830 research outputs found

    There are serious question marks over the effectiveness andappropriateness of proscribing terrorist organisations

    Get PDF
    British Home Secretaries and Prime Ministers have occasionally proscribed organisations which are violent or completely intolerant in outlook, banning various apparent terrorist organisations under a 2000 act of Parliament. But is it effective? Lee Jarvis and Tim Legrand argue that it is not, and raise problems with the identification and designation of these groups, the politicisation of the process, freedom of speech and expression, and efficacy

    The proscription or listing of terrorist organisations: Understanding, assessment, and international comparisons

    Get PDF
    This article serves as an introduction to this Special Issue on the banning or proscription of terrorist organisations around the world. It begins by arguing for greater attention to proscription powers because of their contemporary ubiquity, considerable historical lineage, implications for political life, and ambiguous effectiveness. Following an overview of the Issue’s questions and ambitions, the article discusses five themes: key moments of continuity and change within proscription regimes around the world; the significance of domestic political and legal contexts and institutions; the value of this power in countering terrorism and beyond; a range of prominent criticisms of proscription, including around civil liberties; and the significance of language and other symbolic practices in the justification and extension of proscription powers. We conclude by sketching the arguments and contributions of the subsequent articles in this Issue

    Weakest links: cyber governance and the threat to mid-sized enterprises

    Get PDF
    Overview The governance of cyber security has become a pressing challenge to both the public and private sector. Currently, cyber crime is the second most-reported economic crime, affecting 32 per cent of organisations, at a cost to the Australian economy that is estimated to be as high as $17 billion annually. In partnership with the Macquarie Telecom Group, the National Security College designed a research project to acquire qualitative and quantitative insights into the governance of cyber security risks in Australian medium-sized businesses and government agencies

    National submissions to the UN Counter-Terrorism Committee as constructions of national identity: Cameroon, Kenya and Nigeria

    Get PDF
    This article examines the construction of national identity in the context of the post-9/11 counter-terrorism sanctions regime established by United Nations Security Council Resolution 1373. The study focuses on the written reports of three member states – Cameroon, Kenya, and Nigeria – arguing that these documents not only serve as inventories of national capacity but also as performances of national identity within a specific historical moment. Two overarching arguments are made. First, constructions of terrorism play a crucial discursive role in demarcating self from other in these reports, consistently portraying terrorism as an external and morally reprehensible threat to national security. Second, despite this relatively consistent framing of terrorist otherness, the reports contain creative and diverse reflections on, or articulations of, national identity and its associated characteristics. In making these arguments, the article contributes to existing literature on the post-9/11 UN counter-terrorism regime by offering an original reading of national submissions to the UN Counter-Terrorism Committee, focusing on relatively neglected states from the global South, and develops new conceptual insight into the plasticity of terrorism as a form of discursive otherness capable of sustaining diverse representations of national self-identit

    'I am somewhat puzzled': Questions, audiences and securitization in the proscription of terrorist organisations

    Get PDF
    A recent wave of scholarship has drawn attention to the need for further engagement with the role of ‘the audience’ in securitization ‘games’. This article contributes to this discussion both theoretically and empirically, by exploring the types of question an audience may ask of a securitizing actor before a securitizing act meets with success or failure. To do this, it offers a discursive analysis of all twenty-seven UK Parliamentary debates on the extension of proscription powers to additional terrorist organisations between 2002 and 2014. We argue, first, that these are characterised by a wide range of questions relating to the timing, criteria, mechanics, consequences and exclusions of proscription. And, second, that these questions function as demands upon the executive to variously justify, explain, clarify, elaborate and defend decisions to extend the UK’s list of designated groups. Taking these questions seriously, we suggest, therefore allows insight into a variety of ways in which audiences might participate in security politics that are not adequately captured by notions of consent or resistance, or success or failure. This has empirical and theoretical value for understanding proscription, Parliamentary discourse, and securitization alike

    Policing the G20 Protests: 'Too Much Order with Too Little Law' Revisited

    Get PDF
    In the months leading up to November's G20 summit in 2014, Brisbane's residents would have been forgiven for anticipating the outbreak of a local civil war. Media outlets were leading with headlines stating, among other sensational claims, that 'G20 anarchists vow chaos and mayhem for Brisbane's streets', 'Black Bloc tactics aim for Brisbane G20 shock and awe' and 'Destructive protest plan for G20'. Meanwhile, some of the most severe restrictions on civil liberties seen in Australia in recent years were legislated by the Queensland parliament. The G20 Safety and Security Act 2013 (Qld) (the G20 Act) was passed with little demur by a chamber that was only divided over the question of whether the laws were severe enough, with Queensland opposition police spokesman Bill Byrne MP declaring himself 'surprised' at the leniency of some of the sentencing provisions and the 'minimalist' approach to restricted areas. Of course, in the event the much-anticipated violence did not occur, and the media's pre-summit hyperbole was exposed as just that. Rather more prosaically - and accurately - the post-event headlines dutifully reported 'Passionate, but mostly peaceful protests' and 'G20 protest day wraps up peacefully'. Given that previous G20 summits in London and Toronto saw outbreaks of considerable disorder, we might succumb to the temptation of declaring the peaceful protests in Brisbane to be a vindication of the heavy powers granted by the Queensland parliament. But we believe that to do so would be egregious. Here we reflect on the historical and political motivations underpinning the G20 Act, and draw attention to the rather more measured policing strategy employed by the Queensland Police Service (QPS). We argue that the safety and security of G20 participants and protesters owed little to the restrictive powers granted by the G20 Act, but resulted from a policing strategy that successfully married traditional and modern precepts of policing large events

    Generation of Human Antigen-Specific Monoclonal IgM Antibodies Using Vaccinated “Human Immune System” Mice

    Get PDF
    Passive transfer of antibodies not only provides immediate short-term protection against disease, but also can be exploited as a therapeutic tool. However, the 'humanization' of murine monoclonal antibodies (mAbs) is a time-consuming and expensive process that has the inherent drawback of potentially altering antigenic specificity and/or affinity. The immortalization of human B cells represents an alternative for obtaining human mAbs, but relies on the availability of biological samples from vaccinated individuals or convalescent patients. In this work we describe a novel approach to generate fully human mAbs by combining a humanized mouse model with a new B cell immortalization technique. After transplantation with CD34+CD38⁻ human hematopoietic progenitor cells, BALB/c Rag2⁻/⁻IL-2Rγc⁻/⁻ mice acquire a human immune system and harbor B cells with a diverse IgM repertoire. "Human Immune System" mice were then immunized with two commercial vaccine antigens, tetanus toxoid and hepatitis B surface antigen. Sorted human CD19+CD27+ B cells were retrovirally transduced with the human B cell lymphoma (BCL)-6 and BCL-XL genes, and subsequently cultured in the presence of CD40-ligand and IL-21. This procedure allows generating stable B cell receptor-positive B cells that secrete immunoglobulins. We recovered stable B cell clones that produced IgM specific for tetanus toxoid and the hepatitis B surface antigen, respectively. This work provides the proof-of-concept for the usefulness of this novel method based on the immunization of humanized mice for the rapid generation of human mAbs against a wide range of antigen

    A new 3MW ECRH system at 105 GHz for WEST

    Get PDF
    The aim of the WEST experiments is to master long plasma pulses (1000s) and expose ITER-like tungsten wall to deposited heat fluxes up to 10 MW/m2^2. To increase the margin to reach the H-Mode and to control W-impurities in the plasma, the installation of an upgraded ECRH heating system, with a gyrotron performance of 1MW/1000s per unit, is planned in 2023. With the modifications of Tore Supra to WEST, simulations at a magnetic field B0_0∼3.7T and a central density ne0_{e0}∼6 × 1019^{19} m3^{−3} show that the optimal frequency for central absorption is 105 GHz. For this purpose, a 105 GHz/1MW gyrotron (TH1511) has been designed at KIT in 2021, based on the technological design of the 140 GHz/1.5 MW (TH1507U) gyrotron for W7-X. Currently, three units are under fabrication at THALES. In the first phase of the project, some of the previous Tore Supra Electron Cyclotron (EC) system components will be re-installed and re-used whenever possible. This paper describes the studies performed to adapt the new ECRH system to 105 GHz and the status of the modifications necessary to re-start the system with a challenging schedule

    Expansion of the Multi-Link Frontier™ Coronary Bifurcation Stent: Micro-Computed Tomographic Assessment in Human Autopsy and Porcine Heart Samples

    Get PDF
    BACKGROUND: Treatment of coronary bifurcation lesions remains challenging, beyond the introduction of drug eluting stents. Dedicated stent systems are available to improve the technical approach to the treatment of these lesions. However dedicated stent systems have so far not reduced the incidence of stent restenosis. The aim of this study was to assess the expansion of the Multi-Link (ML) Frontier™ stent in human and porcine coronary arteries to provide the cardiologist with useful in-vitro information for stent implantation and selection. METHODOLOGY/PRINCIPAL FINDINGS: Nine ML Frontier™ stents were implanted in seven human autopsy heart samples with known coronary artery disease and five ML Frontier™ stents were implanted in five porcine hearts. Proximal, distal and side branch diameters (PD, DD, SBD, respectively), corresponding opening areas (PA, DA, SBA) and the mean stent length (L) were assessed by micro-computed tomography (micro-CT). PD and PA were significantly smaller in human autopsy heart samples than in porcine heart samples (3.54±0.47 mm vs. 4.04±0.22 mm, p = 0.048; 10.00±2.42 mm(2) vs. 12.84±1.38 mm(2), p = 0.034, respectively) and than those given by the manufacturer (3.54±0.47 mm vs. 4.03 mm, p = 0.014). L was smaller in human autopsy heart samples than in porcine heart samples, although data did not reach significance (16.66±1.30 mm vs. 17.30±0.51 mm, p = 0.32), and significantly smaller than that given by the manufacturer (16.66±1.30 mm vs. 18 mm, p = 0.015). CONCLUSIONS/SIGNIFICANCE: Micro-CT is a feasible tool for exact surveying of dedicated stent systems and could make a contribution to the development of these devices. The proximal diameter and proximal area of the stent system were considerably smaller in human autopsy heart samples than in porcine heart samples and than those given by the manufacturer. Special consideration should be given to the stent deployment procedure (and to the follow-up) of dedicated stent systems, considering final intravascular ultrasound or optical coherence tomography to visualize (and if necessary optimize) stent expansion
    corecore