The Military's Role in Counterterrorism

Total Page:16

File Type:pdf, Size:1020Kb

The Military's Role in Counterterrorism The Military’s Role in Counterterrorism: Examples and Implications for Liberal Democracies Geraint Hug etortThe LPapers The Military’s Role in Counterterrorism: Examples and Implications for Liberal Democracies Geraint Hughes Visit our website for other free publication downloads http://www.StrategicStudiesInstitute.army.mil/ To rate this publication click here. hes Strategic Studies Institute U.S. Army War College, Carlisle, PA The Letort Papers In the early 18th century, James Letort, an explorer and fur trader, was instrumental in opening up the Cumberland Valley to settlement. By 1752, there was a garrison on Letort Creek at what is today Carlisle Barracks, Pennsylvania. In those days, Carlisle Barracks lay at the western edge of the American colonies. It was a bastion for the protection of settlers and a departure point for further exploration. Today, as was the case over two centuries ago, Carlisle Barracks, as the home of the U.S. Army War College, is a place of transition and transformation. In the same spirit of bold curiosity that compelled the men and women who, like Letort, settled the American West, the Strategic Studies Institute (SSI) presents The Letort Papers. This series allows SSI to publish papers, retrospectives, speeches, or essays of interest to the defense academic community which may not correspond with our mainstream policy-oriented publications. If you think you may have a subject amenable to publication in our Letort Paper series, or if you wish to comment on a particular paper, please contact Dr. Antulio J. Echevarria II, Director of Research, U.S. Army War College, Strategic Studies Institute, 632 Wright Ave, Carlisle, PA 17013-5046. The phone number is (717) 245- 4058; e-mail address is [email protected]. We look forward to hearing from you. Letort Paper THE MILITARY’S ROLE IN COUNTERTERRORISM: EXAMPLES AND IMPLICATIONS FOR LIBERAL DEMOCRACIES Geraint Hughes May 2011 The views expressed in this report are those of the author and do not necessarily reflect the official policy or position of the Joint Services Command and Staff College, the United Kingdom (UK) Ministry of Defence, or any other UK government agency, the U.S. Department of the Army, the U.S. Department of Defense, or the U.S. Government. Authors of Strategic Studies Institute (SSI) publications enjoy full academic freedom, provided they do not disclose classified information, jeopardize operations secu- rity, or misrepresent official U.S. policy. Such academic freedom empowers them to offer new and sometimes controversial per- spectives in the interest of furthering debate on key issues. This report is cleared for public release; distribution is unlimited. ***** This publication is subject to Title 17, United States Code, Sec- tions 101 and 105. It is in the public domain and may not be copy- righted. ***** Comments pertaining to this report are invited and should be forwarded to: Director, Strategic Studies Institute, U.S. Army War College, 632 Wright Ave, Carlisle, PA 17013-5046. ***** The author owes his thanks for critical input from and con- versations with colleagues within the Defence Studies Depart- ment (DSD) of King’s College London, in particular Drs. Tim Bird, Huw Bennett, Katherine Brown, Warren Chin, Tracey Ger- man, Jon Hill, Bill Park, Kenneth Payne, Patrick Porter, Christian Tripodi, and Rachel Vincent. He has also derived immense ben- efit from the staff and students at the Joint Services Command and Staff College (JSCSC), both from the British armed forces and from several foreign services with whom he has had the pleasure of teaching and working with over the past 5 years. The Military’s Role in Counterterrorism has been written for both a professional military and a nonspecialist civilian reader- ship. Readers should note that with certain languages (such as Arabic and Urdu), there is no standard method of transliteration into English. The author’s rendition of certain names and phrases therefore may not match those employed by his sources (for ex- ample, the author uses “al-Qaeda” rather than “al-Qaida,” and “Qasab” rather than “Kasab”). All material cited in this paper is in the public domain, and any factual errors in the text that have escaped the author’s attention are his own responsibility. This Letort Paper is humbly dedicated to the memory of all Coalition military and civil affairs personnel killed on operations in Afghanistan since October 2001. ***** All Strategic Studies Institute (SSI) publications may be downloaded free of charge from the SSI website. Hard copies of this report may also be obtained free of charge while supplies last by placing an order on the SSI website. The SSI website address is: www.StrategicStudiesInstitute.army.mil. ii ***** The Strategic Studies Institute publishes a monthly e-mail newsletter to update the national security community on the re- search of our analysts, recent and forthcoming publications, and upcoming conferences sponsored by the Institute. Each newslet- ter also provides a strategic commentary by one of our research analysts. If you are interested in receiving this newsletter, please subscribe on the SSI website at www.StrategicStudiesInstitute. army.mil/newsletter/. ISBN 1-58487-489-9 iii CONTENTS Foreword ........................................................... vii About the Author .................................................xi Summary ........................................................... xiii Maps .................................................................... xv Introduction ..........................................................1 Is Terrorism A Military Problem? ..............................................................13 The Military’s Role In Counterterrorism ................................................37 Problems Arising From Military Involvement in Counterterrorism— The International Context ..................................58 Problems Arising From Military Involvement in Counterterrorism— The Domestic Context ........................................87 Conclusions ........................................................120 Endnotes .............................................................143 Glossary and Abbreviations .............................185 Military Operations Cited in the Text .............203 v FOREWORD On the morning of September 11, 2001 (9/11), al-Qaeda terrorists hijacked four passenger aircraft, crashing three of them into the World Trade Center in New York City and the Pentagon in Washington, DC, killing up to 3,000 people in the process. Just under 3 years later, a group of predominantly Chechen gun- men took over School Number One in Beslan, North Ossetia, beginning a siege that ended with the death of nearly 400, including 156 children. On the evening of November 26, 2008, 10 members of Lashkar-e-Toiba (LET) began a series of bomb and gun attacks in the Indian city of Mumbai, killing more than 170 people over a 48-hour period. For Americans, Russians, and Indians, each of these attacks was warlike in its pro- portions and, after each, popular and political opinion demanded a militarized response. Dr. Geraint Hughes’s Letort Paper reminds us that in repeated cases in which liberal democratic states have used their armed forces to fight terrorism- -notably Israel against successive Palestinian groups, Britain in Northern Ireland from 1969-98, or indeed America and its allies against al-Qaeda and affiliated groups currently--the employment of military means in counterterrorism has been inherently controversial. As Audrey Kurth Cronin notes, terrorism picks at the vulnerable seam between domestic law and foreign war, and conceptually it does not fit the paradigms of either criminality or warfare.1 Although a particular state or a coalition of powers may use its militaries to protect its citizens in counterterrorist campaigns, the threat posed by specific terrorist groups has to be vii treated sui generis, and the applicability of military means in counterterrorism depends on a series of factors--these include whether the terrorist threat is a domestic or an international one, the lethality of the groups concerned, and the threat they pose to state stability. Furthermore, the involvement of armed forc- es in counterterrorism can be problematic. One has only to look at the post-2001 “War on Terror” and the criticisms expressed by foreign governments, mem- bers of Congress, human rights activists, journalists, and academics regarding the treatment of detainees at Guantanamo Bay, Cuba; the use of unmanned aerial vehicles (UAVs) in air-strikes in Pakistan; and the ci- vilian casualties caused by U.S. and North Atlantic Treaty Organization (NATO) military operations in Afghanistan. Dr. Hughes examines the challenges of deploying the military in counterterrorism from both a historical and a contemporary perspective, outlining not only the specific roles that armed forces can perform either to prevent terrorist attacks or to mitigate their conse- quences, but also the strategic, constitutional, practi- cal, diplomatic, and ethical problems that have arisen from a variety of counterterrorist campaigns, be they in Palestine, Northern Ireland, Quebec, Kashmir, Af- ghanistan, Pakistan, or the North Caucasus. Clause- witz reminds us that in “war everything is simple, but the simplest thing is difficult,”2 and this observation is as true of counterterrorism as it is of interstate warfare. For example, the British Army interned Republican terrorist suspects in Northern Ireland from 1971-75,
Recommended publications
  • Statelessness and Citizenship in the East African Community
    Statelessness and Citizenship in the East African Community A Study by Bronwen Manby for UNHCR September 2018 Commissioned by UNHCR Regional Service Centre, Nairobi, Kenya [email protected] STATELESSNESS AND CITIZENSHIP IN THE EAST AFRICAN COMMUNITY 2 September 2018 STATELESSNESS AND CITIZENSHIP IN THE EAST AFRICAN COMMUNITY Table of Contents List of Tables ............................................................................................................................... i List of Boxes ................................................................................................................................ i Methodology and acknowledgements ...................................................................................... ii A note on terminology: “nationality”, “citizenship” and “stateless person” ........................... iii Acronyms .................................................................................................................................. iv Key findings and recommendations ....................................................................... 1 1. Summary ........................................................................................................... 3 Overview of the report .............................................................................................................. 4 Key recommendations .............................................................................................................. 5 Steps already taken ..................................................................................................................
    [Show full text]
  • Counter-Terrorism 1 Counter-Terrorism
    Counter-terrorism 1 Counter-terrorism WARNING: Article could not be rendered - ouputting plain text. Potential causes of the problem are: (a) a bug in the pdf-writer software (b) problematic Mediawiki markup (c) table is too wide United States Coast GuardCoast Guard on counter-terrorism patrol in Upper New York Bay. Verrazano-Narrows Bridge in distance spanning The Narrows between Brooklyn (left) and Staten Island (right).TerrorismDefinitions of terrorismDefinitionsHistory of terrorismHistoryList of terrorist incidentsIncidents Counter-terrorism (also spelled counterterrorism) incorporates the practices, Military tacticstactics, techniques, and strategies that governments, militarymilitaries, police departments and corporations adopt to attack terrorist threats and/or acts, both real and imputed.The tactic of terrorism is available to insurgencyinsurgents and governments. Not all insurgents use Fearterror as a tactic, and some choose not to use it because other tactics work better for them in a particular context. Individuals, such as Timothy McVeigh, may also engage in terrorist acts such as the Oklahoma City bombing. If the terrorism is part of a broader insurgency, counter-terrorism may also form a part of a counter-insurgency doctrine, but political, economic, and other measures may focus more on the insurgency than the specific acts of terror. Foreign internal defense (FID) is a term used for programs either to suppress insurgency, or reduce the conditions under which insurgency could develop. Counter-terrorism includes both the detection of potential acts and the response to related events. PlanningUnited States Customs and Border Protection officers, fully armed and armored for a counter-terrorism operationMost counter-terrorism strategies involve an increase in standard police and domestic intelligence.
    [Show full text]
  • Identity, Authority and Myth-Making: Politically-Motivated Prisoners and the Use of Music During the Northern Irish Conflict, 1962 - 2000
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by Queen Mary Research Online Identity, authority and myth-making: Politically-motivated prisoners and the use of music during the Northern Irish conflict, 1962 - 2000 Claire Alexandra Green Submitted in partial fulfillment of the requirements of the Degree of Doctor of Philosophy 1 I, Claire Alexandra Green, confirm that the research included within this thesis is my own work or that where it has been carried out in collaboration with, or supported by others, that this is duly acknowledged below and my contribution indicated. Previously published material is also acknowledged below. I attest that I have exercised reasonable care to ensure that the work is original, and does not to the best of my knowledge break any UK law, infringe any third party’s copyright or other Intellectual Property Right, or contain any confidential material. I accept that the College has the right to use plagiarism detection software to check the electronic version of the thesis. I confirm that this thesis has not been previously submitted for the award of a degree by this or any other university. The copyright of this thesis rests with the author and no quotation from it or information derived from it may be published without the prior written consent of the author. Signature: Date: 29/04/19 Details of collaboration and publications: ‘It’s All Over: Romantic Relationships, Endurance and Loyalty in the Songs of Northern Irish Politically-Motivated Prisoners’, Estudios Irlandeses, 14, 70-82. 2 Abstract. In this study I examine the use of music by and in relation to politically-motivated prisoners in Northern Ireland, from the mid-1960s until 2000.
    [Show full text]
  • The Nairobi Attack and Al-Shabab's Media Strategy
    OCTOBER 2013 . VOL 6 . ISSUE 10 Contents The Nairobi Attack and FEATURE ARTICLE 1 The Nairobi Attack and Al-Shabab’s Al-Shabab’s Media Strategy Media Strategy By Christopher Anzalone By Christopher Anzalone REPORTS 6 The Dutch Foreign Fighter Contingent in Syria By Samar Batrawi 10 Jordanian Jihadists Active in Syria By Suha Philip Ma’ayeh 13 The Islamic Movement and Iranian Intelligence Activities in Nigeria By Jacob Zenn 19 Kirkuk’s Multidimensional Security Crisis By Derek Henry Flood 22 The Battle for Syria’s Al-Hasakah Province By Nicholas A. Heras 25 Recent Highlights in Terrorist Activity 28 CTC Sentinel Staff & Contacts Kenyan soldiers take positions outside the Westgate Mall in Nairobi on September 21, 2013. - Photo by Jeff Angote/Getty Images fter carrying out a bold Godane. The attack also followed a attack inside the upscale year in which al-Shabab lost control Westgate Mall in Nairobi in of significant amounts of territory in September 2013, the Somali Somalia, most importantly major urban Amilitant group al-Shabab succeeded in and economic centers such as the cities recapturing the media spotlight. This of Baidoa and Kismayo. was in large part due to the nature of the attack, its duration, the difficulty This article examines al-Shabab’s About the CTC Sentinel in resecuring the mall, the number of media strategy during and immediately The Combating Terrorism Center is an casualties, and al-Shabab’s aggressive after the Westgate Mall attack, both independent educational and research media campaign during and immediately via micro-blogging on Twitter through institution based in the Department of Social after the attack.1 its various accounts as well as more Sciences at the United States Military Academy, traditional media formats such as West Point.
    [Show full text]
  • Current Readings on the Iran-Iraq Conflict and Its Effects on U.S. Foreign Relations and Policy
    Reference Services Review, v. 17, issue 2, 1989, p. 27-39. ISSN: 0090-7324 DOI: 10.1108/eb049054 http://www.emeraldinsight.com/journals.htm?issn=0090-7324 © 1989 MCB UP Ltd Current Readings on the Iran-Iraq Conflict and Its Effects on U.S. Foreign Relations and Policy Magda El-Sherbini The conflict between Iran and Iraq is not new; it dates from long before September 1980. In fact, the origins of the current war can be traced to the battle of Qadisiyah in Southern Iraq in 637 A.D., a battle in which the Arab armies of General Sa'd ibn Abi Waqqas decisively defeated the Persian army. In victory, the Arab armies extended Islam east of the Zagros Mountains to Iran. In defeat, the Persian Empire began a steady decline that lasted until the sixteenth century. However, since the beginning of that century, Persia has occupied Iraq three times: 1508-1514, 1529-1543, and 1623-1638. Boundary disputes, specifically over the Shatt al-Arab Waterway, and old enmities caused the wars. In 1735, belligerent Iranian naval forces entered the Shatt al-Arab but subsequently withdrew. Twenty years later, Iranians occupied the city of Sulimaniah and threatened to occupy the neighboring countries of Bahrain and Kuwait. In 1847, Iran dominated the eastern bank of the Shatt al-Arab and occupied Mohamarah in Iraq. The Ottoman rulers of Iraq concluded a number of treaties with Iran, including: the treaty of Amassin (1534-55); treaties signed in 1519, 1613, and 1618; and the treaty of Zuhab, signed in 1639. Yet another treaty, the treaty of Erzerum in 1823, failed once again to resolve the dispute.
    [Show full text]
  • Articles Al-Qaida and the Pakistani Harakat Movement: Reflections and Questions About the Pre-2001 Period by Don Rassler
    PERSPECTIVES ON TERRORISM Volume 11, Issue 6 Articles Al-Qaida and the Pakistani Harakat Movement: Reflections and Questions about the pre-2001 Period by Don Rassler Abstract There has been a modest amount of progress made over the last two decades in piecing together the developments that led to creation of al-Qaida and how the group has evolved over the last 30 years. Yet, there are still many dimensions of al-Qaida that remain understudied, and likely as a result, poorly understood. One major gap are the dynamics and relationships that have underpinned al-Qaida’s multi-decade presence in Pakistan. The lack of developed and foundational work done on the al-Qaida-Pakistan linkage is quite surprising given how long al- Qaida has been active in the country, the mix of geographic areas - from Pakistan’s tribal areas to its main cities - in which it has operated and found shelter, and the key roles Pakistani al-Qaida operatives have played in the group over the last two decades. To push the ball forward and advance understanding of this critical issue, this article examines what is known, and has been suggested, about al-Qaida’s relations with a cluster of Deobandi militant groups consisting of Harakat ul-Mujahidin, Harakat ul-Jihad Islami, Harakat ul-Ansar, and Jaish-e-Muhammad, which have been collectively described as Pakistan’s Harakat movement, prior to 9/11. It finds that each of these groups and their leaders provided key elements of support to al-Qaida in a number of direct and indirect ways.
    [Show full text]
  • Summer 09.Qxd
    David Lewis, senior research fellow in the Department of Peace Studies at the University of Bradford, England, served previously as director of the International Crisis Group’s Central Asia Project, based in Kyrgyzstan. High Times on the Silk Road The Central Asian Paradox David Lewis In medieval times, traders carried jewels, seems like a major threat to the region, spices, perfumes , and fabulous fabrics along since it is so inextricably linked to violent the legendary Silk Route through Central crime and political instability in many other Asia. Today, the goods are just as valuable, parts of the world . More people died in but infinitely more dangerous. Weapons and Mexican drug violence in 2009 than in Iraq. equipment for American troops in Afghan- In Brazil , the government admits about istan travel from west to east, along the 23,000 drug-related homicides each year— vital lifeline of the Northern Supply Route. some ten times the number of civilians In the other direction, an unadvertised, but killed in the war in Afghanistan . And it ’s no less deadly product travels along the not just Latin America that suffers. On same roads, generating billions of dollars in Afghanistan’s border with Iran, there are illicit profits. As much as 25 percent of regular clashes between Iranian counter- Afghanistan’s heroin production is exported narcotics units and drug smugglers. Hun - through the former Soviet states of Central dreds of border guards have been killed Asia, and the UN’s drug experts express over the past decade in fights with heroin grave concerns . Antonio Maria Costa, head and opium traffickers.
    [Show full text]
  • 14819/06 DCL 1 /Dl GSC.SMART.2.C Delegations Will Find Attached The
    Council of the European Union Brussels, 1 August 2018 (OR. en) 14819/06 DCL 1 SCH-EVAL 177 FRONT 221 COMIX 916 DECLASSIFICATION of document: ST14819/06 RESTREINT UE/EU RESTRICTED dated: 10 November 2006 new status: Public Subject: Schengen evaluation of the new Member States - POLAND : report on Land Borders Delegations will find attached the declassified version of the above document. The text of this document is identical to the previous version. 14819/06 DCL 1 /dl GSC.SMART.2.C EN RESTREINT COUNCIL OF Brussels, 10 November 2006 THE EUROPEAN UNION 14819/06 RESTREINT UE SCH-EVAL 177 FRONT 221 COMIX 916 REPORT from: the Land BordersEvaluation Committee to: the Schengen Evaluation Working Party Subject : Schengen evaluation of the new Member States - POLAND : report on Land Borders TABLE OF CONTENTS 1. Introduction .............................................................................................................................. 3 2. Management summary ............................................................................................................... 4 3. General information .................................................................................................................... 5 3.1. Strategy ............................................................................................................................. 5 3.2. Organisational (functional) structure ................................................................................ 9 3.3. Operational effectiveness ...............................................................................................
    [Show full text]
  • DOSTUM: AFGHANISTAN’S EMBATTLED WARLORD by Brian Glyn Williams
    VOLUME VI, ISSUE 8 APRIL 17, 2008 IN THIS ISSUE: DOSTUM: AFGHANISTAN’S EMBATTLED WARLORD By Brian Glyn Williams....................................................................................1 SINO-PAKISTANI DEFENSE RELATIONS AND THE WAR ON TERRORISM By Tariq Mahmud Ashraf................................................................................4 CAPABILITIES AND RESTRAINTS IN TURKEY’S COUNTER-TERRORISM POLICY By Gareth Jenkins...........................................................................................7 AL-QAEDA’S PALESTINIAN INROADS Abdul Rashid Dostum By Fadhil Ali....................................................................................................10 Terrorism Monitor is a publication of The Jamestown Foundation. Dostum: Afghanistan’s Embattled Warlord The Terrorism Monitor is designed to be read by policy- By Brian Glyn Williams makers and other specialists yet be accessible to the general While the resurgence of the Taliban is the focus of interest in the Pashtun south public. The opinions expressed within are solely those of the of Afghanistan, the year started with a different story in the north that many are authors and do not necessarily depicting as one of the greatest challenges to the Karzai government. Namely the reflect those of The Jamestown surreal confrontation between General Abdul Rashid Dostum, the larger-than- Foundation. life Uzbek jang salar (warlord)—who was once described as “one of the best equipped and armed warlords ever”—and one of his former aides [1]. In a move that many critics of the situation in Afghanistan saw as epitomizing Unauthorized reproduction or the Karzai government’s cravenness in dealing with brutal warlords, the Afghan redistribution of this or any government backed away from arresting Dostum after he beat up and kidnapped Jamestown publication is strictly a former election manager and spokesman in Kabul on February 3 (IHT, February prohibited by law.
    [Show full text]
  • The War on Terror and Its Implications for Human Rights in Uzbekistan
    The War On Terror and its Implications for Human Rights in Uzbekistan by Nozima Kamalova Woodrow Wilson International Center for Scholars OCCASIONAL PAPER #296 KENNAN One Woodrow Wilson Plaza 1300 Pennsylvania Avenue, NW INSTITUTE Washington, DC 20004-3027 Tel. (202) 691-4100 Fax (202) 691-4247 www.wilsoncenter.org/kennan ISBN 1-933549-21-1 The Kennan Institute is a division of the Woodrow Wilson International Center for Scholars. Through its programs of residential scholarships, meetings, and publications, the Institute encourages scholarship on the successor states to the Soviet Union, embracing a broad range of fields in the social sciences and humanities. The Kennan Institute is supported by contributions from foundations, corporations, individuals, and the United States Government. Kennan Institute Occasional Papers The Kennan Institute makes Occasional Papers available to all those interested. Occasional Papers are submitted by Kennan Institute scholars and visiting speakers. Copies of Occasional Papers and a list of papers currently available can be obtained free of charge by contacting: Occasional Papers Kennan Institute One Woodrow Wilson Plaza 1300 Pennsylvania Avenue, NW Washington, DC 20004-3027 (202) 691-4100 Occasional Papers published since 1999 are available on the Institute’s web site, www.wilsoncenter.org/kennan This Occasional Paper has been produced with the support of the Program for Research and Training on Eastern Europe and the Independent States of the Former Soviet Union of the U.S. Department of State (funded by the Soviet and East European Research and Training Act of 1983, or Title VIII). The Kennan Institute is most grate- ful for this support.
    [Show full text]
  • Strange Victory: a Critical Appraisal of Operation Enduring Freedom and the Afghanistan War
    30 JANUARY 2002 RESEARCH MONOGRAPH #6 Strange Victory: A critical appraisal of Operation Enduring Freedom and the Afghanistan war Carl Conetta PROJECT ON DEFENSE ALTERNATIVES COMMONWEALTH INSTITUTE, CAMBRIDGE, MASSACHUSETTS Contents Introduction 3 1. What has Operation Enduring Freedom accomplished? 4 1.1 The fruits of victory 4 1.1.1 Secondary goals 5 1.2 The costs of the war 6 1.2.1 The humanitarian cost of the war 7 1.2.2 Stability costs 7 2. Avoidable costs: the road not taken 9 3. War in search of a strategy 10 3.1 The Taliban become the target 10 3.2 Initial war strategy: split the Taliban 12 3.2.1 Romancing the Taliban 13 3.2.2 Pakistan: between the devil and the red, white, and blue 14 3.3 The first phase of the air campaign: a lever without a fulcrum 15 3.3.1 Strategic bombardment: alienating hearts and minds 15 3.4 A shift in strategy -- unleashing the dogs of war 17 4. A theater redefined 18 4.1 Reshuffling Afghanistan 19 4.2 Regional winners and losers 20 4.3 The structure of post-war Afghan instability 21 4.3.1 The Bonn agreement: nation-building or “cut and paste”? 22 4.3.2 Peacekeepers for Afghanistan: too little, too late 24 4.4 A new game: US and Afghan interests diverge 25 4.4.1 A failure to adjust 26 5. The tunnel at the end of the light 28 5.1 The path charted by Enduring Freedom 28 5.2 The triumph of expediency 29 5.3 The ascendancy of Defense 29 5.4 Realism redux 31 5.5 Bread and bombs 32 5.6 The fog of peace 34 Appendix 1.
    [Show full text]
  • December 1999 Zanzibar
    No. 64 SEPTEMBER - DECEMBER 1999 ZANZIBAR - AGREEMENT IN DETAIL TANZANIA LEAVING COMESA MREMA CHANGES PARTY AGAIN CUF ADVANCES ON THE MAINLAND FIVE-YEAR-OLD TANZANIAN 'MESSIAH' £8,000 FOR TANZANIAN PAINTING ZANZIBAR - THE AGREEMENT On the day (June 10, 1999) that the media of the world were trumpeting the end of the war in the Balkans and the signing of a peace treaty, the beginning of week-long celebrations surrounding another peace treaty went virtually unnoticed in the world outside. After 1,225 days of political impasse in Zanzibar, an agreement, put together by Commonwealth Secretary General Chief Anyaoku and his negotiator Dr Moses Anafu after four years of effort, was signed between representatives of the combative political parties in the Isles - Mr Khatib Hassan, a member of the National Executive Committee for the ruling Chama cha Mapinduzi (CCM) party and Mr Shabaan Mloo, Secretary General of the opposition Civic United Front (CUF) for his party. Special prayers were read at the ceremony in the House of Representatives and seven white pigeons were released. A multitude of guests attended a dinner in the evening and heard President Amour say: "I can now welcome to State House myoid friend Maalim Seif (a term of affection for Seif Shariff Hamad, the CUF leader) for a bottle of soda, a cup of coffee or even haluwa. In a convivial atmosphere he added "You and I understand each other, CCM and CUF understand each other, let us build the nation patriotically". Chief Anyaoku, who was given honorary Zanzibar citizenship said in his speech that Zanzibar was now 'the real pearl of Africa'.
    [Show full text]