Resilience Is an Offensive Weapon

2021 ◽  
pp. 141-159
Author(s):  
Linda Henman
Keyword(s):  
2019 ◽  
pp. 1-4
Author(s):  
Emily Finch ◽  
Stefan Fafinski

The cover of this book features an open penknife with an impressive range of attachments, set against a bright yellow background. So why did we pick this as the image to capture what we think Criminology Skills is all about? Without turning this into a media studies lesson, the cover says several things to us. First, by its very nature, much crime is hidden. Criminals tend not to want their activities to be made public. Criminology aims to bring criminality into the light: to explore issues such as why people start to offend, the causes and consequences of crime, methods of crime prevention, public perceptions and reactions to crime, measuring and quantifying crime, how the criminal justice system, the police, the courts, the probation and prison service, should deal with offenders, and methods that the state uses, especially the criminal law, in response to crime. Secondly, a penknife is quite capable of causing harm: stabbing or merely cutting someone with a knife could give rise to criminal liability for a range of different offences. Simply waving it at someone could be criminal. What about possession of the penknife in a public place? Or selling one to someone under the age of 16? Is it an offensive weapon or a weapon of offence? These have distinct meanings in the criminal law of England and Wales. Knife crime is a topic that is always of concern in the media. Thirdly, and perhaps, most importantly, a penknife contains a whole selection of different tools that can be used in different situations to make life easier. Several years ago, one of us was asked the question: ‘Why do you make such a fuss about skills? These students are at university. They ought to know how to study by now.’ Our answer is that, yes, perhaps students ...


Worldview ◽  
1973 ◽  
Vol 16 (12) ◽  
pp. 42-46
Author(s):  
Patrick P. McDermott

The use of fire in warfare is as old as history itself. It has been an offensive weapon, a defensive weapon and an instrument of psychological terror. To the ancient warrior fire was a way to destroy wooden ships and fortifications made of inflammable materials. Greek fire, the secret weapon of the Byzantines, repelled barbarian invasions in the seventh century. General Sherman tried to break the will of the South by burning a path to the sea. The Americans, with napalm and Zippo lighters, and the Viet Cong, with flamethrowers, continued the tradition by laying waste peasant villages in Vietnam.Concrete bunkers and steel ships have not made fire obsolete from a military viewpoint, for the technology of setting fires has stayed a step ahead of the ability to put them out. The jet streaking in low with a canister of napalm has replaced the flaming brand tossed over a wall, and the flaming arrow has given way to a warhead of white-hot magnesium or thermite.


Author(s):  
Colin F. Baxter

By the spring of 1940, Germany had won an overwhelming victory. The battle for France was lost, and in the summer of 1940 the Battle of Britain raged between the Luftwaffe and “The Few” for supremacy in the skies over Britain. Winston Churchill looked to the bomber as Britain’s only offensive weapon; however, British Bomber Command lacked numbers, and its bombs were small and deficient in explosive power. Lord Beaverbrook made strenuous efforts to obtain the explosive RDX developed at the Woolwich Arsenal, but the Ministry of Supply was unable to provide the huge quantities needed by Bomber Command.


Vulcan ◽  
2020 ◽  
Vol 8 (1) ◽  
pp. 74-99
Author(s):  
Patrick Cecil

Abstract By the Second World War the US Navy had slated the pby Catalina to function as its long-range patrol seaplane and considered it for a bombing role. The first months of the war, however, revealed the pby to be too antiquated and slow to be a viable offensive weapon and thus minimized its utility. Relegated to conducting patrols and rescue operations, pby crews looked to the aircraft itself and experimented with technical and operational changes in reaction to fighting the Japanese in the South Pacific and the U-boat threat in the Atlantic. With the blessing of Navy’s command structure, crews made physical adjustments, added the latest technologies, incorporated supporting armaments, and designed new operational methods on an ad hoc basis for their respective circumstances and opponent. This experimentation and innovation resulted in the enhancement of the pby’s offensive utility as an attack weapon, and its transformation into the Black Cats and mad Cats.


1958 ◽  
Vol 52 (4) ◽  
pp. 739-745 ◽  
Author(s):  
John B. Whitton

Once again the attention of students of international law and relations has been directed to the use of propaganda as an offensive weapon of power politics. President Eisenhower, in his historic speech last August before the United Nations, included in his comprehensive plan for the Middle East a proposal for a system of monitoring inflammatory broadcasts.


2021 ◽  
Author(s):  
Gabriela Purtschert-Montenegro ◽  
Gerardo Cárcamo-Oyarce ◽  
Marta Pinto-Carbó ◽  
Kirsty Agnoli ◽  
Aurelien Bailly ◽  
...  

Abstract Many bacteria utilize contact-dependent killing machineries to eliminate rivals in their environmental niches. Here, we show that Pseudomonas putida IsoF is able to outcompete a wide range of bacteria with the aid of a novel type IVB secretion system (T4BSS) that can deliver toxic effectors into bacterial competitors. This extends the host range of T4BSSs, which were so far thought to transfer effectors only into eukaryotic cells, to prokaryotes. Bioinformatic and genetic analyses showed that this killing machine is entirely encoded by a rare genomic island, which has been recently acquired by horizontal gene transfer. IsoF utilizes this secretion system not only as a defensive weapon to antagonize bacterial competitors but also as an offensive weapon to invade existing biofilms, allowing the strain to persist in its natural environment. Furthermore, we show that IsoF can protect tomato plants against the plant pathogen Ralstonia solanacearum in a T4BSS-dependent manner, suggesting that IsoF capabilities can be exploited for pest control and sustainable agriculture.


2021 ◽  
pp. 589-620
Author(s):  
Michael J. Allen ◽  
Ian Edwards

Course-focused and contextual, Criminal Law provides a succinct overview of the key areas on the law curriculum balanced with thought-provoking contextual discussion. This chapter discusses the several offences in the Theft Acts 1968 and 1978, including: making off without payment; burglary (including discussion of the key terms ‘entry as a trespasser’, ‘building’, and the ulterior offences); aggravated burglary (burglary committed when the person has with them a firearm or imitation firearm, or offensive weapon); blackmail; handling stolen goods; and dishonestly retaining a wrongful credit. The feature ‘The law in context’ feature examines how burglars are sentenced, including the applicable sentencing guidelines, the evolution of relevant case law, and the ‘three strikes and you’re out’ mandatory sentence.


2020 ◽  
Vol 34 (1) ◽  
pp. 127-136
Author(s):  
Nemo C. Mörck

The remote viewing research conducted at Stanford Research Institute (SRI) and later at Science Applications International Corporation (SAIC) was covered in The Star Gate Archives Volumes 1 and 2, both reviewed in this journal (see Mörck, 2018, 2019). Less well-known is the fact that much psychokinesis (PK) research was also carried out. This research “ . . . was never intended to be an academic exercise typical of most laboratories. Rather, the only interest was to determine the degree to which PK might be used as part of a defensive or even offensive weapon system” (p. 12). This sounds dramatic. To U.S. intelligence agencies, a proper threat assessment was deemed necessary due to research conducted in the Soviet Union. The research in America, at SRI, was initially directed by Harold Puthoff from 1972 on, and later, for about ten years, by one of the volume’s editors, Edwin May. In addition to research reports and reviews, Volume 3, like its predecessor volumes, includes nine appendixes, a list of abbreviations, an extensive glossary, an author index, and a subject index. The papers are arranged chronologically, but it is not necessarily a good idea to read them in that order.


Sign in / Sign up

Export Citation Format

Share Document