Newsletter Subject

What is internet?

From

theworld.org

Email Address

criticalstate@theworld.org

Sent On

Tue, May 25, 2021 04:36 PM

Email Preheader Text

What is internet? Read about how refugees choose whether to go home. Received this from a friend? CR

What is internet? Read about how refugees choose whether to go home. Received this from a friend? [SUBSCRIBE]( CRITICAL STATE Your weekly foreign policy fix. [The World]( [INKSTICK]( If you read just one thing… … read about how refugees choose whether to go home. A lack of agency among refugees dominates mainstream coverage of migrant issues. Governments determine where refugees can live, and under what conditions, and whether and when they will be forced to move. As a result, policymakers know little about refugees’ preferences for whether and when to return to their home countries, despite the fact that voluntary repatriation is the internationally agreed upon best practice. A new [article]( in the American Political Science Review sheds light on the ways those preferences can diverge among refugee populations. Drawing from a survey of Syrian refugees living in Lebanon, the article shows that those who were directly exposed to violence in Syria are much more likely to want to return to the country than those who fled without experiencing attacks. According to the researchers, the disparity derives in part from the belief among those who survived violence that they are well-placed to evaluate the risks of a potential return to Syria. a correction for racist data A great deal of quantitative security studies relies on listing wars and then seeing what factors correlate to war onset, duration, termination, severity, etc. The problem is that, in order for those correlations to have any validity, the list of wars has to be comprehensive. It turns out, the most popular lists aren’t even close. One of the categories of war most frequently missed, according to a new [article]( by political scientist (and not Hall of Fame linebacker) Brian Urlacher, is conflicts between Native American tribes and colonizers. Urlacher, studying the extensive historical literature on Native American resistance to colonization, identified 148 conflicts in North America alone between 1500 and 1900. One commonly cited list of wars, the Conflict Catalogue, includes only 0.02% of the conflicts Urlacher identified, underlining the extent of Native erasure in modern security studies. [FORWARD TO A FRIEND]( Disruption at Defense During the Obama administration, then-Defense Secretary Ash Carter was obsessed with improving the relationship between the Pentagon and big tech companies. The crown jewel of his effort was the Defense Innovation Unit (DIU), a Defense Department organization based in Silicon Valley and charged with accelerating the US military’s adoption of commercial technology. Last week, DIU announced plans to get the Pentagon on board with everyone’s favorite Silicon Valley product: the gig economy. DIU is creating an app called “Gig Eagle” that, despite its name, is not for getting aspiring standups to open mic nights. Instead, it will match Defense Department managers with service members with technical skills relevant to their projects. A DIU spokesperson called the app “an Uber but for the [Defense Department],” which, given the famously poor workplace cultures of both Uber and the Pentagon, seems like a case of saying the quiet part out loud. [FORWARD TO A FRIEND]( [ ] DEEP DIVE Sexual violence in conflict: Part I A new [article]( in the Annual Review of Political Science by field leaders Ragnhild NordÃ¥s and Dara Kay Cohen takes stock of the incredible progress made in recent years in understanding when, where, and why wartime sexual violence takes place. This week and next on Deep Dive, we’ll look at two of the most recent articles NordÃ¥s and Cohen highlight in order to better understand the state of the literature on sexual violence in conflict. One of the areas of research where the most progress has been made in recent years is in understanding how armed groups craft policy around sexual violence. In the past, most people assumed that sexual violence in conflict was indiscriminate — the result of wanton cruelty, rather than explicit policy. Yet many armed groups enact rules governing the use of sexual violence by their fighters. In the latest issue of the Journal of Global Security Studies, political scientists Mara Redlich Revkin and Elisabeth Jean Wood have an [article]( that describes the origins of sexual violence policies put in place by the ISIS during the group’s 2014 to 2017 peak in Iraq and Syria. Revkin and Wood are primarily interested in why ISIS chose to inflict particular forms of violence on some groups but not others. If ISIS violence — and specifically sexual violence — was indiscriminate, we woud expect to see it directed at any civilians with which ISIS fighters came in contact. In reality, however, levels of ISIS sexual violence varied widely based on the religious and ethnic identities of the civilians they targeted. Specifically, Revkin and Wood point to the differences in ISIS’s treatment of Sunni and Yazidi populations. Sunni Muslims were subject to frequent sexual violence by ISIS, but the forms of that violence were circumscribed. Sunni women and girls in ISIS-held areas were subject to intense pressure to marry ISIS fighters, often as a form of tacit protection for their families. Outside the framework of marriage, sexual violence toward Sunnis was rare, and frequently resulted in punishment for the perpetrator when it did take place. By contrast, Yazidi women and girls faced widespread sexual enslavement by ISIS, with the group establishing a slave market infrastructure to support the practice of enslavement. Other ethnic and religious groups experienced ISIS sexual violence across a specturm between the treatment of Sunnis and Yazidis. These ethnoreligious differences were not reflections of a change in mood by perpetrators of indiscriminate violence, but rather the direct result of ISIS organizational policy. In 2014, for example, ISIS publicly laid out a clear policy and legal justification for sexual enslavement of Yazidis and other groups it saw as “unbelievers.” Those rules were later expanded with further policy documents that described how slave markets were to be regulated and the conditions under which formerly enslaved people could marry. The rulings reflected the ISIS ideological line — the group’s interpretation of early Islamic law permits the enslavement of prisoners of war who are not Muslims, Jews, or Christians. The focus on child marriage of Sunni girls was also a policy. In 2015, ISIS declared that “it is considered legitimate for a girl to be married at the age of nine” in the group’s territory. ISIS bureaucrats frequently issued licenses for child marriages, complete with signatures, fingerprints, and a record of the dowry paid by the bride’s family. That policy was also a reflection of ISIS’ ideological project. The state the group sought to create was a highly patriarchal one that required women and girls to have male “guardians,” increasing incentives for child marriage. By tying patterns of ISIS violence to the enactment of the group’s ideology, Revkin and Wood go beyond earlier explanations of the group’s actions but did not account for ISIS’s political project. Some security studies scholars had posited that sexual enslavement was a recruitment tactic meant to entice young men into the group. Others argued that ISIS was simply recreating the repressive strategies of the dictatorial governments they were succeeding in Iraq and Syria. Yet neither of these explanations stand up much to scrutiny. ISIS barely mentioned slavery in its foreign propaganda materials, and the group’s use of slavery was circumscribed along ideological grounds. Though the Syrian and Iraqi governments also engaged in sexual violence, sexual enslavement along ethnic lines is just one of the forms of violence ISIS undertook that had no equivalent during predecessor regimes. Even in the realm of sexual violence, Revkin and Wood’s work emphasizes the extent to which an armed group’s tactics tend to reflect its underlying political goals. [LEARN MORE]( [FORWARD TO A FRIEND]( [• • •] SHOW US THE RECEIPTS Sarang Shidore [argued](that The Quad — a group composed of the US, Japan, India, and Australia — would be better off organizing to confront climate change rather than pursue its ostensible raison d’etre of pursuing what President Biden called “extreme competition” with China. The Quad got its start in the wake of a climate disaster — the Asian tsunami of 2004 — and it could play a massive role in disaster response around the Pacific and Indian oceans. Financing from Quad countries could also be a crucial part of building up infrastructure in the region to help build up resilience to climate change. Halima Gikandi [marked]( the 30th anniversary of de facto independence for Somaliland. The country of 3.6 million isn’t recognized by most other countries or international bodies, but has maintained its own government, with passports and a constitution, since 1991. Somalia has not given up its claim on Somaliland, and talks between the two have broken down. Somaliland still intends to go forward with local elections at the end of May and continue to press its case for international recognition in hopes of achieving at least another 30 years of self-government. Paul Carroll [wrote]( about the damage that Israel’s latest assault on Gaza has done to Palestinian civil society organizations. Airstrikes have prevented international humanitarian aid organizations from doing crucial work to serve civilian victims of Israeli attacks, for fear that their workers could be killed. For domestic Palestinian organizations, the strikes are just another part of Israel’s ongoing effort to discredit, defund and destroy them. Palestinian human rights monitors have been the targets of Israeli laws and rhetoric meant to equate human rights work with support for terrorism. [FORWARD TO A FRIEND]( [ ] WELL PLAYED Time for some (Finnish) [game theory](. The Belarusian government staked out some new territory in the realm of bad state behavior when it basically [hijacked]( a passenger flight to arrest a journalist who was on the plane. The arrest does not bode well for Belarusian civil society and budget air travel, but it deserves some points for [novelty](. Today in [things]( that will make you feel old or young, depending on whether you actually are old or young. Turn that rocket-propelled grenade into a shoulder-launched surface to air missile, and it [could]( be a gnome de plume! It’s incomprehensible that they didn’t put [Andrew Card]( on all of [these](. Does nominative determinism mean nothing anymore? Also, you could do a whole dissertation on “brave female soldier” as the queen of hearts. Presumably after reading the greatest ongoing [thread]( on Twitter — of Brazilian police creating artistic poses for the contraband they impound — Italian police have gotten into the publicity-photo-as-massive-self-own [game](. [FORWARD TO A FRIEND]( Follow The World: [fb]( [tw]( [ig]( [www]( [DONATE TO THE WORLD]( Follow Inkstick: [fb]( [tw]( [ig]( [www]( [DONATE TO INKSTICK]( Critical State is written by Sam Ratner and is a collaboration between The World and Inkstick Media. The World is a weekday public radio show and podcast on global issues, news and insights from PRX and GBH. With an online magazine and podcast featuring a diversity of expert voices, Inkstick Media is “foreign policy for the rest of us.” Critical State is made possible in part by the Carnegie Corporation of New York. [Preferences]( | [Web Version]( [Unsubscribe](

EDM Keywords (214)

yazidis written world wood whether week ways wars war want wake violence validity use understanding unbelievers uber two twitter turns treatment things targets talks syrian syria survey support sunnis sunni succeeding subject strikes state start specturm somaliland slavery seeing see saying saw rules risks return result rest resilience researchers research religious relationship regulated region refugees reflections reflection reflect record recognized realm reading read rather rare queen quad pursuing pursue punishment prx projects progress problem prisoners press preferences practice posited policy points podcast plane place perpetrators perpetrator pentagon past passports part pacific others origins organizing order one old obsessed nine next name much move mood may married make maintained made look live literature list likely lebanon lack killed journalist journal israel isis iraq interpretation internet insights infrastructure indiscriminate incomprehensible improving hopes hall groups group government gotten given girls girl get gbh gaza framework forward forms form forced focus fighters fear family fact extent everyone evaluate etre ethnic equivalent enslavement end enactment effort done diversity directed differences destroy despite deserves describes described defense damage creating create country countries could correlations correction contraband continue contact conflicts conflict conditions comprehensive collaboration claim civilians christians china charged change categories case building broken bride board better article arrest areas app also age adoption actually actions achieving account accelerating 2014 2004 1500

Marketing emails from theworld.org

View More
Sent On

26/06/2023

Sent On

23/06/2023

Sent On

22/06/2023

Sent On

21/06/2023

Sent On

21/06/2023

Sent On

20/06/2023

Email Content Statistics

Subscribe Now

Subject Line Length

Data shows that subject lines with 6 to 10 words generated 21 percent higher open rate.

Subscribe Now

Average in this category

Subscribe Now

Number of Words

The more words in the content, the more time the user will need to spend reading. Get straight to the point with catchy short phrases and interesting photos and graphics.

Subscribe Now

Average in this category

Subscribe Now

Number of Images

More images or large images might cause the email to load slower. Aim for a balance of words and images.

Subscribe Now

Average in this category

Subscribe Now

Time to Read

Longer reading time requires more attention and patience from users. Aim for short phrases and catchy keywords.

Subscribe Now

Average in this category

Subscribe Now

Predicted open rate

Subscribe Now

Spam Score

Spam score is determined by a large number of checks performed on the content of the email. For the best delivery results, it is advised to lower your spam score as much as possible.

Subscribe Now

Flesch reading score

Flesch reading score measures how complex a text is. The lower the score, the more difficult the text is to read. The Flesch readability score uses the average length of your sentences (measured by the number of words) and the average number of syllables per word in an equation to calculate the reading ease. Text with a very high Flesch reading ease score (about 100) is straightforward and easy to read, with short sentences and no words of more than two syllables. Usually, a reading ease score of 60-70 is considered acceptable/normal for web copy.

Subscribe Now

Technologies

What powers this email? Every email we receive is parsed to determine the sending ESP and any additional email technologies used.

Subscribe Now

Email Size (not include images)

Font Used

No. Font Name
Subscribe Now

Copyright © 2019–2025 SimilarMail.