Understanding How Security Works Against Terrorism

Total Page:16

File Type:pdf, Size:1020Kb

Understanding How Security Works Against Terrorism San Jose State University SJSU ScholarWorks Mineta Transportation Institute Publications 2-2017 The Challenge of Protecting Transit and Passenger Rail: Understanding How Security Works Against Terrorism Brian Michael Jenkins National Transportation Safety and Security Center, Mineta Transportation Institute Follow this and additional works at: https://scholarworks.sjsu.edu/mti_publications Part of the Defense and Security Studies Commons, Terrorism Studies Commons, and the Transportation Commons Recommended Citation Brian Michael Jenkins. "The Challenge of Protecting Transit and Passenger Rail: Understanding How Security Works Against Terrorism" Mineta Transportation Institute Publications (2017). This Report is brought to you for free and open access by SJSU ScholarWorks. It has been accepted for inclusion in Mineta Transportation Institute Publications by an authorized administrator of SJSU ScholarWorks. For more information, please contact [email protected]. MTI Funded by U.S. Department of Services Transit Census California of Water 2012 Transportation and California The Challenge of Protecting Department of Transportation Transit and Passenger Rail: Understanding How Security Works Against Terrorism MTI ReportMTI 12-02 December 2012 MTI Report 12-74 MINETA TRANSPORTATION INSTITUTE MTI FOUNDER LEAD UNIVERSITY OF MNTRC Hon. Norman Y. Mineta The Mineta Transportation Institute (MTI) was established by Congress in 1991 as part of the Intermodal Surface Transportation MTI/MNTRC BOARD OF TRUSTEES Equity Act (ISTEA) and was reauthorized under the Transportation Equity Act for the 21st century (TEA-21). MTI then successfully competed to be named a Tier 1 Center in 2002 and 2006 in the Safe, Accountable, Flexible, Efficient Transportation Equity Act: A Founder, Honorable Norman Joseph Boardman (Ex-Officio) Diane Woodend Jones (TE 2019) Richard A. White (Ex-Officio) Legacy for Users (SAFETEA-LU). Most recently, MTI successfully competed in the Surface Transportation Extension Act of 2011 to Mineta (Ex-Officio) Chief Executive Officer Principal and Chair of Board Interim President and CEO be named a Tier 1 Transit-Focused University Transportation Center. The Institute is funded by Congress through the United States Secretary (ret.), US Department of Amtrak Lea+Elliot, Inc. American Public Transportation Transportation Association (APTA) Department of Transportation’s Office of the Assistant Secretary for Research and Technology (OST-R), University Transportation Vice Chair Anne Canby (TE 2017) Will Kempton (TE 2019) Centers Program, the California Department of Transportation (Caltrans), and by private grants and donations. Hill & Knowlton, Inc. Director Executive Director Bud Wright (Ex-Officio) OneRail Coalition Transportation California Executive Director Honorary Chair, Honorable Bill American Association of State The Institute receives oversight from an internationally respected Board of Trustees whose members represent all major surface Shuster (Ex-Officio) Donna DeMartino (TE 2018) Art Leahy (TE 2018) Highway and Transportation Officials Chair General Manager and CEO CEO (AASHTO) transportation modes. MTI’s focus on policy and management resulted from a Board assessment of the industry’s unmet needs House Transportation and San Joaquin Regional Transit District Metrolink and led directly to the choice of the San José State University College of Business as the Institute’s home. The Board provides Infrastructure Committee Edward Wytkind (Ex-Officio) United States House of William Dorey (TE 2017) Jean-Pierre Loubinoux (Ex-Officio) President policy direction, assists with needs assessment, and connects the Institute and its programs with the international transportation Representatives Board of Directors Director General Transportation Trades Dept., community. Granite Construction, Inc. International Union of Railways AFL-CIO Honorary Co-Chair, Honorable (UIC) Peter DeFazio (Ex-Officio) Malcolm Dougherty (Ex-Officio) MTI’s transportation policy work is centered on three primary responsibilities: Vice Chair Director Abbas Mohaddes (TE 2018) (TE) = Term Expiration or Ex-Officio House Transportation and California Department of CEO * = Past Chair, Board of Trustee Infrastructure Committee Transportation The Mohaddes Group United States House of Research Representatives Mortimer Downey* (TE 2018) Jeff Morales (TE 2019) MTI works to provide policy-oriented research for all levels of sity system. With the active assistance of the California President CEO Chair, Nuria Fernandez Mort Downey Consulting, LLC California High-Speed Rail Authority government and the private sector to foster the development Department of Transportation, MTI delivers its classes over (TE 2017) of optimum surface transportation systems. Research areas in- a state-of-the-art videoconference network throughout General Manager and CEO Rose Guilbault (TE 2017) Beverley Swaim-Staley (TE 2019) Valley Transportation Board Member President clude: transportation security; planning and policy development; the state of California and via webcasting beyond, allowing Authority Peninsula Corridor Joint Powers Union Station Redevelopment interrelationships among transportation, land use, and the working transportation professionals to pursue an advanced Board (Caltrain) Corporation environment; transportation finance; and collaborative labor- degree regardless of their location. To meet the needs of Vice Chair, Grace Crunican (TE 2019) Ed Hamberger (Ex-Officio) Michael Townes* (TE 2017) management relations. Certified Research Associates conduct employers seeking a diverse workforce, MTI’s education General Manager President/CEO President the research. Certification requires an advanced degree, gener- program promotes enrollment to under-represented groups. Bay Area Rapid Transit District Association of American Railroads Michael S. Townes, LLC ally a Ph.D., a record of academic publications, and profession- Executive Director, Steve Heminger* (TE 2018) Marlene Turner, Ph.D. (Ex-Officio) al references. Research projects culminate in a peer-reviewed Information and Technology Transfer Karen Philbrick, Ph.D. Executive Director Interim Dean, College of Business Mineta Transportation Institute Metropolitan Transportation San José State University publication, available both in hardcopy and on TransWeb, MTI promotes the availability of completed research to San José State University Commission the MTI website (http://transweb.sjsu.edu). professional organizations and journals and works to integrate the research findings into the graduate education Education program. In addition to publishing the studies, the Institute Directors The educational goal of the Institute is to provide graduate-lev- also sponsors symposia to disseminate research results el education to students seeking a career in the development to transportation professionals and encourages Research and operation of surface transportation programs. MTI, through Associates to present their findings at conferences. The Karen Philbrick, Ph.D. Hilary Nixon, Ph.D. Ben Tripousis Executive Director Research and Technology World in Motion, MTI’s quarterly newsletter, covers National High-Speed Rail Connectivity Center San José State University, offers an AACSB-accredited Master of Transfer Director Science in Transportation Management and a graduate Certifi- innovation in the Institute’s research and education pro- Peter Haas, Ph.D. Asha Weinstein Agrawal, Ph.D. cate in Transportation Management that serve to prepare the na- grams. MTI’s extensive collection of transportation-related Education Director Brian Michael Jenkins National Transportation Finance Center tion’s transportation managers for the 21st century. The master’s publications is integrated into San José State University’s National Transportation Safety and Security Center degree is the highest conferred by the California State Univer- world-class Martin Luther King, Jr. Library. DISCLAIMER The contents of this report reflect the views of the authors, who are responsible for the facts and accuracy of the information presented MNTRC herein. This document is disseminated under the sponsorship of the U.S. Department of Transportation, University Transportation Centers Program and the California Department of Transportation, in the interest of information exchange. This report does not necessarily reflect the official views or policies of the U.S. government, State of California, or the Mineta Transportation Institute, who assume no liability MINETA NATIONAL TRANSIT for the contents or use thereof. This report does not constitute a standard specification, design standard, or regulation. RESEARCH CONSORTIUM REPORT 12-74 THE CHALLENGE OF PROTECTING TRANSIT AND PASSENGER RAIL: UNDERSTANDING HOW SECURITY WORKS AGAINST TERRORISM Brian Michael Jenkins February 2017 A publication of Mineta Transportation Institute Created by Congress in 1991 College of Business San José State University San José, CA 95192-0219 TECHNICAL REPORT DOCUMENTATION PAGE 1. Report No. 2. Government Accession No. 3. Recipient’s Catalog No. CA-MTI-1130 4. Title and Subtitle 5. Report Date The Challenge of Protecting Transit and Passenger Rail: Understanding How February 2017 Security Works Against Terrorism 6. Performing Organization Code 7. Authors 8. Performing Organization Report Brian Michael Jenkins MTI Report 12-74 9. Performing Organization Name and Address 10. Work Unit No. Mineta Transportation Institute College of Business 11. Contract or Grant No. San José State University DTRT12-G-UTC21
Recommended publications
  • Attribution and Response to Cybercrime/Terrorism/Warfare Susan W
    Journal of Criminal Law and Criminology Volume 97 Article 2 Issue 2 Winter Winter 2007 At Light Speed: Attribution and Response to Cybercrime/Terrorism/Warfare Susan W. Brenner Follow this and additional works at: https://scholarlycommons.law.northwestern.edu/jclc Part of the Criminal Law Commons, Criminology Commons, and the Criminology and Criminal Justice Commons Recommended Citation Susan W. Brenner, At Light Speed: Attribution and Response to Cybercrime/Terrorism/Warfare, 97 J. Crim. L. & Criminology 379 (2006-2007) This Symposium is brought to you for free and open access by Northwestern University School of Law Scholarly Commons. It has been accepted for inclusion in Journal of Criminal Law and Criminology by an authorized editor of Northwestern University School of Law Scholarly Commons. 0091-4169/07/9702-0379 THE JOURNALOF CRIMINAL LAW & CRIMINOLOGY Vol. 97. No. 2 Copyright 0 2007 by NorthwesternUniversity. Schoolof Low Printedin U.S.A. "AT LIGHT SPEED": ATTRIBUTION AND RESPONSE TO CYBERCRIME/TERRORISM/WARFARE SUSAN W. BRENNER* This Article explains why and how computer technology complicates the related processes of identifying internal (crime and terrorism) and external (war) threats to social order of respondingto those threats. First, it divides the process-attribution-intotwo categories: what-attribution (what kind of attack is this?) and who-attribution (who is responsiblefor this attack?). Then, it analyzes, in detail, how and why our adversaries' use of computer technology blurs the distinctions between what is now cybercrime, cyberterrorism, and cyberwarfare. The Article goes on to analyze how and why computer technology and the blurring of these distinctions erode our ability to mount an effective response to threats of either type.
    [Show full text]
  • In Defense of Cyberterrorism: an Argument for Anticipating Cyber-Attacks
    IN DEFENSE OF CYBERTERRORISM: AN ARGUMENT FOR ANTICIPATING CYBER-ATTACKS Susan W. Brenner Marc D. Goodman The September 11, 2001, terrorist attacks on the United States brought the notion of terrorism as a clear and present danger into the consciousness of the American people. In order to predict what might follow these shocking attacks, it is necessary to examine the ideologies and motives of their perpetrators, and the methodologies that terrorists utilize. The focus of this article is on how Al-Qa'ida and other Islamic fundamentalist groups can use cyberspace and technology to continue to wage war againstthe United States, its allies and its foreign interests. Contending that cyberspace will become an increasingly essential terrorist tool, the author examines four key issues surrounding cyberterrorism. The first is a survey of conventional methods of "physical" terrorism, and their inherent shortcomings. Next, a discussion of cyberspace reveals its potential advantages as a secure, borderless, anonymous, and structured delivery method for terrorism. Third, the author offers several cyberterrorism scenarios. Relating several examples of both actual and potential syntactic and semantic attacks, instigated individually or in combination, the author conveys their damagingpolitical and economic impact. Finally, the author addresses the inevitable inquiry into why cyberspace has not been used to its full potential by would-be terrorists. Separately considering foreign and domestic terrorists, it becomes evident that the aims of terrorists must shift from the gross infliction of panic, death and destruction to the crippling of key information systems before cyberattacks will take precedence over physical attacks. However, given that terrorist groups such as Al Qa'ida are highly intelligent, well-funded, and globally coordinated, the possibility of attacks via cyberspace should make America increasingly vigilant.
    [Show full text]
  • How Sophisticated Are Terrorist Attacks on Passenger Rail Transportation
    How Sophisticated are Terrorist Attacks on Passenger Rail Project SP 0520 Transportation June 2020 Brian Michael Jenkins and Bruce R. Butterworth Executive Summary Summary of Key Findings Terrorist attacks on passenger rail transportation are statistically rare events in the developed world— only about seven attacks per year are carried out against all of the economically advanced countries combined. However, uncovered plots and attempts indicate continuing terrorist interest in attacking transportation targets. The vast majority of terrorist attacks on passenger rail transportation are aimed at disrupting travel or causing casualties. Most of the attacks (87%) and 100% of the casualties result from attacks on passengers aboard trains and in stations, i.e., where the people are. We have defined sophistication by identifying four criteria, of which at least one must be met: The attack must (1) involve the recruitment of inside assistance, the use of insider knowledge, or the acquisition of specialized skills through training; (2) require the penetration of manned or closely monitored security systems; (3) involve the use of sophisticated weapons, devices, or means (for an IED to be considered sophisticated, it must do more than simply explode—it must have a timing or remote detonating system that guarantees detonation at a remote time or in a specific location, or it must be miniaturized or disguised so as to evade detection); and (4) must be complex—it must involve multiple actors with individual roles or coordinated simultaneous or near-simultaneous attacks at different locations. Using those criteria, we find few of the terrorist attacks on public surface transport are sophisticated.
    [Show full text]
  • Lessons from Colombia for Curtailing the Boko Haram Insurgency in Nigeria
    Lessons From Colombia For Curtailing The Boko Haram Insurgency In Nigeria BY AFEIKHENA JEROME igeria is a highly complex and ethnically diverse country, with over 400 ethnic groups. This diversity is played out in the way the country is bifurcated along the lines of reli- Ngion, language, culture, ethnicity and regional identity. The population of about 178.5 million people in 2014 is made up of Christians and Muslims in equal measures of about 50 percent each, but including many who embrace traditional religions as well. The country has continued to experience serious and violent ethno-communal conflicts since independence in 1960, including the bloody and deadly thirty month fratricidal Civil War (also known as the Nigerian-Biafran war, 1967-70) when the eastern region of Biafra declared its seces- sion and which claimed more than one million lives. The most prominent of these conflicts recently pitch Muslims against Christians in a dangerous convergence of religion, ethnicity and politics. The first and most dramatic eruption in a series of recent religious disturbances was the Maitatsine uprising in Kano in December 1980, in which about 4,177 died. While the exact number of conflicts in Nigeria is unknown, because of a lack of reliable sta- tistical data, it is estimated that about 40 percent of all conflicts have taken place since the coun- try’s return to civilian rule in 1999.1 The increasing wave of violent conflicts across Nigeria under the current democratic regime is no doubt partly a direct consequence of the activities of ethno- communal groups seeking self-determination in their “homelands,” and of their surrogate ethnic militias that have assumed prominence since the last quarter of 2000.
    [Show full text]
  • Kamikazes! When Japanese Planes Attacked the U.S. Submarine Devilfish
    KAMIKAZES! When Japanese Planes Attacked the U.S. Submarine Devilfish by NATHANIEL PATCH he image of desperate Japanese pilots purposely flying their Tplanes into American warships in the closing months of World War II figures prominently in American popular culture. When most people hear the term kamikaze, they think Fortunately, the Devilfish was close to the surface when of swarms of planes flying through a torrent of antiaircraft the explosion occurred, and the submarine took only mi­ fire and plowing into the decks of aircraft carriers, battle­ nor damage that the crew could control. ships, cruisers, and destroyers, taking the lives of sailors and The officers and crew in the control room took quick ac­ damaging or sinking the ships in this desperate act. tion to prevent the submarine from sinking and to mitigate Out of the hundreds of these attacks, one was quite un­ the damage done by the incoming saltwater. They leveled usual: the only kamikaze attack on an American subma­ off the submarine at 80 feet, and the drain pumps were rine, the USS Devilfish (SS 292). barely keeping up with the incoming water. The bilges of Why was this submarine attacked, and why was there the conning tower filled rapidly, and water began pouring only one attacker? The story of the attack on the Devilfish into the control room. A constant spray of saltwater from seems to be a fragment of a larger story, separated by time the conning tower splashed onto the electrical panels and and distance, occurring on March 20, 1945. If kamikazes consoles in the control room.
    [Show full text]
  • Foreign Military Interventions and Suicide Attacks
    Article Journal of Conflict Resolution 2017, Vol. 61(2) 271-297 ª The Author(s) 2015 Foreign Military Reprints and permission: sagepub.com/journalsPermissions.nav DOI: 10.1177/0022002715576575 Interventions journals.sagepub.com/home/jcr and Suicide Attacks Seung-Whan Choi1, and James A. Piazza2 Abstract This study examines the effect of foreign military interventions on the incidence of suicide attacks. It presents three theoretical explanations. Foreign military inter- ventions may boost insurgent use of suicide attacks by (a) fomenting a nationalist backlash that sanctions the use of more extreme and unconventional tactics like suicide attacks, (b) providing more and better targets against which suicide attacks can be launched, or (c) prompting insurgents to use suicide tactics in order to overcome their power asymmetries and to confront better defended targets that are enhanced by interventions. We test these competing explanations using a bat- tery of statistical tests on cross-national, time-series data for 138 countries during the period from 1981 to 2005. We find that only foreign interventions with specific features—pro-government interventions involving larger numbers of ground troops—boost suicide attacks in countries experiencing interventions. This finding suggests that by tipping the balance of power against insurgents and hardening targets in the context of assisting a local government, foreign military interventions are likely to increase the use of suicide attacks by regime challengers. Keywords terrorism, suicide bombings, military intervention, international security 1Department of Political Science (MC 276), University of Illinois at Chicago, Chicago, IL, USA 2Department of Political Science, Pennsylvania State University, University Park, PA, USA Corresponding Author: James A.
    [Show full text]
  • Hard Targets: Theory and Evidence on Suicide Attacks*
    Hard Targets: Theory and Evidence on Suicide Attacks* Eli Berman – Department of Economics, UCSD; NBER David D. Laitin – Department of Political Science, Stanford University For inclusion in Eva Meyersson Milgrom, ed. Suicide Bombing from an Interdisciplinary Perspective (to be submitted to Princeton University Press) *We thank Barak Bouks for research assistance. This version benefited from discussions with Larry Iannaccone, Gershon Shafir and Mahmoud Al-Gamal. James Fearon, Peter Katzenstein, Alan Krueger, Howard Rosenthal, and participants in a Stanford conference commented on earlier versions, compelling revisions. Berman acknowledges support of National Science Foundation grant 0214701 through the NBER. Mistakes are our own. Berman and Laitin, “Rational Martyrs” p. 2 Abstract: Why suicide attacks? Though rebels often kill coreligionists, they seldom use suicide attacks to do so. Though rebels typically target poor countries, suicide attacks are just as likely to target rich democracies. Though many groups have grievances, suicide attacks are favored by the radical religious. We model the choice of tactics by rebels. We first ask what a suicide attacker would have to believe to be deemed rational. We then embed the attacker and other operatives in a club good model which emphasizes the function of voluntary religious organizations as providers of local public goods. The sacrifices which these groups demand solve a free-rider problem in the cooperative production of public goods, as in Iannaccone (1992). These sacrifices make clubs well suited for organizing suicide attacks where defection by operatives (including the attacker) endanger the entire organization. Thus radical religious groups can be effective dispatchers of suicide bombers if they chose to do so.
    [Show full text]
  • Applying Traditional Jurisdictional Frameworks to a Modern Threat
    PROSECUTING CYBERTERRORISTS: APPLYING TRADITIONAL JURISDICTIONAL FRAMEWORKS TO A MODERN THREAT Paul N. Stockton* & Michele Golabek-Goldman** The United States faces a growing risk of cyberterrorism against its finan- cial system, electric power grid, and other critical infrastructure sectors. Senior U.S. policymakers note that building U.S. capacity to prosecute cyberterrorists could play a key role in deterring and disrupting such attacks. To facilitate pros- ecution, the federal government is bolstering its technical expertise to attribute attacks to those who perpetrate them, even when, as is increasingly the case, the perpetrators exploit computers in dozens of nations to strike U.S. infrastructure. Relatively little attention has been paid, however, to another prerequisite for prosecuting cyberterrorists: that of building a legal framework that can bring those who attack from abroad to justice. The best approach to prosecuting cyberterrorists striking from abroad is to add extraterritorial application to current domestic criminal laws bearing on cyberattack. Yet, scholars have barely begun to explore how the United States can best justify such extraterritorial extension under international law and assert a legitimate claim of prescriptive jurisdiction when a terrorist hijacks thousands of computers across the globe. Still less attention has been paid to the question of how to resolve the conflicting claims of national jurisdiction that such attacks would likely engender. This Article argues that the protective principle—which predicates prescrip- tive jurisdiction on whether a nation suffered a fundamental security threat— should govern cyberterrorist prosecutions. To support this argument, the Article examines the full range of principles on which States could claim prescriptive ju- risdiction and assesses their strengths and weaknesses for extending extraterrito- rial application of U.S.
    [Show full text]
  • Force Protection and Suicide Bombers: the Necessity for Two Types of Canadian Military Red Teams
    E 21ST CENTURY H N T I WARFARE Reuters photo RTR23HIF by Ahmad Masood by RTR23HIF photo Reuters People run from a suicide car bomb blast outside the German embassy in Kabul, Afghanistan, 17 January 2009. FORCE PROTECTION AND SUICIDE BOMBERS: THE NECESSITY FOR TWO TYPES OF CANADIAN MILItary RED TEAMS by Robert J. Bunker Introduction and Background show how to determine and prioritize the types of likely sui- cide bomber threat scenarios a deployed force will face, and his article will discuss why the use of two types c) show how to conduct the physical red teaming of these of red teams - analytical and physical - to iden- identified higher priority suicide bomber threat scenarios. It tify and then simulate ‘suicide bomber threat will conclude with some general observations concerning the scenarios’ is necessary for the force protection value both forms of red teaming provide for the force protec- training of deploying Canadian military units. tion requirements of deploying Canadian military units TRed teaming as a discipline can be divided into two basic against the threat of suicide bombings. forms: (1) analytical red teaming, which is diegetic in nature; that is, based upon descriptive products and decision support A brief overview of the threat suicide bombings repre- functions and (2) physical red teaming, which is mimetic in sent to military forces and the globalization of this terrorist nature; that is, derived from live-action and role playing-based and insurgent technique needs to be provided for context. training with an opposing force (OPFOR) deployed against a Contemporary suicide bombings have been taking place since friendly military unit.1 These forms of red teaming are inti- the early-1980s, and have been directed at both military and mately linked, create synergies when utilized together, and should be fully harnessed for Canadian military force protec- Dr.
    [Show full text]
  • Suicide Attacks in Afghanistan: Why Now?
    University of Nebraska - Lincoln DigitalCommons@University of Nebraska - Lincoln Political Science Department -- Theses, Dissertations, and Student Scholarship Political Science, Department of Spring 5-2013 SUICIDE ATTACKS IN AFGHANISTAN: WHY NOW? Ghulam Farooq Mujaddidi University of Nebraska-Lincoln Follow this and additional works at: https://digitalcommons.unl.edu/poliscitheses Part of the Comparative Politics Commons, and the International Relations Commons Mujaddidi, Ghulam Farooq, "SUICIDE ATTACKS IN AFGHANISTAN: WHY NOW?" (2013). Political Science Department -- Theses, Dissertations, and Student Scholarship. 25. https://digitalcommons.unl.edu/poliscitheses/25 This Article is brought to you for free and open access by the Political Science, Department of at DigitalCommons@University of Nebraska - Lincoln. It has been accepted for inclusion in Political Science Department -- Theses, Dissertations, and Student Scholarship by an authorized administrator of DigitalCommons@University of Nebraska - Lincoln. SUICIDE ATTACKS IN AFGHANISTAN: WHY NOW? by Ghulam Farooq Mujaddidi A THESIS Presented to the Faculty of The Graduate College at the University of Nebraska In Partial Fulfillment of Requirements For the Degree of Master of Arts Major: Political Science Under the Supervision of Professor Patrice C. McMahon Lincoln, Nebraska May, 2013 SUICIDE ATTACKS IN AFGHANISTAN: WHY NOW? Ghulam Farooq Mujaddidi, M.A. University of Nebraska, 2013 Adviser: Patrice C. McMahon Why, contrary to their predecessors, did the Taliban resort to use of suicide attacks in the 2000s in Afghanistan? By drawing from terrorist innovation literature and Michael Horowitz’s adoption capacity theory—a theory of diffusion of military innovation—the author argues that suicide attacks in Afghanistan is better understood as an innovation or emulation of a new technique to retaliate in asymmetric warfare when insurgents face arms embargo, military pressure, and have direct links to external terrorist groups.
    [Show full text]
  • Martyrdom, Suicide, and the Islamic Law of War: a Short Legal History
    \\server05\productn\F\FIN\27-1\FIN102.txt unknown Seq: 1 31-DEC-03 14:19 MARTYRDOM, SUICIDE, AND THE ISLAMIC LAW OF WAR: A SHORT LEGAL HISTORY Bernard K. Freamon* INTRODUCTION Religion is the mother of war. Conflicts involving religion are among the most intractable of human disputes. Yet, until recently, wars motivated or influenced by religious ideologies have been confined to small well-defined theaters. Europe’s Thirty Years War, which ended in 1648, appears to be the only exception in the modern history of warfare.1 Indeed, in the last three millennia the world has seen much war but it has not seen a full-scale religious war of global proportions since the end of the Crusades. There is reason to believe that this state of affairs is about to change. The horrific attacks on the World Trade Center and the Pentagon on September 11, 2001, as well as the Western military incursion in Afghanistan, the invasion and conquest of Iraq, and continuing Islamist guerilla attacks and terrorist violence against military and civilian targets in a variety of countries with signifi- cant Muslim populations makes one wonder whether the West2 * Professor of Law and Director, Program for the Study of Law in the Middle East, Seton Hall Law School. Professor Freamon is a Doctor in the Science of Law (JSD) candidate at Columbia Law School. Research support provided by the Seton Hall Law School Faculty Development Fund is gratefully acknowledged. Special gratitude is owed to George P. Fletcher for his vision in suggesting the pursuit of this topic and for his insightful comments on earlier drafts.
    [Show full text]
  • The War in Iraq and International Humanitarian Law Frequently Asked Questions (FAQ) Last Updated April 7, 2003
    The War in Iraq and International Humanitarian Law Frequently Asked Questions (FAQ) Last Updated April 7, 2003 The war in Iraq has raised a number of important issues of international humanitarian law (IHL), also known as the laws of war. IHL consists of the rules during armed conflict that seek to protect civilians and captured or incapacitated combatants, and restrict the methods and means of warfare. The following Frequently Asked Questions (FAQ) address some of the legal issues brought to public attention by official government statements and media reports. The FAQ do not attempt to assess the validity of any factual assertions made; instead they provide a legal analysis on the basis of assumed facts. This set of FAQ is not exhaustive and will be added to as necessary. The responses below are based on IHL as derived from international treaties and customary international law (practices broadly accepted as legally binding). The main sources of treaty law are the four Geneva Conventions of 1949 (to which all warring states are party) and the Hague Convention of 1907 respecting the Laws and Customs of War on Land. Customary IHL is drawn from state practice, decisions of international tribunals, scholarly works, and international treaties to which the United States and Iraq are not party (particularly Protocols I and II of 1977 to the Geneva Conventions), many provisions of which are accepted as reflecting customary international law. At its core, international humanitarian law seeks to limit the harm to people and property during wartime. Human Rights Watch urges all parties to the conflict in Iraq to abide scrupulously by its obligations under IHL.
    [Show full text]