Javascript must be enabled to continue!
Mechanisms of Control
View through CrossRef
This chapter discusses the way in which the Ba’thist regime monitored and enforced boundaries on acceptable interpretations of religion in Iraq. The Ba’thists built on and expanded the instructions that it had developed during the first decade of Saddam Hussein’s presidency. The work of local committees became more thorough and systematic. Party bureaus and security services controlled who could work in the religious landscape as well as what they could say. Local branches of the Ba’th Party began keeping spreadsheets on every mosque and all religious leaders in their territories. They maintained and updated these spreadsheets through national “inventories” they conducted of the religious landscape. Iraqi intelligence and security services also updated their structures to better monitor and mitigate threats coming from religious actors; they were always on the lookout for ways to infiltrate various circles within the religious opposition by using spies.
Title: Mechanisms of Control
Description:
This chapter discusses the way in which the Ba’thist regime monitored and enforced boundaries on acceptable interpretations of religion in Iraq.
The Ba’thists built on and expanded the instructions that it had developed during the first decade of Saddam Hussein’s presidency.
The work of local committees became more thorough and systematic.
Party bureaus and security services controlled who could work in the religious landscape as well as what they could say.
Local branches of the Ba’th Party began keeping spreadsheets on every mosque and all religious leaders in their territories.
They maintained and updated these spreadsheets through national “inventories” they conducted of the religious landscape.
Iraqi intelligence and security services also updated their structures to better monitor and mitigate threats coming from religious actors; they were always on the lookout for ways to infiltrate various circles within the religious opposition by using spies.
Related Results
Arms Control Policy
Arms Control Policy
In this work, an expert on biological weapons offers a thoughtful examination of the political and technical issues that have affected the implementation of arms control agreements...
Janet Jackson's The Velvet Rope
Janet Jackson's The Velvet Rope
The question of control for Black women is a costly one. From 1986 onwards, the trajectory of Janet Jackson’s career can be summed up in her desire for control. Control for Janet w...
Tobacco control in developing countries
Tobacco control in developing countries
Abstract
There is no doubt that smoking is damaging global health on an unprecedented scale. However, there is continuing debate on the economics of tobacco contr...
Documenting Raising and Control in Moro
Documenting Raising and Control in Moro
This chapter details classes of raising and control predicates in Moro and the different types of clausal complements for which these predicates select. It is demonstrated that Mor...
Cyclic Cabinet Corrosion Testing
Cyclic Cabinet Corrosion Testing
Description
Provides essential information on corrosion mechanisms in accelerated tests and service environments, and guidance on determining acceleration factors wi...
Large-scale Networks for Attentional Biases
Large-scale Networks for Attentional Biases
Selective attention is essential for all aspects of cognition. Using the paradigmatic case of visual spatial attention, we present a theoretical account proposing the flexible cont...
Robot Manipulator Redundancy Resolution
Robot Manipulator Redundancy Resolution
Introduces a revolutionary, quadratic-programming based approach to solving long-standing problems in motion planning and control of redundant manipulators.This book describes a no...
Corrosion Basics: An Introduction
Corrosion Basics: An Introduction
This book provides general coverage of the wide field of corrosion control. It is designed to help readers being initiated into corrosion work and presents each corrosion process o...

