Fighting the War on Terrorism: a Better Approach
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Combating Islamic Extremist Terrorism 1
CGT 1/22/07 11:30 AM Page 1 Combating Islamic Extremist Terrorism 1 OVERALL GRADE D+ Al-Qaeda headquarters C+ Al-Qaeda affiliated groups C– Al-Qaeda seeded groups D+ Al-Qaeda inspired groups D Sympathizers D– 1 CGT 1/22/07 11:30 AM Page 2 2 COMBATING ISLAMIC EXTREMIST TERRORISM ive years after the September 11 attacks, is the United States win- ning or losing the global “war on terror”? Depending on the prism through which one views the conflict or the metrics used Fto gauge success, the answers to the question are starkly different. The fact that the American homeland has not suffered another attack since 9/11 certainly amounts to a major achievement. U.S. military and security forces have dealt al-Qaeda a severe blow, cap- turing or killing roughly three-quarters of its pre-9/11 leadership and denying the terrorist group uncontested sanctuary in Afghanistan. The United States and its allies have also thwarted numerous terror- ist plots around the world—most recently a plan by British Muslims to simultaneously blow up as many as ten jetliners bound for major American cities. Now adjust the prism. To date, al-Qaeda’s top leaders have sur- vived the superpower’s most punishing blows, adding to the near- mythical status they enjoy among Islamic extremists. The terrorism they inspire has continued apace in a deadly cadence of attacks, from Bali and Istanbul to Madrid, London, and Mumbai. Even discount- ing the violence in Iraq and Afghanistan, the tempo of terrorist attacks—the coin of the realm in the jihadi enterprise—is actually greater today than before 9/11. -
Attribution and Response to Cybercrime/Terrorism/Warfare Susan W
Journal of Criminal Law and Criminology Volume 97 Article 2 Issue 2 Winter Winter 2007 At Light Speed: Attribution and Response to Cybercrime/Terrorism/Warfare Susan W. Brenner Follow this and additional works at: https://scholarlycommons.law.northwestern.edu/jclc Part of the Criminal Law Commons, Criminology Commons, and the Criminology and Criminal Justice Commons Recommended Citation Susan W. Brenner, At Light Speed: Attribution and Response to Cybercrime/Terrorism/Warfare, 97 J. Crim. L. & Criminology 379 (2006-2007) This Symposium is brought to you for free and open access by Northwestern University School of Law Scholarly Commons. It has been accepted for inclusion in Journal of Criminal Law and Criminology by an authorized editor of Northwestern University School of Law Scholarly Commons. 0091-4169/07/9702-0379 THE JOURNALOF CRIMINAL LAW & CRIMINOLOGY Vol. 97. No. 2 Copyright 0 2007 by NorthwesternUniversity. Schoolof Low Printedin U.S.A. "AT LIGHT SPEED": ATTRIBUTION AND RESPONSE TO CYBERCRIME/TERRORISM/WARFARE SUSAN W. BRENNER* This Article explains why and how computer technology complicates the related processes of identifying internal (crime and terrorism) and external (war) threats to social order of respondingto those threats. First, it divides the process-attribution-intotwo categories: what-attribution (what kind of attack is this?) and who-attribution (who is responsiblefor this attack?). Then, it analyzes, in detail, how and why our adversaries' use of computer technology blurs the distinctions between what is now cybercrime, cyberterrorism, and cyberwarfare. The Article goes on to analyze how and why computer technology and the blurring of these distinctions erode our ability to mount an effective response to threats of either type. -
Social-Property Relations, Class-Conflict and The
Historical Materialism 19.4 (2011) 129–168 brill.nl/hima Social-Property Relations, Class-Conflict and the Origins of the US Civil War: Towards a New Social Interpretation* Charles Post City University of New York [email protected] Abstract The origins of the US Civil War have long been a central topic of debate among historians, both Marxist and non-Marxist. John Ashworth’s Slavery, Capitalism, and Politics in the Antebellum Republic is a major Marxian contribution to a social interpretation of the US Civil War. However, Ashworth’s claim that the War was the result of sharpening political and ideological – but not social and economic – contradictions and conflicts between slavery and capitalism rests on problematic claims about the rôle of slave-resistance in the dynamics of plantation-slavery, the attitude of Northern manufacturers, artisans, professionals and farmers toward wage-labour, and economic restructuring in the 1840s and 1850s. An alternative social explanation of the US Civil War, rooted in an analysis of the specific path to capitalist social-property relations in the US, locates the War in the growing contradiction between the social requirements of the expanded reproduction of slavery and capitalism in the two decades before the War. Keywords origins of capitalism, US Civil War, bourgeois revolutions, plantation-slavery, agrarian petty- commodity production, independent-household production, merchant-capital, industrial capital The Civil War in the United States has been a major topic of historical debate for almost over 150 years. Three factors have fuelled scholarly fascination with the causes and consequences of the War. First, the Civil War ‘cuts a bloody gash across the whole record’ of ‘the American . -
Law of Armed Conflict
Lesson 1 THE LAW OF ARMED CONFLICT Basic knowledge International Committee of the Red Cross Unit for Relations with Armed and Security Forces 19 Avenue de la Paix 1202 Geneva, Switzerland T +41 22 734 60 01 F +41 22 733 20 57 E-mail: [email protected] www.icrc.org Original: English – June 2002 INTRODUCTION TO THE LAW OF ARMED CONFLICT BASIC KNOWLEDGE LESSON 1 [ Slide 2] AIM [ Slide 3] The aim of this lesson is to introduce the topic to the class, covering the following main points: 1. Background: setting the scene. 2. The need for compliance. 3. How the law evolved and its main components. 4. When does the law apply? 5. The basic principles of the law. INTRODUCTION TO THE LAW OF ARMED CONFLICT 1. BACKGROUND: SETTING THE SCENE Today we begin a series of lectures on the law of armed conflict, which is also known as the law of war, international humanitarian law, or simply IHL. To begin, I’d like to take a guess at what you’re thinking right now. Some of you are probably thinking that this is an ideal opportunity to catch up on some well-earned rest. “Thank goodness I’m not on the assault course or on manoeuvres. This is absolutely marvellous. I can switch off and let this instructor ramble on for 45 minutes. I know all about the Geneva Conventions anyway – the law is part of my culture and our military traditions. I really don't need to listen to all this legal ‘mumbo jumbo’.” The more sceptical and cynical among you might well be thinking along the lines of a very famous orator of ancient Rome – Cicero. -
Cyber War, Cybered Conflict, and the Maritime Domain Peter Dombrowski
Naval War College Review Volume 67 Article 7 Number 2 Spring 2014 Cyber War, Cybered Conflict, and the Maritime Domain Peter Dombrowski Chris C. Demchak Follow this and additional works at: https://digital-commons.usnwc.edu/nwc-review Recommended Citation Dombrowski, Peter and Demchak, Chris C. (2014) "Cyber War, Cybered Conflict, and the Maritime Domain," Naval War College Review: Vol. 67 : No. 2 , Article 7. Available at: https://digital-commons.usnwc.edu/nwc-review/vol67/iss2/7 This Article is brought to you for free and open access by the Journals at U.S. Naval War College Digital Commons. It has been accepted for inclusion in Naval War College Review by an authorized editor of U.S. Naval War College Digital Commons. For more information, please contact [email protected]. Dombrowski and Demchak: Cyber War, Cybered Conflict, and the Maritime Domain CYBER WAR, CYBERED CONFLICT, AND THE MARITIME DOMAIN Peter Dombrowski and Chris C. Demchak t has been well over a decade since the first “prophets” of information warfare proclaimed a new age of conflict fought not just on air, sea, and land but with 1 Ielectrons in what came to be known as “cyberspace�” Since these early predic- tions, many incidents have confirmed that criminals, random hackers, and government-sanctioned specialists can wreak havoc on governments, military communications systems, and corporations� The Stuxnet worm alone helped delay—by months, perhaps years—the long-standing efforts of Iran to acquire sufficient nuclear material to build nuclear weapons�2 Recent -
HOW to WIN the WAR of IDEAS Lessons from the Gramscian Right
Susan George HOW TO WIN THE WAR OF IDEAS Lessons from the Gramscian Right In Greek the hegemon is the leader, and from ket-dominated, iniquitous world is neither there it’s just a linguistic hop, skip, and jump to natural nor inevitable, then it should be pos- the notion of rule, authority, and dominance ex- sible to build a counter-project for a different pressed by the word “hegemony.” Traditionally, kind of world. the term was reserved for states. In the 1920s and 1930s, the great Italian Marxist thinker An- Exclusion and Ideology tonio Gramsci took the concept further, using it to explain how one class could establish its lead- The late twentieth century could be dubbed the ership over others through ideological domi- Age of Exclusion. It’s now clear that the “free nance. Whereas orthodox Marxism explained market,” which increasingly determines politi- nearly everything by economic forces, Gramsci cal and social as well as economic priorities, added the crucial cultural dimension. He showed cannot embrace everyone. The market’s job is how, once ideological authority—or “cultural he- not to provide jobs, much less social cohesion. gemony”—is established, the use of violence to It has no place for the growing numbers of people impose change can become superfluous. who contribute little or nothing to production Today, few would deny that we live under or consumption. The market operates for the the virtually undisputed rule of the market-domi- benefit of a minority. nated, ultracompetitive, globalized society with The Age of Exclusion engenders myriad so- its cortège of manifold iniquities and everyday cial ills with which various humanitarian and violence. -
American War and Military Operations Casualties: Lists and Statistics
American War and Military Operations Casualties: Lists and Statistics Updated July 29, 2020 Congressional Research Service https://crsreports.congress.gov RL32492 American War and Military Operations Casualties: Lists and Statistics Summary This report provides U.S. war casualty statistics. It includes data tables containing the number of casualties among American military personnel who served in principal wars and combat operations from 1775 to the present. It also includes data on those wounded in action and information such as race and ethnicity, gender, branch of service, and cause of death. The tables are compiled from various Department of Defense (DOD) sources. Wars covered include the Revolutionary War, the War of 1812, the Mexican War, the Civil War, the Spanish-American War, World War I, World War II, the Korean War, the Vietnam Conflict, and the Persian Gulf War. Military operations covered include the Iranian Hostage Rescue Mission; Lebanon Peacekeeping; Urgent Fury in Grenada; Just Cause in Panama; Desert Shield and Desert Storm; Restore Hope in Somalia; Uphold Democracy in Haiti; Operation Enduring Freedom (OEF); Operation Iraqi Freedom (OIF); Operation New Dawn (OND); Operation Inherent Resolve (OIR); and Operation Freedom’s Sentinel (OFS). Starting with the Korean War and the more recent conflicts, this report includes additional detailed information on types of casualties and, when available, demographics. It also cites a number of resources for further information, including sources of historical statistics on active duty military deaths, published lists of military personnel killed in combat actions, data on demographic indicators among U.S. military personnel, related websites, and relevant CRS reports. Congressional Research Service American War and Military Operations Casualties: Lists and Statistics Contents Introduction .................................................................................................................................... -
Foreign Military Interventions and Suicide Attacks
Article Journal of Conflict Resolution 2017, Vol. 61(2) 271-297 ª The Author(s) 2015 Foreign Military Reprints and permission: sagepub.com/journalsPermissions.nav DOI: 10.1177/0022002715576575 Interventions journals.sagepub.com/home/jcr and Suicide Attacks Seung-Whan Choi1, and James A. Piazza2 Abstract This study examines the effect of foreign military interventions on the incidence of suicide attacks. It presents three theoretical explanations. Foreign military inter- ventions may boost insurgent use of suicide attacks by (a) fomenting a nationalist backlash that sanctions the use of more extreme and unconventional tactics like suicide attacks, (b) providing more and better targets against which suicide attacks can be launched, or (c) prompting insurgents to use suicide tactics in order to overcome their power asymmetries and to confront better defended targets that are enhanced by interventions. We test these competing explanations using a bat- tery of statistical tests on cross-national, time-series data for 138 countries during the period from 1981 to 2005. We find that only foreign interventions with specific features—pro-government interventions involving larger numbers of ground troops—boost suicide attacks in countries experiencing interventions. This finding suggests that by tipping the balance of power against insurgents and hardening targets in the context of assisting a local government, foreign military interventions are likely to increase the use of suicide attacks by regime challengers. Keywords terrorism, suicide bombings, military intervention, international security 1Department of Political Science (MC 276), University of Illinois at Chicago, Chicago, IL, USA 2Department of Political Science, Pennsylvania State University, University Park, PA, USA Corresponding Author: James A. -
Al-Qaeda's “Single Narrative” and Attempts to Develop Counter
Al-Qaeda’s “Single Narrative” and Attempts to Develop Counter- Narratives: The State of Knowledge Alex P. Schmid ICCT Research Paper January 2014 This Research Paper seeks to map efforts to counter the attraction of al Qaeda’s ideology. The aim is to bring together and synthesise current insights in an effort to make existing knowledge more cumulative. It is, however, beyond the scope of this paper to test existing counter-narratives on their impact and effectiveness or elaborate in detail a new model that could improve present efforts. However, it provides some promising conceptual elements for a new road map on how to move forward, based on a broad review and analysis of open source literature. About the Author Alex P. Schmid is a Visiting Research Fellow at the International Centre for Counter Terrorism – The Hague, and Director of the Terrorism Research Initiative (TRI), an international network of scholars who seek to enhance human security through collaborative research. He was co-editor of the journal Terrorism and Political Violence and is currently editor-in-chief of Perspectives on Terrorism, the online journal of TRI. Dr. Schmid held a chair in International Relations at the University of St. Andrews (Scotland) where he was, until 2009, also Director of the Centre for the Study of Terrorism and Political Violence (CSTPV). From 1999 to 2005 he was Officer-in-Charge of the Terrorism Prevention Branch at the UN Office on Drugs and Crime (UNODC) in the rank of a Senior Crime Prevention and Criminal Justice Officer. From 1994 to 1999, Dr. Schmid was an elected member of the Executive Board of ISPAC (International Scientific and Professional Advisory Council) of the United Nations' Crime Prevention and Criminal Justice Programme. -
Military Aviation: Issues and Options for Combating Terrorism and Counterinsurgency
Order Code RL32737 CRS Report for Congress Received through the CRS Web Military Aviation: Issues and Options for Combating Terrorism and Counterinsurgency January 27, 2006 Christopher Bolkcom Specialist in National Defense Foreign Affairs, Defense, and Trade Division Kenneth Katzman Specialist in Middle East Affairs Foreign Affairs, Defense, and Trade Division Congressional Research Service ˜ The Library of Congress Military Aviation: Issues and Options for Combating Terrorism Summary By all accounts, the U.S. military dominates state-on-state conflict. In the past, non-state actors (terrorists, guerrillas, drug traffickers) appeared to be less threatening to U.S. national security than the well funded, well organized, and potent armed forces of an enemy nation-state. The terrorist attacks of September 11, 2001 illustrate, however, that small groups of non-state actors can exploit relatively inexpensive and commercially available technology to conduct very destructive attacks over great distances. Today’s U.S. armed forces were developed principally with state-on-state conflict in mind. Combating non-state actors, however, presents a number of distinct challenges in terms of operations, cost, and mindset. Non-state actors generally strive to hide within civilian populations. While U.S. policy makers typically seek quick and decisive victories, non-state actors seek protracted war. Non-state actors often employ cheap, commercially available weapons, that often result in expensive responses by the United States. Many of the weapons and methods employed today by U.S. armed forces can be used against non-state actors. Some, however, are more directly applicable than others. U.S. experience in conducting close air support (CAS), employing special operations forces (SOF) and advising friendly governments in using aviation to defend themselves from insurgents and terrorists may form a basis for building capabilities against non-state actors. -
Law of War Handbook 2005
LAW OF WAR HANDBOOK (2005) MAJ Keith E. Puls Editor 'Contributing Authors Maj Derek Grimes, USAF Lt Col Thomas Hamilton, USMC MAJ Eric Jensen LCDR William O'Brien, USN MAJ Keith Puls NIAJ Randolph Swansiger LTC Daria Wollschlaeger All of the faculty who have served before us and contributed to the literature in the field of operational law. Technical Support CDR Brian J. Bill, USN Ms. Janice D. Prince, Secretary JA 423 International and Operational Law Department The Judge Advocate General's Legal Center and School Charlottesville, Virginia 22903 PREFACE The Law of War Handbook should be a start point for Judge Advocates looking for information on the Law of War. It is the second volume of a three volume set and is to be used in conjunction with the Operational Law Handbook (JA422) and the Documentary Supplement (JA424). The Operational Law Handbook covers the myriad of non-Law of War issues a deployed Judge Advocate may face and the Documentary Supplement reproduces many of the primary source documents referred to in either of the other two volumes. The Law of War Handbook is not a substitute for official references. Like operational law itself, the Handbook is a focused collection of diverse legal and practical information. The handbook is not intended to provide "the school solution" to a particular problem, but to help Judge Advocates recognize, analyze, and resolve the problems they will encounter when dealing with the Law of War. The Handbook was designed and written for the Judge Advocates practicing the Law of War. This body of law is known by several names including the Law of War, the Law of Armed Conflict and International Humanitarian Law. -
Hardening Soft Targets
New Visions for Public Affairs, Volume 11, Spring 2019 || 14 Policy in Action Piece Hardening Soft Targets Daniel Henne University of Delaware Terrorism was once a scattered, intermittent concern for the global community. It is now an everyday security problem that primarily affects large urban centers that have not been secured. Proper risk assessment, intelligence collection, public awareness, organizational collaboration, and improvements in technology are key areas and points that need to be emphasized in terrorism prevention. When it comes to implementing effective counterterrorism practices, places such as New York City have made strides. The city’s ability to prevent attacks can be contributed to their extensive use of surveillance systems, as well as their robust information- sharing and collaborative abilities. This paper assesses the major findings in counterterrorism literature and in practice, providing examples of advances that New York City has utilized in order to keep people safe from terrorist attacks. Policy Problem and Historical Context keep counterterrorism and soft target hardening Terrorist attacks and their effects on at the forefront of their public safety concerns. people throughout the world have been a In addition to this analysis, the following paper protracted concern for the past twenty years. will recommend improvements that can be Although the methods in which these types of made to bolster practices and procedures in attacks have varied, a vast majority of them developing better public safety standards and have occurred in places that can be defined as outcomes. soft targets (French, 2015). Soft targets are locations that are accessible to large numbers of Terrorism and Soft Targets people and that have limited security or There is no universally accepted definition protection methods in case of an emergency.