Rescuing Policy and Terror Victims: a Concerted Approach to the Ransom Dilemma

Total Page:16

File Type:pdf, Size:1020Kb

Rescuing Policy and Terror Victims: a Concerted Approach to the Ransom Dilemma Michigan Journal of International Law Volume 37 Issue 4 2016 Rescuing Policy and Terror Victims: A Concerted Approach to the Ransom Dilemma C. Elizabeth Bundy University of Michigan Law School Follow this and additional works at: https://repository.law.umich.edu/mjil Part of the International Law Commons, Military, War, and Peace Commons, and the National Security Law Commons Recommended Citation C. E. Bundy, Rescuing Policy and Terror Victims: A Concerted Approach to the Ransom Dilemma, 37 MICH. J. INT'L L. 717 (2016). Available at: https://repository.law.umich.edu/mjil/vol37/iss4/4 This Note is brought to you for free and open access by the Michigan Journal of International Law at University of Michigan Law School Scholarship Repository. It has been accepted for inclusion in Michigan Journal of International Law by an authorized editor of University of Michigan Law School Scholarship Repository. For more information, please contact [email protected]. NOTE RESCUING POLICY AND TERROR VICTIMS: A CONCERTED APPROACH TO THE RANSOM DILEMMA C. Elizabeth Bundy* TABLE OF CONTENTS THE VALUE OF A HOSTAGE: PROFITABLE TRADE, PRECIOUS TREASURE ............................................. 717 I. AN INTERNATIONAL LEGAL FRAMEWORK FOR TERROR–DRIVEN KIDNAPPINGS ......................... 720 A. Terrorist Financing: An International Offense ........ 720 B. Implications of the Assets Freeze: Ransom as a Form of Terrorist Financing?.............................. 723 II. STATE PRACTICE: POLICY–ORIENTED APPROACHES AND SHORTCOMINGS ......................................... 728 A. “Hard” Policy: No Concessions ..................... 729 B. “Soft” Policy: A Permissive Approach, or Concealing Concessions? ....................................... 733 C. Bridging the Gap: A Deep Divide ................... 736 III. THE WAY FORWARD ................................... 737 A. State–centered Model: Responsibility–Shifting to the States ............................................... 737 B. Ransom or Rescue? ................................. 740 CONCLUSION ................................................... 745 THE VALUE OF A HOSTAGE: PROFITABLE TRADE, PRECIOUS TREASURE1 After months in captivity with twenty-two other hostages, journalist James Foley became the first to be publicly beheaded by the Islamic State * J.D., May 2016, University of Michigan Law School. Along with the MJIL editorial members and J.D. Andrew Sand, I would like to thank Professors Bromberg, Hakimi, and Ratner for their insightful comments, and Francisco Ceballos for his continued support and encouragement. All views expressed herein (along with any errors) remain my own. 1. Nasser al-Wuhayshi, Al-Qaida Papers: How to Run a State, Second Letter from Abu Basir to Emir of Al-Qaida in the Islamic Maghreb, http://hosted.ap.org/specials/interact ives/_international/_pdfs/al-qaida-papers-how-to-run-a-state.pdf (“Kidnapping hostages is an easy spoil, which I may describe as a profitable trade and a precious treasure.”). Al- Wuhayshi, leader of al-Qaida in the Arabian Peninsula, also wrote that “most of the battle costs, if not all, were paid from through the spoils,” and that “almost half the spoils came from hostages,” indicating the importance of kidnapping operations to the organization’s funding. 717 718 Michigan Journal of International Law [Vol. 37:717 group (Daesh)2 on August 19, 2014.3 His death was preceded by extended negotiations for the release of fifteen other captives;4 shortly thereafter, most of Foley’s hostage-mates were freed in exchange for substantial and varying, though largely undisclosed, amounts.5 What is striking about this group is that, of at least twenty-three hostages from twelve states held together over fourteen months, only the captives of countries refusing to concede ransoms were ultimately executed.6 This tragic chapter demonstrates the difficulties underlying states’ di- vergent approaches to hostage situations. The execution of several nation- als of no-concessions states on the one hand, together with the ransomed release of their fellow hostages on the other, call into question the effec- tiveness of the United States’ and United Kingdom’s strict no-concessions approach in deterring kidnappings of their own nationals. Conversely, the payment of ransoms by states favoring a more flexible approach reinforces the ability of perpetrators to carry out further kidnapping operations. From a legal standpoint, ransoms have never been explicitly prohib- ited through the terrorist financing regime following September 11, 2001 or under any of the relevant multilateral Conventions. Beginning in 2014, however, the United Nations Security Council issued several resolutions to address Daesh, some of which specifically provided for restrictions on ran- som payments.7 Although the resolutions call on states to prevent the ben- efits accruing “from using kidnapping to raise funds or gain political concessions,”8 the absence of an overt prohibition on such payments themselves injects a measure of ambiguity into the framework governing the flow of finances to terrorist organizations. Furthermore, continued payments by certain states undercut the view that the sanctions regime prohibits ransoms to non-state terrorist actors. 2. For an explanation of why “Daesh” is used over other terms (e.g., ISIS, ISIL, Is- lamic State), see Nike Ching, Why Kerry Calls Terror Group ‘Daesh,’ Not Islamic State, VOICE OF AMERICA (Jan. 15, 2016), https://www.bostonglobe.com/opinion/2014/10/09/words- matter-isis-war-use-daesh/V85GYEuasEEJgrUun0dMUP/story.html); Faisal Irshaid, Isis, IS or Daesh? One group, many names, BBC (Dec. 2, 2015), http://www.bbc.com/news/world- middle-east-27994277; Zeba Khan, Words matter in ‘ISIS’ war, so use ‘Daesh’, BOSTON GLOBE (Oct. 9, 2014), https://www.bostonglobe.com/opinion/2014/10/09/words-matter-isis- war-use-daesh/V85GYEuasEEJgrUun0dMUP/story.html. 3. See, e.g., Rukmini Callimachi, Militant Group Says it Killed American Journalist in Syria, N.Y. TIMES (Aug. 19, 2014), http://www.nytimes.com/2014/08/20/world/middleeast/isis- james-foley-syria-execution.html. 4. See Rukmini Callimachi, The Horror Before the Beheadings: ISIS Hostages En- dured Torture and Dashed Hopes, Freed Cellmates Say, N.Y. TIMES (Oct. 25, 2014), http:// www.nytimes.com/2014/10/26/world/middleeast/horror-before-the-beheadings-what-isis-hos- tages-endured-in-syria.html. 5. Id. 6. Id. 7. See, e.g., S.C. Res. 2133 (Jan. 27, 2014); S.C. Res. 2160 (June 17, 2014); S.C. Res. 2161 (June 17, 2014); S.C. Res. 2199 (Feb. 12, 2015). 8. S.C. Res. 2133, ¶ 3 (Jan. 27, 2014). Summer 2016] Rescuing Policy 719 At the practical level, terrorist kidnappings call for a more nuanced response by affected states. Daesh’s most recent kidnappings demonstrate not only the limited effectiveness of a no-concessions policy in deterring terror-driven kidnappings, but also the potential for pro-ransom policies to fund terrorist actors. Moreover, states that are unwilling to engage in ne- gotiations themselves effectively delegate that role to a less capable pri- vate sector and often leave insurers and families in a legally tenuous position in their efforts to secure ransomed release. Finally, the general lack of a coordinated effort during rescue attempts many times results in failed hostage rescue operations or the unintended deaths of those held captive. Such problems lead firstly to the question of the legality of ransoms under international law and, secondly, to the role states can and should play in addressing hostage situations. In surveying these problems, Part I of this Note will analyze the current framework governing hostage situa- tions to determine the permissibility of ransom payments under interna- tional law. Part II will examine the two dominant positions that have developed among states and identify the justifications and shortcomings of each. Part III will conclude, firstly, that for states to develop a multilateral approach to hostage situations, they must take the lead within their re- spective domestic spheres and, secondly, that the option to negotiate for ransomed release should be preserved as an essential tool for confronting terrorist organizations. In examining these points, analysis may draw from piracy-driven kidnappings because of the substantial similarities they bear to hostage situations involving non-state terrorist groups.9 Although the former cate- gory is frequently distinguished as falling within a less egregious branch of criminal enterprise, perpetrators in both contexts pose significant risk to captives and may operate through diffuse international networks.10 Simi- larly, to maintain a narrow focus on the permissibility of ransoms, other forms of concessions such as prisoner exchanges are considered to fall outside the scope of this Note. Instead, this Note will focus narrowly on the issue of kidnappings facilitated by non-state groups that have been designated as terrorists under the auspices of the United Nations.11 9. See, e.g., Lucas V.M. Bento, Preserving Negotiation Whilst Promoting Global Or- der: Should We Bargain with Salt-Water Devils?, 19 HARV. NEGOT. L. REV. 285, 301 (2014). But see id. at 301–04; Lawrence Rutkowski et al., Mugged Twice?: Payment of Ransom on the High Seas, 59 AM. U. L. REV. 1425, 1431–32 (2010). 10. See Bento, supra note 9, at 301. 11. There is currently no internationally agreed upon definition of “terrorist” or “ter- rorism.” See, e.g., Ben Saul, Attempts to Define ‘Terrorism’ in International Law, 52 NETH. INT’L L. REV. 57 (2005). For purposes
Recommended publications
  • Jurisdiction Over Terrorists Who Take Hostages: Efforts to Stop Terror-Violence Against United States Citizens Elizabeth R
    American University International Law Review Volume 2 | Issue 1 Article 3 1987 Jurisdiction Over Terrorists Who Take Hostages: Efforts to Stop Terror-Violence Against United States Citizens Elizabeth R. P. Bowen Follow this and additional works at: http://digitalcommons.wcl.american.edu/auilr Part of the International Law Commons Recommended Citation Bowen, Elizabeth R. P. "Jurisdiction Over Terrorists Who Take Hostages: Efforts to Stop Terror-Violence Against United States Citizens." American University International Law Review 2, no. 1 (1987): 153-202. This Article is brought to you for free and open access by the Washington College of Law Journals & Law Reviews at Digital Commons @ American University Washington College of Law. It has been accepted for inclusion in American University International Law Review by an authorized administrator of Digital Commons @ American University Washington College of Law. For more information, please contact [email protected]. NOTES AND COMMENTS JURISDICTION OVER TERRORISTS WHO TAKE HOSTAGES: EFFORTS TO STOP TERROR-VIOLENCE AGAINST UNITED STATES CITIZENS Elizabeth R. P. Bowen* INTRODUCTION ............................... 154 I. INTERNATIONAL TERRORISM: A GLOBAL CON- C ER N .......................................... 157 A. Hostage Taking: A Terror Tactic ............... 157 B. Definitional Dilemma: Terrorists v. Freedom Fighters ................................... 158 II. UNDERLYING AGITATORS .................... 162 A. State-Sponsored Terrorism ..................... 162 B. The Nature of Terrorist Warfare: Invisible Block- ades ........................................ 164 C. Television: The Role of the Media in the Growth of International Terrorism ........................ 165 1. First Amendment Balance ................. 166 2. Law Enforcement and Media .............. 167 D. Extradition: The Key to Prosecution ............. 168 III. UNITED STATES RESPONSE TO TERRORISM .. 171 A. Domestic Legislation .......................... 172 B. International Efforts of the United States .......
    [Show full text]
  • Preventing Terrorism and Countering Violent Extremism And
    Preventing Terrorism and Countering Violent Extremism and Radicalization that Lead to Terrorism: A Community-Policing Approach Preventing Terrorism and Countering Violent Extremism and Radicalization that Lead to Terrorism: A Community-Policing Approach Published by the Organization for Security and Co-operation in Europe Vienna, February 2014 © OSCE 2014 Designed in Warsaw by Homework Printed in Vienna by Stanzell Druck All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means — electronic, mechanical, photocopying, recording, or otherwise without the prior written permission of the publishers. This restriction does not apply to making digital or hard copies of this publication for internal use within the OSCE, and for personal or educational use when for non-profit and non-commercial purposes, providing that copies be accompanied by an acknowledgment of the OSCE as the source. ISBN 978–92–9235–023–9 Transnational Threats Department Office for Democratic Institutions OSCE Secretariat and Human Rights Wallnerstrasse 6, A-1010 Vienna, Austria Ul. Miodowa 10, 00–251 Warsaw, Poland http://www.osce.org/atu http://www.osce.org/odihr The publication of this guidebook was made possible thanks to generous contributions from the Australian Government, through its Department of Foreign Affairs and Trade, the Swiss Confederation, through its Federal Department of Foreign Affairs, the United States of Amer- ica, through its Department of State, and the Principality of Liechtenstein, through its Ministry of Foreign Affairs. The content of this publication, including the views, opinions, findings, inter- pretations and conclusions expressed herein do not necessarily reflect those of these donors.
    [Show full text]
  • Terror As Strategy and Relational Process
    02_tilly_054468 (jk-t) 17/6/05 11:46 am Page 11 Terror as Strategy and Relational Process Charles Tilly* ABSTRACT Common explanations of terrorism, here illustrated by the work of Jessica Stern and of US State Department analysts, have two significant weaknesses. First, they homogenize terror, assuming that one type of person, group, or action accounts for most instances of its use. Second, they focus on dispositions and motives, decision logics, emotions, or cultural templates of terror-producing actors prior to their action. Adequate explanations of terror must repair these defects by a) looking systematically at variation among produc- ers of terror and b) shifting the focus to relations among actors. Terror is a strategy employed by a wide variety of persons and groups, involving a substantial range of actions. Keywords: relational process, terror, violence Harvard social science lecturer Jessica Stern has written a vivid first-person I- was-there book called Terror in the Name of God. Stern recounts how after years as an expert on terrorism – the Council on Foreign Relations gave her the resounding title Superterrorism Fellow – she began seeking out religious terror- ists and asking them detailed questions about their lives. She first interviewed terrorist Kerry Noble in 1998. Noble had by then served years in prison, convicted of conspiracy to possess unregistered weapons. During the early 1980s, he had risen to second- in-command of a militant Christian cult called the Covenant, the Sword, and the Arm of the Lord (CSA). The CSA hoped to speed the Messiah’s return to earth. They thought they could do so by overturning the US government, which had sold itself to the Antichrist in the forms of Jews, blacks, the United Nations, and the International Monetary Fund.
    [Show full text]
  • National Counterterrorism Center
    National Counterterrorism Center 2007 Report on Terrorism 30 April 2008 National Counterterrorism Center This page intentionally left blank 1 2007 Report on Terrorism FOREWORD: Consistent with its statutory mission to serve as the U.S. Government's knowledge bank on international terrorism, the National Counterterrorism Center (NCTC) is providing this report and statistical information to assist academics, policy makers and the public in understanding the data. The statistical information included in this report is drawn from the data NCTC maintains on the www.nctc.gov website. The report includes the following: -- this foreword, which provides important context for the contents of this report; -- a methodology section that explains how the data was compiled and the inherent limitations of the data; -- NCTC observations related to the statistical material; -- statistical charts and graphs; and -- summaries of high fatality attacks during 2007 -- academic letter on challenges to cataloging attacks Section 2656f(b) of Title 22 of the U.S. Code requires the State Department to include in its annual report on terrorism "to the extent practicable, complete statistical information on the number of individuals, including United States citizens and dual nationals, killed, injured, or kidnapped by each terrorist group during the preceding calendar year." While NCTC keeps statistics on the annual number of incidents of "terrorism," its ability to track the specific groups responsible for each attack involving killings, kidnappings, and injuries is significantly limited by the availability of reliable open source information, particularly for events involving small numbers of casualties. The statistical material compiled in this report, therefore, is drawn from the number of attacks of "terrorism" that occurred in 2007, which is the closest figure that is practicable for NCTC to supply in satisfaction of the above-referenced statistical requirements.
    [Show full text]
  • How Radicalization to Terrorism Occurs in the United States: What Research Sponsored by the National Institute of Justice Tells Us
    U.S. Department of Justice Office of Justice Programs National Institute of Justice National Institute of Justice How Radicalization to Terrorism Occurs in the United States: What Research Sponsored by the National Institute of Justice Tells Us Allison G. Smith, Ph.D. June 2018 This paper was prepared with support from the National Institute of Justice, Office of Justice Programs, U.S. Department of Justice, under contract number 2010F_10097. The opinions, findings, and conclusions or recommendations expressed in this publication are those of the authors and do not necessarily represent those of the Department of Justice. NCJ 250171 U.S. Department of Justice Office of Justice Programs 810 Seventh St. N.W. Washington, DC 20531 David B. Muhlhausen, Ph.D. Director, National Institute of Justice This and other publications and products of the National Institute of Justice can be found at: National Institute of Justice Strengthen Science • Advance Justice NIJ.ojp.gov Office of Justice Programs Building Solutions • Supporting Communities • Advancing Justice OJP.gov The National Institute of Justice is the research, development, and evaluation agency of the U.S. Department of Justice. NIJ’s mission is to advance scientific research, development, and evaluation to enhance the administration of justice and public safety. The National Institute of Justice is a component of the Office of Justice Programs, which also includes the Bureau of Justice Assistance; the Bureau of Justice Statistics; the Office for Victims of Crime; the Office of Juvenile Justice and Delinquency Prevention; and the Office of Sex Offender Sentencing, Monitoring, Apprehending, Registering, and Tracking. Opinions or conclusions expressed in this paper are those of the authors and do not necessarily reflect the official position or policies of the U.S.
    [Show full text]
  • An Empirical Analysis of the Lethality of Suicide Terrorism Burcu Pinar Alakoc, Department of History, Politics, and International Relations, Webster University, St
    DOI: 10.4119/UNIBI/ijcv.493 IJCV: Vol. 11#08/2017 When Suicide Kills: An Empirical Analysis of the Lethality of Suicide Terrorism Burcu Pinar Alakoc, Department of History, Politics, and International Relations, Webster University, St. Louis, United States Vol. 11#08/2017 The IJCV provides a forum for scientific exchange and public dissemination of up-to-date scientific knowledge on conflict and violence. The IJCV is independent, peer reviewed, open access, and included in the Social Sciences Citation Index (SSCI) as well as other relevant databases (e.g., SCOPUS, EBSCO, ProQuest, DNB). The topics on which we concentrate—conflict and violence—have always been central to various disciplines. Con- sequently, the journal encompasses contributions from a wide range of disciplines, including criminology, econom- ics, education, ethnology, history, political science, psychology, social anthropology, sociology, the study of reli- gions, and urban studies. All articles are gathered in yearly volumes, identified by a DOI with article-wise pagination. For more information please visit www.ijcv.org Author Information: Burcu Pinar Alakoc, Department of History, Politics, and International Relations, Webster University, St. Louis, United States [email protected] Suggested Citation: APA: Alakoc, B. P. (2017). When Suicide Kills: An Empirical Analysis of the Lethality of Suicide Terrorism. Inter- national Journal of Conflict and Violence, 11, 1-15. doi: 10.4119/UNIBI/ijcv.493 Harvard: Alakoc, Burcu Pinar. 2017. When Suicide Kills: An Empirical Analysis of the Lethality of Suicide Terror- ism. International Journal of Conflict and Violence 11:1-15. doi: 10.4119/UNIBI/ijcv.493 This work is licensed under the Creative Commons Attribution-NoDerivatives License.
    [Show full text]
  • Terrorism and Communism: a Contribution to the Natural History of Revolution
    Terrorism and Communism A Contribution to the Natural History of Revolution Karl Kautsky 1919 Preface I. Revolution and Terror II. Paris III. The Great Revolution IV. The First Paris Commune The Paris Proletariat and Its Fighting Methods The Failure of Terrorism V. The Traditions of the Reign of Terror VI. The Second Paris Commune The Origin of the Commune Workmen’s Councils and the Central Committee The Jacobins in the Commune The International and the Commune The Socialism of the Commune Centralisation and Federalism Terrorist Ideas of the Commune VII. The Effect of Civilisation on Human Customs Brutality and Humanity Two Tendencies Slaughter and Terrorism The Humanising of Conduct in the Nineteenth Century The Effects of the War VIII. The Communists at Work Expropriation and Organisation The Growth of the Proletariat The Dictatorship Corruption The Change in Bolshevism The Terror The Outlook for the Soviet Republic The Outlook for the World Revolution Preface The following work was begun about a year ago, but was dropped as the result of the Revolution of November 9; for the Revolution brought me other obligations than merely theoretical and historical research. It was only after several months that I could return to the work in order, with occasional interruptions, to bring this book to a class. The course of recent events did not minister to the uniformity of this work. It was rendered more difficult by the fact that, as time went on, the examination of this subject shifted itself to some extent. My starting point represented the central problem of modern Socialism, the attitude of Social Democracy to Bolshevik methods.
    [Show full text]
  • 1 Piracy, Terrorism and War Douglas Guilfoyle
    Piracy, terrorism and war Douglas Guilfoyle µ$Q LQYHVWLJDWRU ILQGV WKDW LQVWHDG RI D VLQJOH UHODWLYHO\ VLPSOH SUREOHP >GHILQLQJ piracy], there are a series of difficult problems which have occasioned [at different times] a great diversity of professional RSLQLRQ¶1 I. Introduction +LVWRULFDOO\WKHUHKDVEHHQVRPHGLIILFXOW\LQGHILQLQJERWKWKHWHUPµSLUDWH¶DQGWKHWHUP µWHUURULVW¶7KH\DUHERWKTXLQWHVVHQWLDOO\ZRUGVWKDWVWLJPDWLVHVRPHRQHDVother: a violent, outlaw actor who seeks to impinge upon SWDWHV¶ OHJitimate monopoly over violence. As a matter of legal usage the controversial relationship between piracy and terrorism springs from three words in the modern definition of piracy which requires that piracy on the high seas must involve DQDFWµfor private ends¶That is, both the 1982 UN Convention on the Law of the Sea (UNCLOS) and the 1958 Geneva High Seas Convention (HSC) tell us: µ3LUDF\ FRQVLVWV RI DQ\ RI WKH IROORZLQJ DFWV « DQ\ LOOHJDO DFWV RI YLROHQFH RU detention, or any act of depredation, committed for private ends by the crew or the SDVVHQJHUV RI D SULYDWH VKLS RU D SULYDWH DLUFUDIW DQG GLUHFWHG « RQ WKH KLJK VHDV DJDLQVWDQRWKHUVKLSRUDLUFUDIWRUDJDLQVWSHUVRQVRUSURSHUW\RQERDUG«¶2 This immediately suggests a distinction between private piratical acts and some other class of public or political acts. A common view of the effect of these words is that: µE\ OLPLWLQJWKHGHILQLWLRQWRDFWVFRPPLWWHGIRU³SULYDWHHQGV´DQ\DFWLRQVWDNHQIRU SROLWLFDOPRWLYHVVXFKDVWHUURULVWDWWDFNVDUHH[FOXGHG¶3 However, even if this is a correct statement of the law today (which I doubt),
    [Show full text]
  • Strategic Framework for Countering Terrorism and Targeted Violence
    DEPARTMENT OF HOMELAND SECURITY STRATEGIC FRAMEWORK FOR COUNTERING TERRORISM AND TARGETED VIOLENCE SEPTEMBER 2019 The U.S. Department of Homeland Security was created in the wake of the devastating 9/11 attacks, and charged with coordinating and unifying the Nation’s homeland security efforts. Today, just past the eighteenth anniversary of those horrible events, the country confronts an evolving challenge of terrorism and targeted violence. While the threat posed by foreign terrorist organizations remains a priority for the Department, and for the Nation as a whole, we have made great progress in our ability to detect, prevent, protect against, and mitigate the threats that these groups pose. At the same time, we face a growing threat from domestic terrorism and other threats originating at home, including the mass attacks that have too frequently struck our houses of worship, our schools, our workplaces, our festivals, and our shopping spaces. I am proud to introduce DHS’s new Strategic Framework for Countering Terrorism and Targeted Violence, which explains how we Kevin McAleenan will use the tools and expertise that have protected and strengthened the country Secretary of Homeland Security from foreign terrorist organizations to address the evolving challenges of today. It is important to appreciate the great progress that the Department has made since it was founded. DHS has adopted a multi-tiered approach to the lines of security we pursue, including aviation security and border security. By gaining the ability to recognize hostile actors long before they reach our borders, we have made our Nation’s borders not our first line of defense, but one of many.
    [Show full text]
  • Understanding China's Evolving Counter-Terror Strategy
    EUROPEAN COUNCIL ON FOREIGN BRIEF POLICY RELATIONS ecfr.eu TERROR OVERSEAS: UNDERSTANDING CHINA’S EVOLVING COUNTER-TERROR STRATEGY Mathieu Duchâtel In November 2015, the Islamic State group (ISIS) announced that it had executed a Chinese citizen for the SUMMARY first time. A few days later, the Al-Murabitoun jihadist • International terrorism has emerged in recent group – later affiliated with Al-Qaeda in the Islamic years as a direct threat to Chinese nationals Maghreb – attacked the Radisson Blu Hotel in Bamako, living overseas. As China's footprint becomes Mali, killing 22 people, including three Chinese nationals increasingly global its exposure to the risk of working for the state-owned China Railway Construction terror attacks has increased too. Corporation. International terrorism has emerged in recent years as a direct threat for Chinese nationals • China’s approach to international terrorism is overseas. A compilation of open source data shows a becoming militarised. This trend has the potential total of 18 attacks causing 40 deaths of Chinese nationals to accelerate if Chinese nationals are victims of overseas in the past decade. China’s global footprint means new attacks overseas. that it has global exposure to terrorist risks. Meanwhile, China’s ambitious plans for Eurasian integration, which • Although China is an active and responsible involve a new wave of outward investment and a new player in the UN with clearly expressed priorities wave of Chinese citizens settling overseas, mean those and an interest in protecting its citizens overseas, risks are likely to increase in the coming years. it is not taking a strong role in leading and shaping the UN’s counter-terrorism agenda.
    [Show full text]
  • A Critique of State Terrorism Zoi Aliozi*
    A CRITIQUE OF STATE TERRORISM ZOI ALIOZI* ABSTRACT This essay is a critical philosophical analysis of the concept of “state terrorism” based upon an epistemological discussion. It is an attempt to re-formulate the question of terrorism by making the case that “state terrorism” is the mother phenomenon and root of all forms of terrorism. My ambition is to contribute in our understanding of terrorism by revealing that, in the Greek language which is the language of concepts and philosophy, the term terrorism literally means “state terrorism,” and it belongs to the same family of words as democracy, aristocracy, autocracy and so on and so forth, since they share their second synthetic and suffix –cracy. This recognition may have the power to open new ways of viewing the term and phenomenon of terrorism, if not re-define the concept by describing it according to the term’s original meaning. Under this logic, terrorism would refer to a form of government and a political system; a hypothesis that my essay introduces into the philosophical dialogues on terrorism, since it has never before been discussed within these terms. Keywords: State terrorism, critical legal studies, philosophy, law, human rights. TABLE OF CONTENTS I. PROLEGOMENA (Introduction) ...............................................................................................54 II. IS TERRORISM, BY DEFINITION, STATE TERRORISM? ............................................................57 CONCLUSION .............................................................................................................................65
    [Show full text]
  • Maritime Terrorism,Piracy
    OCTOBER 2019 Maritime Terrorism in Asia: An Assessment ABHIJIT SINGH Maritime Terrorism in Asia: An Assessment ABHIJIT SINGH ABOUT THE AUTHOR A former naval officer, Abhijit Singh is Senior Fellow and head of the Maritime Policy Initiative at the Observer Research Foundation (ORF). He is a maritime professional with specialist and command experience in front-line Indian naval ships, and was involved in the writing of India's maritime strategy (2007). He is a keen commentator on maritime matters and has written extensively on security and governance issues in the Indian Ocean and Pacific littorals. ISBN: 978-93-89094-96-1 © 2019 Observer Research Foundation. All rights reserved. No part of this publication may be reproduced or transmitted in any form or by any means without permission in writing from ORF. Maritime Terrorism in Asia: An Assessment ABSTRACT This paper evaluates the possibility of an increase in maritime terrorist violence in Asia, based on a recounting and analysis of some of the most recent past incidents in these waters. It argues that the vulnerability of high seas shipping to criminal acts of violence and the weak and inconsistent nature of maritime governance raises the possibility of a terrorist strike in the Asian littorals. In assessing the odds of a major terrorist attack in coastal regions, the paper also explores the terrorism- piracy nexus and the state of port security in key continental spaces, highlighting measures to improve maritime readiness against acts of terror. (This paper is part of ORF's series, 'National Security'. Find other research in the series here: https://www.orfonline.org/series/national-security/) Attribution: Abhijit Singh, “Maritime Terrorism in Asia: An Assessment”, ORF Occasional Paper No.
    [Show full text]