committee on the Judiciary United States Senate, May 20, 2003, â€Å"Narco-Terrorism: International Drug Trafficking and Terrorism – A Dangerous Mix. † 17 For example, On August 28, 1971, a Dutch citizen, Henrietta Hundemeir, was arrested in Israel with a suitcase containing a timer-activated bomb with a barometric altimeter. The bomb was meant to explode in the El Al aircraft in which she herself was flying to Isr ael.Hundemeir was enlisted in Yugoslavia by a member of the â€Å"Popular Front for the Liberation of Palestine,† who became her close friend by supplying her with drugs and using them with her. 18 One example is the â€Å"Weatherman† organization, which was responsible for terrorist attacks in the U. S. at the end of the 1960s and the beginning of the 1970s. The group perceived drug use as a part of the revolutionary process. 2 Trends in Modern International Terrorism 29 Global Jihadi Terrorism Terrorism is a dynamic phenomenon that develops over time, gradually changing its shape and activities. It is carried out by various organizations in the service of different ideologies.Despite the fact that various local terrorist groups have operated in the international arena in the past decade, there is growing recognition by scholars and the intelligence community that the current international terrorist threat does not come from organizations motivated by nationalist grie vances or separatist goals (such as the IRA, ETA, Fatah, LTTE, PKK, and others). Instead, the main threat is that of radical Islamic terrorism primarily aimed at promoting a radical religious world view. 19 Such groups are motivated by what they perceive as a divine command, making them potentially more dangerous than groups motivated by other causes. Hoffman stresses that while religion was an inseparable component of many terrorist organizations in the past, the dominant motivation for their actions was political rather than religious.This is not the case with Al-Qaeda and other radical Islamic organizations today. For them, religion is the most important component defining their activities, ideology, characteristics, and recruitment methods (Hoffman, 2006:82). According to James Thomson, â€Å"religions are very effective at guiding in-group morality and out-group hatred. They permit the take-over of groups by disenfranchised young males, they minimize the fear of death by sprea ding the belief in an afterlife reward for those who are dying in a holy war, etc. † (Thomson, 2003:82). Radical Islamic terrorism, part of the Global Jihad movement, includes acts perpetrated by many organizations, groups, and cells around the world.The movement is headed by Al-Qaeda, which, despite the many setbacks it has endured since September 11, 2001, is still capable of carrying out â€Å"direct attacks† through activists reporting directly to its authority or â€Å"indirect attacks† through proxy organizations – radical Islamic terrorist organizations and networks that share a similar fundamentalist Islamic ideology, aspirations, and interests. Some of these organizations, such as Egyptian, Bangladeshi, and Afghan Jihadi groups, were established by Osama bin Laden under the umbrella of his â€Å"International Islamic Front for Jihad Against Jews and Crusaders† (February 1998). Some of these organizations have made pacts or commitments to bi n Laden over the years, such as the Egyptian Al-Jama’a Al-Islamiya and the GSPC (currently referred to as Al-Qaeda of the Maghreb). However, the most significant trend of the past several years has been the phenomenon of â€Å"homegrown terrorism. Lone activists and local radical groups of Muslims, who either immigrated to Western countries There are also terrorist organizations that combine religious grievances with national-political motivations, such as Hamas. On the one hand, Hamas derives its ideology from the same narrative and background as Al-Qaeda, based on the early religious global ideology of the Muslim Brotherhood. At the same time though, Hamas seeks to achieve the nationalistic goal of destroying Israel and creating a Palestinian state in its place. 19 30 B. Ganor (first, second, or third generation) or converted to Islam in their country of origin, become inspired by the Global Jihad movement, leading them to carry out terrorist attacks.Al-Qaeda, its allies i n the Global Jihad movement, other radical Islamic terrorist organizations, and the radical Islamic networks and cells of the West, all believe in one divine mission, which calls upon them to spread their radical beliefs throughout the world (Sageman, 2004:1). In seeking to achieve this mission, they believe it is permissible and necessary to make use of violence and terrorism, and that they are fighting a â€Å"defensive war† that allows them to use drastic measures. One perspective shared by several researchers is that this defensive war is not actually pitted against American or Western imperialism, as Global Jihad organizations commonly claim. Rather, the â€Å"fight against the West† is used to help mobilize and recruit activists, arguably acting as â€Å"lip service† by Al-Qaeda.It also serves to at least express their concern over every aspect of modernization, including democratic forms of government, liberal values, and even modern technology that threa ten the way of life they strive for – a radical Islamic caliphate governed by Sharia law. It is also important to note that the threat of Global Jihad is not, as many tend to think, a war between Islam and other religions. Rather, it can be understood as a war of cultures – the culture of radical Islam against the outside world; or the culture of radical Islam against the culture of the â€Å"infidels,† as Islamists call all those who do not share their world view. Many in the radical Jihadi movement recognize that they will not be able to succeed in their worldwide campaign in the near future. Therefore they aim, as a first stage, to create localized radical Islamic revolutions, primarily in Arab and Islamic countries.In fact, the majority of Global Jihad attacks over the past several years occurred in countries of the Arab or Islamic world,