Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

The North Iraq Dataset (NIDS) files: Northern Iraq under Baʿthist rule, 1968–911

View through CrossRef
The first archival collection from Saddam Hussein’s regime to receive the attention of researchers in the early 1990s was the large number of documents secured by Iraqi Kurdish rebels in the March 1991 uprising. The documents have been referred to variously as the Iraqi secret police files, the Anfal files, the North Iraq records, and are today known as the North Iraq Dataset (NIDS). In addition to being the first of several collections of Baʿth-era documents removed from Iraq by the US military as a result of the 1991 and 2003 wars, the NIDS was also the first collection returned to the country by the US government in 2005. This article discusses the history of the NIDS, the contents of the archive, efforts to digitize and study the documents, along with investigating the fate of the original records.
Title: The North Iraq Dataset (NIDS) files: Northern Iraq under Baʿthist rule, 1968–911
Description:
The first archival collection from Saddam Hussein’s regime to receive the attention of researchers in the early 1990s was the large number of documents secured by Iraqi Kurdish rebels in the March 1991 uprising.
The documents have been referred to variously as the Iraqi secret police files, the Anfal files, the North Iraq records, and are today known as the North Iraq Dataset (NIDS).
In addition to being the first of several collections of Baʿth-era documents removed from Iraq by the US military as a result of the 1991 and 2003 wars, the NIDS was also the first collection returned to the country by the US government in 2005.
This article discusses the history of the NIDS, the contents of the archive, efforts to digitize and study the documents, along with investigating the fate of the original records.

Related Results

Female Citizenship under Authoritarian Rule in the Middle East: Baʿthist Syria and Beyond
Female Citizenship under Authoritarian Rule in the Middle East: Baʿthist Syria and Beyond
Abstract In Creating Consent in Baʿthist Syria, Esther Meininghaus claims that Syria between 1967 and 2008 was a totalitarian state and that the dispersion of welfar...
A Framework for Detecting Distributed Denial of Services Attack in Cloud Enviorment using Machine Learning Techniques
A Framework for Detecting Distributed Denial of Services Attack in Cloud Enviorment using Machine Learning Techniques
Distributed Denial of Service (DDoS) persists in Online Applications as One of those significant threats. Attackers can execute DDoS by the more natural steps. Then with the high p...
The Critical Role of NIDSNIPS in Protecting Internet Infrastructure
The Critical Role of NIDSNIPS in Protecting Internet Infrastructure
With the rapid development and wide application of the Internet, network security has become an important issue in modern society. Network attacks such as network worms, botnets an...
Network Based Intrusion Detection System Using Weighted Product Model (WPM)
Network Based Intrusion Detection System Using Weighted Product Model (WPM)
A security technology called a network-based intrusion detection system (NIDS) was created to safeguard computer networks against unauthorised access and criminal activity. This te...
Structure and deformation history of the northern range of Trinidad and adjacent areas
Structure and deformation history of the northern range of Trinidad and adjacent areas
Conflicting models have been proposed for both the evolution of northern South America and the neotectonics of the south Caribbean plate boundary zone. The Trinidadian portion of t...
An International Rule of Law
An International Rule of Law
The “international rule of law” is an elusive concept. Under this heading, mainly two variations are being discussed: The international rule of law “proper” and an “internationaliz...
A Novel Approach to Network Intrusion Detection System using Deep Learning for SDN: Futuristic Approach
A Novel Approach to Network Intrusion Detection System using Deep Learning for SDN: Futuristic Approach
Software-Defined Networking (SDN) is the next generation to change the architecture of traditional networks. SDN is one of the promising solutions to change the architecture of int...

Back to Top