We use cookies to distinguish you from other users and to provide you with a better experience on our websites. Close this message to accept cookies or find out how to manage your cookie settings.
To save content items to your account,
please confirm that you agree to abide by our usage policies.
If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account.
Find out more about saving content to .
To save content items to your Kindle, first ensure coreplatform@cambridge.org
is added to your Approved Personal Document E-mail List under your Personal Document Settings
on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part
of your Kindle email address below.
Find out more about saving to your Kindle.
Note you can select to save to either the @free.kindle.com or @kindle.com variations.
‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi.
‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.
Science can only tell us a part of what we need to know about the risks of climate change. We also need to make judgements about politics, technology, and international security. To tell truth to power, we need to bring these fields of knowledge together.
Terrorist attacks against hospitals and health care providers have disproportionally increased during the last decades. A significant proportion of these attacks targeted abortion clinics and abortion providers. In the light of the overturning of Roe v. Wade in 2022, an increase of anti-abortion terrorist attacks is anticipated. Therefore, it becomes imperative to gain further insight into the risk and characteristics of past terrorist attacks. This study aimed to review terrorist attacks against health care targets providing abortion services from 1970 through 2020.
Methods:
Data collection was performed using a retrospective database search through the Global Terrorism Database (GTD). The GTD was searched using the internal database functions for all terrorist attacks against abortion health care providers from January 1, 1970 - December 31, 2020. Temporal factors, location, attack and weapon type, and number of casualties or hostages were analyzed using descriptive statistics.
Results:
In total, 262 terrorist attacks were identified in five different countries. The majority (96.6%) occurred in the United States, with the highest counts during the last 20 years of the 20th century. Facility and infrastructure attacks were the most common attack types, followed by bombings and explosions. The attacks resulted in 34 injuries and nine fatalities. Kidnapping took place in three incidents. Of all successful attacks, 96.9% resulted in property damage.
Conclusion:
Abortion-related health care facilities and providers have repeatedly been the target of terrorists over the past decades. Nearly all of these attacks took place in the United States, with the highest counts during the last 20 years of the 20th century.
The eighteenth century saw a series of reforms in judicial structures and practices, including the creation of the Acordada and the division of the capital city into cuarteles. These reforms may have contributed to more draconian approaches to justice in New Spain, as evidenced by an increasing number of corporal punishment sentences in the late 1780s and a peak in executions in 1790. This year also represents a watershed in the history of the Novohispanic judiciary due to the creation of Mexico’s first salaried corps of nightwatchmen. Arguably, the shock of the Dongo massacre motivated Revillagigedo to create this new institution.
Zimbabwe’s longest election season span from the February 2000 referendum to the 2002 presidential election. In 2002, voters became wary and weary of violent elections. Politically motivated violence continued as Mugabe and Tsvangirai had their moment of reckoning as to who should be president of Zimbabwe. Over time, Mugabe become ever more dependent on violence and dictatorial methods, and less and less interested in the welfare of his people, treating Zimbabwe’s wealth and resources as rewards for loyal Zanu PF supporters, boasting that there was no vacancy at State House. A closer study of the incidence of election violence shows voter resilience amidst cyclical bouts of state-sponsored udlakela. Voter resilience in the ruling party and opposition showed the potential and capability of the electorate to recover from crises and shocks. Zimbabwe voter resilience revealed that no matter the number of violent disturbances Zimbabweans absorbed over time, they remained within a relatively similar political state domain without imploding. Voters in Zimbabwe were remarkably resilient, displaying abilities of self-organization under extreme periodic election stresses. They built capacity and adaptation in the face of election adversities without resorting to civil war.
On 29 March 2008, Zimbabwe’s ninth poll took place. Zanu PF felt insecure being in power, legitimised by only 47 and 19.5 per cent in the 2005 parliamentary and senate election, respectively. Following changes to the Constitution of Zimbabwe in September 2007, the electorate was asked to vote for a set of four political representatives for: president, parliament, senate and local government council. The 2008 socio-economic contexts showed that the electoral playing field and election processes and outcomes echoed excesses of previous flawed elections. The 29 March and 27 June 2008 elections were critical watershed moments in that while the March elections were the most peaceful (and even enjoyable) since the genesis of Zimbabwe’s mega-crisis in 2000, the June run-off will go down in history as the bloodiest since independence. The pre-poll arena for the harmonised elections had hallmarks of a rigged election, especially the use of state-financed patronage, poor voter education, the decrepit state of the voters’ roll and the violent pronouncements by members of the military-security sector, all of which skewed the playing field in favour of the incumbent regime.
This research sought to study how women cope with incarceration by exploring the pseudo-family phenomenon in female correctional centres, specifically in Kgoši Mampuru II and Johannesburg in the Gauteng Province of South Africa. The study employed a qualitative research approach to investigate the phenomenon. The research participants were selected through non-probability sampling, namely purposive, convenience and snowball methods. At the Kgoši Mampuru II centre, 21 offenders and seven officials were interviewed, while 15 offenders and six officials were interviewed at Johannesburg. In total, 36 offenders and 13 officials, including the two heads, were interviewed from both centres. The researchers chose theories on the sociology of corrections, specifically the deprivation and importation models, due to their suitability to explain the phenomenon under investigation. This study found that: (1) pseudo-families are structures or relationships that resemble families in general society; and (2) female offenders are motivated to join pseudo-families due to the need for protection, the need for belonging and comfort, and for smuggling contraband.
The contributions to this Special Issue examine multispecies perspectives on the political dynamics of international life. Building on this theme, I consider the complex and manifold ways in which the subject of security can be understood in terms of more-than-human personhood. First, by thinking of more-than-human animals as phenomenally conscious persons, we might better appreciate the multispecies complexity of security as an agentic and affective experience. Second, attending to the spiritual character of certain indigenous articulations of personhood presses us to decipher how spiritual claims might inform moral and legal dimensions of multispecies security-seeking behaviour. To illustrate the significance of these moves, I first draw on more-than-human experiences of war, pathogenic viruses, and the global factory farm. I then explore conceptions of spiritual personhood in the context of Ojibwe responsibilities to protect wolves. These perspectives on personhood demonstrate possibilities for cultivating greater interest in the multispecies experience of security.
Talk of decentralization in Iraq is usually dominated by attempts to define the extent and geographical reach of Kurdish autonomy in northern Iraq, including the question of natural resources. The primary challenge for the state has been how to accommodate a nationalistic ethnic group that has throughout its existence expressed a stalwart desire for self-rule if not independence. This chapter examines Iraq’s decentralization “moments” in 1970, between 1991 and 2003, and in the 2005 Constitution. It then explores the challenges of implementing Kurdish regional autonomy after 2005, focusing on governance and natural resources. It argues that despite a brief experience with independence, self-rule or enhanced autonomy has been held hostage to several variables, namely: Kurdish disunity, the strength of the central government, and concerns in Turkey and Iran about the potential impact of Kurdish self-government in Iraq on their own Kurdish minority populations.
Supply chain security presents numerous challenges to governments interested in defending against terrorist threats. While most approaches stress technological solutions, scholars and policy-makers tend to overlook economics, labour market issues, and industrial relations. Applying agency theory from behavioural economics, this article analyses threats to the US supply chain and opportunities for efficient solutions. Using data from a sophisticated web-based survey of owner-operator cost-of-operations, it shows that drayage drivers are among the lowest paid truck drivers and workers in the US. We provide evidence that low pay is associated with both safety and security risk. Low-wage labour and subcontracting present challenges to US and foreign supply-chain security because the market attracts workers who have few other employment options. In this environment, principals and agents currently make inefficient and inequitable contracts because markets do not reflect the complete costs associated with low-probability/high-impact events like cargo theft and transport security.
Casual employment in Australia is more prevalent than temporary work in most European nations, and casual employees have fewer rights and entitlements than comparable temporary employment categories in Europe. Yet, despite Australia’s long history of industrial activism and political representation of labour, there are fewer examples of social or political movements in Australia resisting precarious work than in Europe. This article provides a partial explanation of this puzzling lack of social resistance to casual employment. It begins from the idea, developed by the Frankfurt School tradition of critical social theory, that economic systems can create or sustain norms that conceal their more harmful social effects from public view. It then uses conceptual categories drawn from critical social theory to show how individual and social costs of casual employment have been overlooked or ‘reified’ in the workplace and in public political discourse. The study is based on existing qualitative research and on a new analysis of attitudes to work and economic organisation in Australian public discourse.
The U.S.–Latin American relationship has never been easy. A combination of wars, invasions, occupations, mutual suspicion (and occasionally open dislike and insults), dictatorships, and/or differences in ideology represents a consistent obstacle to strong national friendships. However, relations have not always been negative. Periodically, Latin American political leaders have worked closely with the U.S. government in a spirit of partnership, and the United States has also periodically offered new initiatives and shown a willingness to establish a positive and friendly relationship. How, then, can we make sense of it all? This book has three intertwined purposes, focusing on theory, political history, and research. It examines four prominent approaches to international relations: realism, dependency theory, autonomy, and liberal institutionalism. However, there is no perfect theory, and the strengths and weaknesses of each are discussed. Students are strongly encouraged to engage different theories of international relations in the light of empirical evidence. Resources are also offered for further study of chapter topics.
‘Follow the money’ is currently the central principle of international financial security, although money itself is probably one of the most unlikely objects to make traceable. Two recent scandals around a security unit and the payment processor Wirecard show how existing systems of financial surveillance that seek to capture ‘flows’ of money for security purposes are either enabled or frustrated. While this current regime of financial surveillance adheres to demanding the free flow of money through financial infrastructures and various actors and intermediaries, new digital currencies build on a set type of ledger(s) in which money is stored as data. Hence, what we understand as money does not ‘flow’, but is rather updated. This change in the underlying infrastructure means that traceability does not need to be enacted; it is an intrinsic feature of digital currencies. With new central bank digital currencies (CBDC), the regime of financial security thus changes from the monitoring of financial flows and flagging of (potentially) illicit transactions towards the storage of financial data in (de)centralised ledgers. This form of transactional governance is engendered by shifting geopolitical agendas that increasingly rely on fractured instead of globalised financial infrastructures, thus making CBDCs themselves subject to security efforts.
In a recent article Wilson explores the origins and explanation of ownership (property) as a custom, and argues that the custom of ownership is the primary concept and that property rights are subordinated to ownership. I argue that Wilson's subordination argument is unpersuasive; the linguistic evidence used by Wilson fits better with the concept of possession; and ownership is not a human universal.
It is clear from the sources that under some emperors, the Roman imperial court could be a social space characterized by violence. This chapter offers a general framework for understanding the key dimensions of court violence – its aetiology, its impact on the court’s image, and the institutions and ideologies restraining it. Drawing on insights into human violence offered by evolutionary psychology, the chapter argues that the latent human capacity for violence was triggered by a court environment with high levels of physical danger, status consciousness, and competition for resources. But in almost all societies, culture and institutions serve to restrain interpersonal violence, to a greater or lesser degree. The second part of the chapter therefore examines the limits placed on court violence by the emperor’s guard forces (the praetorians, the Germani corporis custodes, and the equites singulares), by Roman legal culture, and by Graeco-Roman political theory and ideology.
This article focuses on the control of international mobility through the gathering, processing, and sharing of air travellers’ data. While a lot has been written about pre-emptive rationalities of security translated into the functionalities of IT systems used for border controls, we take a step further and investigate how these rationalities are operationalised through data transfer, screening, validation, discarding, profiling, contextualisation, calibration, and adjustment practices. These practices may seem banal and technical; however, we demonstrate how they matter politically as they underpin the making of international security. We do so by analysing the work of Passenger Information Units (PIUs) and retracing how they turn Passenger Name Record (PNR) data into actionable intelligence for counterterrorism and the fight against serious crime. To better understand the work of PIUs, we introduce and unpack the concept of ‘epistemic fusion’. This explicates how security intelligence comes into being through practices that pertain to cross-domain data frictions, the contextualisation of data-driven knowledge through its synthesis with more traditional forms of investigatory knowledge and expertise, and the adjustment of the intelligence produced to make it actionable on the ground.
This chapter introduces and develops an initial critique of ‘eco-determinist’ thought on climate, water and environmental security. The chapter shows, against this tradition, that the tension between local geographical constraints and demographic pressures is not the central cause of contemporary water-related insecurities, and that there are good structural reasons for this, rooted in the logics of global capitalism. The chapter demonstrates that eco-determinist thinking is both substantively misleading and normatively questionable. And it argues, on these grounds, that climate change–induced scarcities are in and of themselves unlikely to become a major source of conflict. These arguments are advanced both theoretically and via empirical analysis of, among other things, the patterns of water stress and scarcity across the book's ‘divided environments’, claims about 'water wars' on the Euphrates, Jordan and Nile Rivers and evidence on the current and likely future impacts of climate change on water resources. Overall, the chapter shows that what Robert Kaplan has called a ‘revenge of geography’ is unlikely, even under conditions of accelerating human-induced climate change.
This chapter explores the consequences of war for water security and insecurity. It maps out and analyses four main ways in which war matters for water: through infrastructure destruction; through population displacement; through the expropriation of resources and infrastructures; and through war’s profound if mostly indirect ramifications for state-building and development. Empirically, the chapter draws on evidence from across the divided environments considered in this book, including the ongoing wars in South Sudan, Syria and Lake Chad, the 2003–5 Darfur war, recent Israeli wars on Gaza and key historical conflagrations such as the 1948–9 Arab-Israeli war. The chapter argues through all of this that war is deeply contradictory, being simultaneously highly destructive and highly productive in its water security consequences. And it argues that this is likely to remain the case in an era of climate disruption: while, for some, war is likely is have sharply negative climate vulnerability consequences, it is nonetheless also the case, the chapter shows, that adaptive capacities are often founded on infrastructures and hierarchies of political violence.
This concluding chapter summarises and synthesises the book's main arguments on four levels: in relation to its five ‘divided environments’; with regard to what these cases, and the similarities and differences between them, suggest about the relations between water and (in)security; with reference to the broader significance of the analysis for understanding ecological politics and the study thereof; and on what, by extension, all this might tell us about the likely future conflict and security implications of climate change. Neither the eco-determinist nor liberal traditions, the book as a whole shows, are adequate to understanding water security and insecurity today, or to grasping the wide-ranging conflict and security implications of climate change; political ecology–informed premises are required instead. But what does this tell us about the coming landscape of climate change and conflict? The book closes by offering a series of tentative predictions.
This full-length chapter introduces the book’s central themes and approach to analysing them. It starts by summarising the current public and policy ‘common sense’ on climate security, and by showing that the evidence base for this orthodoxy is weak or, at best, contested: this establishes the book’s primary research puzzle. With this set out, the remainder of the chapter details the book’s approach to exploring this crucial but contested issue. It does this first with regard to epistemology and method – critiquing extant environment-centric, quantitative and discourse-centric approaches, and via that articulating an alternative ‘international political ecology’ framework for the analysis of environment–security relations. It does it, second, in substantive terms, explaining the book’s focus on water as a key variable in, and analogue for understanding, climate–security linkages. And it does it, third, with regard to cases, introducing the book’s empirical focus on the five ‘divided environments’ of Cyprus, Israel–Palestine, Sudan–South Sudan, Syria and the Lake Chad basin. The chapter concludes by briefly explaining how the remainder of the book is organised.