
Notes Introduction 1 See for example Terrorism and Political Violence; Studies in Conflict and Terrorism or Critical Studies on Terrorism. 2 See for example degree courses at St. Andrews University in the UK, Pennsylvania State University in the US or Murdoch University in Australia. 3 See for example the Centre for the Study of Terrorism and Political Violence or the International Center of the Study of Terrorism. 4 For more on information on the leading academics and experts on terrorism see Reid (1993) and Raphael (2009). 5 Recently Lee Jarvis has noted the importance of interpretivist perspectives on terrorism which in his opinion are ‘capable of addressing the discipline’s continuing analytical limitations’ (Jarvis 2009a: 7). Chapter 1 1 For a more detailed analysis of the early history of terrorism see: Sinclair (2003) Anderson, and Sloan (2003) or Carr (2002). 2 For a more detailed look at terrorism and WMDs see Falkenrath et al. (1998) or Gurr and Cole (2000). 3 For more on the connection of anarchism and ‘new terrorism’ in the form of al-Qaeda see Gelvin (2008). 4 On this point see also Zimmermann (2004). 5 For a detailed history of suicide terrorism see Reuter (2004). Chapter 2 1 For a very good summary of counter-terrorism classifications see: Crelinsten and Schmid (1992). 2 Even in the German literature on terrorism one can encounter a number of different ways of classifying counter-terror policies (Daase 2002). For example Peter Waldman (1998) distinguishes between marco, meso and micro levels of counter-terrorism while Ulrich Schneckener (2004) notes the difference between operative and structural anti-terror measures and differen- tiates between military and diplomatic as well as measures which guard against and prevent terrorist attacks. 3 The inability to deter terrorists is questioned by authors such as Bowen (2004) or Zagare (2006). 4 For more on the spiral of violence and revenge see Waldmann (2001). 5 One has to note that many different laws are considered to play an indirect role in the struggle against terrorism. Even if they do not directly focus on 145 146 Notes terrorism, laws regulating the possession of guns and explosives, racketeer- ing or law regarding drug-trafficking or pirate DVD sales have an influence on a state’s ability to deal with terrorism. 6 On this problem of inter agency cooperation see the 9/11 Commission Report: Final Report of the National Commission on Terrorist Attacks Upon the United States, Official Government Edition, available at: http://www. gpoaccess.gov/911/ [accessed on 11.03.2008]. 7 See for example The International Convention for the Suppression of the Financing of Terrorism, available at http://untreaty.un.org/English/Terrorism/ Conv12.pdf [accessed 10.10.2007] or partly the United Nations Security Council Resolution 1373 & 1566, available at http://www.undemocracy.com/ S-RES-1373(2001).pdf [accessed 10.10.2007] or http://www.undemocracy. com/S-RES-1566(2004).pdf [accessed 10.10.2007]. 8 For more detail see: Financial Action Task Force on Money Laundering (2004) Special Recommendations on Terrorist Financing, Available at: http://www.fatf- gafi.org/dataoecd/8/17/34849466.pdf [accessed 05.11.06]. 9 For more information on terrorist financing see: Napoleoni (2004); Schott (2006); Ehrenfeld (2003); Biersteker et al. (2007). 10 For more information on how the hawala system works see: Jost and Sandhu (2000). 11 US Customs and Border Protection ‘Money and other Monetary Instruments’, available at: http://www.cbp.gov/xp/cgov/travel/vacation/kbyg/money.xml [accessed 09.07.09]. 12 Bundesministerium der Finanzen ‘Barmittel- und Bargeldkontrollen im Verkehr mit Drittländern und innerhalb der Europäischen Union’, available at: http:// www.zoll.de/c0_reise_und_post/a0_reiseverkehr/f0_bargeldverkehr/ index.html [accessed 10.07.09]. 13 HM Revenue & Customs ‘Carrying cash in and out of the United Kingdom’, available at: http://customs.hmrc.gov.uk/channelsPortalWebApp/download File?contentID=HMCE_PROD1_027380 [accessed on 09.07.09]. Chapter 3 1 For more information on the counter-terrorism measures implemented by different governments see: Buckley and Fawn (2003); von Hippel (2005) or Alexander (2002). 2 Government Accountability Office: Combating Terrorism – Determining and Reporting Federal Funding Data, Report to Congressional Requesters, GAO- 06-161, (2006), pp. 1–2, available at: www.gao.gov/new.items/d06161.pdf [accessed 15.06.09]. 3 The Government Performance Results Act of 1993, Office of Management and Budget, available at: http://www.whitehouse.gov/omb/mgmt-gpra/ gplaw2m.html [accessed 15.06.09]. 4 Progress Report in the Global War on Terrorism, Washington: The White House, available at: http://www.whitehouse.gov/homeland/progress/ [accessed 15.06.09]. 5 See: Three Years of Progress in the War on Terrorism, Fact Sheet, The White House, Office of the Press Secretary, Washington DC, September 11, 2004, Notes 147 available at: http://merln.ndu.edu/archivepdf/hls/WH/20040911.pdf [accessed 15.06.09]. 6 On the effectiveness of assassinations also see: Hafez and Hatfield (2006). 7 For other examples where statistical models are being applied to evaluate the effectiveness of counter-terrorism see: Enders and Sandler (2005); Wilson et al. (2006); Enders and Sandler (1995); Sandler and Arce (2003). 8 United States Department of State: Patterns of Global Terrorism 2003, available at: http://www.state.gov/s/ct/rls/crt/2003/ [accessed 13.07.09]. 9 Some of the databases available include ‘International Terrorism: Attributes of Terrorist Events’ (ITERATE) or ‘Terrorism in Western Europe: Event Data’ (TWEED) as well as the RAND-MIPT Terrorism Incident database. 10 The MIPT Terrorism Knowledge Base was available at: http://www.tkb.org/ Home.jsp but has now been removed from public access. 11 For a number of explanations for this phenomenon see: Slovic (2000); Lerner et al. (2003); Loewenstein et al. (2001); Sunstein (2003). 12 Booth (2008: 74) criticised this attitude and points out that most historians have never met their subjects they study such as roman emperors or Tudor kings. 13 The Sunday Times (London) cited on the back cover of Gunaratna (2003a). 14 For more information on the issue of scientific fieldwork in a violent conflict see Nordstrom and Robben (1995). 15 For more information on the Critical Studies on Terrorism Working Group see: http://www.bisa.ac.uk/groups/7/index.asp [accessed on the 06.02.2008]. 16 On the issue of interdisciplinarity in terrorism studies especially in Germany see Spencer and Biazza (2008). 17 For a serious engagement by traditional terrorism scholars with critical terror- ism studies see for example Horgan and Boyle (2008) or Weinberg and Eubank (2008) and for a more vulgar response see Jones and Smith (2009). 18 For further criticism of Critical Terrorism Studies see Egerton (2009); Joseph (2009) or Stokes (2009). Chapter 4 1 This is not to mean that constructivism should be considered the cutting edge of IR. 2 Booth (2008: 74) also questions the vital importance of primary engage- ment with one’s subject as he points out that historian rarely ever meet the protagonists of their research such as Tudor Kings or Holy Roman emperors. 3 This section is only a very brief introduction to the central ideas of what can be broadly described as constructivist thought. For more information on Con- structivism in IR see for example: Adler (1997), Checkel (1998), Fierke and Jørgensen (2001), Wiener (2003); Guzzini and Leander (2006). 4 The contrast to rationalism has been questioned to some extend as the logic of consequence can also be a logic of appropriateness. For more on the problems of contrasting rationalism with constructivism see Fearon and Wendt (2002) or Hurd (2008). 5 For translations of al-Qaeda’s own discourse, see Lawrence (2005) and Mansfield (2006). 148 Notes 6 See for example the Researching and Applying Metaphor (RaAM) Association conferences, http://www.raam.org.uk/. 7 See for example Metaphor and Symbol which is its 22 year of publication and was previously called Metaphor and Symbolic Activity. 8 One of the very few exceptions which analyse the role of metaphors in ter- rorism and counter-terrorism is Kruglanski et al. (2007). 9 Exceptions here include Mongoven (2006), Zhang (2007) and most famously Lakoff (2001). 10 These types of metaphors are also sometimes referred to a ‘major’ and ‘mini’ metaphors, see for example Kitis and Milapides (1997). 11 On the issue of causality of ideas and discourse on policy see for example Yee (1996) or Wendt (1999: 77–88). 12 One has to note that the decision of what is metaphorical and what is not is also down to interpretations. On this point see in particular Low (1999: 49): ‘There is always going to be a measure of subjectivity or randomness in identifying expressions’. Chapter 5 1 For an exception see Thornborrow (1993) and Winfield et al. (2002). 2 See Media Tenor http://www.medientenor.com/newsletters.php?id_news= 239 [accessed on 2.2.2008]. 3 Please note that, all subsequent footnotes provide only one example of each metaphorical expression found in the Bild or The Sun together with the title of the article and the page number and author were possible (All translations are my own). 4 Kai Diekmann, Bild, ‘Kriegserklärung an die Menschheit’, 12.9.2001, p. 1. 5 ‘Kamikaze-Angriff’, Peter Scholl-Latour, Bild, ‘Gibt es jetzt Krieg, Herr Scholl- Latour?’, 12.9.2001, p. 5. 6 ‘Kamikaze-Flieger’, Bild, ‘Fünf Minuten Stille für Amerika’, 13.9.2001, p. 14. 7 ‘Kamikaze-Piloten’, Bild, ‘Der Flugplan des Terrors’, 14.9.2001, p. 4. 8 ‘Kamikaze Attentäter’, Gordon Thomas, Bild, ‘Warum haben FBI und CIA so grausam versagt?’, 13.9.2001, p. 4. 9 ‘Kamikaze-Waffen’, Bild, ‘Großer Gott steh uns bei!’, 12.9.2001, p.
Details
-
File Typepdf
-
Upload Time-
-
Content LanguagesEnglish
-
Upload UserAnonymous/Not logged-in
-
File Pages56 Page
-
File Size-