Rethinking the “War on Terror” New Approaches to Conflict Prevention and Management in the Post-9/11 World

Total Page:16

File Type:pdf, Size:1020Kb

Rethinking the “War on Terror” New Approaches to Conflict Prevention and Management in the Post-9/11 World 24 RETHINKING THE “WAR ON TERROR” NEW APPROACHES TO CONFLICT PREVENTION AND MANAGEMENT IN THE POST-9/11 WORLD Paul B. Stares and Mona Yacoubian HE NEW STRATEGIC CHALLENGE FAC- lenges that transcend national borders and are ing the United States in the wake of driven by nonstate actors and processes. This T9/11 is often compared with the great does not mean that the traditional toolbox of “generational” struggles of the twentieth cen- national security responses is now irrelevant or tury against fascism and communism. While renders obsolete the standard menu of conflict the contest likely will be as prolonged and re- prevention and management techniques—on quire a comparable mobilization of national the contrary. But these techniques must be and international resources if the United States adapted and complemented with new ap- is to prevail, the comparison should not be proaches that acknowledge unconventional pushed too far.The struggle we now find our- attributes of these new security challenges. In selves in is like neither World War II nor the the case of Islamist militancy, the nature of the Cold War, with their clearly defined combat- evolving challenge is still poorly understood. ants, “front lines,” and rules of engagement. Thus, before describing an alternative, and The perpetrators of the September 11 attacks what we believe to be a more effective strategy represent a transnational, highly dynamic, in- for responding to Islamist militancy than the creasingly decentralized, religiously inspired approach currently favored in the “global war movement propelled for the most part by a di- on terror,” this chapter will first lay out a dif- verse collection of nonstate actors.They operate ferent way of thinking about the new strategic in some instances openly but more often clan- challenge confronting the United States. destinely, using unorthodox tactics and weap- ons.The challenge posed by what we define as “Islamist militancy” is fundamentally differ- THE NEW STRATEGIC CHALLENGE ent, therefore, from traditional “state-centric” Despite a plethora of studies and policy pre- threats to international peace and security. scriptions since the September 11 attacks, we As such, Islamist militancy has more in com- are still trying to grasp the nature of the new mon with other so-called new security chal- strategic challenge we face and how best to 425 426 PAUL B. STARES AND MONA YACOUBIAN Figure 1. Islamist Militancy, c. 2006 Transnational Islamist-Militant Groups with a Global Agenda Abu Sayyaf Group, Jaish-e-Mohammed, al Qaeda, al Qaeda in Iraq, Salafiyyah Jihadiyyah, Ansar al-Islam, Jemaah Islamiya International Islamic Battalion, Islamic Movement of Uzbekistan Saudi charities, al Qaeda Web sites Independents (e.g., 3/11, 7/7) Hamas, Hezbollah, al Mukmin Hizbul-Mujahideen, Moro Islamic Liberation Front Jamaat-e-Ulema Islami, Hezbollah/Hamas party organizations Nationalist/Insurgent Support/Mobilization Islamist-Militant Groups Networks with a Local Agenda counter it.There is no better indication of this to “terrorism.” Using the term “militants” to than the complete lack of consensus or com- refer to those who either employ or espouse mon lexicon about what to call the threat. Is violent means in pursuit of political ends not it “global terrorism,” “Islamic terrorism,” “al only avoids the notoriously slippery defini- Qaeda and its affiliates,” “Sunni jihadists,” “Is- tional problems associated with terrorism but lamist radicals,” or “terrorist extremism”? This also serves to underscore that the challenge is is not just a semantics issue; words and names both multidimensional and broad based, in- have vital operational import. Without clarity volving more actors than just those who actu- on who, precisely, is our adversary, we are un- ally carry out terrorist attacks.2 Indeed, Islamist likely to ever develop a clear and comprehen- militancy has three main constituent groups sive understanding of its objectives, strategy, whose memberships are constantly evolving and operational character. And without such a and overlap in significant ways. common understanding, it will be difficult, if There are, first, the transnational jihadist not impossible, to conceive of an effective and groups that have a global agenda (principally sustainable response. Yet it is our assessment al Qaeda and its affiliates); second, the nation- that there is neither a broadly accepted under- alist insurgent groups that have essentially standing of the challenge we face nor a com- a local agenda (e.g., Hamas, Hezbollah, and prehensive long-term strategy to counter it. some of the Kashmiri groups); and, third, the Our preference is to classify this broader miscellaneous organizations and networks that challenge as “Islamist militancy.” Like the 9/11 directly and indirectly support these militant Commission, we feel it important to use the groups. Distinctions among these groups are modifier “Islamist”—a politico-religious move- difficult to discern. Indeed, more and more new ment within the Muslim world—rather than organizations and groups are emerging that “Islamic”—the culture and religion of Islam.1 share common traits with overlapping agen- Unlike the 9/11 Commission, however, we das. Figure 1 provides a general snapshot of the prefer the simpler, less loaded term “militancy” principal actors in 2006. The diagram is not RETHINKING THE “WAR ON TERROR” 427 meant to be exhaustive and is merely illustra- insurgency approach has its shortcomings and tive of the phenomenon and its key consti- even liabilities. Describing the phenomenon tuent elements. as a global insurgency dangerously exaggerates Islamist militancy does not represent a the threat by assuming a degree of organiza- conventional national security threat—that tion and unity among its various actors that much is clear and generally understood. Nei- currently does not exist. The COIN approach ther does it represent a conventional terrorist also risks conflating many kinds of Islamist threat, which typically has a distinctive—often struggles and perversely even serving to legit- singular—identity with reasonably clear polit- imize them. Unless suitably adapted, the stan- ical goals, organizational structure, and area dard COIN framework with its simplistic of operations. Conventional counterterrorist distinctions between “enemies,” “friends,” and responses, with their emphasis on apprehend- “uncommitted” could make matters worse, es- ing an organization’s leaders and rolling up pecially if military or “kinetic” responses come networks or cells of activists and supporters to dominate. through improved intelligence gathering and With these concerns in mind, we propose sharing, are usually effective therefore. Although an alternative strategy to countering Islamist such methods remain just as necessary to any militancy that views the challenge as one would campaign against Islamist militancy, it is also a global public health threat or epidemic. The becoming clear that they will not be sufficient. conceptual leap required by this approach is The growing trend, exhibited in attacks such not as far as it first appears. Social scientists as those in Madrid (March 2004), London increasingly have looked to epidemiology to (July 2005), and elsewhere, toward the emer- understand a variety of social contagions, and gence of localized, self-organizing militant here Islamist militancy is no different. Specif- groups acting largely independently of higher ically, our approach draws on the scientific operational direction underscores the limits of principles and practices of epidemiology as conventional counterterrorism responses. well as the insights from a growing body of re- Not surprisingly, an increasing number of search on “social contagion phenomena” such experts now advocate drawing on the strate- as fashions, fads, rumors, civil violence, and gies and tactics of unconventional, or “irregu- revolutionary ideas.4 Moreover, many com- lar,” warfare to meet the challenge.3 The threat mentators and even U.S. officials have em- is portrayed as a global insurgency that re- ployed disease metaphors to describe the chal- quires a commensurate global counterinsur- lenge of Islamist militancy.5 Thus references gency (COIN) campaign. There is some logic to terrorism being a “virus” or to al Qaeda “mu- to this as elements of the challenge reflect tating” or “metastasizing” are common. Simi- characteristics of a classic insurgency. Certainly, larly, the image of madrassas and mosques al Qaeda’s stated goals of expelling “Jews and being “incubators” of a “virulent ideology” is crusaders” from the Muslim world and cleans- frequently invoked. Such metaphors have a ing it of apostate regimes—all with the objec- visceral appeal in that they help to convey a tive of reestablishing a purified caliphate—can dangerous and, moreover, darkly insidious be viewed as an insurgency of sorts. The threat. For some, the disease metaphor also recognition that success ultimately hinges on sets—implicitly, at least—a more realistic goal winning “hearts and minds” in the Muslim for what can be practically achieved to elimi- world is also a critically important attribute of nate this scourge. Just as very few diseases a counterinsurgency response. have been completely eradicated, so the like- Yet just as classic counterterrorism meas- lihood that terrorism or political violence will ures have their limits, so a strictly counter- be rendered extinct is remote. The best that 428 PAUL B. STARES AND MONA YACOUBIAN can be hoped for is for
Recommended publications
  • Combating Islamic Extremist Terrorism 1
    CGT 1/22/07 11:30 AM Page 1 Combating Islamic Extremist Terrorism 1 OVERALL GRADE D+ Al-Qaeda headquarters C+ Al-Qaeda affiliated groups C– Al-Qaeda seeded groups D+ Al-Qaeda inspired groups D Sympathizers D– 1 CGT 1/22/07 11:30 AM Page 2 2 COMBATING ISLAMIC EXTREMIST TERRORISM ive years after the September 11 attacks, is the United States win- ning or losing the global “war on terror”? Depending on the prism through which one views the conflict or the metrics used Fto gauge success, the answers to the question are starkly different. The fact that the American homeland has not suffered another attack since 9/11 certainly amounts to a major achievement. U.S. military and security forces have dealt al-Qaeda a severe blow, cap- turing or killing roughly three-quarters of its pre-9/11 leadership and denying the terrorist group uncontested sanctuary in Afghanistan. The United States and its allies have also thwarted numerous terror- ist plots around the world—most recently a plan by British Muslims to simultaneously blow up as many as ten jetliners bound for major American cities. Now adjust the prism. To date, al-Qaeda’s top leaders have sur- vived the superpower’s most punishing blows, adding to the near- mythical status they enjoy among Islamic extremists. The terrorism they inspire has continued apace in a deadly cadence of attacks, from Bali and Istanbul to Madrid, London, and Mumbai. Even discount- ing the violence in Iraq and Afghanistan, the tempo of terrorist attacks—the coin of the realm in the jihadi enterprise—is actually greater today than before 9/11.
    [Show full text]
  • Blitzkrieg: the Evolution of Modern Warfare and the Wehrmacht's
    East Tennessee State University Digital Commons @ East Tennessee State University Electronic Theses and Dissertations Student Works 8-2021 Blitzkrieg: The Evolution of Modern Warfare and the Wehrmacht’s Impact on American Military Doctrine during the Cold War Era Briggs Evans East Tennessee State University Follow this and additional works at: https://dc.etsu.edu/etd Part of the History Commons Recommended Citation Evans, Briggs, "Blitzkrieg: The Evolution of Modern Warfare and the Wehrmacht’s Impact on American Military Doctrine during the Cold War Era" (2021). Electronic Theses and Dissertations. Paper 3927. https://dc.etsu.edu/etd/3927 This Thesis - unrestricted is brought to you for free and open access by the Student Works at Digital Commons @ East Tennessee State University. It has been accepted for inclusion in Electronic Theses and Dissertations by an authorized administrator of Digital Commons @ East Tennessee State University. For more information, please contact [email protected]. Blitzkrieg: The Evolution of Modern Warfare and the Wehrmacht’s Impact on American Military Doctrine during the Cold War Era ________________________ A thesis presented to the faculty of the Department of History East Tennessee State University In partial fulfillment of the requirements for the degree Master of Arts in History ______________________ by Briggs Evans August 2021 _____________________ Dr. Stephen Fritz, Chair Dr. Henry Antkiewicz Dr. Steve Nash Keywords: Blitzkrieg, doctrine, operational warfare, American military, Wehrmacht, Luftwaffe, World War II, Cold War, Soviet Union, Operation Desert Storm, AirLand Battle, Combined Arms Theory, mobile warfare, maneuver warfare. ABSTRACT Blitzkrieg: The Evolution of Modern Warfare and the Wehrmacht’s Impact on American Military Doctrine during the Cold War Era by Briggs Evans The evolution of United States military doctrine was heavily influenced by the Wehrmacht and their early Blitzkrieg campaigns during World War II.
    [Show full text]
  • American War and Military Operations Casualties: Lists and Statistics
    American War and Military Operations Casualties: Lists and Statistics Nese F. DeBruyne Senior Research Librarian Updated September 14, 2018 Congressional Research Service 7-5700 www.crs.gov RL32492 American War and Military Operations Casualties: Lists and Statistics Summary This report provides U.S. war casualty statistics. It includes data tables containing the number of casualties among American military personnel who served in principal wars and combat operations from 1775 to the present. It also includes data on those wounded in action and information such as race and ethnicity, gender, branch of service, and cause of death. The tables are compiled from various Department of Defense (DOD) sources. Wars covered include the Revolutionary War, the War of 1812, the Mexican War, the Civil War, the Spanish-American War, World War I, World War II, the Korean War, the Vietnam Conflict, and the Persian Gulf War. Military operations covered include the Iranian Hostage Rescue Mission; Lebanon Peacekeeping; Urgent Fury in Grenada; Just Cause in Panama; Desert Shield and Desert Storm; Restore Hope in Somalia; Uphold Democracy in Haiti; Operation Enduring Freedom (OEF); Operation Iraqi Freedom (OIF); Operation New Dawn (OND); Operation Inherent Resolve (OIR); and Operation Freedom’s Sentinel (OFS). Starting with the Korean War and the more recent conflicts, this report includes additional detailed information on types of casualties and, when available, demographics. It also cites a number of resources for further information, including sources of historical statistics on active duty military deaths, published lists of military personnel killed in combat actions, data on demographic indicators among U.S. military personnel, related websites, and relevant Congressional Research Service (CRS) reports.
    [Show full text]
  • Social-Property Relations, Class-Conflict and The
    Historical Materialism 19.4 (2011) 129–168 brill.nl/hima Social-Property Relations, Class-Conflict and the Origins of the US Civil War: Towards a New Social Interpretation* Charles Post City University of New York [email protected] Abstract The origins of the US Civil War have long been a central topic of debate among historians, both Marxist and non-Marxist. John Ashworth’s Slavery, Capitalism, and Politics in the Antebellum Republic is a major Marxian contribution to a social interpretation of the US Civil War. However, Ashworth’s claim that the War was the result of sharpening political and ideological – but not social and economic – contradictions and conflicts between slavery and capitalism rests on problematic claims about the rôle of slave-resistance in the dynamics of plantation-slavery, the attitude of Northern manufacturers, artisans, professionals and farmers toward wage-labour, and economic restructuring in the 1840s and 1850s. An alternative social explanation of the US Civil War, rooted in an analysis of the specific path to capitalist social-property relations in the US, locates the War in the growing contradiction between the social requirements of the expanded reproduction of slavery and capitalism in the two decades before the War. Keywords origins of capitalism, US Civil War, bourgeois revolutions, plantation-slavery, agrarian petty- commodity production, independent-household production, merchant-capital, industrial capital The Civil War in the United States has been a major topic of historical debate for almost over 150 years. Three factors have fuelled scholarly fascination with the causes and consequences of the War. First, the Civil War ‘cuts a bloody gash across the whole record’ of ‘the American .
    [Show full text]
  • Foreign Terrorist Organizations
    Order Code RL32223 CRS Report for Congress Received through the CRS Web Foreign Terrorist Organizations February 6, 2004 Audrey Kurth Cronin Specialist in Terrorism Foreign Affairs, Defense, and Trade Division Huda Aden, Adam Frost, and Benjamin Jones Research Associates Foreign Affairs, Defense, and Trade Division Congressional Research Service ˜ The Library of Congress Foreign Terrorist Organizations Summary This report analyzes the status of many of the major foreign terrorist organizations that are a threat to the United States, placing special emphasis on issues of potential concern to Congress. The terrorist organizations included are those designated and listed by the Secretary of State as “Foreign Terrorist Organizations.” (For analysis of the operation and effectiveness of this list overall, see also The ‘FTO List’ and Congress: Sanctioning Designated Foreign Terrorist Organizations, CRS Report RL32120.) The designated terrorist groups described in this report are: Abu Nidal Organization (ANO) Abu Sayyaf Group (ASG) Al-Aqsa Martyrs Brigade Armed Islamic Group (GIA) ‘Asbat al-Ansar Aum Supreme Truth (Aum) Aum Shinrikyo, Aleph Basque Fatherland and Liberty (ETA) Communist Party of Philippines/New People’s Army (CPP/NPA) Al-Gama’a al-Islamiyya (Islamic Group, IG) HAMAS (Islamic Resistance Movement) Harakat ul-Mujahidin (HUM) Hizballah (Party of God) Islamic Movement of Uzbekistan (IMU) Jaish-e-Mohammed (JEM) Jemaah Islamiya (JI) Al-Jihad (Egyptian Islamic Jihad) Kahane Chai (Kach) Kurdistan Workers’ Party (PKK, KADEK) Lashkar-e-Tayyiba
    [Show full text]
  • Law of Armed Conflict
    Lesson 1 THE LAW OF ARMED CONFLICT Basic knowledge International Committee of the Red Cross Unit for Relations with Armed and Security Forces 19 Avenue de la Paix 1202 Geneva, Switzerland T +41 22 734 60 01 F +41 22 733 20 57 E-mail: [email protected] www.icrc.org Original: English – June 2002 INTRODUCTION TO THE LAW OF ARMED CONFLICT BASIC KNOWLEDGE LESSON 1 [ Slide 2] AIM [ Slide 3] The aim of this lesson is to introduce the topic to the class, covering the following main points: 1. Background: setting the scene. 2. The need for compliance. 3. How the law evolved and its main components. 4. When does the law apply? 5. The basic principles of the law. INTRODUCTION TO THE LAW OF ARMED CONFLICT 1. BACKGROUND: SETTING THE SCENE Today we begin a series of lectures on the law of armed conflict, which is also known as the law of war, international humanitarian law, or simply IHL. To begin, I’d like to take a guess at what you’re thinking right now. Some of you are probably thinking that this is an ideal opportunity to catch up on some well-earned rest. “Thank goodness I’m not on the assault course or on manoeuvres. This is absolutely marvellous. I can switch off and let this instructor ramble on for 45 minutes. I know all about the Geneva Conventions anyway – the law is part of my culture and our military traditions. I really don't need to listen to all this legal ‘mumbo jumbo’.” The more sceptical and cynical among you might well be thinking along the lines of a very famous orator of ancient Rome – Cicero.
    [Show full text]
  • Political Violence and War
    Chapter 2 Political Violence and War In their respective conclusions to examinations of the literature on possible linkages between internal and external conflict, both Stohl (1980) and Levy (1989) decry the apparent lack of theory development as the main impediment to progress in our understanding and the accumulation of knowledge on this subject. Stohl goes on to claim that, The construction of an adequate theory of conflict linkages is dependent upon the reciprocal development of theories of political conflict and violence in general. As previously indicated, theorists of internal and external conflict have avoided consideration of conflict outside their particular focus when constructing their theories. The evidence we have reviewed...suggests that this has been an error and thus a hindrance to the development of conflict theory. (Stohl 1980, 326) It is, however, unusual within the political science discipline for scholars to lend much credence to such linkage and other macro-theoretical arguments. The skeletal structure lent to our global security affairs by the construction of modern political states demarcated by spatial borders and exclusive juridical domains provides a strong rationale for closure, compartmentalization, and specialization in scholarship. Yet, the idea of a nexus between internal and external conflict, and especially warfare, gains in both saliency and immediacy as the political borders separating the internal from the external become more permeable. It seems almost facetious to suggest that the key to an understanding of any nexus between internal and external political conflict should focus on the agency and structure of that which defines the distinction, that is on political borders themselves.
    [Show full text]
  • The Importance of the War at Sea During WWI
    The Importance of The War At Sea During WWI By: Taylor Pressdee, Anna Ward, Nathan Urquidi What Was the Impact of ‘The War at Sea’? ● Opened a new kind of warfare: Submarine Warfare ● Involved civilians as well as sailors and soldiers ● One of the major reasons that the United States joined the Allies ● Influenced major events during the war: Battle of Jutland, the naval blockade, submarine warfare and the sinking of the Lusitania Who Was Affected By The War at Sea? ● “Total War” ● War At Sea affected civilians as well as soldiers ● Ship Liners, and Coastal cities were in danger of attack ● Starvation was prevalent in specifically Germany because supply ships were being sunk Timeline May 31st 1916 September 1915 Battle of Jutland Germans stop using U-boats February 1st 1916 Germans begin using U-boats again May 7th 1916 Lusitania Sinks Battle of Jutland Battle of Jutland ● Fought on May 31st 1916 ● Only major battle fought at sea ● Fought by the Jutland Peninsula between England and Germany ● Two Admirals in charge of both fleets: Vice Admiral Reinhard Scheer (Left) and Admiral Sir John Jellicoe (Right) The Battle ● British forces intercepted a German message containing a plan to attack them on May 28th ● However, Admiral Scheer postponed the attack due to bad weather ○ Attempted to plan another attack down by the Jutland Peninsula, however Britain intercepted this plan as well ● Vice Admiral Jellicoe moved his fleet down to the Jutland Peninsula, awaiting the attack Aftermath of the Battle ● The British suffered losses, but not nearly
    [Show full text]
  • Violent Jihad in the Netherlands
    Violent Jihad in the Netherlands Current trends in the Islamist terrorist threat Violent Jihad in the Netherlands Current trends in the Islamist terrorist threat 2 Contents Foreword 5 Introduction 7 The murder of Theo van Gogh: consequences and effects 7 General trends in the development of jihadism 9 Framework of terms and definitions 10 1 From exogenous threat to home-grown terrorism 13 1.1 What is a jihadist network? 13 1.2 Historical development of network formation 15 1.2.1 The traditional phase: migration of jihadists 15 1.2.2 The proliferation phase: recruitment 16 1.2.3 The ‘home-grown’ phase: radicalisation and jihadisation 17 1.3 Three types of jihadist networks 17 2 Decentralisation and local implantation of international jihad19 2.1Al-Qaeda: from ‘network of gynetworks’ 19 to trademark and ideolo 2.2 Ideology of global violent jihad 21 2.3 Decentralisation of international jihad 22 2.4 Local implantation of international jihad 26 3 Radicalisation and the emergence of local networks 29 3.1Radicalisation, recruitment and jihadisation 29 3.2 The religious context of radicalisation 30 3.3 The socio-political context of radicalisation 33 3.4 The cultural and socio-psychological context of radicalisation 35 3.5 Emergence of local autonomous cells and networks 37 3.6 Backgrounds and functioning of local autonomous networks 38 3.7 The significance of the Hofstad network 39 4 Virtualisation of jihad 43 4.1The Internet as a propulsion of the jihad movement 43 4.2 Al-Qaeda as a virtual database (top-down) 44 4.3 The virtual umma (grass
    [Show full text]
  • A Great and Sudden Change: the Global Political Violence Landscape Before and After the COVID-19 Pandemic
    A Great and Sudden Change: The Global Political Violence Landscape Before and After the COVID-19 Pandemic acleddata.com/2020/08/04/a-great-and-sudden-change-the-global-political-violence-landscape-before-and-after-the- covid-19-pandemic/ August 4, 2020 In this special report, ACLED Research Analyst Melissa Pavlik reviews key findings from 16 weeks of data recorded by our COVID-19 Disorder Tracker, highlighting the most significant changes to global political violence and demonstrations trends since the onset of the pandemic. Introduction The coronavirus pandemic has brought at least half of the world under lockdown ( New York Times, 3 April 2020), and killed — at the time of writing — over half a million people (Johns Hopkins University, 31 July 2020). As humanity struggles against this deadly threat, the virus has transformed political priorities and behavior across the globe. Political conflict is a function of politics: as politics shift, so too do political violence patterns. The end of June marked 16 weeks since the World Health Organization (WHO) declared COVID-19 a pandemic (WHO, 11 March 2020). Since March, the Armed Conflict Location & Event Data Project (ACLED) has monitored resulting shifts in political violence and protest patterns around the globe through the COVID-19 Disorder Tracker (CDT). The project has documented varying responses across countries and contexts. In some places, reactionary populist leaders refused to take the virus seriously, preferring to perform politics as usual against a backdrop of the rising death toll. In others, power shifted between the people and the state, with the pandemic bringing a halt to mass protest movements and increasing the opportunity for government repression (Foreign Policy, 21 July 2020).
    [Show full text]
  • Cyber War, Cybered Conflict, and the Maritime Domain Peter Dombrowski
    Naval War College Review Volume 67 Article 7 Number 2 Spring 2014 Cyber War, Cybered Conflict, and the Maritime Domain Peter Dombrowski Chris C. Demchak Follow this and additional works at: https://digital-commons.usnwc.edu/nwc-review Recommended Citation Dombrowski, Peter and Demchak, Chris C. (2014) "Cyber War, Cybered Conflict, and the Maritime Domain," Naval War College Review: Vol. 67 : No. 2 , Article 7. Available at: https://digital-commons.usnwc.edu/nwc-review/vol67/iss2/7 This Article is brought to you for free and open access by the Journals at U.S. Naval War College Digital Commons. It has been accepted for inclusion in Naval War College Review by an authorized editor of U.S. Naval War College Digital Commons. For more information, please contact [email protected]. Dombrowski and Demchak: Cyber War, Cybered Conflict, and the Maritime Domain CYBER WAR, CYBERED CONFLICT, AND THE MARITIME DOMAIN Peter Dombrowski and Chris C. Demchak t has been well over a decade since the first “prophets” of information warfare proclaimed a new age of conflict fought not just on air, sea, and land but with 1 Ielectrons in what came to be known as “cyberspace�” Since these early predic- tions, many incidents have confirmed that criminals, random hackers, and government-sanctioned specialists can wreak havoc on governments, military communications systems, and corporations� The Stuxnet worm alone helped delay—by months, perhaps years—the long-standing efforts of Iran to acquire sufficient nuclear material to build nuclear weapons�2 Recent
    [Show full text]
  • Containing the Taliban: Path to Peace in Afghanistan
    CONTAINING THE TALIBAN: PATH TO PEACE IN AFGHANISTAN ISHTIAQ AHMAD Dr Ishtiaq Ahmad is Associate Professor of International Relations at the Eastern Mediterranean University, Gazima¤usa, Turkish Republic of Northern Cyprus. He reported on the rise of Taliban for the Pakistani newspaper the Nation. Taliban, the Islamic warriors of Afghanistan, live up to their words. "Taliban victory will set a model for other Muslim nations to follow," Maulvi Wakil Ahmad Mutawakil, the Taliban Foreign Minister, told me in an interview in Kandahar in February 1995. The Taliban had by then captured only one- third of Afghanistan and their victory in the rest of the country was far from certain. But what was increasingly visible was the expansionist ambitions of the Islamic student militia: "We will go and fight for our Muslim brethren elsewhere in the world, in Bosnia and Chechnya," said Maulvi Amir Khan Muttaqi, the former Information Minister, recently appointed as the Taliban Emissary for Peace.1 Now, six years later, the Taliban control around 90 percent of Afghanistan, and their rival United Front, led by the Afghan-Tajik commander, Ahmad Shah Masood, is struggling to survive in the north-eastern regions of the country. The extent of the Taliban success in exporting Islamic extremism into regions bordering Afghanistan and beyond - from Chechnya in Russia to Kashmir in India to Xinjiang in China - can be gauged from the fact that it has forced the emergence of an alliance of world powers and regional states to contain the regional and international spill over of Islamic extremism and terrorism from Afghanistan.
    [Show full text]