ABSOLUTE FINAL ONEIL Dissertation

Total Page:16

File Type:pdf, Size:1020Kb

ABSOLUTE FINAL ONEIL Dissertation UCLA UCLA Electronic Theses and Dissertations Title Dealing with the Devil? Explaining the Onset of Strategic State-Terrorist Negotiations Permalink https://escholarship.org/uc/item/5td7j61f Author O'Neil, Siobhan Publication Date 2014 Peer reviewed|Thesis/dissertation eScholarship.org Powered by the California Digital Library University of California UNIVERSITY OF CALIFORNIA Los Angeles Dealing with the Devil? Explaining the Onset of Strategic State-Terrorist Negotiations A dissertation submitted in partial satisfaction of the requirements for the degree Doctor of Philosophy in Political Science by Siobhan O’Neil 2014 ABSTRACT OF THE DISSERTATION Dealing with the Devil? Explaining the Onset of Strategic State-Terrorist Negotiations by Siobhan O’Neil Doctor of Philosophy in Political Science University of California, Los Angeles, 2014 Professor Arthur Stein, Chair Statesmen are quick to declare that they will not negotiate with terrorists. Yet, the empirical record demonstrates that, despite statements to the contrary, many states do eventually negotiate with their terrorist challengers. My dissertation examines the circumstances under which states employ strategic negotiations with terrorist groups to resolve violent conflict. I argue that only when faced with a credible and capable adversary and afforded relative freedom of action domestically will states negotiate with terrorists. To test this theory, I use a multi-method approach that incorporates a cross- national study of all known strategic negotiations from 1968-2006 and three within-case studies (Israel, Northern Ireland, and the Philippines). Initial results suggest that negotiations are employed in about 13% of terrorist campaigns, certain types of groups are privileged, and negotiations only occur when statesmen can overcome domestic ii obstacles, namely public and veto player opposition. This study seeks to make definitive contributions to both science and society: Its findings will advance the literatures on conflict processes and policymaking, while informing the policy debate on effective counterterrorism strategies, an especially timely contribution given ongoing efforts to negotiate with terrorist groups in Afghanistan, Colombia, and Israel. iii The dissertation of Siobhan O’Neil is approved. Marc Trachtenberg James DeNardo Jessica Stern Arthur Stein, Committee Chair University of California, Los Angeles 2014 iv Contents Chapter 1 – Introduction…………………………………………………………………1 1.1 Introduction……………………………………………………………………………1 1.2 Key Argument…………………………………………………………………………2 1.3 The Study’s Parameters……………………………………………………………….3 1.4 Assumptions………………………………………………………………………….15 1.5 Theory…………………………………………………………………………...…...18 1.6 Methodology…………………………………………………………………………21 1.7 Data Analysis………………………………………………………………………...22 1.8 Case Studies………………………………………………………………………….29 1.9 Academic and Policy Relevance……………………………………………………..31 1.10 What Follows……………………………………………………………………….32 Chapter 2 – Negotiating with Terrorists is Self-Defeating: The Conventional Wisdom and its Critics…………………………………………………………………………….33 2.1 Introduction…………………………………………………………………………..33 2.2 Normative Arguments………………………………………………………………..36 2.3 Explanatory Arguments……………………………………………………………...39 2.4 Critiques……………………………………………………………………………...40 2.5 Conclusion…………………………………………………………………………...57 Chapter 3 - The Logic of Negotiating with Terrorist Groups………………………….59 3.1 Introduction…………………………………………………………………………..59 3.2 Strategic Environment……………………………………………………………….63 3.3 Domestic Political Environment……………………………………………………..86 3.4 The Role of Third Parties?.........................................................................................115 3.5 Conclusion………………………………………………………………………….116 Chapter 4 - Israel Case Study………………………………………………………….119 4.1 Introduction…………………………………………………………………………119 4.2 History of the Israeli-Palestinian Conflict & Counterterrorism Responses………...121 4.3 Strategic Environment……………………………………………………………...172 4.4 Domestic Political Environment……………………………………………………193 4.5 Third Party Influence? ……………………………………………………………..222 4.6 Conclusion………………………………………………………………………….225 Chapter 5 – UK Case Study (Northern Ireland)………………………………………228 5.1 Introduction…………………………………………………………………………228 5.2 Overview of the Troubles & UK Counterterrorism Policy Responses……………..231 5.3 Strategic Environment……………………………………………………………...278 v 5.4 Domestic Political Environment……………………………………………………302 5.5 Third Party Influence?...............................................................................................325 5.6 Conclusion………………………………………………………………………….329 Chapter 6 – The Philippines Case Study…………...………………………………….336 6.1 Introduction…………………………………………………………………………336 6.2 The Moro and Communist Conflicts & Policy Responses…………………………339 6.3 Strategic Environment……………………………………………………………...372 6.4 Domestic Political Environment……………………………………………………399 6.5 Third Parties?.............................................................................................................428 6.6 Conclusion………………………………………………………………………….432 Chapter 7 – Conclusion………………………………………………………………..437 7.1 The Puzzle …………………………………………………………………………..437 7.2 Summary of Findings……………………………………………………………….438 7.3 Case Studies………………………………………………………………………...441 7.4 Cross-case Analysis………………………………………………………………...449 7.5 Implications for Academia…………………………………………………………455 7.6 Future Research…………………………………………………………………….456 7.7 Implications for Policy……………………………………………………………..460 List of Figures 1. British Public Opinion on Northern Ireland’s Future………………………………..306 vi Acknowledgements It is often said that success has many parents. This maxim rings true with regard to my doctoral dissertation. I owe a sincere debt of gratitude to the members of my dissertation committee, Art Stein, Marc Trachtenberg, Jim DeNardo, and Jessica Stern, who provided thoughtful feedback and continued support. I owe a special thanks to Marc Trachtenberg for his help procuring financial support during a critical time in my studies. The faculty and staff of the UCLA Department of Political Science, particularly Joseph Brown, offered years of academic counseling, instruction, and administrative support, without which I would not have been able to finish this degree. During my the course of my research and my fieldwork, many people generously gave me their time and I am grateful for their guidance and insight into the topic. I owe sincere thanks to the foundations that helped fund this research, particularly the Institute for Global Conflict and Cooperation (IGCC), UCLA International Institute, and Bradley Foundation, as well as the Summer Workshop on the Analysis of Military Operations and Strategy (SWAMOS), Summer Institute on Conducting Archival Research (SICAR), UCLA Graduate Research Travel Grant Program, UCLA Graduate Research Mentorship Program, Partners for a Progressive Israel Symposium, and New Era Policy Conference. My colleagues in the Department and at UCLA volunteered their feedback and shared their camaraderie. A special thanks goes to Hannah Vaughan, Liza Taylor, Gilda Rodríguez for their friendship and encouragement, and to Eric Kramon and Michael Tesler, for their statistics-related support. Thank you to my friends and family – especially my siblings, Jamie, Margot, Rory, Molly and Pat and my LP, Lauren - for vii dutifully asking about my dissertation over the last seven years (alas something new to talk about!) and accepting the confines of my student budget when making plans. Most importantly, this dissertation is dedicated to the two men without whom I would not have been able to finish this degree: My loving husband Simon believed in me and my project, even when I didn’t. Without his gentle prodding and feedback, I’m not sure I would have finished this dissertation. My father offered his wide-ranging support over the course of my degree despite his personal misgivings about political scientists. Lastly, I lost my mother while I was writing this dissertation. I wish she were here to see this day – a PhD and the prospects of getting another adult child off the family phone plan! viii Biographical Sketch Prior to commencing her studies at UCLA, Siobhan O’Neil worked in the security and intelligence fields. In the wake of the September 11th attacks, she worked for the newly created state homeland security agencies in New York and New Jersey, helping state and local governments build their capacity to detect, prevent, and recover from terrorist attacks. She later served as the analyst for domestic security and intelligence at the Congressional Research Service (CRS), identifying emerging threats and evaluating possible policy responses for Congress. During the course of her doctoral studies, Siobhan worked as a research analyst at the RAND Corporation on projects pertaining to counterinsurgency transitions, insurgent motivations, and civil-military coordination during a domestic chemical, biological, radiological, nuclear, and explosive (CBRNE) attacks. Siobhan has an MA in Homeland Security and Defense from the Naval Postgraduate School, an M.Litt. in International Security Studies from the University of St. Andrews, and a BA in Political Science and History from the College of the Holy Cross. ix “Of course, if you want to make peace, you don't talk to your friends. You talk to your enemies.” Moshe Dayan1 1 Dayan, then Israel’s Minister of Foreign Affairs, made the comment when interviewed by Newsweek. Interestingly, the rest of the quote reads, “But the question is whom do we want
Recommended publications
  • Nelson-Mandelas-Legacy.Pdf
    Nelson Mandela’s Legacy What the World Must Learn from One of Our Greatest Leaders By John Carlin ver since Nelson Mandela became president of South Africa after winning his Ecountry’s fi rst democratic elections in April 1994, the national anthem has consisted of two songs spliced—not particularly mellifl uously—together. One is “Nkosi Sikelel’ iAfrika,” or “God Bless Africa,” sung at black protest ral- lies during the forty-six years between the rise and fall of apartheid. The other is “Die Stem,” (“The Call”), the old white anthem, a celebration of the European settlers’ conquest of Africa’s southern tip. It was Mandela’s idea to juxtapose the two, his purpose being to forge from the rival tunes’ discordant notes a powerfully symbolic message of national harmony. Not everyone in Mandela’s party, the African National Congress, was con- vinced when he fi rst proposed the plan. In fact, the entirety of the ANC’s national executive committee initially pushed to scrap “Die Stem” and replace it with “Nkosi Sikelel’ iAfrika.” Mandela won the argument by doing what defi ned his leadership: reconciling generosity with pragmatism, fi nding common ground between humanity’s higher values and the politician’s aspiration to power. The chief task the ANC would have upon taking over government, Mandela reminded his colleagues at the meeting, would be to cement the foundations of the hard-won new democracy. The main threat to peace and stability came from right-wing terrorism. The way to deprive the extremists of popular sup- port, and therefore to disarm them, was by convincing the white population as a whole President Nelson Mandela and that they belonged fully in the ‘new South Francois Pienaar, captain of the Africa,’ that a black-led government would South African Springbok rugby not treat them the way previous white rulers team, after the Rugby World Cup had treated blacks.
    [Show full text]
  • MARITIME TERRORISM THREAT in SOUTHEAST ASIA and ITS CHALLENGES by ME6 Joses Yau Meng Wee
    features 32 MARITIME TERRORISM THREAT IN SOUTHEAST ASIA AND ITS CHALLENGES by ME6 Joses Yau Meng Wee Abstract: The threat of terrorism is always present, but the public was only given a wake-up call to the devastating impacts of terrorism after the September 11 attacks in the United States (US). Since then, many countries have stepped up their counter-terrorism efforts and measures. For example, the Association of Southeast Asian Nations (ASEAN) adopted a comprehensive approach to improve the regional security. In this essay, the author examines the terrorism threat in Southeast Asia, exploring the possible scenarios of a maritime terrorist attack in the region and thoroughly assesses the region’s counter-terrorism efforts that have been put in place. The author also introduces an Opportunity, Capability and Intent (OCI) framework as a form of threat assessment, to affirm his stand that the terrorist threat in Southeast Asia is indeed very real. Keywords: Terrorism; Counter-terrorism; Efforts and Measures; Regional Security; Threat Assessment INTRODUCTION This essay seeks to ascertain a common definition of ‘Maritime Terrorism’ and followed on to affirm The September 11 attacks in the US underscored that the terrorism threat in Southeast Asia is real the devastating effects of terrorism to the world. through the use of the Opportunity, Capability and The attacks on USS Cole in 2000, MV Limburg in Intent (OCI) threat assessment framework. Next, 2002, SuperFerry 14 in 2004 and the M Star in 2010 the essay will discuss eight probable scenarios of a are classified as acts of ‘Maritime Terrorism’, a stark maritime terrorist attack in Southeast Asia and attempt reminder that the world’s waterways continue to be to examine the credibility of each scenario.
    [Show full text]
  • Cambridge University Press 978-1-107-13504-8 — Insurgencies and Counterinsurgencies Edited by Beatrice Heuser , Eitan Shamir Index More Information
    Cambridge University Press 978-1-107-13504-8 — Insurgencies and Counterinsurgencies Edited by Beatrice Heuser , Eitan Shamir Index More Information Index 9/11 Attacks, 45, 148, 360 Al-Dawla al-Islamiyya fi al-`Iraq, 299 Abbas, Ferhat, 196 Alderson, Alexander, 29, 41 Abbas, Mahmoud, 242 Aleppo, 289, 294–6, 300–1, 303–4, 307 Aberystwyth University, 10 Algeria, 20, 47–54, 57–73, 126–7, 136, Abu Ghraib prison, 144 193–9, 202, 204–5, 207–9, 211, 226–7, Abu Marzuq, Mousa, 238 285, 326, 328, 337–9, 347–8, 354, Abu-Mazen. See Abbas, Mahmoud 356–8, 365 Adams, Gerry, 218 Autonomous Zone of Algiers, 205 Aden, 26, 30, 38 Nationalist uprisings 1945, 197 Acheson, Dean, 322 Palestro, 199 Aerial Rocket Artillery, 132 Tribal uprisings of 1845, 1871, 1864, Aeschylus, 2 1881 and 1916, 196 Afghan National Army, 261–2 Algerian Front de Libération nationale. Afghan war, 89 See FLN Afghanistan, 20, 25–6, 30, 41, 46, 74, 76, 81, Algerian National Liberation Army. 88, 136–44, 146–8, 246–8, 251–2, 254– See ALN 6, 259–61, 263–5, 306, 348, 354, 356–7, Algerian National Movement. See MNA 359, 362, 365–6, 370 Algerian People’s Party, 198 Herat, 262 Algerian War 1954–1962, 19, 126, 193–5, Soviet withdrawal 1989, 261 211, 314, 330, 336, 349, 361 Africa, 28, 47, 51, 53, 73, 223, 334, 341, Algerian wars, 366 346, 364 Algiers, 65–7, 193, 199, 204–5 African slave trade, 114 Al-Haraka al-Tashihiyya, 294 Afrika Korps, 171 Allard, General Robert, 66 Age of Battles, 10 Alloush, Zahran, 305 Agent Orange, 131 ALN, 49, 63, 65–6, 194–211, 354 Agitprop, 229 Alon, Yigal, 170 AGM-114 Hellfire, 145 Al-Qaeda, 45, 88, 141, 147, 240–1, 264 Aguinaldo, Emilio, 119–20 Al-Qaeda in the Sinai Peninsula, 240 Air France, 176 Al-Qaeda, 299 AirLand Battle, 135 Al-Qaeda in Iraq, 299 Aït Ahmed, Hocine, 198–9 Al-Quds Brigades, 235 AKP, 306 American Civil War, 5, 114–15, 120–2, Al Aqsa Martyrs’ Brigades, 218 223, 337 Al Qaeda, 221, 338 American Revolution, 113–16, 145 Kidnapping Manual 2004, 344 Amir ul Moomineen.
    [Show full text]
  • Yale Law School 2010–2011
    BULLETIN OF YALE UNIVERSITY BULLETIN OF YALE UNIVERSITY Periodicals postage paid New Haven ct 06520-8227 New Haven, Connecticut Yale Law School 2010–2011 Yale Law School Yale 2010–2011 BULLETIN OF YALE UNIVERSITY Series 106 Number 10 August 10, 2010 BULLETIN OF YALE UNIVERSITY Series 106 Number 10 August 10, 2010 (USPS 078-500) The University is committed to basing judgments concerning the admission, education, is published seventeen times a year (one time in May and October; three times in June and employment of individuals upon their qualifications and abilities and a∞rmatively and September; four times in July; five times in August) by Yale University, 2 Whitney seeks to attract to its faculty, sta≠, and student body qualified persons of diverse back- Avenue, New Haven CT 0651o. Periodicals postage paid at New Haven, Connecticut. grounds. In accordance with this policy and as delineated by federal and Connecticut law, Yale does not discriminate in admissions, educational programs, or employment against Postmaster: Send address changes to Bulletin of Yale University, any individual on account of that individual’s sex, race, color, religion, age, disability, PO Box 208227, New Haven CT 06520-8227 status as a special disabled veteran, veteran of the Vietnam era, or other covered veteran, or national or ethnic origin; nor does Yale discriminate on the basis of sexual orientation Managing Editor: Linda Koch Lorimer or gender identity or expression. Editor: Lesley K. Baier University policy is committed to a∞rmative action under law in employment of PO Box 208230, New Haven CT 06520-8230 women, minority group members, individuals with disabilities, special disabled veterans, veterans of the Vietnam era, and other covered veterans.
    [Show full text]
  • Israel Resource Cards (Digital Use)
    WESTERN WALL ַה ּכֹו ֶתל ַה ַּמ ַעָר ִבי The Western Wall, known as the Kotel, is revered as the holiest site for the Jewish people. A part of the outer retaining wall of the Second Temple that was destroyed by the Romans in 70 CE, it is the place closest to the ancient Holy of Holies, where only the Kohanim— —Jewish priests were allowed access. When Israel gained independence in 1948, Jordan controlled the Western Wall and all of the Old City of Jerusalem; the city was reunified in the 1967 Six-Day War. The Western Wall is considered an Orthodox synagogue by Israeli authorities, with separate prayer spaces for men and women. A mixed egalitarian prayer area operates along a nearby section of the Temple’s retaining wall, raising to the forefront contemporary ideas of religious expression—a prime example of how Israel navigates between past and present. SITES AND INSIGHTS theicenter.org SHUK ׁשוּק Every Israeli city has an open-air market, or shuk, where vendors sell everything from fresh fruits and vegetables to clothing, appliances, and souvenirs. There’s no other place that feels more authentically Israeli than a shuk on Friday afternoon, as seemingly everyone shops for Shabbat. Drawn by the freshness and variety of produce, Israelis and tourists alike flock to the shuk, turning it into a microcosm of the country. Shuks in smaller cities and towns operate just one day per week, while larger markets often play a key role in the city’s cultural life. At night, after the vendors go home, Machaneh Yehuda— —Jerusalem’s shuk, turns into the city’s nightlife hub.
    [Show full text]
  • 2019-20 Annual Report
    PRINCETON UNIVERSITY DEPARTMENT AND PROGRAM OF EAST ASIAN STUDIES Annual Report 2019-2020 1 COVER: The wooden doors to 202 Jones. Photo taken by Martin Kern. 2 Annual Report 2019-20 Contents Director’s Letter 4 Department and Program News 6 Language Programs 8 Undergraduates 11 Graduate Students 14 Faculty 18 Events 24 Summer Programs 26 Affiliated Programs 29 Libraries & Museum 34 3 Director’s Letter, 2019-20 In normal years, the Director’s Letter is a retrospective of the year in East Asian Studies—but where to begin? Annual disasters and upheavals are standard topics in traditional East Asian chronicles. By June of 2020 (a gengzi 庚子 year), we had already lived through more than our share: the coronavirus pandemic, severe economic downturn, government inaction and prevarication, Princeton’s shift to online teaching, dislocation of undergraduate and graduate life, shuttering of libraries and labs, disruption to travel, study, and research for students, staff, and faculty, the brutal murder of George Floyd, and the international renaissance of the Black Lives Matter movement. invigorate campus intellectual life, completing book This spring semester, the usual hum of summer manuscripts, or starting new projects. The heaviest burden, programming and plans for next academic year grew no doubt, fell on our language instructors. The faculty quiet, and many EAS projects were cancelled, postponed, in Chinese, Japanese, and Korean innovated non-stop to shifted online, or put on hold. As this Annual Report goes insure that, in the era of Zoom, students would remain fully to press, plans for undergraduate residence on campus engaged in all four language skills of speaking, listening, and the format for classes in fall of 2020 are still being reading, and writing.
    [Show full text]
  • PRENEGOTIATION Ln SOUTH AFRICA (1985 -1993) a PHASEOLOGICAL ANALYSIS of the TRANSITIONAL NEGOTIATIONS
    PRENEGOTIATION lN SOUTH AFRICA (1985 -1993) A PHASEOLOGICAL ANALYSIS OF THE TRANSITIONAL NEGOTIATIONS BOTHA W. KRUGER Thesis presented in partial fulfilment of the requirements for the degree of Master of Arts at the University of Stellenbosch. Supervisor: ProfPierre du Toit March 1998 Stellenbosch University http://scholar.sun.ac.za DECLARATION I, the undersigned, hereby declare that the work contained in this thesis is my own original work and that I have not previously in its entirety or in part submitted it at any university for a degree. Signature: Date: The fmancial assistance of the Centre for Science Development (HSRC, South Africa) towards this research is hereby acknowledged. Opinions expressed and conclusions arrived at, are those of the author and are not necessarily to be attributed to the Centre for Science Development. Stellenbosch University http://scholar.sun.ac.za OPSOMMING Die opvatting bestaan dat die Suid-Afrikaanse oorgangsonderhandelinge geinisieer is deur gebeurtenisse tydens 1990. Hierdie stuC.:ie betwis so 'n opvatting en argumenteer dat 'n noodsaaklike tydperk van informele onderhandeling voor formele kontak bestaan het. Gedurende die voorafgaande tydperk, wat bekend staan as vooronderhandeling, het lede van die Nasionale Party regering en die African National Congress (ANC) gepoog om kommunikasiekanale daar te stel en sodoende die moontlikheid van 'n onderhandelde skikking te ondersoek. Deur van 'n fase-benadering tot onderhandeling gebruik te maak, analiseer hierdie studie die oorgangstydperk met die doel om die struktuur en funksies van Suid-Afrikaanse vooronderhandelinge te bepaal. Die volgende drie onderhandelingsfases word onderskei: onderhande/ing oor onderhandeling, voorlopige onderhande/ing, en substantiewe onderhandeling. Beide fases een en twee word beskou as deel van vooronderhandeling.
    [Show full text]
  • Issue Brief Template
    9 February 2010 No. 3 WESTERN SAHARA Expected Council Action In February the Personal Envoy of the Secretary-General for Western Sahara, Christopher Ross, will coordinate a meeting between Morocco and the Polisario Front. This meeting follows the UN’s proposal to hold informal direct talks over the status of Western Sahara. The Security Council is not expected to take any action in February, but members are watching developments closely bearing in mind that the mandate of the UN peacekeeping operation MINURSO, expires in April. Key Recent Developments On 2 February, the Secretary-General issued a statement welcoming the parties' decision to agree to the proposal for informal talks made by his Special Envoy. The talks will take place on 10-11 February outside New York and allow the parties to renew each other’s positions on Western Sahara, including: • Morocco's proposal that Western Sahara should be an autonomous region within Morocco; and • Polisario Front’s position that the territory’s final status can only be decided in a referendum that includes independence as a legitimate option. In December 2009 some Council members requested a briefing from the Secretariat on Western Sahara. The briefing was agreed upon just before Christmas but has not been scheduled as of this writing. On 30 April 2009, the Council extended the mandate of the UN Mission for the Referendum in Western Sahara (MINURSO) through resolution 1871. The Council also called on the parties to continue negotiations in good faith, with a view to achieving political solution. MINURSO has been in place since 1991.
    [Show full text]
  • Strategic Insights No 10 DRAFT
    Towards a European maritime security policy Wengelin, Mattias Published in: Strategic Insights 2008 Link to publication Citation for published version (APA): Wengelin, M. (2008). Towards a European maritime security policy. Strategic Insights, 6-13. Total number of authors: 1 General rights Unless other specific re-use rights are stated the following general rights apply: Copyright and moral rights for the publications made accessible in the public portal are retained by the authors and/or other copyright owners and it is a condition of accessing publications that users recognise and abide by the legal requirements associated with these rights. • Users may download and print one copy of any publication from the public portal for the purpose of private study or research. • You may not further distribute the material or use it for any profit-making activity or commercial gain • You may freely distribute the URL identifying the publication in the public portal Read more about Creative commons licenses: https://creativecommons.org/licenses/ Take down policy If you believe that this document breaches copyright please contact us providing details, and we will remove access to the work immediately and investigate your claim. LUND UNIVERSITY PO Box 117 221 00 Lund +46 46-222 00 00 Risk Intelligence Strategic Insights Global Maritime Security Analysis No 10 - 2008 USCGC Bertholf during sea trials 8 February 2008 (USCG) Content § US Maritime Security Policy Revisited § Towards a European Maritime Security Policy? § The Maritime Operations of the Liberation Tigers of Tamil Eelam (LTTE): The Sea Tigers and Sea Pigeons § Marine Insurance for Piracy or Terrorism – Drawing a line in Water Strategic Insights No.
    [Show full text]
  • Maritime Terrorism in the Indian Ocean Rim
    Maritime Terrorism in the Indian Ocean Rim: Peering into the Darkness Keegan B. Steele California State University Maritime Academy April, 2017 Via CIMSEC™ MARITIME TERRORISM IN THE INDIAN OCEAN RIM Steele 1 Abstract The Indian Ocean Rim (IOR) has become a major geopolitical and security interest in the 21st century. One of the biggest issues that faces the Indian Ocean today is the swift growth of maritime related security threats. This is a major concern to not only first world nations like the United States, but also to developing states in the region. Due to the lack of stability in the region, the Horn of Africa and the Arabian Peninsula have been a breeding ground for violent non-state actors. Piracy, illicit trade, and terrorism are just a few of the non traditional maritime security threats. With instability in an already pirate-infested area, the threat of a growing maritime terrorism domain is a looming and haunting notion. This thesis will look into the history of maritime based terrorist attacks, and the potential for up and coming non-state actors, terrorist organizations, and organized crime in a region of instability. MARITIME TERRORISM IN THE INDIAN OCEAN RIM Steele 2 Introduction Maritime terrorism is a real and current threat to the world’s maritime industry. Acts of terrorism have been committed in the past, that have not only been devastating to infrastructure, but also have caused loss of life. According to (Nincic, 2012), maritime terrorism represents a very small percentage of all terrorist attacks. “A similar analysis of the RAND terrorism database supports these figures; of the 40,126 terrorist incidents recorded between 1968 and 2007, only 136 (0.34%) were against the maritime domain” (Nincic, 2012, para.
    [Show full text]
  • Dziadok Mikalai 1'St Year Student
    EUROPEAN HUMANITIES UNIVERSITY Program «World Politics and economics» Dziadok Mikalai 1'st year student Essay Written assignment Course «International relations and governances» Course instructor Andrey Stiapanau Vilnius, 2016 The Troubles (Northern Ireland conflict 1969-1998) Plan Introduction 1. General outline of a conflict. 2. Approach, theory, level of analysis (providing framework). Providing the hypothesis 3. Major actors involved, definition of their priorities, preferences and interests. 4. Origins of the conflict (historical perspective), major actions timeline 5. Models of conflicts, explanations of its reasons 6. Proving the hypothesis 7. Conclusion Bibliography Introduction Northern Ireland conflict, called “the Troubles” was the most durable conflict in the Europe since WW2. Before War in Donbass (2014-present), which lead to 9,371 death up to June 3, 20161 it also can be called the bloodiest conflict, but unfortunately The Donbass War snatched from The Troubles “the victory palm” of this dreadful competition. The importance of this issue, however, is still essential and vital because of challenges Europe experience now. Both proxy war on Donbass and recent terrorist attacks had strained significantly the political atmosphere in Europe, showing that Europe is not safe anymore. In this conditions, it is necessary for us to try to assume, how far this insecurity and tensions might go and will the circumstances and the challenges of a international relations ignite the conflict in Northern Ireland again. It also makes sense for us to recognize that the Troubles was also a proxy war to a certain degree 23 Sources, used in this essay are mostly mass-media articles, human rights observers’ and international organizations reports, and surveys made by political scientists on this issue.
    [Show full text]
  • National Security Capability Review: a Changing Security Environment
    House of Lords House of Commons Joint Committee on the National Security Strategy National Security Capability Review: A changing security environment First Report of Session 2017–19 Report, together with formal minutes relating to the report Ordered by the House of Lords to be printed 19 March 2018 Ordered by the House of Commons to be printed 19 March 2018 HL Paper 104 HC 756 Published on 23 March 2018 by authority of the House of Lords and the House of Commons The Joint Committee on the National Security Strategy The Joint Committee on the National Security Strategy is appointed by the House of Lords and the House of Commons to consider the National Security Strategy. Current membership House of Lords Lord Brennan (Labour) Lord Campbell of Pittenweem (Liberal Democrat) Lord Hamilton of Epsom (Conservative) Lord Harris of Haringey (Labour) Baroness Healy of Primrose Hill (Labour) Baroness Henig (Labour) Lord King of Bridgwater (Conservative) Baroness Lane-Fox of Soho (Crossbench) Lord Powell of Bayswater (Crossbench) Lord Trimble (Conservative) House of Commons Margaret Beckett MP (Labour, Derby South) (Chair) Yvette Cooper MP (Labour, Normanton, Pontefract and Castleford) James Gray MP (Conservative, North Wiltshire) Mr Dominic Grieve MP (Conservative, Beaconsfield) Dan Jarvis MP (Labour, Barnsley Central) Dr Julian Lewis MP, (Conservative, New Forest East) Angus Brendan MacNeil MP (Scottish National Party, Na h-Eileanan an Iar) Robert Neill MP (Conservative, Bromley and Chislehurst) Rachel Reeves MP (Labour, Leeds West) Tom Tugendhat MP (Conservative, Tonbridge and Malling) Stephen Twigg MP (Labour (Co-op), Liverpool, West Derby) Theresa Villiers MP (Conservative, Chipping Barnet) Powers The Committee has the power to require the submission of written evidence and documents, to examine witnesses, to meet at any time (except when Parliament is prorogued or dissolved), to adjourn from place to place within the United Kingdom, to appoint specialist advisers, and to make Reports to both Houses.
    [Show full text]