Secrecy, Acknowledgement, and War Escalation: a Study in Covert Competition

Total Page:16

File Type:pdf, Size:1020Kb

Secrecy, Acknowledgement, and War Escalation: a Study in Covert Competition Secrecy, Acknowledgement, and War Escalation: A Study in Covert Competition DISSERTATION Presented in Partial Fulfillment of the Requirements for the Degree Doctor of Philosophy in the Graduate School of The Ohio State University By Austin Matthews Carson, M.A. Graduate Program in Political Science The Ohio State University 2013 Dissertation Committee: Randall Schweller, Advisor Richard Herrmann Jennifer Mitzen Copyrighted by Austin Matthews Carson 2013 Abstract Why do states use secrecy? Specifically, why do great powers often seem to create a kind of “backstage” area around local conflicts? That is, why create a covert realm where external powers can meddle in local conflicts to pursue their security interests? This project generally analyzes how secrecy is used in international politics and why states are individually and collectively motivated to use it. Existing scholarship suggests states use secrecy to surprise their adversaries or insulate their leaders from dovish domestic political groups. I develop an alternative logic rooted in the desire to control conflict escalation risks. In the context of interventions in local conflicts by outside powers, I find intervening states use covert methods to maintain control over the perceptions and interpretations of outside audiences whose reactions determine the magnitude of external pressure on leaders to escalate further. Intervening in a secret, plausibly deniable manner makes restraint and withdrawal on the part of the intervening state easier. It also creates ambiguity about their role which can give the political space to responding states to ignore covert meddling and respond with restraint. Escalation control dynamics therefore make sense of why states intervene secretly and, more puzzling, why other states – even adversaries – may join in ignoring and covering up such covert activity (what I call “tacit collusion”). ii Drawing on Erving Goffman and others, I develop an “impression management” theory for why states individually and jointly use secrecy and political denial to achieve their goals. To illustrate several new concepts and evaluate the theory’s value-added, I use a sophisticated comparative case study research design that leverages within- and between- case variation in the Korean War, Spanish Civil War, and the civil war in Soviet- occupied Afghanistan. Each conflict hosts several external interventions and several opportunities for tacit collusion; variation among these outcomes helps distinguish the relative importance of escalation and other considerations. Together, the conflicts span the early and late Cold War as well as a particularly important set of cases in the pre- bipolar, pre-nuclear 1930s. Similar findings across time and space suggest the generalizability of the findings. My data are drawn primarily from primary documentation from internal decision-making and assessments, including original archival research on the American awareness of and reaction to Soviet pilots fighting in the air war over Korea in the early 1950s. The project attempts to contribute to scholarly and policy knowledge in several ways. It provides a rare window into the tactics and politics of covert security competition, a set of practices that remain alive and well in places like the Middle East. The project also offers new historical findings, presents a novel theoretical framework for understanding how states manage publicity and use secrecy in international affairs, and helps better understand the difficult dilemma between political accountability and secrecy in foreign policy in democracy. iii Dedicated to Bruce and Nancy, for years of unwavering affection and support and Sarah, for her love and companionship iv Acknowledgments I have had the good fortune of working with incredibly supportive colleagues and friends without whom this dissertation could not have been completed. My dissertation advisor, Randy Schweller, provided the precious intellectual resources of trust and autonomy, steadily encouraging me to write well and think ambitiously. Rick Herrmann provided reliable, encouraging and constructively critical feedback. Jennifer Mitzen provided invaluable input for the project’s theory and framing; her wisdom was always only a phone call away. Equally important was my “shadow committee” of Alex Downes and Alex Thompson to whom I repeatedly turned for advice and friendship. Bentley Allan, my most important sounding board and a dear friend, has my sincere gratitude for his patience, wisdom, and shared love of General Tso’s tofu. Jason Keiber accomplished a rare triple play of friendship, introducing me to my future wife, presiding over our wedding, and providing hilarious and insightful commentary along the way. My parents, Nancy and Bruce, my sister Jess, and my Grand Rapids crew (Sean Ferguson, Jason O’Callaghan, Joe Perry) provided love, laughter, and a safe haven when I needed a break from Columbus. Other friends and colleagues who provided advice and support include Justin Acome, Bear Braumoeller, Jon Brown, Zoltan Buzas, Erin Graham, Eric Grynaviski, Josh Kertzer, Julia MacDonald, Sebastien Mainville, Eleonora Mattiacci, Josh Shifrinson, Caitlin Talmadge, Jane Vaynman, and Tristan Volpe. v My journey included a fairly abrupt left turn in the direction of Washington, D.C in 2011. Two institutions provided invaluable support that made my circuitous route to degree an asset rather than burden. The Ohio State University’s Political Science Department and George Washington University’s Institute for Security and Conflict Studies (ISCS) in the Elliott School of International Affairs deserve eternal gratitude. I am thankful for the resources and opportunities provided by both, especially from two department chairs at Ohio State (Herb Weisberg; Rick Herrmann) and the leadership duo at ISCS (Charlie Glaser; Rose Kelanic). Most importantly, Sarah Bryner’s companionship was the steady rock that helped me through the vicissitudes of graduate school. Her love is the most valuable gift the Buckeye State has provided. As always, I alone am responsible for any shortcomings in what follows that the wisdom of others could not root out. vi Vita 2003................................................................B.A. International Relations, James Madison College, Michigan State University 2003-2005 ......................................................Research Assistant, Center for Strategic & International Studies 2009................................................................M.A. Political Science, Ohio State 2012-2013 ......................................................Predoctoral Research Fellow, Institute for Security and Conflict Studies, George Washington University Publications “Political Irrelevance, Democracy, and the Limits of Militarized Conflict”. Journal of Conflict Resolution, Volume 55, No. 2, April 2011, 292-320 (with Bear Braumoeller). Fields of Study Major Field: Political Science vii Table of Contents Abstract ............................................................................................................................... ii Acknowledgments............................................................................................................... v Vita .................................................................................................................................... vii Table of Contents ............................................................................................................. viii List of Tables ...................................................................................................................... x List of Figures .................................................................................................................... xi Chapter 1: Introduction ...................................................................................................... 1 The Public and Private Lives of States............................................................................ 6 Theorizing Secrecy .......................................................................................................... 8 Theory, Part 1: Secrecy in Impression Management ................................................... 12 Theory, Part 2: Impression Management in Intervention Scenarios ............................ 13 Empirical Analysis: An Overview ............................................................................... 15 Chapter Summaries ....................................................................................................... 16 Chapter 2: Secrecy’s Continuity and Change in International Affairs ............................ 24 Three Forms of Secrecy ................................................................................................ 27 Historical Context: Continuity and Change ................................................................. 31 Continuity ...................................................................................................................... 32 Change ........................................................................................................................... 42 Why Change? ................................................................................................................ 54 Conclusion ..................................................................................................................... 62 Chapter 3: Theory ...........................................................................................................
Recommended publications
  • Inside the Covert War Against Terrorism's Money Masters, by Nitsana Darshan- Leitner and Samuel M
    Annotated List of New Resources at The Kaufman Silverberg Library January 2018 For our searchable catalogue go to www.winnipegjewishlibrary.ca Our Facebook Page www.fb.com/kaufmansilverberglibrary Adult Judaic Non Fiction Harpoon: inside the covert war against terrorism's money masters, by Nitsana Darshan- Leitner and Samuel M. Katz. Offers a gripping story of the Israeli-led effort, now joined by the Americans, to choke off the terrorists' oxygen supply, money, via unconventional warfare. Call number: Z 953.23 DAR Judaic Fiction The luminous heart of Jonah S., by Gina B. Nahai. The Soleymans, an Iranian Jewish family, are tormented for decades by Raphael's Son, a crafty and unscrupulous financier who has futilely claimed to be an heir to the family's fortune. Forty years later in contemporary Los Angeles, Raphael's Son has nearly achieved his goal--until he suddenly disappears, presumed by many to have been murdered. Call number: Z FIC NAH General Non-Fiction Survival skills of the Native Americans: hunting, trapping, woodwork and more, edited by Stephen Brennan. A practical guide to the techniques that have made the indigenous people of North America revered for their mastery of the wilderness. Readers can replicate outdoor living by trying a hand at making rafts and canoes, constructing tools, and living off the land. Call number: 970.4 BRE General Fiction The buried giant, by Kazuo Ishiguro. The Buried Giant begins as a couple set off across a troubled land of mist and rain in the hope of finding a son they have not seen in years.
    [Show full text]
  • Venezuelan Masses Build Resistance to U.S. Covert
    Venezuela se moviliza 12 Socialismo y juventud 12 Workers and oppressed peoples of the world unite! workers.org Vol. 61 No. 12 March 21, 2019 $1 Editorial Venezuelan masses build Combat resistance to U.S. covert war Islamophobia By Sam Ordóñez worldwide! The world reverberated on March 15 to the horrify- March 17—A massive anti-imperialist march filled ing news that 50 people had been murdered and scores the streets of Caracas this Saturday, March 16, cele- wounded, some critically, at the Al Noor and Linwood brating another victory against the latest wave of U.S. mosques in Christchurch, New Zealand. aggression against Venezuela. We knew immediately, without the shadow of a This mobilization is another example of the increas- doubt, that this was an act of white supremacist ter- ing organization and mobilization of the Venezuelan ror, aimed specifically at Muslim people. Here in the masses. The latest phase of imperialist aggression was U.S., the act called up the heart-wrenching memory of designed to destroy the Bolivarian Revolution, but white supremacist murders of African-American peo- instead it has sparked a new wave of working-class, ple at a Bible class in the Emanuel African Methodist anti-imperialist organization. Episcopal Church in Charleston, S.C., in 2015, and of Venezuela’s conflict with imperialism seems to Jewish people at worship in the Tree of Life Synagogue be entering a period of prolonged siege, where the in Pittsburgh in 2018. Venezuelan masses’ ability to organize and develop Attacks of white terror and white supremacy continue domestic production, along with the strength of the worldwide.
    [Show full text]
  • CLASSICAL CRYPTOGRAPHY COURSE by LANAKI February 22
    CLASSICAL CRYPTOGRAPHY COURSE BY LANAKI February 22, 1996 Revision 0 COPYRIGHT 1996 ALL RIGHTS RESERVED LECTURE 8 INTRODUCTION TO CRYPTARITHMS AND HILL CIPHER SUMMARY In Lecture 8, we depart from the schedule for a real treat. In the first part of this Lecture, we introduce Cryptarithms by our guest lecturer LEDGE (Dr. Gerhard D. Linz). LEDGE has already produced one of our better references on beginning cryptography [LEDG], and I appreciate his assistance in our course. The cryptarithms portion of this course will be presented in three lectures and for the final book labelled Lectures 20 - 23. Following the Cryptarithms section we introduce the Hill Cipher. Our second guest lecturer is NORTH DECODER. Dr. Jerry Metzger and his team are presenting you with the Crypto Drop Box and the ACA-L Listserver. The Hill cipher has six GIF files associated with it and can be found at the CDB. Waiting in wings patiently for my resource materials is TATTERS to present Cipher Exchange problems. INTRODUCTION TO CRYPTARITHMS (by LEDGE) Here's the first of the Cryptarithm lectures. It consists of a general introduction to the genre including how to read the problems. That's followed by an explanation of modulo arithmetic. Then we look at how to identify the letters that represent 0, 1 and 9, called digital characteristics. Then there are two sections on making inferences, each demonstrating a problem solution. Finally, there's a section on extracting square roots. Next lecture LEDGE will give some aids for solving multiplication problems and then go into base 11 and base 12 arithmetic.
    [Show full text]
  • NATO Intelligence Sharing in the 21 Century
    NATO Intelligence Sharing in the 21st Century Columbia School of International and Public Affairs Capstone Research Project, Spring 2013 RESEARCH TEAM FACULTY ADVISOR Keenan Mahoney Dr. Joshua Rovner [email protected] [email protected] Nemanja Mladenovic [email protected] Salvador Molina [email protected] Adam Scher [email protected] Selma Stern [email protected] Christopher Zoia [email protected] TABLE OF CONTENTS Executive Summary 3 Introduction & Framework 4 France 8 Germany 18 Italy 28 Turkey 41 Conclusion 55 Notes 57 Appendix 65 2 EXECUTIVE SUMMARY This report analyzes the opportunities and obstacles for intelligence sharing with select NATO members: France, Germany, Italy, and Turkey. In addition to describing the history, organizational structure, and capabilities of these members’ civilian and military intelligence organizations, the report provides a framework for assessing a country’s propensity to share intelligence based on the following six factors: strategic priorities, security environment, established partnerships, intelligence capabilities, and culture. We hope this framework can serve as an enduring analytical tool for intelligence scholars and practitioners. Based on our research, we conclude the following about the prospects for intelligence sharing with France, Germany, Italy, and Turkey: Due to the insular nature of France’s secret services and the lack of legislative oversight, France’s propensity to share intelligence will depend on the characteristics of its potential partners. France will be likely to share if the partner is involved in similar areas of strategic interest, if it is affected by an event that causes a sense of crisis in France, if there are mutual “boots on the ground,” or if the partner is a member of Five Eyes.
    [Show full text]
  • American Military History: a Resource for Teachers and Students
    AMERICAN MILITARY HISTORY A RESOURCE FOR TEACHERS AND STUDENTS PAUL HERBERT & MICHAEL P. NOONAN, EDITORS WITH AN INTRODUCTION BY WALTER A. MCDOUGALL AUGUST 2013 American Military History: A Resource for Teachers and Students Edited by Colonel (ret.) Paul H. Herbert, Ph.D. & Michael P. Noonan, Ph.D. August 2013 About the Foreign Policy Research Institute Founded in 1955 by Ambassador Robert Strausz-Hupé, FPRI is a non-partisan, non-profit organization devoted to bringing the insights of scholarship to bear on the development of policies that advance U.S. national interests. In the tradition of Strausz-Hupé, FPRI embraces history and geography to illuminate foreign policy challenges facing the United States. In 1990, FPRI established the Wachman Center, and subsequently the Butcher History Institute, to foster civic and international literacy in the community and in the classroom. About First Division Museum at Cantigny Located in Wheaton, Illinois, the First Division Museum at Cantigny Park preserves, interprets and presents the history of the United States Army’s 1st Infantry Division from 1917 to the present in the context of American military history. Part of Chicago’s Robert R. McCormick Foundation, the museum carries on the educational legacy of Colonel McCormick, who served as a citizen soldier in the First Division in World War I. In addition to its main galleries and rich holdings, the museum hosts many educational programs and events and has published over a dozen books in support of its mission. FPRI’s Madeleine & W.W. Keen Butcher History Institute Since 1996, the centerpiece of FPRI’s educational programming has been our series of weekend-long conferences for teachers, chaired by David Eisenhower and Walter A.
    [Show full text]
  • Studia Securitatis 2 2019
    Lucian Blaga University of Sibiu Faculty of Social Sciences and Humanities Department of International Relations, Political Science and Security Studies STUDIA SECURITATIS Security Studies Magazine Two Issues/Year Volume XIII No. 2/2019 ISSN: 1843-1925 1 INTERNATIONAL AFFILIATION: CEEOL: http://www.ceeol.com/ EBSCO: http://www.ebscohost.com/ ERIHPLUS: https://dbh.nsd.uib.no/publiseringskanaler /erihplus INDEX COPERNICUS: http://www.indexcopernicus.com/ ULRICH'S PERIODICAL DIRECTORY: http://ulrichsweb.serialssolutions.com/ INFOBASE INDEX: http://www.infobaseindex.com/ SOCIONET.RU: http://socionet.ru/ RESEARCHBIB: http://www.researchbib.com/ MIAR: http://miar.ub.edu GLOBAL IMPACT & QUALITY FACTOR: http://globalimpactfactor.com/ 2 BOARD EDITORIAL BOARD: CHIEF-EDITOR: Gra țian Lupu CO-EDITORS: Cristian Troncot ă, Gabriel Șerban, Nicoleta Annemarie Munteanu, Marius Șpechea, Iustin Vancea, Emilia Tomescu, Iuliana Neago ș SCIENTIFIC BOARD: • Corvin Lupu (Founder Studia Securitatis) • Eugen Str ăuțiu (Lucian Blaga University of Sibiu) • Marc Chesnel (Académie des Belles-Lettres Sciences et Arts de la Rochelle) • Siegmar Schmidt (Universität Koblenz-Landau) • Liubiša Despotovi ć (Institute for Political Studies, Belgrade) • Gheorghe Bichicean (Romanian-German University of Sibiu) • Alexandr Dughin (Lomonosov University of Moscow) • Valeriu Mo şneaga (State University of Moldova, Chi şin ău) • Antonio Nadal (University of Malaga) • Dan Dungaciu (Institute of Political Science and International Relations, Romanian Academy, Bucharest) • Tomasz B
    [Show full text]
  • COINTELPRO.S.Pdf
    COINTELPRO, FBI Counterintelligence, Covert Operations, Black Bag Jobs, Church Committee COINTELPRO http://www.icdc.com/~paulwolf/cointel.htm (1 of 7) [9/3/2001 11:33:41 AM] COINTELPRO, FBI Counterintelligence, Covert Operations, Black Bag Jobs, Church Committee COINTELPRO was the FBI's secret program to undermine the popular upsurge which swept the country during the 1960s. Though the name stands for "Counterintelligence Program," the targets were not enemy spies. The FBI set out to eliminate "radical" political opposition inside the US. When traditional modes of repression (exposure, blatant harassment, and prosecution for political crimes) failed to counter the growing insurgency, and even helped to fuel it, the Bureau took the law into its own hands and secretly used fraud and force to sabotage constitutionally - protected political activity. Its methods ranged far beyond surveillance, and amounted to a domestic version of the covert action for which the CIA has become infamous throughout the world. The COINTELPRO Papers: Documents from the FBI's Secret Wars Against Dissent in the United States by Ward Churchill & Jim Vander Wall Preface - The Face of COINTELPRO HTML Index to the Documents Introduction - A Glimpse Into the Files of America's Political Police Chapter 1 - Understanding Deletions in FBI Documents Chapter 2 - COINTELPRO - CP/USA Chapter 3 - COINTELPRO - SWP Chapter 4 - COINTELPRO - Puerto Rican Independence Movement Chapter 5 - COINTELPRO - Black Liberation Movement Chapter 6 - COINTELPRO - New Left Chapter 7 - COINTELPRO
    [Show full text]
  • The Americans: Domesticity and Regendering of Classical Spy Narratives
    Brno Studies in English Volume 44, No. 1, 2018 ISSN 0524-6881, e-ISSN 1805-0867 https://doi.org/10.5817/BSE2018-1-7 Esther Muñoz-González The Americans: Domesticity and Regendering of Classical Spy Narratives Abstract In this article an analysis is made of the first season of the television series The Americans from a cultural perspective which shows the relevance of the series within the context of the first decades of the 21st century. The series belongs to a specific genre that used to be masculine and mainly centered on the conflicts resulting from the confrontation between individual male loyalties and their identities conditioned by their belonging to a political order. By humanizing the usual villains in the spy genre, the series introduces a certain moral ambiguity and the idea that political ideologies lose their value in the face of individual motivations. This article explores the use of the conventions of the spy genre and how the model is adapted to allow for the treatment of present-day concerns related to the individual’s struggle (now female as well) to reconcile public and private life. Keywords Spy genre; female spies; public vs private; professional women/family; indi- vidual isolation 1. Introduction In the years after World War II and during the Cold War, there was a pressing need for inhabiting a ‘safe place’ that had to be protected from the destruction that World War II had caused. And it is precisely this vulnerability of citizens’ homes and by extension of their nations that functions as “ideological motiva- tion” for spies.
    [Show full text]
  • Codebreakers
    Some of the things you will learn in THE CODEBREAKERS • How secret Japanese messages were decoded in Washington hours before Pearl Harbor. • How German codebreakers helped usher in the Russian Revolution. • How John F. Kennedy escaped capture in the Pacific because the Japanese failed to solve a simple cipher. • How codebreaking determined a presidential election, convicted an underworld syndicate head, won the battle of Midway, led to cruel Allied defeats in North Africa, and broke up a vast Nazi spy ring. • How one American became the world's most famous codebreaker, and another became the world's greatest. • How codes and codebreakers operate today within the secret agencies of the U.S. and Russia. • And incredibly much more. "For many evenings of gripping reading, no better choice can be made than this book." —Christian Science Monitor THE Codebreakers The Story of Secret Writing By DAVID KAHN (abridged by the author) A SIGNET BOOK from NEW AMERICAN LIBRARV TIMES MIRROR Copyright © 1967, 1973 by David Kahn All rights reserved. No part of this book may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording or by any information storage and retrieval system, without permission in writing from the publisher. For information address The Macmillan Company, 866 Third Avenue, New York, New York 10022. Library of Congress Catalog Card Number: 63-16109 Crown copyright is acknowledged for the following illustrations from Great Britain's Public Record Office: S.P. 53/18, no. 55, the Phelippes forgery, and P.R.O. 31/11/11, the Bergenroth reconstruction.
    [Show full text]
  • Nicole Bauer, University of North Carolina at Chapel Hill
    The Fate of Secrets in a Public Sphere: the Comte de Broglie and the Demise of the Secret du roi Nicole Bauer, University of North Carolina at Chapel Hill In every century, secrecy has been a part of the diplomatic game and the sine qua non of espionage. For Louis XV, however, secrecy became a volatile weapon that did him more harm than good, especially at the end of his reign. Like fire, secrets sometimes took a life of their own and burned those clandestinely serving the king instead of enemies—even Louis XV became a victim of his own espionage. In the end, he himself was burned. In the middle decades of the eighteenth century, Louis XV conducted a secret foreign policy with a network of spies, run for much of its existence until the end by the Comte de Broglie. This network was referred to as the secret du roi by its own members and initiates, and sometimes merely as “the secret.” The secret du roi often went counter to his official policy and was conducted behind the backs of his ministers. This on the surface is puzzling. Why have two policies that worked at cross purposes and that prompted government officials to be at odds with one another, keeping secrets from one another and certainly not facilitating an efficient flow of information? It may help to think of secrets as political currency. In royal courts, keeping one’s secrets hidden while learning those of potential enemies was essential to survival. Louis XV had taken the advice of his predecessor, Louis XIV, to heart: that a king should always have several sources of information, preferably unknown to one another.
    [Show full text]
  • SARAH HOROWITZ FRIENDSHIP and POLITICS
    FRIENDSHIP and POLITICS IN POST-REVOLUTIONARY FRANCE SARAH HOROWITZ FRIENDSHIP and POLITICS in POST- REVOLUTIONARY FRANCE FRIENDSHIP and POLITICS in POST- REVOLUTIONARY FRANCE SARAH HOROWITZ The Pennsylvania State University Press University Park, Pennsylvania Library of Congress Cataloging- in- Publication Data Horowitz, Sarah, 1978– author. Friendship and politics in post-revolutionary France / Sarah Horowitz. p. cm Summary: “Explores the place of friendship in helping French society and the political system recover from the upheaval of the Revolution. Examines the interdependence of public and private in post-revolutionary France, as well as the central role of women in political reconstruction”—Provided by publisher. Includes bibliographical references and index. ISBN 978-0-271-06192-4 (cloth : alk. paper) 1. Friendship—Political aspects—France—History—19th century. 2. France—Politics and government—19th century. 3. Political culture—France—History—19th century. 4. Politicians—France—Social life and customs—19th century. 5. Politicians—Social networks—France—History—19th century. 6. Women—Political activity—France—History—19th century. I. Title. dc252.h67 2013 306.20944'09034—dc23 2013027155 Copyright © 2013 The Pennsylvania State University All rights reserved Printed in the United States of America Published by The Pennsylvania State University Press, University Park, PA 16802-1003 The Pennsylvania State University Press is a member of the Association of American University Presses. It is the policy of The Pennsylvania State University Press to use acid- free paper. Publications on uncoated stock satisfy the minimum requirements of American National Standard for Information Sciences—Permanence of Paper for Printed Library Material, ansi z39.48–1992. This book is printed on paper that contains 30% post-consumer waste.
    [Show full text]
  • Afghanistan the Genesis of the the Final Crusade by Abid Ullah
    Afghanistan: The Genesis of the the Final Crusade Afghanistan: The Genesis of the Final Crusade Afghanistan: The Genesis of the Final Crusade ABID ULLAH JAN Pragmatic Publishing Ottawa Afghanistan: The Genesis of the Final Crusade Copyright © 2006 by Pragmatic Publishing, Canada Trade paperback/bound edition March 2006 All rights reserved. The use of any part of this publication reproduced, stored in any retrieval system, or transmitted in any forms or by any means, electronic or otherwise, without prior written consent of the publisher — or, in case of photocopying or other reprographic copying, a license from the Canadian Copyright Licensing Agency — is an infringement of the copyright law. Library and Archives Canada Cataloguing in Publication Jan, Abid Ullah, 1965- Afghanistan : the genesis of the final crusade / Abid Ullah Jan. Includes bibliographical references and index. ISBN 0-9733687-4-8 (bound).--ISBN 0-9733687-2-1 (pbk.) 1. Afghan War, 2001-. 2. War on Terrorism, 2001-. I. Title. DS371.412.J35 2006 958.104’6 C2006-900587-7 All sources have been referenced and acknowledged. The author and publisher welcome any information enabling them to rectify any error or omission in future editions. PRAGMATIC PUBLISHING Web: http://www.pragmaticpublishings.com/ Contents PREFACE 9 INTRODUCTION The Pre-planned Aggression 13 CHAPTER 1 The Motivational Force Behind The War 33 CHAPTER 2 The Architects of War 61 The Main Reason for the Crusade 70 Faith in Force or Super-fascism 75 The Fear of Khilafah, Not “Terrorism” 77 CHAPTER 3 The Real Challenge 85 CHAPTER 4 From Jihad to Crusade 113 Beginning Of the Last Crusade 125 Crusaders vs.
    [Show full text]