41,258 research outputs found
Recommended from our members
Fighting for White Rule in Africa: The Central African Federation, Katanga and the Congo Crisis 1958-1965
This article assesses the role of the Central African Federation (CAF) of Southern Rhodesia, Northern Rhodesia and Nyasaland in the turmoil surrounding Belgiumâs withdrawal from the Congo in June 1960. This is a subject largely ignored in the historiography on the collapse of the Congo and this article seeks to show that the CAF, keen to preserve white-settler rule in southern Africa, supported Belgian settler interests in the Congo, notably in neighbouring mineral-rich Katanga province, that were trying to block the transition to a united independent black Congo. Led by Sir Roy Welensky, the CAF initially pushed for a political union with Katanga province. When this failed, it actively supported the secession of Katanga, led by the pro-Western Congolese leader MoĂŻse Tshombe, with economic, political and military assistance. The help included the extensive deployment of white mercenaries recruited in Southern Rhodesia and South Africa to support white-settler interests in the Congo from 1960 to 1965. This article also touches upon the role of Portuguese Angola and South Africa in the Congo crisis
Recommended from our members
Latin America: Terrorism Issues
[Excerpt] For most countries in Latin America and the Caribbean, threats emanating from terrorism are low. Terrorism in the region is largely perpetrated by groups in Colombia and by the remnants of radical leftist Andean groups. According to the Department of State, most governments in the region have good records of cooperation with the United States on anti-terrorism issues, although progress in the region on improving counterterrorism capabilities is limited by several factors, including corruption, weak governmental institutions, weak or non-existent legislation, and reluctance to allocate sufficient resources. Both Cuba and Venezuela are on the State Departmentâs list of countries determined to be not cooperating fully with U.S. antiterrorism efforts, and Cuba has remained on the State Departmentâs list of state sponsors of terrorism since 1982. U.S. officials and some Members of Congress have expressed concern over the past several years about Venezuelaâs relations with Iran, with concerns centered on efforts by Iran to circumvent U.N. and U.S. sanctions and on Iranâs ties to Hezbollah, alleged to be linked to two bombings in Argentina in the 1990s. There is disagreement, however, over the extent and significance of Iranâs activities in Latin America. The State Department maintains that there are no known operational cells of either Al Qaeda or Hezbollah-related groups in the hemisphere, although it notes that ideological sympathizers continue to provide financial and moral support to these and other terrorist groups in the Middle East and South Asia
Quantum surveillance and 'shared secrets'. A biometric step too far? CEPS Liberty and Security in Europe, July 2010
It is no longer sensible to regard biometrics as having neutral socio-economic, legal and political impacts. Newer generation biometrics are fluid and include behavioural and emotional data that can be combined with other data. Therefore, a range of issues needs to be reviewed in light of the increasing privatisation of âsecurityâ that escapes effective, democratic parliamentary and regulatory control and oversight at national, international and EU levels, argues Juliet Lodge, Professor and co-Director of the Jean Monnet European Centre of Excellence at the University of Leeds, U
Algorithmic Jim Crow
This Article contends that current immigration- and security-related vetting protocols risk promulgating an algorithmically driven form of Jim Crow. Under the âseparate but equalâ discrimination of a historic Jim Crow regime, state laws required mandatory separation and discrimination on the front end, while purportedly establishing equality on the back end. In contrast, an Algorithmic Jim Crow regime allows for âequal but separateâ discrimination. Under Algorithmic Jim Crow, equal vetting and database screening of all citizens and noncitizens will make it appear that fairness and equality principles are preserved on the front end. Algorithmic Jim Crow, however, will enable discrimination on the back end in the form of designing, interpreting, and acting upon vetting and screening systems in ways that result in a disparate impact
Crowdsourcing Cybersecurity: Cyber Attack Detection using Social Media
Social media is often viewed as a sensor into various societal events such as
disease outbreaks, protests, and elections. We describe the use of social media
as a crowdsourced sensor to gain insight into ongoing cyber-attacks. Our
approach detects a broad range of cyber-attacks (e.g., distributed denial of
service (DDOS) attacks, data breaches, and account hijacking) in an
unsupervised manner using just a limited fixed set of seed event triggers. A
new query expansion strategy based on convolutional kernels and dependency
parses helps model reporting structure and aids in identifying key event
characteristics. Through a large-scale analysis over Twitter, we demonstrate
that our approach consistently identifies and encodes events, outperforming
existing methods.Comment: 13 single column pages, 5 figures, submitted to KDD 201
- âŠ