Newsletter Subject

Untitled goose-stepping game

From

prx.org

Email Address

criticalstate@prx.org

Sent On

Mon, Oct 7, 2019 07:21 PM

Email Preheader Text

Much hand-wringing has gone on in world capitals since ISIS’ collapse about whether and how to

Much hand-wringing has gone on in world capitals since ISIS’ collapse about whether and how to bring back citizens who left to join ISIS... Received this from a friend? [SUBSCRIBE]( CRITICAL STATE Your weekly foreign policy fix. [PRI's The World]( [INKSTICK]( If you read just one thing… … read about who we think of as ‘foreign fighters.’ Much hand-wringing has gone on in world capitals since ISIS’ collapse about whether and how to bring back citizens who left to join ISIS, — so-called “foreign fighters” — to their countries of origin. There seems, however, to be a hand-wringing double standard. A new study [reports]( that among the over 17,000 mostly Russian foreigners who have entered Ukraine to participate in the conflict there, there are well over 1,000 non-Russian white supremacists from around the world. Those foreign white supremacist fighters, more than 30 of whom are Americans, are recruited through online networks utilized by both sides of the conflict. Yet, because these networking groups and individuals have not yet been designated as foreign terrorist organizations, they are subject to much less scrutiny than those associated with ISIS. Radioactive ostriches After the nuclear disaster at Fukushima, everything was abandoned in the power plant’s immediate vicinity. Homes and businesses were lost, including — it turns out — an ostrich farm. Workers in the exclusion zone around the plant would occasionally see ostriches wandering through abandoned towns, a wild[monument]( to a quixotic attempt to increase tourism to Fukushima shortly before the disaster. As with cats, dogs, pigs and other animals abandoned in the exclusion zone, the ostriches became feral and roamed wild behind the wire. People returning home for short visits were alarmed to find them and complained to authorities, who trapped six of them. Those six ostriches became assets to science, showing researchers how wild animals process radiation over time. The only radioactive materials the birds retained in their bodies was cesium, which is absorbed into muscle tissue rather than organ tissue, suggesting animals can overcome many forms of environmental radiation. [FORWARD TO A FRIEND]( How Gulf influence works in Washington It is easy to find people in Washington who, behind closed doors, will complain about the pervasiveness of funding from foreign governments — and especially from the Gulf kingdoms — in the think tank sector. Less common are publicly available stories about the effect of that funding, like the one [told]( by analyst Hassan Hassan last week on Twitter. Hassan, a friend of murdered Saudi journalist Jamal Khashoggi, spoke out in print about the Saudi regime’s clear responsibility for Khashoggi’s death. After that, the pressure started. Hassan writes for The Atlantic and, at the time, worked at The George Washington University’s Program on Extremism. After receiving angry calls about Hassan’s writing on Khashoggi and other issues from a “senior” official from a Gulf state, the Program on Extremism director emailed The Atlantic directly, demanding that the Program be removed from Hassan’s bio on the articles. Hassan left The George Washington University rather than allow the Program on Extremism to continue to pressure him, but he complains in his thread about the difficulty of finding another institutional home in Washington that is safe from Saudi and Emirati pressure. [FORWARD TO A FRIEND]( [ ] MIDNIGHT OIL This week’s Midnight Oil guest is Sara Polo, a lecturer in the government department at the University of Essex. Her [recent article]( on how refugee movements do and do not drive terrorism, co-authored with Julian Wucherpfennig, won the award for best paper from the conflict processes section at the 2019 meeting of the American Political Science Association. WHAT IS THE HARDEST PROBLEM YOU WORK ON? Why, how and under what conditions do groups employ terrorist tactics to accomplish political goals? This is the central concern of my research. Within that question, one of the themes I engage with is how processes of diffusion, emulation and external interventions affect nonstate actors' adoption of terrorist tactics. This part of my research studies what I call the “external” (as opposed to the domestic) causes of terrorism. A key objective is to understand whether and how terrorism spreads from one country or group to another following a process of diffusion or contagion. For example, to what extent is a group’s decision to resort to terrorism influenced by the choices of similar groups elsewhere? Do nonstate actors emulate and learn each other’s tactics? If so, how? What role, if any, do refugee movements play in the diffusion of terrorism? Answering these questions requires a specific theoretical and methodological effort. Recognizing the interdependence of groups’ tactical choices forces us to look for the causes of terrorism outside of the local context; we need to take into account the complex network of relationships and channels that connect actors and provide them with the inspiration, motivation and means to conduct terrorist attacks. Despite the challenges, studying the diffusion of terrorism is incredibly fascinating. My projects on this topic (including the article that won the APSA best paper award) are probably my favorite, although also the most difficult ones I have undertaken so far. HOW DO YOU GO ABOUT TRYING TO SOLVE THIS PROBLEM? Methodologically, my research is based on quantitative statistical analyses. Those analyses require reliable data, but for many of my projects, the data needed to test my theoretical arguments did not exist. Therefore, as part of my research, I have embarked upon several data collection efforts. For example, for my project on the relationship between refugee flows and the diffusion of terrorism, my co-author, Julian Wucherpfennig, and I collected data on the countries of origin of all terrorist organizations in the Global Terrorism Database that conducted at least one transnational terrorist attack. These data, combined with data on refugees’ origin and destination countries, have allowed us to examine whether terrorist groups originate from the same countries as the refugees and whether they use refugee streams to conduct attacks in host countries. For the same project, we have also matched the nationality of the targets of terrorist attacks in each country with data on the nationality of refugees hosted in those countries. All of these data, in combination with a novel methodological approach, have allowed us to demonstrate that, in developed countries, terrorism does not diffuse through the infiltration of refugee flows. In other words, refugees are not a “Trojan Horse” for terrorism. At the same time, it is the case that refugee-hosting countries often experience an increase in terrorist attacks. These terrorist attacks, however, are conducted by local groups against refugees and other migrants and are driven primarily by security concerns. This pattern is particularly strong in developed host countries. Current policy responses to the refugee crisis, which frequently monger rather than reduce fears, are therefore not only ill-suited, but even counterproductive by heightening the overall risk of terrorism. [FORWARD TO A FRIEND]( [• • •] SHOW US THE RECEIPTS Shirin Jaafari [tracked]( the evolution of massive anti-government protests in Iraq. At least 70 people associated with the protests have been killed since the start of the month, mostly from sharp crackdowns from state security forces. Protesters decried poor governance, joblessness and breakdowns in service provision and said the firing of popular army commander Lt. Gen. Abdul Wahab al-Saadi, had added fuel to the fire. Peter T. Charles [reflected]( on the decline of “China Hands” — self-taught students of Chinese politics, often from the business world, who long dominated American policymaking toward China. Henry Kissinger himself is the classic example: prone to gaffes when dealing in a language he didn’t speak, but lauded for engaging with China at a time when few Americans did. Today, however, though some China Hands cling to relevance, real expertise is a prerequisite for young policymakers to enter the field. Tania Karas [reported]( on a new set of bilateral deals between the Trump administration and Central American governments that would commit those countries to accept asylum-seekers who arrived in the United States from neighboring countries. Honduras, for example, would accept asylum-seekers from Nicaragua who made it to the US only to be sent back to the region they were fleeing. The deals will allow the US to evade even more of its duty under international law to protect asylum-seekers who arrive at its border. [FORWARD TO A FRIEND]( [ ] WELL PLAYED [These]( golf balls are very expensive, will make you late for your tee time, and sometimes, for reasons no one quite understands, you’ll hit them and they’ll end up lodged in your throat. They do have the radar signature of an F-35 though. The [meddling goose]( from “Untitled Goose Game” got loose at China’s National Day military parade! Luckily, a reporter was [on the scene](. It’s hard to find a more perfect encapsulation of the difference between how historians and political professionals view the lessons of last week’s impeachment discussions than this [tweet.]( To [quote]( the great William Wallace from Braveheart, “AAAAAAAAAAAAHHHHHHHHHH.” [FORWARD TO A FRIEND]( Follow The World: [fb]( [tw]( [ig]( [www]( [DONATE TO THE WORLD]( Follow Inkstick: [fb]( [tw]( [ig]( [www]( [DONATE TO INKSTICK]( Critical State is written by Sam Ratner and is a collaboration between PRI’s The World and Inkstick Media. The World is a weekday public radio show and podcast on global issues, news and insights from PRX, BBC, and WGBH. With an online magazine and podcast featuring a diversity of expert voices, Inkstick Media is “foreign policy for the rest of us.” Critical State is made possible in part by the Carnegie Corporation of New York. [Preferences]( | [Web Version]( [Unsubscribe](

Marketing emails from prx.org

View More
Sent On

01/06/2020

Sent On

25/05/2020

Sent On

18/05/2020

Sent On

11/05/2020

Sent On

04/05/2020

Sent On

27/04/2020

Email Content Statistics

Subscribe Now

Subject Line Length

Data shows that subject lines with 6 to 10 words generated 21 percent higher open rate.

Subscribe Now

Average in this category

Subscribe Now

Number of Words

The more words in the content, the more time the user will need to spend reading. Get straight to the point with catchy short phrases and interesting photos and graphics.

Subscribe Now

Average in this category

Subscribe Now

Number of Images

More images or large images might cause the email to load slower. Aim for a balance of words and images.

Subscribe Now

Average in this category

Subscribe Now

Time to Read

Longer reading time requires more attention and patience from users. Aim for short phrases and catchy keywords.

Subscribe Now

Average in this category

Subscribe Now

Predicted open rate

Subscribe Now

Spam Score

Spam score is determined by a large number of checks performed on the content of the email. For the best delivery results, it is advised to lower your spam score as much as possible.

Subscribe Now

Flesch reading score

Flesch reading score measures how complex a text is. The lower the score, the more difficult the text is to read. The Flesch readability score uses the average length of your sentences (measured by the number of words) and the average number of syllables per word in an equation to calculate the reading ease. Text with a very high Flesch reading ease score (about 100) is straightforward and easy to read, with short sentences and no words of more than two syllables. Usually, a reading ease score of 60-70 is considered acceptable/normal for web copy.

Subscribe Now

Technologies

What powers this email? Every email we receive is parsed to determine the sending ESP and any additional email technologies used.

Subscribe Now

Email Size (not include images)

Font Used

No. Font Name
Subscribe Now

Copyright © 2019–2025 SimilarMail.