And the Challenge to the the Rationality of Modern Islamist Terrorism Liberal Democratic World

Total Page:16

File Type:pdf, Size:1020Kb

And the Challenge to the the Rationality of Modern Islamist Terrorism Liberal Democratic World GLOBAL ALERT The Rationality of Modern Islamist Terrorism and the Challenge to the Liberal Democratic World BOAZ GANOR GLOBAL ALERT COLUMBIA STUDIES IN TERRORISM AND IRREGULAR WARFARE COLUMBIA STUDIES IN TERRORISM AND IRREGULAR WARFARE Bruce Hoffman, Series Editor This series seeks to fill a conspicuous gap in the burgeoning literature on terrorism, guerrilla warfare, and insurgency. The series adheres to the highest standards of scholarship and discourse and publishes books that elucidate the strategy, operations, means, motivations, and effects posed by terrorist, guer- rilla, and insurgent organizations and movements. It thereby provides a solid and increasingly expanding foundation of knowledge on these subjects for students, established scholars, and informed reading audiences alike. Ami Pedahzur, The Israeli Secret Services and the Struggle Against Terrorism Ami Pedahzur and Arie Perliger, Jewish Terrorism in Israel Lorenzo Vidino, The New Muslim Brotherhood in the West Erica Chenoweth and Maria J. Stephan, Why Civil Resistance Works: The Strategic Logic of Nonviolent Resistance William C. Banks, New Battlefields/Old Laws: Critical Debates on Asymmetric Warfare Blake W. Mobley, Terrorism and Counterintelligence: How Terrorist Groups Elude Detection Guido W. Steinberg, German Jihad: On the Internationalization of Islamist Terrorism Michael W. S. Ryan, Decoding Al-Qaeda’s Strategy: The Deep Battle Against America David H. Ucko and Robert Egnell, Counterinsurgency in Crisis: Britain and the Challenges of Modern Warfare Bruce Hoffman and Fernando Reinares, editors, The Evolution of the Global Terrorist Threat: From 9/11 to Osama bin Laden’s Death BOAZ GANOR GLOBAL ALERT The Rationality of Modern Islamist Terrorism and the Challenge to the Liberal Democratic World Columbia University Press / New York Columbia University Press Publishers Since 1893 New York Chichester, West Sussex cup.columbia.edu Copyright © 2015 Columbia University Press Chapter three first published, in slightly different form, in William C. Banks, ed., Shaping a Global Legal Framework for Counterinsurgency: New Directions in Asymmetric Warfare (Oxford: Oxford University Press, 2012). By permission of Oxford University Press. All rights reserved Library of Congress Cataloging-in-Publication Data Ganor, Boaz. Global alert : the rationality of modern Islamist terrorism and the challenge to the liberal democratic world / Boaz Ganor. pages cm. — (Columbia studies in terrorism and irregular warfare) Includes bibliographical references and index. ISBN 978-0-231-17212-7 (cloth : alk. paper) — ISBN 978-0-231-53891-6 (ebook) 1. Terrorism—Islamic countries. 2. Terrorism—Religious aspects—Islam. 3. Terrorism—Prevention. I. Title. HV6433.I74.G36 2015 363.325—dc23 2014029475 Columbia University Press books are printed on permanent and durable acid-free paper. This book is printed on paper with recycled content. Printed in the United States of America c 10 9 8 7 6 5 4 3 2 1 Cover design: Noah Arlow Cover image: Geoff Spear References to websites (URLs) were accurate at the time of writing. Neither the author nor Columbia University Press is responsible for URLs that may have expired or changed since the manuscript was prepared. CONTENTS Acknowledgments vii Introduction ix 1. INTRODUCTION TO MULTIDIMENSIONAL WARFARE: Defining Terrorism, Redefining War 1 2. THE CHALLENGES AND DILEMMAS FACED BY LIBERAL DEMOCRACIES COPING WITH MODERN ISLAMIST TERRORISM 21 3. THE PROPORTIONALITY DILEMMA IN COUNTERING TERRORISM 37 4. STATE INVOLVEMENT IN TERRORISM 64 CONTENTS 5. THE HYBRID TERRORIST ORGANIZATION 73 6. IS LIBERAL DEMOCRACY THE SOLUTION TO TERRORISM—OR IS IT PART OF THE PROBLEM? 84 7. THE RATIONALE OF MODERN ISLAMIST TERRORISM 97 8. THE PRACTICAL ASPECTS OF AN ISLAMIST TERRORIST ORGANIZATION’S RATIONALE 119 9. UNDERSTANDING THE RATIONALE BEHIND DIFFERENT TYPES OF TERRORIST ATTACKS 133 10. THE RATIONALE OF THE MODERN ISLAMIST TERRORIST ORGANIZATION: Hamas as a Case Study 150 11. CONCLUSION 172 Notes 181 Selected Bibliography 205 Index 211 vi ACKNOWLEDGMENTS HIS BOOK IS dedicated to my wife, Amit Ganor, and my children, Lee, Tom, and Dan, as an expression of my love and gratitude for their T understanding and support through all the years of my professional work and especially during the writing of this book. The book is also dedi- cated to my parents of blessed memory, Shulamit and David Ganor, who instilled in me the passion for learning, research, and writing. It would be impossible for me to thank all of my colleagues who advised and guided me during the research phase of this book, but special thanks are due to Marsha Weinstein, who translated and edited the book with exceptional skill and professionalism, and above all to my assistant and dear friend Stevie Weinberg, director of operations at the International Insti- tute for Counter-Terrorism (ICT), who played a valuable and central role in preparing the book for publication. I would like to thank my friends and acquaintances who supported the publishing of this book—Shabtai Shavit, former head of the Mossad and chairman of the ICT board of directors; Congressman Peter King, member of the Homeland Security Committee and chairman of the Subcommittee on Counterterrorism and Intelligence; Judge Jean-Louis Bruguiere, former head, Counter-Terrorism Unit, Paris District Court, and former leading French magistrate for investigating counterterrorism, France; Fernando ACKNOWLEDGMENTS Reinares, professor of political science, Universidad Rey Juan Carlos, and senior analyst on international terrorism, Real Instituto Elcano Madrid, Spain; and Brian Jenkins, senior advisor to the president, RAND Corpo- ration. In addition, I want to thank Columbia University Press and edi- tor Anne Routon, as well as Columbia Studies in Terrorism and Irregular Warfare series editor Bruce Hoffman. In conclusion, I would like to thank Uriel Reichman, founder and president of the Interdisciplinary Center (IDC), Herzliya—my academic home—whose distinct academic vision and initiative prompted his con- stant support of all my academic activities throughout the past two decades, both at the ICT and in personal endeavors. I also am grateful to Ambassa- dor Ronald S. Lauder, who granted me the Chair for Counter-Terrorism at the Lauder School of Government, Diplomacy, and Strategy, as well as my dear friends Daniel Jusid Man and Daphna and Gerry Cramer. viii INTRODUCTION O EACH AGE its challenges. Barely over half a century ago, the interna- tional community grappled with fascism; less than half that time ago, T it seemed that communism would be the scourge to end all scourges. The formation, dismantling, and re-formation of nations and nation-blocs of the past century and a half have been accompanied by changes in the way wars are fought, and in where and how they are fought. Although terror- ism is not a modern phenomenon, it has in the modern age continued to don and slough off various incarnations: from state terrorization of civilian populations during World War II, through the anti-colonial campaigns of the Viet Minh and EOKA, to the anarchistic and nationalistic terrorism of the Red Brigades, IRA, and PLO. Recent years have seen an increase in the religious-ideological terrorism of Islamist-jihadists, whose manipula- tion of supportive civilian populations so as to wield violence against other civilians whom they regard as infidels represents a “perfecting” of modern terrorist strategies. Islamist-jihadist terrorism—a plague that has spread to almost every corner of the world—creates painful dilemmas for the peoples and decision makers who confront it. Its rapid, shape-shifting advance has sometimes confounded efforts to comprehend its origins, motives, and aims. Its sophistication in exploiting liberal values poses challenges and difficul- ties for the Western world, and for liberal democratic states in general, in INTRODUCTION attaining effective and balanced counter-terrorism policies. It is this gap in the understanding of Islamist-jihadist terrorism, as an offshoot and devel- opment of modern terrorism, that Global Alert wishes to bridge. Chapter 1 begins the work of bridging the gap in understanding current trends and challenges in countering Islamist terrorism by providing a his- torical perspective on modern terrorism, as opposed to traditional warfare. It proposes a definition of terrorism, which takes into account the difficulty that the international community has so far had in reaching consensus on such a definition. It also reviews the reaction of today’s terrorists—Islamist terrorists among them—to liberal democracy, including their warped inter- pretation of modern liberal democratic governance and attempts to under- mine it to achieve their aims. Chapter 2 expands on terrorism’s exploitation of liberal democracy and explains the main dilemmas that this generates for the liberal democratic state plagued by terrorism. The chapter also describes the tango danced by terrorism and the liberal, free media, and explains how terrorist organizations “spin” their actions to send different messages to different target audiences. The tension created by the effort to devise efficient counter-terrorism strategies while preserving liberal democratic values gives rise to yet another dilemma, that of the proportionality of the response to terrorism. Chapter 3 addresses the conundrum of proportionality by first taking up the thread of analysis presented in chapter 1, this time in light of international humani- tarian law. Developed to provide a frame
Recommended publications
  • COLD ARMS Zoran Markov Dragutin Petrović
    COLD ARMS Zoran Markov Dragutin Petrović MUZEUL BANATULUI TIMIŞOARA 2012 PREFACE Authors of the catalog and exhibition: Zoran Markov, Curator, Banat Museum of Timisoara Dragutin Petrović, Museum - Consultant, The City Museum of Vršac Associates at the exhibition: Vesna Stankov, Etnologist, Senior Curator Dragana Lepir, Historian Reviewer: “Regional Centre for the Heritage of Banat — Concordia” is set adopted a draft strategy for long-term research, protection and pro- Eng. Branko Bogdanović up with funds provided by the EU and the Municipality of Vršac, motion of the cultural heritage of Banat, where Banat means a ge- Catalog design: as a cross-border cooperation project between the City Museum ographical region, which politically belongs to Romania, Hungary Javor Rašajski of Vršac (CMV) and Banat Museum in Timisoara (MBT). In im- and Serbia. Photos: plementation of this project, the reconstruction of the building of All the parts of the Banat region have been inextricably linked Milan Šepecan Concordia has a fundamental role. It will house the Regional Centre by cultural relations since the earliest prehistoric times. Owing to Ivan Kalnak and also be a place for the permanent museum exhibition. its specific geographical position, distinctive features and the criss- Technical editor: The main objective of establishing the Regional Centre in crossing rivers Tisza, Tamis and Karas, as the ways used for spread- Ivan Kalnak Concordia is cross-border cooperation between all institutions of ing influence by a number of different cultures, identified in archae- COLD ARMS culture and science in the task of production of a strategic plan ological research, the area of Banat represents today an inexhaust- and creation of best conditions for the preservation and presenta- ible source of information about cultural and historic ties.
    [Show full text]
  • Runescape Weapons Guide
    Runescape weapons guide Continue Guns are a vital part of the fight in any video game and OSRS is no different. When RuneScape decided to activate the Evolution of Combat update, people noticed a striking contrast between how it works in both OSRS and RS3. In this preview of OSRS and RuneScape Weapons, we'll help you make it easier to understand how guns work in each version. Is there a difference between guns in Runescape 3 and OSRS? Despite the overwhelming amount of content in RS3, Jagex has completely changed the way the original weapon works. Some weapons were useless and some were upgraded. There was a lot of division in the community with this update, but it offers a new dynamic of aging game. The most important change was the ability to double-weapon in the form of an undesirable variant of these weapons - an example of the fact that it is a flash sword and a sword from the hands. As a rule, OSRS allowed players to equip only weapons and shields or weapons with two hands, and there was nothing between them. Swords As one would expect in medieval style games, there is plenty of content surrounding swords in Runescape and OSRS. This includes likes of short swords, long swords, scimitars, two-handed swords, and rapiers. Dragon Scimitar is one of the most popular swords, especially for pure strength training or mid-level players. Dragon Longsword is used to be held in high esteem right up until the release of the scimitar. The swords of God have entered the game and are by far the most useful 2-handed swords in both RS3 and OSRS.
    [Show full text]
  • {Download PDF} Improvised Hunting Weapons: a Waterproof Pocket Guide to Making Simple Tools for Survival Ebook
    IMPROVISED HUNTING WEAPONS: A WATERPROOF POCKET GUIDE TO MAKING SIMPLE TOOLS FOR SURVIVAL PDF, EPUB, EBOOK Dave Canterbury,J. M. Kavanagh | 1 pages | 01 Jun 2012 | Waterford Press | 9781583557112 | English | United Kingdom Dave Canterbury Outdoor Survival Laminated Pocket Guides But at the same time crafting effective primitive tools is often an art passed down from one generation to the next. That is where our challenge is. Many websites show how to quickly make one using a pole and common survival items such as knives, duct tape and paracord e. Nor do they compare in any way to the power and effectiveness of an ancient Spartan dory — the Spartan version of a spear. Measuring 7 to 9 feet in length, the Spartans crafted extremely effective and deadly spears, helping ensure Spartan warriors victory in battle. As a back up weapon, was a second sharpened point, on the bottom end of the spear, if the primary spearhead ever broke off. The most basic of spears is just a sharpened stick. To finish it off, you should put the end on fire for a few minutes while rotating it, to cause the fibers to contract and toughen the end. First, tie a piece of rope about 20 inches from the end you intend to split. Next, using a sharp knife or a really sharp rock , make two splits at that same end, about 15 inches in depth. Next, tap a couple of small twigs along the two cuts, as much as the cuts allow it. When finished, the twigs will be one on top of each other and form a cross.
    [Show full text]
  • Quick Token Reference
    Front Cover Copyright True Adventures, Ltd., 2021 last updated August 27, 2021 1 All rights reserved Copyright True Adventures, Ltd., 2021 All rights reserved 2 last updated August 27, 2021 How to Read a Token Conversion Initials: What the token converts to via Class List: If a token can only be used by certain classes, the Token Exchange Program. For details, visit those classes are listed here. If a token does not have a https://truedungeon.com/tep. If the conversion initials are class list, it can be used by all classes. If the list of classes flanked by dots (e.g., •MH•), that token is not part of the that can use the item would be excessively long, it may be core set of tokens for that year. written as “All except ___”. In those cases, the classes listed are the only ones that cannot use the item. Name: The color of the token’s name indicates its rarity. In general, the rarer the token the more powerful it is. Damage Wheel: On a weapon token, these numbers These are the rarities and the colors that go with them: show how much damage the weapon is capable of dealing. Common (black), Uncommon (green), Rare (red), Ultra If the attack slide succeeds, the number closest to the Rare (purple), Transmuted (blue, with 3 subcategories damage dot on the combat board is the damage dealt. Your indicated by the number of points on the star found coach goes over combat in detail during your training on each one), and Legendary (orange).
    [Show full text]
  • Enigma-3.Pdf
    1 The book is the result of the research of legal experts and criminalists group (an essay of legal and criminologists researchers). These are results of lawyers’ and criminologists’ research work in the framework of their professional activity. Usage of the book in any other way, other than as a reference, makes one responsible for the usage of the data. 2 ENIGMA 3 IGNORANCE LIQUIDATION Oleg Maltsev MISCONCEPTIONS IN MARTIAL ARTS 3 CONTENTS: 1. INTRODUCTION. LOGIC OF MARTIAL ARTS 5 2. ABOUT THE ORIGIN OF DEFENSE 18 3. SPEAR. TRANSFORMATION OF SPEAR STRIKES INTO KNIFE STRIKES 23 4. ORIGINS OF THE STILETTO. VENETIAN TECHNIQUE 31 5. AN ARMED WARRIOR. QUEST FOR MORE ADVANTAGE 38 6. ORIGINS OF FIGHTING 44 7. PERIOD OF FIREARMS 47 8. ORIGINS OF COUNTER SYSTEM 49 9. JAPANESE MARTIAL ARTS AND THEIR DESIGNATION 52 10. ERA OF KNIFE FIGHTING 54 AFTERWORD 57 4 INTRODUCTION LOGIC OF MARTIAL ARTS The book in your hands is the third one in the series of Enigma Ignorance Liquidation. According to a dictionary «Enigma» means: “something that is mysterious and seems impossible to understand completely”. Correspondingly, this book was not titled this way without a reason. The fact is that people rarely see the essence in ordinary things; modern approach often excludes the capability to understand the history of the phenomenon, its structure, its functional designation of elements of its structure. Respectively, one who is going to use that kind of approach, will find very difficult to see the effectiveness of what he has. We recommend to start with such a concept as «LOGIC» of ignorance liquidation in the context of this book.
    [Show full text]
  • Updating of Specification of Names of Persons Designated As
    G.N. 4415 UNITED NATIONS (ANTI-TERRORISM MEASURES) ORDINANCE (Chapter 575) Updating of specification of names of persons designated as terrorists or terrorist associates by the Committees of the United Nations Security Council established pursuant to the Resolutions 1267 (1999), 1989 (2011) and 2253 (2015), as well as the Resolution 1988 (2011) (the Committees) I, T K LAI, the Secretary for Security, pursuant to – (a) section 4(1), (2) and (6) of the United Nations (Anti-Terrorism Measures) Ordinance (Chapter 575) and all other powers conferred upon me; and (b) the delegation dated 4th of September 2002 under section 16 of that Ordinance of the Chief Executive’s functions under section 4 of that Ordinance, hereby – (c) revoke the notice dated 22nd July 2016, published as G.N. 4054 in Gazette No. 29/2016, specifying the names of the persons then designated by the Committees as terrorists or terrorist associates; and (d) specify, in the Schedule to this notice, the names of the persons now designated by the Committees as terrorists or terrorist associates. Dated this 5th day of August 2016. T K Lai Secretary for Security SCHEDULE SPECIFICATION OF NAMES OF PERSONS DESIGNATED BY THE COMMITTEES AS TERRORISTS OR TERRORIST ASSOCIATES A. Individuals associated with the Taliban TAi.002 Name: 1: MOHAMMAD 2: HASSAN 3: AKHUND 4: na محمد حسن آخوند :(Name (original script Title: a) Mullah b) Haji Designation: a) First Deputy, Council of Ministers under the Taliban regime b) Foreign Minister under the Taliban regime c) Governor of Kandahar under the Taliban regime d) Political Advisor of Mullah Mohammed Omar DOB: a) Between 1955 and 1958 (Approximately) b) Between 1945 and 1950 (Approximately) POB: Pashmul village, Panjwai District, Kandahar Province, Afghanistan Good quality a.k.a.: na Low quality a.k.a.: na Nationality: Afghanistan Passport no: na National identification no: na Address: na Listed on: 25 Jan.
    [Show full text]
  • The a to Z Guide to Afghanistan Assistance 2009
    The A to Z Guide to Afghanistan Assistance 2009 AFGHANISTAN RESEARCH AND EVALUATION UNIT Improving Afghan Lives Through Research The A to Z Guide to Afghanistan Assistance 2009 Seventh Edition AFGHANISTAN RESEARCH AND EVALUATION UNIT Improving Afghan Lives Through Research IMPORTANT NOTE: The information presented in this Guide relies on the voluntary contributions of ministries and agencies of the Afghan government, embassies, development agencies and other organisations representing donor countries, national and international NGOs, and other institutions. While AREU undertakes with each edition of this Guide to provide the most accurate and current information possible, details evolve and change continuously. Users of this guide are encouraged to submit updates, additions, corrections and suggestions to [email protected]. © Copyright Afghanistan Research and Evaluation Unit, January 2009. All rights reserved. No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, recording or otherwise without prior written permission of the publisher, the Afghanistan Research and Evaluation Unit. Permission can be obtained by emailing areu@ areu.org.af or by calling +93 799 608 548. Coordinating Editor: Cynthia Lee Contacts Section: Sheela Rabani and Noorullah Elham Contributors: Ahmadullah Amarkhil, Amanullah Atel, Chris Bassett, Mia Bonarski, Colin Deschamps, Noorullah Elham, Susan Fakhri, Paula Kantor, Anna Larson, Sheela Rabani, Rebecca Roberts, Syed Mohammad Shah,
    [Show full text]
  • Can a Flaming Sword Be Cold? Cutting Weapon As a Conceptual and Linguistic Predicament
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by Jagiellonian Univeristy Repository Studia Etymologica Cracoviensia vol. 9 Kraków 2004 Kinga MACIUSZAK / Ignacy NASALSKI (Kraków) CAN A FLAMING SWORD BE COLD? CUTTING WEAPON AS A CONCEPTUAL AND LINGUISTIC PREDICAMENT So he drove out the man; and he placed at the east of the garden of Eden Cherubinis, and a flaming sword which turned every way, to keep the way of the tree of life. (Gen. 3:24) [King James Version] 0. Note on transcription 1. Cutting weapon from the linguistic point of view 2. “White weapon” 2.1. General remarks 2.2. Romance languages 2.3. Germanic languages 2.4. Arabic 3. Flaming sword 4. “Cold weapon” 4.1. Persian 4.2. Latin gladius 0. Note on transcription To make our reflections available to the readers who are not aquainted with non-European alphabets, we have decided to make use of only the Russian and Greek alphabets and to present less known scripts, i.e. Arabic, Armenian, He­ brew, Persian and Sanskrit, in Latin transcription. 78 KINGA MACIUSZAK / IGNACY NASALSKI 1. Cutting weapon from the linguistic point of view If one takes a look at how people call weapons like sword, lance, bayonet &c, i.e. the English category “cutting weapon / cold steel” (from now onward CW/CS), one notices that they are described in different languages by miscella­ neous adjectives: Czech bodna/sećna zbrah ‘thrusting/cutting weapon’, Eng. cold steel ‘cold weapon’, Fin. teriivii ase ‘sharp, slicing weapon’, Fr. arme blanche ‘white weapon’, Hung, szuró- es vagofegyverek ‘stubbing/cutting weapon’, Germ, blanke Waffe ‘shining/naked weapon’, Gr.
    [Show full text]
  • Military and Strategic Affairs Volume 4 | No
    Military and Strategic Affairs Volume 4 | No. 3 | December 2012 A Blueprint for Cyber Deterrence: Building Stability through Strength Frank J. Cilluffo, Sharon L. Cardash, and George C. Salmoiraghi On Nuclear War: Deterrence, Escalation, and Control Stephen J. Cimbala Israel’s Second Lebanon War Reconsidered Benjamin S. Lambeth In Defense of Stuxnet James A. Lewis Iran and Cyberspace Warfare Gabi Siboni and Sami Kronenfeld The Growing Power of the Indian Navy: Westward Bound Yuval Zur, Tamir Magal, and Nadav Kedem Cybercrime: A National Security Issue? Lior Tabansky המכון למחקרי ביטחון לאומי THE INSTITUTE FOR NATIONAL SECURcITY STUDIES INCORPORATING THE JAFFEE bd CENTER FOR STRATEGIC STUDIES Military and Strategic Affairs Volume 4 | No. 3 | December 2012 CONTENTS A Blueprint for Cyber Deterrence: Building Stability through Strength | 3 Frank J. Cilluffo, Sharon L. Cardash, and George C. Salmoiraghi On Nuclear War: Deterrence, Escalation, and Control | 25 Stephen J. Cimbala Israel’s Second Lebanon War Reconsidered | 45 Benjamin S. Lambeth In Defense of Stuxnet | 65 James A. Lewis Iran and Cyberspace Warfare | 77 Gabi Siboni and Sami Kronenfeld The Growing Power of the Indian Navy: Westward Bound | 101 Yuval Zur, Tamir Magal, and Nadav Kedem Cybercrime: A National Security Issue? | 117 Lior Tabansky The purpose of Military and Strategic Affairs is to stimulate Military and and enrich the public debate on military issues relating to Strategic Affairs Israel’s national security. Military and Strategic Affairs is a refereed journal published three times a year within the framework of the Military and Strategic Affairs Program at the Institute for National Security Studies. Articles are written by INSS researchers and guest contributors.
    [Show full text]
  • Stp 21-1-Smct
    STP 21-1-SMCT HEADQUARTERS DEPARTMENT OF THE ARMY Soldier’s Manual of Common Tasks Warrior Skills Level 1 OCTOBER 2006 DISTRIBUTION RESTRICTION: Approved for public release; distribution is unlimited. WARRIOR CREED I am an American Soldier. I am a Warrior and a member of a team. I serve the people of the United States and live the Army Values. I will always place the mission first. I will never accept defeat. I will never quit. I will never leave a fallen comrade. I am disciplined, physically and mentally tough, trained, and proficient in my warrior tasks and drills. I always maintain my arms, my equipment, and myself. I am an expert and I am a professional. I stand ready to deploy, engage, and destroy the enemies of the United States of America in close combat. I am a guardian of freedom and the American way of life. I am an American Soldier. This publication is available at Army Knowledge Online (www.us.army.mil) and General Dennis J. Reimer Training and Doctrine Digital Library at (www.train.army.mil). *STP 21-1-SMCT Soldier Training Publication Headquarters No. 21-1-SMCT Department of the Army Washington, DC, 2 October 2006 SOLDIER'S MANUAL OF COMMON TASKS WARRIOR SKILLS LEVEL 1 TABLE OF CONTENTS Page PREFACE .................................................................................x Chapter 1 Introduction .......................................................................... 1-1 Chapter 2 Training Guide...................................................................... 2-1 Chapter 3 Warrior Skills Level 1 Tasks................................................ 3-1 Subject Area 1: Individual Conduct and Laws of War............................. 3-1 181-105-1001 Comply with the Law of War and the Geneva and Hague Conventions................................................................
    [Show full text]
  • M.S.A.I. All Rights Reserved 0
    Military Studies and Analysis Institute | M.S.A.I. All Rights Reserved 0 he establishment of an effective and dominant naval power for the Islamic Republic of Iran after the end of the Iraqi imposed war on Iran and on the basis of its valuable T experiences has been a high priority. After the eight-year war against our country and observing the performance of missiles such as the Harpoon used by the Iranian Navy and the Exocet French missile used by the Iraqis, as well as the Silkworm missile used by both sides of the war, significant investment was made in the Ministry of Defense and the Armed Forces to design and manufacture anti-ship missiles with various ranges. Especially about the types of cruises that can be launched from the three main categories of launchers: an aircraft, ship, submarine, or ground based launcher. The main feature of Cruise missiles is that they can fly at low altitudes (generally less than 30 meters). For this kind of missiles, the longtime of flight is dedicated to the Cruise phase that is a phase of flight path that’s why the cruise was chosen for this missile. The speed of most cruise missiles is lower than that of sound. In some new instances, the speed in the final flight phase (terminal phase) is higher than the speed of sound, and in some Military Studies and Analysis Institute | M.S.A.I. All Rights Reserved 1 cases the speed is higher than the speed of sound at the beginning of the flight.
    [Show full text]
  • Timeline of Military and Security Events Semira N
    Timeline of Military and Security Events Semira N. Nikou 1979 May 5 – The Revolutionary Guards were established by decree of Ayatollah Ruhollah Khomeini. Aug. 10 – Iran canceled a $9 billion arms deal with the United States made during the shah's reign. Aug. 18 – Khomeini appointed himself commander-in-chief and ordered a general mobilization against Iran’s Kurdish nationalists. Fighting in northern Kurdistan continued until the fall of Kurdish strongholds on September 3. 1980 Feb. 19 – Ayatollah Khomeini appointed President Abolhassan Bani-Sadr commander- in-chief of the military. Bani-Sadr was deposed on June 10, 1981. Sept. 22 – Iraqi troops invaded Iran, following weeks of clashes between their Iraqi forces along the border. Baghdad's conditions for peace included Iranian recognition of Iraqi claims to the entire Shatt al-Arab waterway and disputed territory, and the return of three Persian Gulf islands occupied by Iran in 1971. Iraq quickly penetrated deep into Iranian territory. Oil installations were targeted by both nations, leading to a suspension in oil shipments. PLO chairman Yasir Arafat began the first mediation effort on September 25, which was followed by a similar attempt by an Islamic Conference Organization delegation. Sept. 28 – The U.N. Security Council passed a resolution calling on both nations to cease hostilities. Oct. 1 – Iran said it would do its part to keep the Strait of Hormuz open to oil-tanker traffic in spite of regional hostility. Heavy bombardment was reported on cities in both nations, while fighting on the ground centered around the oil-rich southern cities of Khorramshahr and Abadan.
    [Show full text]