HOW TERRORIST GROUPS END Lessons for Countering Al Qa’Ida

Total Page:16

File Type:pdf, Size:1020Kb

HOW TERRORIST GROUPS END Lessons for Countering Al Qa’Ida THE ARTS This PDF document was made available CHILD POLICY from www.rand.org as a public service of CIVIL JUSTICE the RAND Corporation. EDUCATION ENERGY AND ENVIRONMENT Jump down to document6 HEALTH AND HEALTH CARE INTERNATIONAL AFFAIRS The RAND Corporation is a nonprofit NATIONAL SECURITY research organization providing POPULATION AND AGING PUBLIC SAFETY objective analysis and effective SCIENCE AND TECHNOLOGY solutions that address the challenges SUBSTANCE ABUSE facing the public and private sectors TERRORISM AND HOMELAND SECURITY around the world. TRANSPORTATION AND INFRASTRUCTURE Support RAND WORKFORCE AND WORKPLACE Purchase this document Browse Books & Publications Make a charitable contribution For More Information Visit RAND at www.rand.org Explore the RAND Corporation View document details Limited Electronic Distribution Rights This document and trademark(s) contained herein are protected by law as indicated in a notice appearing later in this work. This electronic representation of RAND intellectual property is provided for non-commercial use only. Unauthorized posting of RAND PDFs to a non-RAND Web site is prohibited. RAND PDFs are protected under copyright law. Permission is required from RAND to reproduce, or reuse in another form, any of our research documents for commercial use. For information on reprint and linking permissions, please see RAND Permissions. This product is part of the RAND Corporation monograph series. RAND monographs present major research findings that address the challenges facing the public and private sectors. All RAND mono- graphs undergo rigorous peer review to ensure high standards for research quality and objectivity. HOW TERRORIST GROUPS END Lessons for Countering al Qa’ida SETH G. JONES • MARTIN C. LIBICKI C O R P O R A T I O N This research in the public interest was supported by RAND, using discretionary funds made possible by the generosity of RAND's donors, the fees earned on client-funded research, and independent research and development (IR&D) funds provided by the Department of Defense. Library of Congress Cataloging-in-Publication Data Jones, Seth G., 1972– How terrorist groups end : lessons for countering Al Qa’ida / Seth G. Jones, Martin C. Libicki. p. cm. Includes bibliographical references. ISBN 978-0-8330-4465-5 (pbk. : alk. paper) 1. Terrorism. 2. Terrorism—Prevention—International cooperation. 3. Intelligence service. 4. Problem-oriented policing. 5. Qaida (Organization) I. Libicki, Martin C. II. Title. HV6431.J65 2008 363.325'16—dc22 2008025194 The RAND Corporation is a nonprofit research organization providing objective analysis and effective solutions that address the challenges facing the public and private sectors around the world. RAND’s publications do not necessarily reflect the opinions of its research clients and sponsors. R® is a registered trademark. Cover design by Carol Earnest © Copyright 2008 RAND Corporation All rights reserved. No part of this book may be reproduced in any form by any electronic or mechanical means (including photocopying, recording, or information storage and retrieval) without permission in writing from RAND. Published 2008 by the RAND Corporation 1776 Main Street, P.O. Box 2138, Santa Monica, CA 90407-2138 1200 South Hayes Street, Arlington, VA 22202-5050 4570 Fifth Avenue, Suite 600, Pittsburgh, PA 15213-2665 RAND URL: http://www.rand.org To order RAND documents or to obtain additional information, contact Distribution Services: Telephone: (310) 451-7002; Fax: (310) 451-6915; Email: [email protected] About the Authors Seth G. Jones is a political scientist at RAND and an adjunct professor at Georgetown University’s Edmund A. Walsh School of Foreign Ser- vice and the U.S. Naval Postgraduate School. He specializes in stability operations and counterinsurgency. He is the author of In the Graveyard of Empires: America’s War in Afghanistan (W. W. Norton, forthcoming) and The Rise of European Security Cooperation (Cambridge University Press, 2007). He has published articles in such journals as International Security, National Interest, Security Studies, Chicago Journal of Interna- tional Law, International Affairs, and Survival, as well as such newspa- pers and magazines as the New York Times, Newsweek, Financial Times, and International Herald Tribune. His RAND publications include Counterinsurgency in Afghanistan: RAND Counterinsurgency Study, Volume 4 (2008); Establishing Law and Order after Conflict (2005); The UN’s Role in Nation-Building: From the Congo to Iraq (2005); and America’s Role in Nation-Building: From Germany to Iraq (2003). He received an M.A. and Ph.D. from the University of Chicago. Martin C. Libicki is a senior management scientist at RAND, focusing on the relationship between information technology and national security. This work is documented in commercially pub- lished books, Conquest in Cyberspace: National Security and Informa- tion Warfare (2007) and Information Technology Standards: Quest for the Common Byte (1995), as well as in numerous monographs, notably What Is Information Warfare (1995), The Mesh and the Net: Speculations on Armed Conflict in a Time of Free Silicon (1994), and Exploring Ter- rorist Targeting Preferences (2007). He was also an editor of the RAND iii iv How Terrorist Groups End: Lessons for Countering al Qa’ida textbook, New Challenges, New Tools for Defense Decisionmaking (2003). His most recent assignments were to create and analyze a database of post–World War II insurgencies, devise a strategy to maximize the use of information and information technology in countering insurgency, explore terrorists’ targeting preferences, develop a post–September 11 information technology strategy for U.S. Department of Justice and the Defense Advanced Research Projects Agency’s Terrorist Informa- tion Awareness program, conduct an information-security analysis for the FBI, and assess CIA’s R&D venture, In-Q-Tel. Other work has examined information warfare and the revolution in military affairs. Prior employment includes 12 years at the National Defense Univer- sity, three years on the Navy staff as program sponsor for industrial pre- paredness, and three years as a policy analyst for the U.S. Government Accountability Office’s Energy and Minerals Division. He received a Ph.D. from the University of California, Berkeley. Preface By analyzing 648 groups that existed between 1968 and 2006, this monograph examines how terrorist groups end. Its purpose is to inform U.S. counterterrorist efforts by understanding how groups have ended in the past and to assess implications for countering al Qa’ida. This monograph results from the RAND Corporation’s continuing pro- gram of self-initiated independent research. Support for such research is provided, in part, by donors and by the independent research and development provisions of RAND’s contracts for the operation of its U.S. Department of Defense federally funded research and develop- ment centers. This research was conducted within the RAND National Secu- rity Research Division (NSRD) of the RAND Corporation. NSRD conducts research and analysis for the Office of the Secretary of Defense, the Joint Staff, the Unified Commands, the defense agencies, the Department of the Navy, the U.S. Intelligence Community, allied foreign governments, and foundations. For more information on the RAND National Security Research Division, contact the Director of Operations, Nurith Berstein. She can be reached by email at [email protected]; by phone at 703-413-1100, extension 5469; or by mail at RAND, 1200 South Hayes Street, Arlington VA 22202-5050. More information about the RAND Corporation is available at www.rand.org. v Contents About the Authors ............................................................... iii Preface .............................................................................. v Figures ............................................................................. ix Tables .............................................................................. xi Summary .........................................................................xiii Acknowledgments .............................................................. xix Abbreviations .................................................................... xxi CHAPTER ONE Introduction ....................................................................... 1 CHAPTER TWO How Terrorist Groups End ...................................................... 9 CHAPTER THREE Policing and Japan’s Aum Shinrikyo .........................................45 CHAPTER FOUR Politics and the FMLN in El Salvador .......................................63 CHAPTER FIVE Military Force and al Qa’ida in Iraq .........................................83 CHAPTER SIX The Limits of America’s al Qa’ida Strategy ............................... 103 vii viii How Terrorist Groups End: Lessons for Countering al Qa’ida CHAPTER SEVEN Ending the “War” on Terrorism ............................................ 121 APPENDIXES A. End-of-Terror Data Set ................................................... 141 B. Al Qa’ida Attacks, 1994–2007 ......................................... 187 C. Regression Analysis ...................................................... 197 References ....................................................................... 201 Index ............................................................................. 223 Figures 2.1. How Terrorist Groups End (N = 268) ............................19 2.2. Politics and Group Goals .........................................
Recommended publications
  • Power Seeking and Backlash Against Female Politicians
    Article Personality and Social Psychology Bulletin The Price of Power: Power Seeking and 36(7) 923 –936 © 2010 by the Society for Personality and Social Psychology, Inc Backlash Against Female Politicians Reprints and permission: sagepub.com/journalsPermissions.nav DOI: 10.1177/0146167210371949 http://pspb.sagepub.com Tyler G. Okimoto1 and Victoria L. Brescoll1 Abstract Two experimental studies examined the effect of power-seeking intentions on backlash toward women in political office. It was hypothesized that a female politician’s career progress may be hindered by the belief that she seeks power, as this desire may violate prescribed communal expectations for women and thereby elicit interpersonal penalties. Results suggested that voting preferences for female candidates were negatively influenced by her power-seeking intentions (actual or perceived) but that preferences for male candidates were unaffected by power-seeking intentions. These differential reactions were partly explained by the perceived lack of communality implied by women’s power-seeking intentions, resulting in lower perceived competence and feelings of moral outrage. The presence of moral-emotional reactions suggests that backlash arises from the violation of communal prescriptions rather than normative deviations more generally. These findings illuminate one potential source of gender bias in politics. Keywords gender stereotypes, backlash, power, politics, intention, moral outrage Received June 5, 2009; revision accepted December 2, 2009 Many voters see Senator Hillary Rodham Clinton as coldly politicians and that these penalties may be reflected in voting ambitious, a perception that could ultimately doom her presi- preferences. dential campaign. Peter Nicholas, Los Angeles Times, 2007 Power-Relevant Stereotypes Power seeking may be incongruent with traditional female In 1916, Jeannette Rankin was elected to the Montana seat in gender stereotypes but not male gender stereotypes for a the U.S.
    [Show full text]
  • Cancel Culture: Posthuman Hauntologies in Digital Rhetoric and the Latent Values of Virtual Community Networks
    CANCEL CULTURE: POSTHUMAN HAUNTOLOGIES IN DIGITAL RHETORIC AND THE LATENT VALUES OF VIRTUAL COMMUNITY NETWORKS By Austin Michael Hooks Heather Palmer Rik Hunter Associate Professor of English Associate Professor of English (Chair) (Committee Member) Matthew Guy Associate Professor of English (Committee Member) CANCEL CULTURE: POSTHUMAN HAUNTOLOGIES IN DIGITAL RHETORIC AND THE LATENT VALUES OF VIRTUAL COMMUNITY NETWORKS By Austin Michael Hooks A Thesis Submitted to the Faculty of the University of Tennessee at Chattanooga in Partial Fulfillment of the Requirements of the Degree of Master of English The University of Tennessee at Chattanooga Chattanooga, Tennessee August 2020 ii Copyright © 2020 By Austin Michael Hooks All Rights Reserved iii ABSTRACT This study explores how modern epideictic practices enact latent community values by analyzing modern call-out culture, a form of public shaming that aims to hold individuals responsible for perceived politically incorrect behavior via social media, and cancel culture, a boycott of such behavior and a variant of call-out culture. As a result, this thesis is mainly concerned with the capacity of words, iterated within the archive of social media, to haunt us— both culturally and informatically. Through hauntology, this study hopes to understand a modern discourse community that is bound by an epideictic framework that specializes in the deconstruction of the individual’s ethos via the constant demonization and incitement of past, current, and possible social media expressions. The primary goal of this study is to understand how these practices function within a capitalistic framework and mirror the performativity of capital by reducing affective human interactions to that of a transaction.
    [Show full text]
  • Rebooting U.S. Security Cooperation in Iraq
    Rebooting U.S. Security Cooperation in Iraq MICHAEL KNIGHTS POLICY FOCUS 137 Rebooting U.S. Security Cooperation in Iraq MICHAEL KNIGHTS THE WASHINGTON INSTITUTE FOR NEAR EAST POLICY www.washingtoninstitute.org The opinions expressed in this Policy Focus are those of the author and not necessarily those of The Washington Institute, its Board of Trustees, or its Board of Advisors. All rights reserved. Printed in the United States of America. No part of this publica- tion may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. © 2015 by The Washington Institute for Near East Policy The Washington Institute for Near East Policy 1828 L Street NW, Suite 1050 Washington, DC 20036 Design: 1000colors Photo: A Kurdish fighter keeps guard while overlooking positions of Islamic State mili- tants near Mosul, northern Iraq, August 2014. (REUTERS/Youssef Boudlal) CONTENTS Acknowledgments | v Acronyms | vi Executive Summary | viii 1 Introduction | 1 2 Federal Government Security Forces in Iraq | 6 3 Security Forces in Iraqi Kurdistan | 26 4 Optimizing U.S. Security Cooperation in Iraq | 39 5 Issues and Options for U.S. Policymakers | 48 About the Author | 74 TABLES 1 Effective Combat Manpower of Iraq Security Forces | 8 2 Assessment of ISF and Kurdish Forces as Security Cooperation Partners | 43 FIGURES 1 ISF Brigade Order of Battle, January 2015 | 10 2 Kurdish Brigade Order of Battle, January 2015 | 28 ACKNOWLEDGMENTS My thanks to a range of colleagues for their encouragement and assistance in the writing of this study.
    [Show full text]
  • Refugee Status Appeals Authority New Zealand
    REFUGEE STATUS APPEALS AUTHORITY NEW ZEALAND REFUGEE APPEAL NO 76505 AT AUCKLAND Before: B L Burson (Chairperson) S A Aitchison (Member) Counsel for the Appellant: D Mansouri-Rad Appearing for the Department of Labour: No Appearance Date of Hearing: 3 & 4 May 2010 Date of Decision: 14 June 2010 DECISION [1] This is an appeal against the decision of a refugee status officer of the Refugee Status Branch (RSB) of the Department of Labour (DOL) declining refugee status to the appellant, a national of Iraq. INTRODUCTION [2] The appellant claims to have a well-founded fear of being persecuted in Iraq on account of his former Ba’ath Party membership in the rank of Naseer Mutakadim, and due to his father’s position as Branch Member of the al-Amed Organisation for the Ba’ath Party in City A. He fears persecution at the hands of members of the Mahdi Army – a Shi’a militia group in Iraq, the police who collaborate with them, and the Iraqi Government that is infiltrated by militias. [3] The principal issues to be determined in this appeal are the well- foundedness of the appellant’s fears and whether he can genuinely access meaningful domestic protection. 2 THE APPELLANT’S CASE [4] What follows is a summary of the appellant’s evidence in support of his claim. It will be assessed later in this decision. Background [5] The appellant is a single man in his early-30s. He was born in Suburb A in City A. He is one of three children, the youngest of two boys.
    [Show full text]
  • Captain America and the Struggle of the Superhero This Page Intentionally Left Blank Captain America and the Struggle of the Superhero Critical Essays
    Captain America and the Struggle of the Superhero This page intentionally left blank Captain America and the Struggle of the Superhero Critical Essays Edited by ROBERT G. WEINER Foreword by JOHN SHELTON LAWRENCE Afterword by J.M. DEMATTEIS McFarland & Company, Inc., Publishers Jefferson, North Carolina, and London ALSO BY ROBERT G. WEINER Marvel Graphic Novels and Related Publications: An Annotated Guide to Comics, Prose Novels, Children’s Books, Articles, Criticism and Reference Works, 1965–2005 (McFarland, 2008) LIBRARY OF CONGRESS CATALOGUING-IN-PUBLICATION DATA Captain America and the struggle of the superhero : critical essays / edited by Robert G. Weiner ; foreword by John Shelton Lawrence ; afterword by J.M. DeMatteis. p. cm. Includes bibliographical references and index. ISBN 978-0-7864-3703-0 softcover : 50# alkaline paper ¡. America, Captain (Fictitious character) I. Weiner, Robert G., 1966– PN6728.C35C37 2009 741.5'973—dc22 2009000604 British Library cataloguing data are available ©2009 Robert G. Weiner. All rights reserved No part of this book may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying or recording, or by any information storage and retrieval system, without permission in writing from the publisher. Cover images ©2009 Shutterstock Manufactured in the United States of America McFarland & Company, Inc., Publishers Box 6¡¡, Je›erson, North Carolina 28640 www.mcfarlandpub.com Dedicated to My parents (thanks for your love, and for putting up with me), and Larry and Vicki Weiner (thanks for your love, and I wish you all the happiness in the world). JLF, TAG, DW, SCD, “Lizzie” F, C Joyce M, and AH (thanks for your friend- ship, and for being there).
    [Show full text]
  • Looking Into Iraq
    Chaillot Paper July 2005 n°79 Looking into Iraq Martin van Bruinessen, Jean-François Daguzan, Andrzej Kapiszewski, Walter Posch and Álvaro de Vasconcelos Edited by Walter Posch cc79-cover.qxp 28/07/2005 15:27 Page 2 Chaillot Paper Chaillot n° 79 In January 2002 the Institute for Security Studies (ISS) beca- Looking into Iraq me an autonomous Paris-based agency of the European Union. Following an EU Council Joint Action of 20 July 2001, it is now an integral part of the new structures that will support the further development of the CFSP/ESDP. The Institute’s core mission is to provide analyses and recommendations that can be of use and relevance to the formulation of the European security and defence policy. In carrying out that mission, it also acts as an interface between European experts and decision-makers at all levels. Chaillot Papers are monographs on topical questions written either by a member of the ISS research team or by outside authors chosen and commissioned by the Institute. Early drafts are normally discussed at a semi- nar or study group of experts convened by the Institute and publication indicates that the paper is considered Edited by Walter Posch Edited by Walter by the ISS as a useful and authoritative contribution to the debate on CFSP/ESDP. Responsibility for the views expressed in them lies exclusively with authors. Chaillot Papers are also accessible via the Institute’s Website: www.iss-eu.org cc79-Text.qxp 28/07/2005 15:36 Page 1 Chaillot Paper July 2005 n°79 Looking into Iraq Martin van Bruinessen, Jean-François Daguzan, Andrzej Kapiszewski, Walter Posch and Álvaro de Vasconcelos Edited by Walter Posch Institute for Security Studies European Union Paris cc79-Text.qxp 28/07/2005 15:36 Page 2 Institute for Security Studies European Union 43 avenue du Président Wilson 75775 Paris cedex 16 tel.: +33 (0)1 56 89 19 30 fax: +33 (0)1 56 89 19 31 e-mail: [email protected] www.iss-eu.org Director: Nicole Gnesotto © EU Institute for Security Studies 2005.
    [Show full text]
  • The Vulnerabilities of Developed States to Economic Cyber Warfare
    Working Paper The Vulnerabilities of Developed States to Economic Cyber Warfare Paul Cornish Head, International Security Programme and Carrington Professor of International Security, Chatham House June 2011 The views expressed in this document are the sole responsibility of the author(s) and do not necessarily reflect the view of Chatham House, its staff, associates or Council. Chatham House is independent and owes no allegiance to any government or to any political body. It does not take institutional positions on policy issues. This document is issued on the understanding that if any extract is used, the author and Chatham House should be credited, preferably with the date of the publication. Working Paper: The Vulnerabilities of Developed States to Economic Cyber Warfare INTRODUCTION The central features of the ‘cybered’ world of the early 21st century are the interconnectedness of global communications, information and economic infrastructures and the dependence upon those infrastructures in order to govern, to do business or simply to live. There are a number of observations to be made of this world. First, it is still evolving. Economically developed societies are becoming ever more closely connected within themselves and with other, technologically advanced societies, and all are becoming increasingly dependent upon the rapid and reliable transmission of ideas, information and data. Second, where interconnectedness and dependency are not managed and mitigated by some form of security procedure, reversionary mode or redundancy system, then the result can only be a complex and vitally important communications system which is nevertheless vulnerable to information theft, financial electronic crime, malicious attack or infrastructure breakdown.
    [Show full text]
  • Full Complaint
    Case 1:18-cv-01612-CKK Document 11 Filed 11/17/18 Page 1 of 602 IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLUMBIA ESTATE OF ROBERT P. HARTWICK, § HALEY RUSSELL, HANNAH § HARTWICK, LINDA K. HARTWICK, § ROBERT A. HARTWICK, SHARON § SCHINETHA STALLWORTH, § ANDREW JOHN LENZ, ARAGORN § THOR WOLD, CATHERINE S. WOLD, § CORY ROBERT HOWARD, DALE M. § HINKLEY, MARK HOWARD BEYERS, § DENISE BEYERS, EARL ANTHONY § MCCRACKEN, JASON THOMAS § WOODLIFF, JIMMY OWEKA OCHAN, § JOHN WILLIAM FUHRMAN, JOSHUA § CRUTCHER, LARRY CRUTCHER, § JOSHUA MITCHELL ROUNTREE, § LEIGH ROUNTREE, KADE L. § PLAINTIFFS’ HINKHOUSE, RICHARD HINKHOUSE, § SECOND AMENDED SUSAN HINKHOUSE, BRANDON § COMPLAINT HINKHOUSE, CHAD HINKHOUSE, § LISA HILL BAZAN, LATHAN HILL, § LAURENCE HILL, CATHLEEN HOLY, § Case No.: 1:18-cv-01612-CKK EDWARD PULIDO, KAREN PULIDO, § K.P., A MINOR CHILD, MANUEL § Hon. Colleen Kollar-Kotelly PULIDO, ANGELITA PULIDO § RIVERA, MANUEL “MANNIE” § PULIDO, YADIRA HOLMES, § MATTHEW WALKER GOWIN, § AMANDA LYNN GOWIN, SHAUN D. § GARRY, S.D., A MINOR CHILD, SUSAN § GARRY, ROBERT GARRY, PATRICK § GARRY, MEGHAN GARRY, BRIDGET § GARRY, GILBERT MATTHEW § BOYNTON, SOFIA T. BOYNTON, § BRIAN MICHAEL YORK, JESSE D. § CORTRIGHT, JOSEPH CORTRIGHT, § DIANA HOTALING, HANNA § CORTRIGHT, MICHAELA § CORTRIGHT, LEONDRAE DEMORRIS § RICE, ESTATE OF NICHOLAS § WILLIAM BAART BLOEM, ALCIDES § ALEXANDER BLOEM, DEBRA LEIGH § BLOEM, ALCIDES NICHOLAS § BLOEM, JR., VICTORIA LETHA § Case 1:18-cv-01612-CKK Document 11 Filed 11/17/18 Page 2 of 602 BLOEM, FLORENCE ELIZABETH § BLOEM, CATHERINE GRACE § BLOEM, SARA ANTONIA BLOEM, § RACHEL GABRIELA BLOEM, S.R.B., A § MINOR CHILD, CHRISTINA JEWEL § CHARLSON, JULIANA JOY SMITH, § RANDALL JOSEPH BENNETT, II, § STACEY DARRELL RICE, BRENT § JASON WALKER, LELAND WALKER, § SUSAN WALKER, BENJAMIN § WALKER, KYLE WALKER, GARY § WHITE, VANESSA WHITE, ROYETTA § WHITE, A.W., A MINOR CHILD, § CHRISTOPHER F.
    [Show full text]
  • Counterinsurgency in the Iraq Surge
    A NEW WAY FORWARD OR THE OLD WAY BACK? COUNTERINSURGENCY IN THE IRAQ SURGE. A thesis presented to the faculty of the Graduate School of Western Carolina University in partial fulfillment of the requirements for the degree of Master of Arts in US History. By Matthew T. Buchanan Director: Dr. Richard Starnes Associate Professor of History, Dean of the College of Arts and Sciences. Committee Members: Dr. David Dorondo, History, Dr. Alexander Macaulay, History. April, 2018 TABLE OF CONTENTS List of Abbreviations . iii Abstract . iv Introduction . 1 Chapter One: Perceptions of the Iraq War: Early Origins of the Surge . 17 Chapter Two: Winning the Iraq Home Front: The Political Strategy of the Surge. 38 Chapter Three: A Change in Approach: The Military Strategy of the Surge . 62 Conclusion . 82 Bibliography . 94 ii ABBREVIATIONS ACU - Army Combat Uniform ALICE - All-purpose Lightweight Individual Carrying Equipment BDU - Battle Dress Uniform BFV - Bradley Fighting Vehicle CENTCOM - Central Command COIN - Counterinsurgency COP - Combat Outpost CPA – Coalition Provisional Authority CROWS- Common Remote Operated Weapon System CRS- Congressional Research Service DBDU - Desert Battle Dress Uniform HMMWV - High Mobility Multi-Purpose Wheeled Vehicle ICAF - Industrial College of the Armed Forces IED - Improvised Explosive Device ISG - Iraq Study Group JSS - Joint Security Station MNC-I - Multi-National-Corps-Iraq MNF- I - Multi-National Force – Iraq Commander MOLLE - Modular Lightweight Load-carrying Equipment MRAP - Mine Resistant Ambush Protected (vehicle) QRF - Quick Reaction Forces RPG - Rocket Propelled Grenade SOI - Sons of Iraq UNICEF - United Nations International Children’s Fund VBIED - Vehicle-Borne Improvised Explosive Device iii ABSTRACT A NEW WAY FORWARD OR THE OLD WAY BACK? COUNTERINSURGENCY IN THE IRAQ SURGE.
    [Show full text]
  • ESS9 Appendix A3 Political Parties Ed
    APPENDIX A3 POLITICAL PARTIES, ESS9 - 2018 ed. 3.0 Austria 2 Belgium 4 Bulgaria 7 Croatia 8 Cyprus 10 Czechia 12 Denmark 14 Estonia 15 Finland 17 France 19 Germany 20 Hungary 21 Iceland 23 Ireland 25 Italy 26 Latvia 28 Lithuania 31 Montenegro 34 Netherlands 36 Norway 38 Poland 40 Portugal 44 Serbia 47 Slovakia 52 Slovenia 53 Spain 54 Sweden 57 Switzerland 58 United Kingdom 61 Version Notes, ESS9 Appendix A3 POLITICAL PARTIES ESS9 edition 3.0 (published 10.12.20): Changes from previous edition: Additional countries: Denmark, Iceland. ESS9 edition 2.0 (published 15.06.20): Changes from previous edition: Additional countries: Croatia, Latvia, Lithuania, Montenegro, Portugal, Slovakia, Spain, Sweden. Austria 1. Political parties Language used in data file: German Year of last election: 2017 Official party names, English 1. Sozialdemokratische Partei Österreichs (SPÖ) - Social Democratic Party of Austria - 26.9 % names/translation, and size in last 2. Österreichische Volkspartei (ÖVP) - Austrian People's Party - 31.5 % election: 3. Freiheitliche Partei Österreichs (FPÖ) - Freedom Party of Austria - 26.0 % 4. Liste Peter Pilz (PILZ) - PILZ - 4.4 % 5. Die Grünen – Die Grüne Alternative (Grüne) - The Greens – The Green Alternative - 3.8 % 6. Kommunistische Partei Österreichs (KPÖ) - Communist Party of Austria - 0.8 % 7. NEOS – Das Neue Österreich und Liberales Forum (NEOS) - NEOS – The New Austria and Liberal Forum - 5.3 % 8. G!LT - Verein zur Förderung der Offenen Demokratie (GILT) - My Vote Counts! - 1.0 % Description of political parties listed 1. The Social Democratic Party (Sozialdemokratische Partei Österreichs, or SPÖ) is a social above democratic/center-left political party that was founded in 1888 as the Social Democratic Worker's Party (Sozialdemokratische Arbeiterpartei, or SDAP), when Victor Adler managed to unite the various opposing factions.
    [Show full text]
  • Catalogo En.Pdf
    Fname "/Users/acescon/Desktop/PDF/catalogo_en_2010.pdf", build 3.11.2011.10.49.38.488 (c) Copyright 2011 Visa S.p.A. [email protected] Fname "/Users/acescon/Desktop/PDF/catalogo_en_2010.pdf", build 3.11.2011.10.49.38.550 INDEX 02 Visa S.p.A. via I° Maggio, 55 31043 Fontanelle (TV) Italy Tel: +39 0422 5091 Fax: +39 0422 509350 Mail: [email protected] Web: www.visa.it (c) Copyright 2011 Visa S.p.A. [email protected] Fname "/Users/acescon/Desktop/PDF/catalogo_en_2010.pdf", build 3.11.2011.10.49.38.585 INDEX Visa S.p.A. via I° Maggio, 55 31043 Fontanelle (TV) Italy Tel: +39 0422 5091 Fax: +39 0422 509350 Mail: [email protected] Web: www.visa.it 03 (c) Copyright 2011 Visa S.p.A. [email protected] Fname "/Users/acescon/Desktop/PDF/catalogo_en_2010.pdf", build 3.11.2011.10.49.38.616 VISA SPA HISTORY Mr. Benvenuto Barro founded the company in 1960 when he sensed that the increasing energy demands in certain sectors could be met with generating sets. In the 1980's, with the generational change from father to sons, Lorenzo and Marco, the company moved its interest and activities into foreign markets where seriousness, commitment and product quality have been rewarded globally over the course of 50 years. Visa works in 60 countries on 7 continents. NEW SITE As of January 01, 2009 Visa moved into a new modern 34000sqm production facility, 11000sqm of which are for generating set assembly. The recent introduction of the new production process called "Lean Production" has further improved production efficiency and flexibility, increasing product control.
    [Show full text]
  • The Coils of the Anaconda: America's
    THE COILS OF THE ANACONDA: AMERICA’S FIRST CONVENTIONAL BATTLE IN AFGHANISTAN BY C2009 Lester W. Grau Submitted to the graduate degree program in Military History and the Graduate Faculty of the University of Kansas in partial fulfillment of the requirements for the degree of Doctor of Philosophy ____________________________ Dr. Theodore A Wilson, Chairperson ____________________________ Dr. James J. Willbanks, Committee Member ____________________________ Dr. Robert F. Baumann, Committee Member ____________________________ Dr. Maria Carlson, Committee Member ____________________________ Dr. Jacob W. Kipp, Committee Member Date defended: April 27, 2009 The Dissertation Committee for Lester W. Grau certifies that this is the approved version of the following dissertation: THE COILS OF THE ANACONDA: AMERICA’S FIRST CONVENTIONAL BATTLE IN AFGHANISTAN Committee: ____________________________ Dr. Theodore A Wilson, Chairperson ____________________________ Dr. James J. Willbanks, Committee Member ____________________________ Dr. Robert F. Baumann, Committee Member ____________________________ Dr. Maria Carlson, Committee Member ____________________________ Dr. Jacob W. Kipp, Committee Member Date approved: April 27, 2009 ii PREFACE Generals have often been reproached with preparing for the last war instead of for the next–an easy gibe when their fellow-countrymen and their political leaders, too frequently, have prepared for no war at all. Preparation for war is an expensive, burdensome business, yet there is one important part of it that costs little–study. However changed and strange the new conditions of war may be, not only generals, but politicians and ordinary citizens, may find there is much to be learned from the past that can be applied to the future and, in their search for it, that some campaigns have more than others foreshadowed the coming pattern of modern war.1 — Field Marshall Viscount William Slim.
    [Show full text]