LLRX is highlighting research sources for their relevance and relationship to this site’s Israel-Hamas War Project articles. This guide by Sabrina I. Pacifici will be updated moving forward and currently includes 8 pertinent sources comprising government reports, academic papers, reviews of UN/NGO programs, news, databases, analysis and commentary.
Benjamin Jensen, a war strategy expert from American University School of International Service who served 20 years in the military explained that civilians often become pawns in war when one side does not have a military advantage against a stronger adversary – and looks for other ways to weaken their opponent.
With our new Israel-Hamas War Project – read the first article here – we are doing what we can to help Truth catch up with Falsehood. Our goal is to document accurate, timely and actionable resources for researchers. We hope that providing this guide will assist policymakers, diplomats, analysts, journalists, scholars, and the public. Improved understanding of the law of war should raise the level of public discussion and facilitate better decision-making at this critical time.
Antisemitism has moved from the right to the left in the US − and falls back on long-standing stereotypes
Prof. Arie Perliger, director of the graduate program in Security Studies at the School of Criminology and Justice Studies at the University of Massachusetts, Lowell addresses the fact the the U.S. is currently experiencing one of the most significant waves of antisemitism that it has ever seen. Jewish communities are shaken and traumatized. Jewish and civil rights organizations both in the U.S. and in other Western countries reported a rise in antisemitic incidents following the Oct. 7, 2023, Hamas attack on Israel and the subsequent Israeli military response. The Anti-Defamation League reported that in the first week after Hamas’ deadly attack, in which 1,400 Israelis were killed, antisemitic incidents in the U.S. tripled in comparison to the same week last year. Similarly, London police recorded a 1,353% increase in antisemitic crimes compared with the same period a year earlier. In addition, antisemitic symbols and rhetoric seem to be part of a growing number of protests that erupted around the globe following the escalation of the conflict between Israel and Hamas.
Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, finance, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and online security, often without our situational awareness. Four highlights from this week: Appeals Court Upholds Public.Resource.Org’s Right to Post Public Laws and Regulations Online; Hackers Are Salivating Over Electric Cars; and How Google Assistant and Amazon Alexa Target You With Ads.
On August 30th each year the world is reminded that hundreds of thousands of people in at least 85 countries don’t know where their loved ones are, or even whether they are alive or dead. For the victims of enforced disappearance and their families, every day is the Day of the Disappeared. The unrelenting uncertainty and anguish of not knowing the truth of what has happened to their family member is a recognized form of torture for both the disappeared and their families. The crime of enforced disappearance cuts off the disappeared from any access to legal representation or judicial remedies – they are placed “outside all protection of the law.” “Rampant” global impunity for enforced disappearance has led the United Nations (UN) Secretary-General, António Guterres, and UN bodies to call on all countries to ratify or accede to the Convention for the Protection of all Persons against Enforced Disappearances (Convention or ICPPED). Catherine Morris brings much needed attention to the fact that of the UN’s 193 countries, only 72 have ratified or acceded to the Convention. Canada and the United States (US) are not yet among them. The unrelenting uncertainty and anguish of not knowing the truth of what has happened to their family member is a recognized form of torture for both the disappeared and their families. The crime of enforced disappearance cuts off the disappeared from any access to legal representation or judicial remedies – they are placed “outside all protection of the law.”
Catherine Morris and Rebekah Smith of Peacemakers Trust Canada conducted extensive research on disproportionate violence against Indigenous persons in Canada that includes uncounted disappearances of Indigenous children, women, and men. Canada’s decades of failure to prevent and halt disappearances forms part of a long litany of grave international human rights violations against Indigenous Peoples. Continued reports of officially hushed-up violence lead to increasingly clarion allegations of genocide. The authors’ work on documenting enforced disappearance, failure to investigate and prosecute crimes against indigenous people has parallel application to the habitual failure of U.S. authorities to address crimes perpetrated against Native Americans.
Red flag laws and the Colorado LGBTQ club shooting – questions over whether state’s protection order could have prevented tragedy
Professor Alex McCourt, an expert on gun laws at Johns Hopkins University, explains how red flag laws are supposed to work – and why they weren’t triggered in this case.
Hurst Hannum, Professor of International Law, Fletcher School of Law & Diplomacy, Tufts University acknowledges that International laws are in place to prevent war and help protect civilians and combatants alike. But he further states that these laws are challenging to enforce and are unlikely to stop the unfolding Russia-Ukraine war.
Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: The dangers of dark data: How to manage it and mitigate the risks; US Still Lacks Federal Cyber Strategy After Decades of Attempts; The Worst Scams of 2021; and Tips for providing digital security benefits to employees.