Terrorism and Global Security

Total Page:16

File Type:pdf, Size:1020Kb

Terrorism and Global Security GLOBAL ISSUES TERRORISM AND GLOBAL SECURITY Ann E. Robertson Foreword by James O Ellis III Memorial Institute for the Prevention of Terrorism 0i-viii_GI_Terrorism_fm.indd i 8/1/07 4:31:46 PM GLOBAL ISSUES: TERRORISM AND GLOBAL SECURITY Copyright © 2007 by Infobase Publishing All rights reserved. No part of this book may be reproduced or utilized in any form or by any means, electronic or mechanical, including photocopying, recording, or by any information storage or retrieval systems, without permission in writing from the publisher. For information contact: Facts On File, Inc. An imprint of Infobase Publishing 132 West 31st Street New York NY 10001 ISBN-10: 0-8160-6766-X ISBN-13: 978-0-8160-6766-4 Library of Congress Cataloging-in-Publication Data Robertson, Ann E. Terrorism and global security / Ann E. Robertson; foreword by James O Ellis III. p. cm. Includes bibliographical references and index. ISBN 0-8160-6766-X (acid free paper) 1. Terrorism—United States. 2. Terrorism—Case studies 3. Terrorism— Psychology. 4. Terrorism. 5. Security, International. I. Title. HV6432.R59 2007 363.3250973—dc22 2006029477 Facts On File books are available at special discounts when purchased in bulk quantities for businesses, associations, institutions, or sales promotions. Please call our Special Sales Department in New York at (212) 967-8800 or (800) 322-8755. You can fi nd Facts On File on the World Wide Web at http://www.factsonfi le.com Text design by Erika K. Arroyo Cover design by Salvatore Luongo Diagrams by Jeremy Eagle Printed in the United States of America MP Hermitage 10 9 8 7 6 5 4 3 2 1 Th is book is printed on acid-free paper. 0i-viii_GI_Terrorism_fm.indd ii 8/1/07 4:31:46 PM CONTENTS1 j Foreword by James O Ellis III v PART I: At Issue Chapter 1 Introduction 3 Chapter 2 Focus on the United States 42 Chapter 3 Global Perspectives 84 PART II: Primary Sources Chapter 4 United States Documents 125 Chapter 5 International Documents 183 PART III: Research Tools Chapter 6 How to Research Terrorism and Global Security 257 Chapter 7 Facts and Figures 269 Chapter 8 Key Players 277 0i-viii_GI_Terrorism_fm.indd iii 8/1/07 4:31:46 PM Chapter 9 Organizations and Agencies 304 Chapter 10 Annotated Bibliography 314 Chronology 346 Glossary 377 Index 385 0i-viii_GI_Terrorism_fm.indd iv 8/1/07 4:31:46 PM j Foreword Th ough Edmund Burke coined the term terrorism in the 18th century to describe Robespierre’s Reign of Terror during the French Revolution, acts of terrorism have been documented as early as 66 c.e. between the Zealots and the Romans. Th roughout time, it has reappeared as an instrument of ma- nipulation and desperation for those who think they require fear to further their cause. At its heart, terrorism is a method to gain social, economic, and political concessions and to provoke change, often through the appearance of government overreaction or underreaction to violence against civilians. Despite its ancient roots, terrorism has only received formal study for a few decades. Much of the scholarship on terrorism has focused almost exclusively on international terrorism—terrorism involving the citizens of more than one country. As this book helps to make clear, however, terrorism is usually a domestic phenomenon. Within the United States, groups such as the Ku Klux Klan have long sown violence and hate, and terrorism has been a part of this country’s story since its founding. For most of the 19th and early 20th centuries, the major form of terror- ism confronting the United States came from within the country rather than without. Anarchists, anti-alienists, and violent labor movements perpetrated the majority of terrorist acts during this time period. Radicals called for “pro- paganda by the deed” and depended upon the “philosophy of the bomb.” Un- abashedly proclaiming themselves to be terrorists, some anarchists sought to inspire the masses to revolution through spectacular acts of terrorism meant to show that the powerful could be made vulnerable. Th is violence spread into parts of the labor movement, sparking explosions at bridges and factories across the country. Prominent government and business fi gures, including John D. Rockefeller, J. P. Morgan, and Supreme Court Justice Oli- ver Wendell Holmes were also targeted. In September 1919, a huge bomb exploded on Wall Street, damaging the headquarters of J. P. Morgan and the stock exchange, killing 29 people. v 0i-viii_GI_Terrorism_fm.indd v 8/1/07 4:31:46 PM TERRORISM AND GLOBAL SECURITY Following the end of World War II, terrorism in the United States in- creasingly came from extreme left, right, and nationalist-separatist groups. Domestic unrest emerged from the Civil Rights movement and the anti– Vietnam War movement. Th ough both of these movements had admirable aims and ultimately changed the character of our society, elements associ- ated with them perpetrated considerable violence and terrorism. Left-wing radical terrorists pursued open class warfare and revolution against what they perceived to be an oppressive and racist capitalist system. Groups such as the Symbionese Liberation Army, the New World Liberation Front, and the Weather Underground used violence in the name of the poor or for social justice. Th ese organizations were often fellow travelers with African-Ameri- can separatist groups that occasionally resorted to terrorist activity, such as the Black Liberation Army or the Black Panther Party, whose members con- ducted two hijackings. Other notable nationalist or separatist groups during this period have included the Cuban Omega-7, the Croatian Freedom Fight- ers, and the Puerto Rican Armed Forces of National Liberation (FALN). As you will read, Puerto Rican nationalists have carried out hundreds of attacks, including an attempt to assassinate President Harry S. Truman and an assault in the gallery of the U.S. House of Representatives. American right-wing extremists, on the other hand, have often employed terrorism to preserve the status quo or restore previously existing circum- stances. Th ese groups often embrace some form of racism, anti-Semitism, and anti-government rhetoric as part of their ideology. Organizations such as Posse Comitatus and Th e Order oppose taxes and gun control, while others focus on white supremacy and survivalism. Many within this movement have been inspired by William Pierce’s book, Th e Turner Diaries, which provided a blueprint for the violent overthrow of the U.S. government and helped inspire Timothy McVeigh to commit the Oklahoma city bombing on April 19, 1995. Some right-wing groups include an element of separatism as well, such as the Aryan Nations, which has sought the creation of an independent, whites-only homeland. In discussing right-wing terrorists, however, it is important to remember that militia members and survivalists are not always terrorists. Militias, however, often provide an environment where terrorist groups and lone wolves can grow and fl ourish. In recent times, secular ter- rorists have lost momentum when compared to religious fanatics. Much has been written about the current wave of Islamic fundamental- ist terrorism targeting western countries in general and the United States in particular. However, many fail to appreciate the signifi cant history of other types of religious extremist terrorism. For example, members or groups such as the Jewish Defense League and Kach have been responsible for bombings, shootings, arson, and kidnapping. Members of the Sikh faith have also used terrorism in America including several murders and bombings. Cults and vi 0i-viii_GI_Terrorism_fm.indd vi 8/1/07 4:31:47 PM ChapterForeword Title religious sects have even resorted to bioterrorism, as was the case with the mass poisoning by the Bhagwan Shree Rajneeshees in Oregon. Th is volume also describes the acts of the Covenant, Sword and Arm of the Lord—a Christian fundamentalist terrorist group. Some of these Christian Identity followers assert that the white Aryan race is God’s chosen race, that whites comprise the lost tribes of Israel, and that a cleansing process must occur be- fore Christ’s kingdom can be established on earth. Th is cleansing may only be brought about by a violent and bloody struggle—a war between God’s forces and the forces of evil. Th ey use violence to punish violators of God’s law, kill- ing interracial couples, abortionists, prostitutes, and homosexuals, burning pornography stores, robbing banks, and perpetrating frauds to undermine the “usury system.” Since the attacks of September 11, 2001, attention to terrorism has in- creased dramatically, though it has been a feature of the political and cultural landscape of America throughout its history. No one category of people has monopolized the use of terrorism in the United States. Groups from many political ideologies, religious persuasions, nationalities, and ethnicities have been associated with extremist violence at one time or another in the United States. Indeed, the groups, causes, and incidents are so vast and varied that it is very diffi cult to give a comprehensive overview, but Dr. Robertson is to be commended for the thorough survey that follows. It is important to remember that it is not the political or religious view that makes one a ter- rorist, nor is there anything inherently suspect about holding unconventional or even radical views. Th e advocacy and use of these ideas as the basis for violence, however, moves beyond the acceptable dialogue, debate, and pro- test enshrined in the American system. In a democratic society, taking up arms in furtherance of a cause is a sign of weakness, not strength, and those who do so admit their own inability to convince others through a reasonable exchange of ideas. In the modern age, terrorism often takes the form of assassinations, bombings, kidnappings, hostage situations, hijackings, arson, and armed assaults.
Recommended publications
  • Counter-Terrorism 1 Counter-Terrorism
    Counter-terrorism 1 Counter-terrorism WARNING: Article could not be rendered - ouputting plain text. Potential causes of the problem are: (a) a bug in the pdf-writer software (b) problematic Mediawiki markup (c) table is too wide United States Coast GuardCoast Guard on counter-terrorism patrol in Upper New York Bay. Verrazano-Narrows Bridge in distance spanning The Narrows between Brooklyn (left) and Staten Island (right).TerrorismDefinitions of terrorismDefinitionsHistory of terrorismHistoryList of terrorist incidentsIncidents Counter-terrorism (also spelled counterterrorism) incorporates the practices, Military tacticstactics, techniques, and strategies that governments, militarymilitaries, police departments and corporations adopt to attack terrorist threats and/or acts, both real and imputed.The tactic of terrorism is available to insurgencyinsurgents and governments. Not all insurgents use Fearterror as a tactic, and some choose not to use it because other tactics work better for them in a particular context. Individuals, such as Timothy McVeigh, may also engage in terrorist acts such as the Oklahoma City bombing. If the terrorism is part of a broader insurgency, counter-terrorism may also form a part of a counter-insurgency doctrine, but political, economic, and other measures may focus more on the insurgency than the specific acts of terror. Foreign internal defense (FID) is a term used for programs either to suppress insurgency, or reduce the conditions under which insurgency could develop. Counter-terrorism includes both the detection of potential acts and the response to related events. PlanningUnited States Customs and Border Protection officers, fully armed and armored for a counter-terrorism operationMost counter-terrorism strategies involve an increase in standard police and domestic intelligence.
    [Show full text]
  • Mcallister Bradley J 201105 P
    REVOLUTIONARY NETWORKS? AN ANALYSIS OF ORGANIZATIONAL DESIGN IN TERRORIST GROUPS by Bradley J. McAllister (Under the Direction of Sherry Lowrance) ABSTRACT This dissertation is simultaneously an exercise in theory testing and theory generation. Firstly, it is an empirical test of the means-oriented netwar theory, which asserts that distributed networks represent superior organizational designs for violent activists than do classic hierarchies. Secondly, this piece uses the ends-oriented theory of revolutionary terror to generate an alternative means-oriented theory of terrorist organization, which emphasizes the need of terrorist groups to centralize their operations. By focusing on the ends of terrorism, this study is able to generate a series of metrics of organizational performance against which the competing theories of organizational design can be measured. The findings show that terrorist groups that decentralize their operations continually lose ground, not only to government counter-terror and counter-insurgent campaigns, but also to rival organizations that are better able to take advantage of their respective operational environments. However, evidence also suggests that groups facing decline due to decentralization can offset their inability to perform complex tasks by emphasizing the material benefits of radical activism. INDEX WORDS: Terrorism, Organized Crime, Counter-Terrorism, Counter-Insurgency, Networks, Netwar, Revolution, al-Qaeda in Iraq, Mahdi Army, Abu Sayyaf, Iraq, Philippines REVOLUTIONARY NETWORK0S? AN ANALYSIS OF ORGANIZATIONAL DESIGN IN TERRORIST GROUPS by BRADLEY J MCALLISTER B.A., Southwestern University, 1999 M.A., The University of Leeds, United Kingdom, 2003 A Dissertation Submitted to the Graduate Faculty of the University of Georgia in Partial Fulfillment of the Requirements for the Degree DOCTOR OF PHILOSPHY ATHENS, GA 2011 2011 Bradley J.
    [Show full text]
  • Islamic State of Iraq and the Levant (ISIL), Or Simply the Islamic State, Has Carried out Deadly Terrorist Attacks
    BACKGROUND REPORT Patterns of Islamic State-Related Terrorism, 2002--2015 For more than a decade, the organization now known as the Islamic State of Iraq and the Levant (ISIL), or simply the Islamic State, has carried out deadly terrorist attacks. Beginning as a small network led by Jordanian Abu Musab al-Zarqawi, the first terrorist attack attributed to this group was the assassination of American diplomat Laurence Foley in Amman, Jordan in October 2002. Since then, the group initially known as Tawhid and Jihad (Jama’at al-Tawhid w’al-Jihad (the Party of Monotheism and Jihad)) has undergone a complex evolution, including name changes, leadership changes, and shifts in allegiance to other Salafi-jihadist organizations, most notably al-Qaida. In addition, the reach of ISIL’s violence surpasses its own membership, to include attacks carried out by other groups and individuals who have pledged allegiance to ISIL regardless of whether or not formal ties exist. This complexity makes it difficult to comprehensively and systematically place into context the violence of one of the most active and deadly terrorist organizations in recent history. For the purpose of this report, we have classified the terrorist attacks in the Global Terrorism Database (GTD) into four ISIL-related perpetrator categories: ISIL Predecessor: attacks by organizations that were part of the ISIL lineage prior to adoption of the ISIL name in 2013 ISIL: attacks by operatives of the “core” of the organization, based in and primarily active in Iraq and Syria ISIL Affiliate: attacks by organizations that have declared allegiance to ISIL1 ISIL-Inspired: attacks by individuals who have indicated that they were motivated by allegiance to ISIL ISIL-Related: any of the above This report presents data that illustrate the dynamics of ISIL-related terrorism over time and place, from 2002 to 2015.
    [Show full text]
  • The Literature on Jihadism in Jordan Henrik Gråtrud
    When Insularity Becomes a Problem: the Literature on Jihadism in Jordan Henrik Gråtrud Address: Norwegian Defence Research Establishment/FFI Postboks 25, 2027 Kjeller, Norway Email: [email protected] Henrik Gråtrud is a research fellow at the Norwegian Defence Research Establishment (FFI) and a doctoral candidate at the University of Oslo. Acknowledgment: I would like to thank my colleagues at the Norwegian Defence Research Establishment and the University of Oslo, the editor, as well as the anonymous reviewers for excellent input and advice. 1 Dette er en postprint-versjon/This is a postprint version. Publisert versjon/Publised version: http://dx.doi.org/10.1080/1057610X.2020.1723282 When Insularity Becomes a Problem: the Literature on Jihadism in Jordan ABSTRACT This article offers a review of the literature on Jordanian jihadism. While excellent work has been done, particularly on the phenomenon’s history and ideologues such as Abu Muhammad al-Maqdisi, several topics remain unexplored. The main explanation for the literature’s shortcomings is that it has been too inward-looking. I argue that this insularity has led to three problems: first, the literature sometimes recycles observations already made; second, it fails to show how Jordan presents specificities in terms of jihadism; and third and most importantly, it misses insights from the literature on political violence about radicalization and terrorist attack activity. As a result, it fails to address key questions about Jordanian jihadism, such as why, when, and how terrorist attacks happen. Keywords: jihadism; terrorism; Jordan; review; radicalization Introduction After the outbreak of war in Syria, Jordan witnessed an unprecedented jihadist mobilization in the early 2010s.
    [Show full text]
  • Personal Stories of American, Korean, and Chinese Soldiers
    University of Kentucky UKnowledge Military History History 2-13-2004 Voices from the Korean War: Personal Stories of American, Korean, and Chinese Soldiers Xiaobing Li University of Central Oklahoma Richard Peters Click here to let us know how access to this document benefits ou.y Thanks to the University of Kentucky Libraries and the University Press of Kentucky, this book is freely available to current faculty, students, and staff at the University of Kentucky. Find other University of Kentucky Books at uknowledge.uky.edu/upk. For more information, please contact UKnowledge at [email protected]. Recommended Citation Li, Xiaobing and Peters, Richard, "Voices from the Korean War: Personal Stories of American, Korean, and Chinese Soldiers" (2004). Military History. 37. https://uknowledge.uky.edu/upk_military_history/37 Voices from the Korean War This page intentionally left blank Voices from the Korean War PERSONAL STORIES of AMERICAN, KOREAN, and CHINESE SOLDIERS Bichard Peters and Xiaobing Li THE UNIVERSITY PRESS OF KENTUCKY Publication of this volume was made possible in part by a grant from the National Endowment for the Humanities. Copyright © 2004 by The University Press of Kentucky Paperback edition 2005 Scholarly publisher for the Commonwealth, serving Bellarmine University, Berea College, Centre College of Kentucky, Eastern Kentucky University, The Filson Historical Society, Georgetown College, Kentucky Historical Society, Kentucky State University, Morehead State University, Murray State University, Northern Kentucky University, Transylvania University, University of Kentucky, University of Louisville, and Western Kentucky University. All rights reserved. Editorial and Sales Offices: The University Press of Kentucky 663 South Limestone Street, Lexington, Kentucky 40508-4008 www.kentuckypress.com 08 07 06 05 04 54321 Library of Congress Cataloging-in-Publication Data Peters, Richard A.
    [Show full text]
  • Law Enforcement in Japan - Wikipedia, the Free Encyclopedia Law Enforcement in Japan from Wikipedia, the Free Encyclopedia
    9/25/2014 Law enforcement in Japan - Wikipedia, the free encyclopedia Law enforcement in Japan From Wikipedia, the free encyclopedia Law enforcement in Japan is provided by the Prefectural Police under the oversight of the National Police Agency or NPA. The NPA is headed by the National Public Safety Commission thus ensuring that Japan's police are an apolitical body and free of direct central government executive control. They are checked by an independent judiciary and monitored by a free and active press. Japanese Police logo Contents 1 History 2 National Organization 2.1 National Public Safety Commission 2.1.1 National Police Agency 2.1.1.1 Police Administration Bureau Aichi Prefecture Toyota Crown police car 2.1.1.2 Criminal Investigation in the parking lot in the Expo 2005 Aichi Japan Before the South Korean pavilion. Bureau 2.1.1.3 Traffic Bureau 2.1.1.4 Security Bureau 2.1.1.5 Regional Public Safety Bureaus 2.1.1.6 Police Communications Divisions 2.1.1.7 Imperial Guard 3 Strength 4 Local organization 4.1 Prefectural Police 4.1.1 Kōban 5 Riot police 6 Special police http://en.wikipedia.org/wiki/Law_enforcement_in_Japan 1/20 9/25/2014 Law enforcement in Japan - Wikipedia, the free encyclopedia 6.1 Special judicial police officials (特別司法警 察職員) 6.1.1 Cabinet Office 6.1.2 Ministry of Justice 6.1.3 Ministry of Health, Labour and Welfare 6.1.4 Ministry of Agriculture, Forestry and Fisheries 6.1.5 Ministry of Economy, Trade and Industry 6.1.6 Ministry of Land, Infrastructure, Transport and Tourism 6.1.6.1 Coast Guard Officer (海上保 安官) 6.1.7
    [Show full text]
  • UK Home Office
    Country Policy and Information Note Syria: the Syrian Civil War Version 4.0 August 2020 Preface Purpose This note provides country of origin information (COI) and analysis of COI for use by Home Office decision makers handling particular types of protection and human rights claims (as set out in the Introduction section). It is not intended to be an exhaustive survey of a particular subject or theme. It is split into two main sections: (1) analysis and assessment of COI and other evidence; and (2) COI. These are explained in more detail below. Assessment This section analyses the evidence relevant to this note – i.e. the COI section; refugee/human rights laws and policies; and applicable caselaw – by describing this and its inter-relationships, and provides an assessment of, in general, whether one or more of the following applies: x A person is reasonably likely to face a real risk of persecution or serious harm x The general humanitarian situation is so severe as to breach Article 15(b) of European Council Directive 2004/83/EC (the Qualification Directive) / Article 3 of the European Convention on Human Rights as transposed in paragraph 339C and 339CA(iii) of the Immigration Rules x The security situation presents a real risk to a civilian’s life or person such that it would breach Article 15(c) of the Qualification Directive as transposed in paragraph 339C and 339CA(iv) of the Immigration Rules x A person is able to obtain protection from the state (or quasi state bodies) x A person is reasonably able to relocate within a country or territory x A claim is likely to justify granting asylum, humanitarian protection or other form of leave, and x If a claim is refused, it is likely or unlikely to be certifiable as ‘clearly unfounded’ under section 94 of the Nationality, Immigration and Asylum Act 2002.
    [Show full text]
  • Chapter IV. Maintenance of Public Safety and Disaster Countermeasures
    Chapter IV. Maintenance of Public Safety and Disaster Countermeasures Section 1. Status of International Terrorism and its Countermeasures 1. Status of International Terrorism (2) Threat of Terrorism against Japan (1) Islamic Extremists Japan is regarded as an ally of the United States by During 2009, as is shown in Table 4-1, there was a Islamic extremist organizations such as Al-Qaeda and succession of terrorist incidents. Of these, the has hitherto been included in the target list of terrorist attempted terrorist attack on an American passenger attacks many times in the statement, etc, that are aircraft from Amsterdam to Detroit in December 2009 allegedly made by Osama bin Laden. It is confirmed was an incident in which an aircraft with many civilian that Khalid Sheikh Mohammed, a cadre of Al-Qaeda in passengers aboard was targeted, and terrorists were US custody stated that he was involved in the plan to able to slip through airport security screening networks destroy the US Embassy in Japan. to almost carry out the attack. With this incident, it was It has been confirmed that those connected to recognized once again that threats of large-scale and Al-Qaeda, who were on the international wanted list indiscriminate terrorist attacks could actually happen. have illegally entered and left Japan repeatedly in the Despite the strengthening of terrorism past years, indicating that Islamic extremist networks countermeasures by governments of all countries since loosely connected through extremist thought have also the terrorist attacks on the United States on Sept extended to this country. 11,2001, the threat of terrorism by Islamic extremists Considering the situation, and given the fact that in remains high.
    [Show full text]
  • Arinternational SPECIAL FORCES and SWAT / CT UNITS
    arINTERNATIONAL SPECIAL FORCES And SWAT / CT UNITS ABU DHABI Emirate of Abu Dhabi Police Special Unit ========================================================================================== ALBANIA Minster of defence Naval Commandos Commando Brigade - Comando Regiment, Zall Herr - 4 x Commando Battalions - Special Operations Battalion, Farke - Commando Troop School Ministry of Interior Reparti i Eleminimit dhe Neutralizimit te Elementit te Armatosur (RENEA) Unit 88 Reparti i Operacioneve Speciale (ROS), Durres Unit 77 (CT) Shqiponjat (police) "The Eagles" /Forzat e Nderhyrjes se Shpejte (FNSH) - There are 12 FNSH groups throughout Albania . - Albania is divided into 14 districts called prefectures. There is one FNSH group assigned to 11 of these prefectures Garda Kombetare - National Guards ========================================================================================== ALGERIA Ministry of National Defence Units of the Gendarmerie National Special Intervention Detachment (DSI) / Assault & Rapid Intervention unit Special Brigade Garde Republicaine - Republican Guard (presidential escort honour guard & VIP) Units of the DRS (Research & Security Directorate) (internal security, counter- intelligence) Special Unit of the Service Action GIS, Groupe d’Intervention Sppeciale (Special Intervention Group), Blida Army Units - Saaykaa (Commando & CT), Boughar, Medea Wilaya - One Special Forces/Airborne Divisional HQ - 4 x Airborne Regiments - 18th Elite Para-Commando Regiment ('The Ninjas') - The Special Assault /Airborne/Recon Troops
    [Show full text]
  • Download Original 489.8 KB
    Frazer 1 Risky Behavior: Understanding Iranian Foreign Policy Sarah Frazer Class of 2019 Senior Honors Thesis Government 490 Advisor: Professor Jennifer Kibbe Department of Government Franklin & Marshall College Date of Honors Defense: 1 May, 2019 Frazer 2 Acknowledgements Firstly, I would like to thank Professor Jennifer Kibbe for being my thesis advisor and guiding me through this process with support and enthusiasm. Thank you for always pushing me to do my best and for this great opportunity. I would not have thought to pursue an honors thesis without your suggestion and confidence in me. I have greatly enjoyed working with you over this past year.. To my mom, thank you for always encouraging me and believing in me. I’m grateful that you raised me to work hard and follow through to accomplish my goals. Lastly, thank you to my sister, Marie, for many hours and late nights of listening to my ideas, editing drafts, and giving constructive criticism. Frazer 3 Abstract Since its founding in 1979, the Islamic Republic of Iran has played a pivotal role in Middle East politics and beyond; therefore, understanding the factors that influence Iran’s international behavior is essential to understanding regional politics. In this paper, I will analyze Iran’s foreign policy towards three neighboring states: Saudi Arabia, Iran’s archrival; Turkey its “frenemy,” and Syria, its closest state ally. I will consider Iran’s relations with these countries during the Khatami (1997-2005) and Ahmadinejad (2005-2013) presidencies and will apply prospect theory to explain Iran’s behavior. Through my research, I discovered that the Islamic Republic’s behavior is best explained by prospect theory, which contends that Iran will behave differently when it is in a domain of loss as opposed to when it is in a domain of gain.
    [Show full text]
  • Routledge Handbook of U.S. Counterterrorism and Irregular
    ‘A unique, exceptional volume of compelling, thoughtful, and informative essays on the subjects of irregular warfare, counter-insurgency, and counter-terrorism – endeavors that will, unfortunately, continue to be unavoidable and necessary, even as the U.S. and our allies and partners shift our focus to Asia and the Pacific in an era of renewed great power rivalries. The co-editors – the late Michael Sheehan, a brilliant comrade in uniform and beyond, Liam Collins, one of America’s most talented and accomplished special operators and scholars on these subjects, and Erich Marquardt, the founding editor of the CTC Sentinel – have done a masterful job of assembling the works of the best and brightest on these subjects – subjects that will continue to demand our attention, resources, and commitment.’ General (ret.) David Petraeus, former Commander of the Surge in Afghanistan, U.S. Central Command, and Coalition Forces in Afghanistan and former Director of the CIA ‘Terrorism will continue to be a featured security challenge for the foreseeable future. We need to be careful about losing the intellectual and practical expertise hard-won over the last twenty years. This handbook, the brainchild of my late friend and longtime counter-terrorism expert Michael Sheehan, is an extraordinary resource for future policymakers and CT practitioners who will grapple with the evolving terrorism threat.’ General (ret.) Joseph Votel, former commander of US Special Operations Command and US Central Command ‘This volume will be essential reading for a new generation of practitioners and scholars. Providing vibrant first-hand accounts from experts in counterterrorism and irregular warfare, from 9/11 until the present, this book presents a blueprint of recent efforts and impending challenges.
    [Show full text]
  • WEEKLY CONFLICT SUMMARY | 30 March - 5 April 2020
    WEEKLY CONFLICT SUMMARY | 30 March - 5 April 2020 SYRIA SUMMARY • NORTHWEST | Levels of Conflict in northwest Syria remained elevated for the second consecutive week, as Turkish military personnel and equipment continued to arrive to Idleb. Inside the Turkish-held areas of northern Aleppo Governorate, opposition armed groups continued their looting and extortion activity against civilians. An attack against an opposition affiliated National Police Officer highlighted the growing number of attacks against the entity in the previous month. • SOUTH & CENTRAL | Tensions over kidnapping and clashes continue between communal militias Dara’a and As-Sweida. Government of Syria (GoS)-aligned personal faced continuing attacks in Daraa Governorate. • NORTHEAST | Shelling exchanges around Turkish-held Operation Peace Spring areas increased, while Turkish-backed opposition armed groups and the Syrian Democratic Forces (SDF) clashed on the ground. Jailed ISIS members staged a riot to escape a prison in Hassakah. ISIS also attacked SDF and pro-Iran forces in Deir-ez-Zor. Members of the Asayish (Kurdish Intelligence) and National Defense Forces (NDF) exchanged fire in Qamishli City. Figure 1: Dominant actors’ area of control and influence in Syria as of 5 April 2020. NSOAG stands for Non-state Organized Armed Groups. Also, please see the footnote on page 2. Page 1 of 5 WEEKLY CONFLICT SUMMARY | 30 March – 5 April 2020 NORTHWEST SYRIA1 For a second consecutive week, there were elevated levels of conflict activity in the northwest of Syria. The Government of Syria (GoS) shelled 14 locations, 26 times2 during the week, compared to 22 locations targeted 36 times by shelling and small arms fire the previous week.
    [Show full text]