To save content items to your account,
please confirm that you agree to abide by our usage policies.
If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account.
Find out more about saving content to .
To save content items to your Kindle, first ensure no-reply@cambridge.org
is added to your Approved Personal Document E-mail List under your Personal Document Settings
on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part
of your Kindle email address below.
Find out more about saving to your Kindle.
Note you can select to save to either the @free.kindle.com or @kindle.com variations.
‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi.
‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.
The introduction provides an overview of the book, presents the core arguments, highlights the contribution to current literature, explains the book’s methods and sources, and outlines the structure of the book. The overarching argument of the book is that intelligence cooperation was so beneficial for all parties that European authorities therefore let Mossad carry out its operation and tolerated the use of its intelligence to kill Palestinians. Hence, the book demonstrates that the extensive advantages that European agencies gained through Club de Berne intelligence-sharing led them to turn a blind eye towards, or even tacitly support, Israeli covert actions on their respective territories.
States frequently use leadership decapitation in their domestic and cross-border counter-insurgency/terrorism operations, yet the literature is far from having a consensus regarding its effects. I argue that literature focuses on the military implications of decapitation (its implications for the organisation’s operational capabilities/ability to generate violence) at the expense of its implications for negotiations between insurgents and the state. Second, I argue that leadership arrest and killing are analytically distinct categories of leadership decapitation that can trigger different processes and outcomes and that an arrested leader’s possible role from the prison should be considered in the analysis since leadership arrest alters the leader’s incentives, resulting in a new bargaining game between the leader, the state, and the organisation. I empirically illustrate these arguments using the arrest of the leader of the Kurdistan Workers’ Party (PKK) Abdullah Öcalan as a theory-building case study. In the case study, I show that Abdullah Öcalan’s arrest was productive for terminating the conflict in the short run, whereas it was counter-productive in the medium and long run. These findings suggest that the literature may benefit from tracing the process closely, considering the dynamic nature of conflicts and the impact of decapitation on bargaining processes, without limiting the temporal scope of inquiry.
How do counterterrorism policies enable terrorist groups to thrive and survive? This article examines the relationship and how counterterrorism policies and political structures impact terrorist group success. While studies of terrorism have tended to separate the two phenomena, there is considerable complexity in the interactions between violent action and coercive state response. To demonstrate the complexity of these interactions, this article examines the persistence of three transnational terrorist groups from 1989 to 2022 – the Lashkar-e-Taiba, Jaish-e-Mohammad, and the Hizbul Mujahideen – that operate in the Kashmir region despite India’s coercive counterterrorism policies. While existing research emphasises macro-level factors in transnational terrorism, this article, based on original qualitative data, demonstrates the critical importance of granular, localised opportunities for terrorist groups to carry on. We show how these structures interact with civilian perceptions of state legitimacy and security to create nuanced patterns of support. In doing so, we challenge simplistic explanations of terrorist recruitment and resilience. The article dispels existing misconceptions about the efficacy of coercive counterterrorism to end militant groups and further suggests that softer, non-coercive approaches might not necessarily generate public sympathy. In fact, select counterterrorism policies might inadvertently legitimise violence by extremist groups to their constituency and increase sympathy in the process.
The September 11, 2001, attacks on the United States further propelled the global focus on terrorism. Despite international efforts, the threat of terrorism remains throughout the world. In this chapter, the challenges in defining and analyzing terrorism are established by articulating the characteristics, structures, and motivations of groups that terrorize others. These definitions of terrorism, and the features of relevant groups, are then placed within the wider context of intrastate conflict. Key questions addressed include: Why does terrorism more frequently occur in war-torn countries? And how does its occurrence lower prospects for sustainable peace? This analysis is then used to inform modern counterterrorism methods, and how their evolution is critical for future international and national security along with peace mediation studies.
This paper develops the notion of ‘Platform Security’ to analyse the type of security power that seeks to work through facilitation and decentralised connection. The paper draws an analogy between the metaphor and model of the platform economy and contemporary security practices. It analyses the imaginaries and infrastructures of the platform economy and shows how these are present in the work of transnational security authorities. Like online platforms, contemporary security practitioners seek to connect local players in a manner that is data-driven and decentred. Like digital platforms, security organisations like FATF and Europol seem to understand themselves as utilities or services, whose primary aim is to ‘transmit communication and information data’ that they have not themselves produced or commissioned (Van Dijck 2013: 6). Analysing platform security through this lens, allows the development critical purchase on this mode of security power and raise critical questions about the organisation of responsibility and protections.
Long viewed as an example of effective multilateralism, UN peace operations are facing mounting challenges. Transformations in the landscape of conflict are outpacing their ability to respond. Rising expectations of peacekeeping have led to disenchantment with what they can deliver, while dis- and misinformation tactics undermine the efforts of the UN to make and build peace. As UN peace operations risk becoming another casualty of intensifying international tensions, great power rivalry, and the erosion of the rules and norms that govern international cooperation, we consider the future of UN peace operations. In the debate between a “pragmatic” and an “adaptive” approach to peacekeeping, we argue that a fundamental question is the ability of both alternatives to address three recurring issues that have shaped the effectiveness and legitimacy of peace operations: the mismatch between ambitious mandates and limited resources; the gap between the protection of civilians objective and its implementation in practice; and growing difficulties in honoring the principles of impartiality. We argue that policymakers and researchers should not lose sight of the fact that peacekeeping's legitimacy depends on its adherence to some version of host-state consent and some kind of restriction on when and how force is used. The expectation of civilian populations that the UN stands for protection also means that the UN must continue to safeguard some key norms associated with peacekeeping.
There is a growing concern about the evolution of violent extremism in the digital era. This chapter presents historical progression and current state of how extremists have used digital advancements to increase their reach and influence for their own nefarious purposes. This chapter also discusses the challenges due to encryption and the need for a strategic collaboration and comprehensive whole-of-society approach to combat the threats effectively.
This article explores the construction of terrorism via evidentiary practices, through the examination of terrorism trials in Nigeria. By conceptualising legal evidence – or evidencing – as a juridical practice of truth-making, the article contributes to the growing stream of critical literature on terrorism trials, and pre-emptive security more broadly, by examining the production of terrorism knowledge in light of the dominant pre-crime rationality that typically underpins counte-terrorism practice. The article highlights the complex processes and practices involved in the making of juridical truth in court and criminal justice processes, and how this enables the production and contestation of terrorism.
The article utilises important works on truth-making, alongside the contemporary literature on terrorism trials, to develop its theoretical and methodological approach. The empirical data for this study include court documents of terrorism cases in Nigeria, including those from the so-called Kainji trials, which emerged from fieldwork conducted in Abuja, Nigeria in 2020. The article demonstrates the productivity of legal evidence in the context of terrorism trials, involving different truth-makers, narratives, techniques, temporalities, and rationalities. In doing so, the article therefore contributes to the problematisation of terrorism and related issues of pre-emption, as well as the discussion on truth-making, by illustrating how the production of legal truth is shaped by different narratives, material practices, and logics in terrorism trials.
Chapter 3 focuses on the figure of the jihadist in the context of the Syrian Civil War. Outlawed as a terrorist by the Security Council and perceived as a security threat in home states, this latest version of the enemy of humanity seems to have nothing in common with previous foreign fighters. The aim of the chapter is to re-inscribe this actor within the longer history of foreign volunteering. It shifts from domestic debates to national courtrooms, showing how the jihadist combatant gets constantly split in two: idealist and fanatic, hero and villain, martyr and freedom fighter. Based on previous images of the foreign fighter, these dichotomies highlight different conceptions of freedom and hence problematize its current conflation with terrorism. The chapter ends with a digression on the laws of war, revealing the persisting cultural bias used against certain foreign combatants through the domestic application of IHL.
This article serves as the introduction to a Special Issue of the European Journal of International Security titled ‘What the War on Terror Leaves Behind’. In it, we seek to contextualise and summarise the diverse contributions of this collection, which is animated by four overarching questions: (i) More than 20 years after the attacks of 11 September 2001, is the War on Terror now, finally, over? (ii) What, if any, legacies remain from the post-9/11 way of thinking and doing counterterrorism? (iii) What is the significance of the War on Terror’s legacies or absence thereof? and, (iv) How do the War on Terror’s impacts and effects sit within other historical contexts and (dis)continuities? The article begins with a brief overview of some of the conceptual and political ambiguities of the War on Terror itself, before situating the issue in relation to issues of continuity and change anticipated by the four questions above. A second section then explores the urgency of these questions for academic debate, and in the ‘real world’ of international security as experienced by states, communities, and other subjects. A third section then summarises the argument and contributions of the articles in the issue –highlighting the lack of agreement on key issues within these debates.
Terrorist attacks on the aviation sector represent a significant security challenge due to the high-profile status of airports and aircraft. These attacks not only jeopardize global security but also have severe public health repercussions, leading to widespread casualties and psychological distress.
Methods
This study conducted a comprehensive retrospective analysis using data from the Global Terrorism Database to explore the patterns, frequencies, and impacts of terrorist attacks on the aviation sector worldwide. The analysis spanned incidents from 1970 to 2020, focusing on attack types, affected regions, and the direct and indirect health consequences arising from these incidents.
Results
Over the 50-year period, the study identified 1183 terrorist attacks targeting the aviation sector. Bombings and explosions emerged as the most common and deadliest forms of attack, responsible for the majority of fatalities and injuries. The data also highlighted significant regional disparities, with certain areas experiencing higher frequencies of attacks and more severe outcomes. Notably, North America bore a disproportionately high number of fatalities, primarily due to the events of September 11, 2001.
Conclusions
The findings emphasize the ongoing and evolving threat of terrorism in the aviation industry, underscoring the critical need for a proactive and comprehensive approach to security and public health preparedness. Future strategies should prioritize the integration of advanced technological solutions, enhanced international cooperation, and thorough public health planning to mitigate the impact of terrorist attacks on aviation effectively.
This article critically examines the major shortcomings in multi-country security investments in East Africa during the war on terror. It argues that these investments have not only failed to adequately recognise African contexts but also falls short of recognising the agency of local communities in counterterrorism efforts. Drawing on critical terrorism and security studies, as well as excerpts from interviews with practitioners in Kenya, the article identifies gaps in the prevailing approach that treats Africa as a unitary entity and critiques the notion of universality of knowledge ingrained in these interventions. By taking a decolonial perspective, the article challenges some prevailing constructions about Africa, linked to the war on terror, as the source of this notion of universality of knowledge. By highlighting the connection of counterterrorism strategies to coloniality and the systemic exclusion of subaltern voices, the discussion suggests that a more contextually informed approach is a precursor to envisioning Africa positioned beyond the war on terror.
An epilogue explores several topics regarding the future of modern air warfare. The first section offers recommendations for how the United States can better prepare for modern air warfare. The second considers air power in counterinsurgency and counterterrorism operations. The third anticipates the role of air power in extending deterrence to allies. The fourth demonstrates how TAP theory can assess the potential effectiveness of air power by analyzing the Russian Air Force in the Battle of Kyiv. The final section considers additional challenges facing the United States during an emerging era of great power competition.
This chapter first demonstrates the significance of counterterrorism for China and international society and then reviews different narratives of China’s counterterrorism. It investigates China’s domestic and international counterterrorism lawmaking at the domestic and international levels. After the late 1990s, and especially after the September 11 terrorist attacks in 2001, the UN Security Council emerged at the forefront of international counterterrorism and adopted a lot of resolutions that imposed demanding obligations on UN members.The chapter examines how these UN counterterrorism resolutions are enforced in China. While many countries’ counterterrorism activities have been strongly criticized, China has encountered particularly strong criticism, and especially for its operations in Xinjiang. Finally, this chapter tries to recalibrate the relationship between counterterrorism and human rights protection, and to evaluate the implications of counterterrorism measures for human rights in China.
The central argument set out in this Element is that the combination of a perceived radical change in the threat environment post 9/11, and the new capabilities afforded by the long silent reach of the drone, have put pressure on the previously accepted legal frameworks justifying the use of force. This has resulted in disagreements - both articulated and unarticulated - in how the Western allies should respond to both the legal and operational innovations in the use of force that drones have catalysed. The Element focuses on the responses of the UK, France, and Germany to these developments in the context of the changing US approach to the use of force. Locating itself at the interface of international law and politics, this is the first attempt to look at the interplay between technological innovations, legal justifications, and inter-alliance politics in the context of the use of armed drones.
Chapter 4 further explores the role of bureaucrats within the African Union Commission (AUC) and the influence of Algerian representatives on continental security policies. It opens by reconstructing the formation of the Nouakchott Process in 2013 that brought together eleven member states of the ‘Sahelo-Saharan Region’, from Senegal to Chad and Libya to Nigeria, in a political environment marked by long-standing distrust and suspicion that had already hampered previous attempts at security cooperation. Based on this, the chapter analyzes how the spatial semantic ‘Sahelo-Saharan Region’ allowed the initiators of the Nouakchott Process to create a ‘transregional’ space to overcome the spatial dissatisfaction with the African Standby Force (ASF) geography without undermining it. This allowed the AUC and Algerian representatives to regain influence over the conflict interventions in Mali and the Sahel to re-engage where they had felt sidelined after the French intervention and United Nations Mission’s take over. The chapter concludes with an examination of the proposed Nouakchott Process Intervention Force, which, while never deployed, reveals from its conception the growing desire for military-heavy, robust, counterterrorism engagement by African policymakers.
from
Part III
-
Intersections: National(ist) Synergies and Tensions with Other Social, Economic, Political, and Cultural Categories, Identities, and Practices
On 28 June 1914 in Sarajevo, a young Bosnian Serb, Gavrilo Princip, assassinated the Austrian heir presumptive, Franz Ferdinand. By killing the archduke (and his wife), Princip set in motion the well-oiled wheels that would, just a month later, lead to the outbreak of what George F. Kennan called “the great seminal catastrophe of [the twentieth] century,”1 the First World War. It resulted in the demise of most European monarchies and empires, and – by extension – triggered the next two global conflicts, the Second World War and the Cold War. Princip was a member of the secret Serbian society the “Black Hand,” which had grown in response to the illegal occupation of Bosnia and Herzegovina by the Habsburg Monarchy in 1908. He shot Franz Ferdinand to intimidate Austria-Hungary so that it would let go of Bosnia and Herzegovina.2 This assassination demonstrates how terrorism and nationalism can be intertwined and how potent and destructive this mix can be.
This Element explores the topics of terrorism, counterterrorism, and the US government's war on terror following the September 11, 2001 terror attacks. It draw on insights from Austrian and public choice economics. First, the foundations of the economics of terrorism are discussed emphasizing that the behaviors of terrorists and counter-terrorists are purposeful and goal-oriented. Then, the economics of counterterrorism policies and the importance of institutional change is considered. Next, the three dilemmas facing liberal societies as it relates to counterterrorism efforts is focused on. The Element then provides an assessment of the US government's war on terror. It discusses the origins of the war, discuss whether it can be judged a success or failure, and consider some of the main effects both abroad and within the United States. The final chapter concludes with a discussion of several areas for future research.
Before developing the argument of the book, this chapter gives an overview of the contexts where combat drones have been deployed as a basis for the study. The description of the contexts in which drone operations have been conducted extraterritorially against non-state actors by the US, the UK, and France follow a chronological sequence, and draw some general common and diverging features of the different legal rationales crafted by these states.
The study of terrorism represents one of the major turning points in criminology of the twenty-first century. In the space of just two decades, research on terrorism and political extremism went from a relatively uncommon niche to a widely recognized criminological specialization. Terrorism research now appears in nearly all mainstream criminology journals; college courses on terrorism and political violence have been added to the curricula of most criminology departments; and a growing number of criminology students are choosing terrorism as a suitable topic for class papers, research topics, theses and dissertations. The purpose of this book is to explore similarities and differences between terrorism and more ordinary forms of crime. This Element considers the ways that criminology has contributed to the study of terrorism and the impact the increasing interest in terrorism has had on criminology. This Element also provides empirical comparisons of terrorist attacks to more ordinary crimes and criminal offenders. This title is also available as Open Access on Cambridge Core.