Modern Terrorism and Counter-Terrorism Strategies

Size: px
Start display at page:

Download "Modern Terrorism and Counter-Terrorism Strategies"

Transcription

1 Modern Terrorism and Counter-Terrorism Strategies Dr. Boaz Ganor Ronald Lauder Chair for Counter Terrorism, Founder & Executive Director, ICT The International Policy Institute for Counter-Terrorism, Deputy Dean, Lauder School of Government, Herzliya, Israel, The Interdisciplinary Center, Herzliya, Israel Web:

2 Explanatory Disciplines To Terrorism Agro-terrorism Psychology Terrorism as a psychological warfare Terrorism radicalization process Public resilience to terrorism Terrorism and the IHL Terrorism as a crime Democratic Dilemmas Cyber Terrorism Law Media & Economics The economic implication of terrorism Terrorism fundraising Terrorism Media and public Communication opinion. Terrorism and the new media Terrorist criminal activity Political Punishment policy Science Terrorism as a warfare Modern terrorism strategy Counter terrorism strategies Democratic Dilemmas in CT

3 Who are the Perpetrators?

4 State Involvement Terror Attack Perpetrators Conduct Initiation Support Proxy Terrorist Organization Organized Attacks Personal Initiative Attacks Direct Attacks Indirect Attacks Initiation Support Proxy External Cell Group Local Sleeper Cell Local Network Group Individual Lone Wolf

5 Terrorist Cells as Social Networks Node Matrix Hub - Clique Hub Chain Local Network Group

6 Classification of Terrorist Organizations and Cells Terrorism Military Hierarchical Terrorist Organization Decentralized Terrorist Organization Hybrid Terrorist Organization Clique Hub Terrorist Organizations Alliance Local Network / Sleeper Cell Lone Wolfe

7 Different types of attacks

8 Lone Wolf Local Network Local Sleeper Cell External Cell Type of Terrorist Attacks Threats Cold Weapon Shooting Assaults Ambush, Killing- Journey Bombing Attacks Time, Remote, Suicide Extortion Hostage Kidnappings CBRN Food Water Cyber

9 Terrorism Decision Making

10 Decision making intersections within a terrorist organization Leaders Activists Establishing Terror Organization Managing the Organization Initiating Attacks Termination Of Terrorism Supporting Passive Active Joining Terrorism As the sole or Main Activity Non-violent Political Activity Terrorism Combined with Social- Political Activity Violent Political Activity Finance Structure Hierarchal Organizations Terrorism Social Network Non-conventional CBRN Guerilla Warfare Cyber Protest Perpetrating Terrorism Administrative Activity Level of Involvement Conventional Attack Boycott Suicide Attack State Sponsorship Criminal Activity Terrorist Extortion Commercial Activity Donations Level of risk

11 Counter Terrorism

12 Counter Terrorism Dilemmas: What is effective counter terrorism? The terrorism equation and the Boomerang effect

13 Terrorism = Motivation X operational capability Deterrence Effective Military Offensive Activity Non-Effective Military Offensive Activity Counter Motivation Measures: Propaganda Education Welfare A C A C D B Effective Military Offensive Activity + Counter Motivation Measures. Terror level Motivation Operational capability Short Term Influence Influence at the long term

14

15 Boomerang Effect L I M I T I N G F A C T O R Motivation Operational Capability (? ) ( - ) Decrease ( + ) ( - )

16 Counter Terrorism Decision Making

17 CT Decision Making- American leader s world View Framing External Factors Economic Situation Magnitude & Characteristics of Terrorism Intelligence information Public Opinion Media Political Party Friends & Family Defense DHS International Processes & Events Security Situation Foreign Affairs Government Decision Maker Offices World View Decision Decision Maker Maker Ideology Friends Education (head of State) Advisors (head of of State) Beliefs & Values Pentagon Static Factors CIA FBI Political Situation NSA MI

18 World View + _ Defining the enemy Policy Eradication of Terrorism Damage Control Prevention of escalation Operational Prism Effectiveness Cost / Benefits (in case of success and failure) Counter Terrorism Decision Making Adopting a strategy Policy Setting Goals Choosing Tools Offensive measures Punitive measures Defensive measures Intelligence measures Legal measures Legal Prism _ IHL State s Legislation Values +

Counter-Terrorism as Crime Prevention: A Holistic Approach

Counter-Terrorism as Crime Prevention: A Holistic Approach Center for Research on Extremism Counter-Terrorism as Crime Prevention: A Holistic Approach Tore Bjørgo Director of Center for Research on Extremism (C-REX), University of Oslo and Professor of Police

More information

Terrorism in Africa: Challenges and perspectives

Terrorism in Africa: Challenges and perspectives African Training and Research Centre in Administration for Development Hanns Seidel Foundation The Governance of National Security: Challenges and Prospects New Strategies to Address Growing Security Threats

More information

CONVENTIONAL WARS: EMERGING PERSPECTIVE

CONVENTIONAL WARS: EMERGING PERSPECTIVE CONVENTIONAL WARS: EMERGING PERSPECTIVE A nation has security when it does not have to sacrifice its legitimate interests to avoid war and is able to, if challenged, to maintain them by war Walter Lipman

More information

UNIT SIX: CHALLENGES OF THE MODERN ERA Part II

UNIT SIX: CHALLENGES OF THE MODERN ERA Part II UNIT SIX: CHALLENGES OF THE MODERN ERA Part II ARMS PROLIFERATION Spread of weapons of mass destruction (WMDs) (nuclear, chemical & biological weapons) throughout the world.* This is seen as dangerous

More information

Newsletter February - May 2018

Newsletter February - May 2018 Newsletter February - May 2018 4 CONFERENCE DAYS OVER 60 COUNTRIES 1000 + PARTICIPANTS SAVE THE DATE WORLD SUMMIT ON COUNTER TERRORISM ICT'S 18TH INTERNATIONAL CONFERENE SEPTEMBER 3-6, 2018 02 ICT IS PLEASED

More information

The Embassy Closings

The Embassy Closings The Embassy Closings August 20, 2013 by Bill O'Grady of Confluence Investment Management In the first week of August, the Obama administration announced the closing of 22 embassies and consulates across

More information

The CIC is supported in its day-to-day work by the International Staff s NATO Office of Security.

The CIC is supported in its day-to-day work by the International Staff s NATO Office of Security. ABOUT THE CIVILIAN INTELLIGENCE COMMITTEE (CIC) The Civilian Intelligence Committee (CIC) is the sole body that handles civilian intelligence issues at NATO. It reports directly to the North Atlantic Council

More information

General Assembly First Committee (International Security and Disarmament) Addressing fourth generation warfare MUNISH

General Assembly First Committee (International Security and Disarmament) Addressing fourth generation warfare MUNISH Research Report General Assembly First Committee (International Security and Disarmament) Addressing fourth generation warfare MUNISH Please think about the environment and do not print this research report

More information

TERRORISM Fervour is the weapon of choice of the impotent. FRANZ FANON, B l a c k S k i n, White Ma s k s (1952)

TERRORISM Fervour is the weapon of choice of the impotent. FRANZ FANON, B l a c k S k i n, White Ma s k s (1952) TERRORISM Fervour is the weapon of choice of the impotent. FRANZ FANON, B l a c k S k i n, White Ma s k s (1952) Until the 1990s, terrorism was widely considered to be a security concern of the second

More information

Title of Presentation. Global Threat Brief President / CEO Global Guardian

Title of Presentation. Global Threat Brief President / CEO Global Guardian Title of Presentation Global Threat Brief President / CEO Global Guardian Introduction / Background Dale Buckner, President and CEO of Global Guardian 24-year US Army Veteran, Colonel (Retired) Special

More information

Chapter 8: The Use of Force

Chapter 8: The Use of Force Chapter 8: The Use of Force MULTIPLE CHOICE 1. According to the author, the phrase, war is the continuation of policy by other means, implies that war a. must have purpose c. is not much different from

More information

Al Qaeda: Corporate hierarchy or biological entity?

Al Qaeda: Corporate hierarchy or biological entity? initiative for interdisciplinary research http://www.i2r.org Al Qaeda: Corporate hierarchy or biological entity? by Wojciech Gryc (wojciech@gmail.com) 1 / 9 Al Qaeda: Corporate hierarchy or biological

More information

Security Council The question of Somalia and the spread of terrorism into Africa. Sarp Çelikel

Security Council The question of Somalia and the spread of terrorism into Africa. Sarp Çelikel Security Council The question of Somalia and the spread of terrorism into Africa. Sarp Çelikel Overview Since the downfall of the Federal Republic of Somalia s dictatorial regime under president Siad Barre

More information

CRS Report for Congress

CRS Report for Congress CRS Report for Congress Received through the CRS Web Order Code RS22011 December 29, 2004 Intelligence Reform and Terrorism Prevention Act of 2004: Lone Wolf Amendment to the Foreign Intelligence Surveillance

More information

Twenty-Four Theses on Intelligence (Notes for OSS '02, 10 May 2002) by Martin van Creveld

Twenty-Four Theses on Intelligence (Notes for OSS '02, 10 May 2002) by Martin van Creveld Twenty-Four Theses on Intelligence (Notes for OSS '02, 10 May 2002) by Martin van Creveld The purpose of these notes is to provide a brief, schematic, comparison between the problems facing intelligence

More information

Combating Terrorism Center at West Point. Success, Lethality, and Cell Structure Across the Dimensions of Al Qaeda

Combating Terrorism Center at West Point. Success, Lethality, and Cell Structure Across the Dimensions of Al Qaeda Combating Terrorism Center at West Point Occasional Paper Series Success, Lethality, and Cell Structure Across the Dimensions of Al Qaeda May 2, 2011 Scott Helfstein, Ph.D. Dominick Wright, Ph.D. The views

More information

WCAML Forum. The Challenges of Terrorist Financing in 2014 and Beyond. May 7, Dennis M. Lormel President & CEO DML Associates, LLC

WCAML Forum. The Challenges of Terrorist Financing in 2014 and Beyond. May 7, Dennis M. Lormel President & CEO DML Associates, LLC The Challenges of Terrorist Financing in 2014 and Beyond May 7, 2014 Dennis M. Lormel President & CEO DML Associates, LLC Al-Qaeda s Most Dangerous Member: Nasir al-wuhayshi 2 Terrorist Threats 2014 Introduction

More information

KORET FOUNDATION-SPONSORED WORKSHOP ON KOREAN AFFAIRS

KORET FOUNDATION-SPONSORED WORKSHOP ON KOREAN AFFAIRS KORET FOUNDATION-SPONSORED WORKSHOP ON KOREAN AFFAIRS KOREAN STUDIES PROGRAM SHORENSTEIN ASIA-PACIFIC RESEARCH CENTER STANFORD UNIVERSITY MARCH 19-20, 2009 ENHANCING SOUTH KOREA S SECURITY: THE U.S. ALLIANCE

More information

Severing the Web of Terrorist Financing

Severing the Web of Terrorist Financing Severing the Web of Terrorist Financing Severing the Web of Terrorist Financing By Lee Wolosky Al Qaeda will present a lethal threat to the United States so long as it maintains a lucrative financial network,

More information

FYI: 70s/80s Test Wednesday April 11 Agenda: Reagan Guided Notes: Conservative Resurgence

FYI: 70s/80s Test Wednesday April 11 Agenda: Reagan Guided Notes: Conservative Resurgence FYI: 70s/80s Test Wednesday April 11 Agenda: Reagan Guided Notes: Conservative Resurgence Conservative Resurgence 1980-1989 Reagan Presidency Reagan Presidency 1981-1989 The 1980s witnessed a resurgence

More information

NBER WORKING PAPER SERIES DESIGNING INSTITUTIONS TO DEAL WITH TERRORISM IN THE UNITED STATES. Martin S. Feldstein

NBER WORKING PAPER SERIES DESIGNING INSTITUTIONS TO DEAL WITH TERRORISM IN THE UNITED STATES. Martin S. Feldstein NBER WORKING PAPER SERIES DESIGNING INSTITUTIONS TO DEAL WITH TERRORISM IN THE UNITED STATES Martin S. Feldstein Working Paper 13729 http://www.nber.org/papers/w13729 NATIONAL BUREAU OF ECONOMIC RESEARCH

More information

Alex Mintz Dean Lauder School of Government IDC Presented at the Herzliya Conference, January How Rational is Ahmadinejad?

Alex Mintz Dean Lauder School of Government IDC Presented at the Herzliya Conference, January How Rational is Ahmadinejad? Alex Mintz Dean Lauder School of Government IDC Presented at the Herzliya Conference, January 2008 How Rational is Ahmadinejad? The Research Project In this project, our team analyzes every decision taken

More information

C I E D C O E. Legal tools for prosecution of threat network agents May 26 th, This report can be downloaded from: BICES NATO CIED PORTAL

C I E D C O E. Legal tools for prosecution of threat network agents May 26 th, This report can be downloaded from: BICES NATO CIED PORTAL Legal tools for prosecution of threat network agents May 26 th, 2017 C I E D C O E This report can be downloaded from: BICES NATO CIED PORTAL BICES COE CIED PORTAL http://www.ciedcoe.org/documents/documents/

More information

Countering Violent Extremism. Mohamed A.Younes Future For Advanced Research and Studies

Countering Violent Extremism. Mohamed A.Younes Future For Advanced Research and Studies Countering Violent Extremism Mohamed A.Younes Future For Advanced Research and Studies What are The Common Myths about CVE? 1-Extremists have some unique signs that can be Identified easily. Contrary to

More information

Emmanuel Heymann, Luxembourg, Luxembourg

Emmanuel Heymann, Luxembourg, Luxembourg 32 33 Emmanuel Heymann, Luxembourg, Luxembourg Eli Hanovitch, Melbourne, Australia LAUDER SCHOOL OF GOVERNMENT, DIPLOMACY AND STRATEGY DEAN S WELCOME The Lauder School of Government at IDC Herzliya is

More information

Foro de Seguridad XXV Foro Económico. Krynica (Polonia) 8-10 de septiembre de 2015

Foro de Seguridad XXV Foro Económico. Krynica (Polonia) 8-10 de septiembre de 2015 Foro de Seguridad XXV Foro Económico Krynica (Polonia) 8-10 de septiembre de 2015 FIGHTING AGAINST TERRORISM Good morning ladies and gentlemen, for me, it is a pleasure and an honor being here today. First,

More information

Intelligence Reform and Terrorism Prevention Act of 2004: Lone Wolf Amendment to the Foreign Intelligence Surveillance Act

Intelligence Reform and Terrorism Prevention Act of 2004: Lone Wolf Amendment to the Foreign Intelligence Surveillance Act Order Code RS22011 Updated December 19, 2006 Intelligence Reform and Terrorism Prevention Act of 2004: Lone Wolf Amendment to the Foreign Intelligence Surveillance Act Summary Elizabeth B. Bazan and Brian

More information

Thought Leader Summary. Heather Conley SVP for Europe, Eurasia, and the Arctic; and Director, Europe Program, CSIS

Thought Leader Summary. Heather Conley SVP for Europe, Eurasia, and the Arctic; and Director, Europe Program, CSIS Prospects and Priorities for U.S. Gray Zone Competition Center for Strategic and International Studies Tuesday, November 27, 2018 Heather Conley SVP for Europe, Eurasia, and the Arctic; and Director, Europe

More information

National Consortium for Study of Terrorism and Responses to Terrorism

National Consortium for Study of Terrorism and Responses to Terrorism National Consortium for Study of Terrorism and Responses to Terrorism Conflict, Terrorism and Societal Resilience Jonathan Wilkenfeld University of Maryland, jwilkenf@gvpt.umd.edu Congressional Briefing

More information

CAREERS ADVISERS AND TEACHERS DAY

CAREERS ADVISERS AND TEACHERS DAY CAREERS ADVISERS AND TEACHERS DAY What exactly is security studies? DR ADAM LOCKYER SENIOR LECTURER IN SECURITY STUDIES DEPARTMENT OF SECURITY STUDIES AND CRIMINOLOGY Unfortunately, it is a busy time and

More information

THE ENABLING ACT FOR SUPPRESSION TERRORISM [1991]

THE ENABLING ACT FOR SUPPRESSION TERRORISM [1991] THE ENABLING ACT FOR SUPPRESSION OF TERRORISM [1991] THE ENABLING ACT FOR SUPPRESSION OF TERRORISM (1991) WHEREAS the Kingdom of Bhutan is a party to the SAARC Regional Convention on suppression of Terrorism

More information

The first affirmation of the Center s Guideline ( on

The first affirmation of the Center s Guideline (  on October-December, 2007 Vol. 30, No. 4 Security and Defense Guideline #7 for Government and Citizenship by James W. Skillen The first affirmation of the Center s Guideline (www.cpjustice.org/guidelines)

More information

Agenda: Protecting and Promoting Human Rights to Prevent and Counter Violent Extremism

Agenda: Protecting and Promoting Human Rights to Prevent and Counter Violent Extremism Agenda: Protecting and Promoting Human Rights to Prevent and Counter Violent Extremism Committee: Human Rights Council Student Officer: Soo Young Yun, President from Wikimedia Commons Introduction: With

More information

Stopping the banned groups

Stopping the banned groups Stopping the banned groups Mehwish Rani Mehwish Rani is M.Phil in Psychology and an independent research analyst in the field of countering violent extremism. W hile the NAP lays down a comprehensive framework

More information

COUNTERINSURGENCY MEASURES B4S5499XQ STUDENT HANDOUT

COUNTERINSURGENCY MEASURES B4S5499XQ STUDENT HANDOUT UNITED STATES MARINE CORPS THE BASIC SCHOOL MARINE CORPS TRAINING COMMAND CAMP BARRETT, VIRGINIA 22134-5019 COUNTERINSURGENCY MEASURES B4S5499XQ STUDENT HANDOUT Basic Officer Course Introduction This lesson

More information

Reflections on U.S. Military Policy

Reflections on U.S. Military Policy Reflections on U.S. Military Policy Douglas Feith Former Under Secretary of Defense for Policy U.S. Department of Defense An Interview with Jonah Shrock and Oliver Hermann Providence, RI, 8 May 2017 Douglas

More information

Role of Security Sector and Civil Society in Responding to and Preventing VE

Role of Security Sector and Civil Society in Responding to and Preventing VE Role of Security Sector and Civil Society in Responding to and Preventing VE Security Governance Initiative Partners Seminar Accra, Ghana; 13 th December, 2017 Motivations, Commitments, Interests and profiles

More information

Montessori Model United Nations. Distr.: Middle School Twelfth Session XX March Security Council

Montessori Model United Nations. Distr.: Middle School Twelfth Session XX March Security Council Montessori Model United Nations S/12/BG-Terrorist Acts General Assembly Distr.: Middle School Twelfth Session XX March 2018 Original: English Security Council This is a special part of the United Nations.

More information

ener.: ..., EU counter-terrorism policy: Main achievements and future challenges 9 th February 2011 Presentation by Rokhsana Fiaz, ENER Director

ener.: ..., EU counter-terrorism policy: Main achievements and future challenges 9 th February 2011 Presentation by Rokhsana Fiaz, ENER Director ener.: o EUROPEAN NETWORK OF EXPERTS ON RADICAlISATION EU counter-terrorism policy: Main achievements and future challenges Presentation by Rokhsana Fiaz, ENER Director European Economic and Social Committee

More information

Analyzing Terrorist Networks - Theories & Techniques

Analyzing Terrorist Networks - Theories & Techniques NYU Department of Politics April 10, 2012 What We Will Discuss Why I am talking to you? Where I used to work What I used to do How I used to do it Theories of terrorist organizations Sageman and Hoffman

More information

Trends in Modern International Terrorism

Trends in Modern International Terrorism Chapter 2 Trends in Modern International Terrorism Boaz Ganor Abstract This chapter examines some of the most widely researched trends and developments within the phenomenon of modern international terrorism,

More information

Diplomacy in the 21 st Century - Syllabus

Diplomacy in the 21 st Century - Syllabus Diplomacy in the 21 st Century - Syllabus Course Supervisor: Prof. Boaz Ganor - Dean, Lauder School of Government, Diplomacy & Strategy, Interdisciplinary Center (IDC), Herzliya & Founder and Executive

More information

WikiLeaks Document Release

WikiLeaks Document Release WikiLeaks Document Release February 2, 2009 Congressional Research Service Report RS21033 Terrorism at Home: A Quick Look at Applicable Federal and State Criminal Laws Charles Doyle, American Law Division

More information

G8 Declaration on Counter Terrorism

G8 Declaration on Counter Terrorism G8 Declaration on Counter Terrorism Now is the time for a new era of international cooperation that strengthens old partnerships and builds new ones to confront our common challenges and to defeat terrorism

More information

Conflating Terrorism and Insurgency

Conflating Terrorism and Insurgency Page 1 of 6 MENU FOREIGN POLICY ESSAY Conflating Terrorism and Insurgency By John Mueller, Mark Stewart Sunday, February 28, 2016, 10:05 AM Editor's Note: What if most terrorism isn t really terrorism?

More information

U.S. Government Response

U.S. Government Response What Price Homeland Security? Civil Liberties October 4, 2004 11.002/17.30j Public Policy 1 What is the problem? Vulnerability of American society to terrorist attracts Fragility of infrastructure Fragility

More information

Boko Haram I. Background Boko Haram is an islamic terrorist group that is primarily ran out of Nigeria and is also

Boko Haram I. Background Boko Haram is an islamic terrorist group that is primarily ran out of Nigeria and is also Boko Haram I. Background Boko Haram is an islamic terrorist group that is primarily ran out of Nigeria and is also active within Chad, Niger, and northern Cameroon. The terrorist group is currently working

More information

Next- Generation National Security and Public Safety in Europe

Next- Generation National Security and Public Safety in Europe A N A L Y S T C O N N E C T I O N Alan Webber Research Director Next- Generation National Security and Public Safety in Europe June 2016 As the threats and risks from cyber criminals, terrorists, gangs,

More information

RESOLUTION ON PREVENTING AND COUNTERING TERRORISM AND VIOLENT EXTREMISM AND RADICALIZATION THAT LEAD TO TERRORISM 1

RESOLUTION ON PREVENTING AND COUNTERING TERRORISM AND VIOLENT EXTREMISM AND RADICALIZATION THAT LEAD TO TERRORISM 1 RESOLUTION ON PREVENTING AND COUNTERING TERRORISM AND VIOLENT EXTREMISM AND RADICALIZATION THAT LEAD TO TERRORISM 1 1. Condemning terrorism, in all its forms and manifestations, in the strongest possible

More information

SACT s lecture at. FBI Joint Terrorism Task Force. New York City, 16 Apr 2018,

SACT s lecture at. FBI Joint Terrorism Task Force. New York City, 16 Apr 2018, NORTH ATLANTIC TREATY ORGANIZATION SUPREME ALLIED COMMANDER TRANSFORMATION SACT s lecture at FBI Joint Terrorism Task Force New York City, 16 Apr 2018, 1400-1600 Général d armée aérienne Denis MERCIER

More information

FACT SHEET STOPPING THE USE OF RAPE AS A TACTIC OF

FACT SHEET STOPPING THE USE OF RAPE AS A TACTIC OF June 2014 FACT SHEET STOPPING THE USE OF RAPE AS A TACTIC OF WAR: A NEW APPROACH There is a global consensus that the mass rape of girls and women is routinely used as a tactic or weapon of war in contemporary

More information

Montgomery County Community College CJS/EMP/POL/SOC 250 Terrorism & Counter-terrorism 3-3-0

Montgomery County Community College CJS/EMP/POL/SOC 250 Terrorism & Counter-terrorism 3-3-0 Montgomery County Community College CJS/EMP/POL/SOC 250 Terrorism & Counter-terrorism 3-3-0 AY17-18 COURSE DESCRIPTION: Terrorism in the 21 st century is a global phenomenon. This course is designed to

More information

Multi-domain Counter-terrorism Modeling

Multi-domain Counter-terrorism Modeling www.titan.com Multi-domain Counter-terrorism Modeling Roger Smith Vice President and Group CTO Titan Systems Corporation rdsmith@titan.com MORS WG16 & WG29 The Goal Capture the complex dynamics of a global

More information

Deterring Mass-Casualty Terrorism. have become preoccupied with preventing

Deterring Mass-Casualty Terrorism. have become preoccupied with preventing Mass-casualty drill at Camp Bondsteel, Kosovo. 55 th Signal Company (Thomas Bray) Deterring Mass-Casualty Terrorism By WYN Q. BOWEN Western governments have become preoccupied with preventing mass-casualty

More information

Montessori Model United Nations. Distr.: Upper Elementary Eleventh Session XX September Sixth Committee Legal

Montessori Model United Nations. Distr.: Upper Elementary Eleventh Session XX September Sixth Committee Legal Montessori Model United Nations A/C.6/11/BG-108 General Assembly Distr.: Upper Elementary Eleventh Session XX September 2016 Original: English Sixth Committee Legal This group focuses on legal questions.

More information

Laura Dugan, University of Maryland Erica Chenoweth, University of Denver September 18, 2014

Laura Dugan, University of Maryland Erica Chenoweth, University of Denver September 18, 2014 Government Actions in Terror Environments: Moving Beyond Deterrence Laura Dugan, University of Maryland Erica Chenoweth, University of Denver September 18, 2014 This research was supported by the U.S.

More information

Some Reasons Why International Terrorism Has Not Yet Become the Common Enemy of Mankind

Some Reasons Why International Terrorism Has Not Yet Become the Common Enemy of Mankind Some Reasons Why International Terrorism Has Not Yet Become the Common Enemy of Mankind Presentation by Prof. em. Alex P. Schmid (Research Fellow, International Centre for Counter-Terrorism [ICCT], The

More information

Contents. Preface Acknowledgments

Contents. Preface Acknowledgments Contents Preface xv Acknowledgments xxi Introduction xxiii Part I Terrorists' Threats and Societal Vulnerabilities 1 Chapter I Aircraft and Aviation Facilities Alona E. Evans 3 Introduction 3 The Problem

More information

Geopolitics of the New Middle East - Syllabus

Geopolitics of the New Middle East - Syllabus Geopolitics of the New Middle East - Syllabus Course Supervisor: Prof. Boaz Ganor - Dean, Lauder School of Government, Diplomacy & Strategy, Interdisciplinary Center (IDC), Herzliya & Founder and Executive

More information

S/2003/487. Security Council. United Nations

S/2003/487. Security Council. United Nations United Nations Security Council Distr.: General 28 April 2003 Original: English S/2003/487 Letter dated 15 April 2003 from the Chairman of the Security Council Committee established pursuant to resolution

More information

Cover Story. - by Shraddha Bhandari. 24 JANUARY-FEBRUARY 2016 FSAI Journal

Cover Story. - by Shraddha Bhandari. 24 JANUARY-FEBRUARY 2016 FSAI Journal - by Shraddha Bhandari 24 JANUARY-FEBRUARY 2016 FSAI Journal Following the spate of terror attacks in Paris, Beirut, and downing of the Russian Metrojet liner in November 2015, concerns have been raised

More information

Violent Conflicts 2015 The violent decade?! Recent Domains of Violent Conflicts and Counteracting February 25-27, 2015

Violent Conflicts 2015 The violent decade?! Recent Domains of Violent Conflicts and Counteracting February 25-27, 2015 Call for Papers Violent Conflicts 2015 The violent decade?! Recent Domains of Violent Conflicts and Counteracting February 25-27, 2015 Organized by the Institute for Interdisciplinary Research on Conflict

More information

Addressing Emerging Terrorist Threats and the Role of UNODC

Addressing Emerging Terrorist Threats and the Role of UNODC Addressing Emerging Terrorist Threats and the Role of UNODC Ms. Dolgor Solongo, Officer-in-Charge, ISS1 (Asia and Europe)/ Terrorism Prevention Branch 14 April 2015 Terrorism Evolving Global Threat Terrorism

More information

Christian Aid Ireland s submission on civil society space 31 March 2017

Christian Aid Ireland s submission on civil society space 31 March 2017 Christian Aid Ireland s submission on civil society space 31 March 2017 Christian Aid Ireland recognises the leading role Ireland played during its membership of the UN Human Rights Council 2013-2015 and

More information

Freedom vs. Security: Guaranteeing Civil Liberties in a World of Terrorist Threats

Freedom vs. Security: Guaranteeing Civil Liberties in a World of Terrorist Threats Freedom vs. Security: Guaranteeing Civil Liberties in a World of Terrorist Threats Speech by the Federal Minister of the Interior Dr Wolfgang Schäuble for the Bucerius Summer School on Global Governance

More information

PRO/CON: Is Snowden a whistle-blower or just irresponsible?

PRO/CON: Is Snowden a whistle-blower or just irresponsible? PRO/CON: Is Snowden a whistle-blower or just irresponsible? By McClatchy-Tribune News Service, adapted by Newsela staff on 02.04.14 Word Count 1,340 Demonstrators rally at the U.S. Capitol to protest spying

More information

Recommendation for a COUNCIL DECISION

Recommendation for a COUNCIL DECISION EUROPEAN COMMISSION Brussels, 20.12.2017 COM(2017) 806 final Recommendation for a COUNCIL DECISION authorising the opening of negotiations for an agreement between the European Union and the State of Israel

More information

After the Fall of Daesh in Syria and Iraq: Counter-Radicalisation

After the Fall of Daesh in Syria and Iraq: Counter-Radicalisation After the Fall of Daesh in Syria and Iraq: Implications for Radicalisation and Counter-Radicalisation Professor Peter R. Neumann King s College London @PeterRNeumann peter.neumann@kcl.ac.uk POSITIVE DEVELOPMENTS

More information

Analysis of the Draft Defence Strategy of the Slovak Republic 2017

Analysis of the Draft Defence Strategy of the Slovak Republic 2017 Analysis of the Draft Defence Strategy of the Slovak Republic 2017 Samuel Žilinčík and Tomáš Lalkovič Goals The main goal of this study consists of three intermediate objectives. The main goal is to analyze

More information

Weapons of Mass Destruction and their Effect on Interstate Relationships

Weapons of Mass Destruction and their Effect on Interstate Relationships STUDENT 2 PS 235 Weapons of Mass Destruction and their Effect on Interstate Relationships We make war that we may live in Peace. -Aristotle A lot of controversy has been made over the dispersion of weapons

More information

REPORT FROM THE COMMISSION TO THE EUROPEAN PARLIAMENT AND THE COUNCIL

REPORT FROM THE COMMISSION TO THE EUROPEAN PARLIAMENT AND THE COUNCIL EUROPEAN COMMISSION Brussels, 5.9.2014 COM(2014) 554 final REPORT FROM THE COMMISSION TO THE EUROPEAN PARLIAMENT AND THE COUNCIL on the implementation of Council Framework Decision 2008/919/JHA of 28 November

More information

SHAPE POLICY TO STRATEGICALLY FIGHT GLOBAL TERRORISM

SHAPE POLICY TO STRATEGICALLY FIGHT GLOBAL TERRORISM SHAPE POLICY TO STRATEGICALLY FIGHT GLOBAL TERRORISM AMERICAN UNIVERSITY ONLINE MASTER OF SCIENCE IN COUNTER- TERRORISM AND HOMELAND SECURITY American University s online Master of Science in Counter-Terrorism

More information

GOVT-GOVERNMENT (GOVT)

GOVT-GOVERNMENT (GOVT) GOVT-GOVERNMENT (GOVT) 1 GOVT-GOVERNMENT (GOVT) GOVT 100G. American National Government Class critically explores political institutions and processes including: the U.S. constitutional system; legislative,

More information

COMMUNICATION FROM THE COMMISSION TO THE EUROPEAN PARLIAMENT, THE COUNCIL, THE EUROPEAN ECONOMIC AND SOCIAL COMMITTEE AND THE COMMITTEE OF THE REGIONS

COMMUNICATION FROM THE COMMISSION TO THE EUROPEAN PARLIAMENT, THE COUNCIL, THE EUROPEAN ECONOMIC AND SOCIAL COMMITTEE AND THE COMMITTEE OF THE REGIONS EUROPEAN COMMISSION Brussels, 15.1.2014 COM(2013) 941 final COMMUNICATION FROM THE COMMISSION TO THE EUROPEAN PARLIAMENT, THE COUNCIL, THE EUROPEAN ECONOMIC AND SOCIAL COMMITTEE AND THE COMMITTEE OF THE

More information

Council conclusions on counter-terrorism

Council conclusions on counter-terrorism European Council Council of the European Union Council conclusions on counterterrorism Foreign Affairs Council Brussels, 9 February 2015 1. The Council strongly condemns the recent attacks, which have

More information

Final Report. For the European Commission, Directorate General Justice, Freedom and Security

Final Report. For the European Commission, Directorate General Justice, Freedom and Security Research Project Executive Summary A Survey on the Economics of Security with Particular Focus on the Possibility to Create a Network of Experts on the Economic Analysis of Terrorism and Anti-Terror Policies

More information

Global Risk Index 2018

Global Risk Index 2018 Cambridge Centre for Risk Studies Advisory Board Research Showcase 23 January 2018 Global Risk Index 2018 Jessica Tsang Research Assistant Cambridge Centre for Risk Studies 2018 Global Risk Index Measure

More information

Negotiating with Terrorists an Option Not to Be Forgone

Negotiating with Terrorists an Option Not to Be Forgone KOMMENTARE /COMMENTS Negotiating with Terrorists an Option Not to Be Forgone MICHAEL DAUDERSTÄDT I t is very tempting, in the wake of the many shocking terrorist attacks of recent times such as those in

More information

Example 8.2 The Economics of Terrorism: Externalities and Strategic Interaction

Example 8.2 The Economics of Terrorism: Externalities and Strategic Interaction Example 8.2 The Economics of Terrorism: Externalities and Strategic Interaction ECONOMIC APPROACHES TO TERRORISM: AN OVERVIEW Terrorism would appear to be a subject for military experts and political scientists,

More information

The Sources of and Limits on Criminal Law 1

The Sources of and Limits on Criminal Law 1 CONTENTS Preface xiii Acknowledgments About the Author xv xvii I. CHAPTER 1 The Sources of and Limits on Criminal Law 1 A. Introduction 1 1. The Purpose of Criminal Law 1 a) Morality and Blame 2 b) The

More information

Debating privacy and ICT

Debating privacy and ICT Debating privacy and ICT Citation for published version (APA): Est, van, R., & Harten, van, D. (2002). Debating privacy and ICT. In D. Harten, van (Ed.), International conference on the use of personal

More information

SENATE STAFF ANALYSIS AND ECONOMIC IMPACT STATEMENT

SENATE STAFF ANALYSIS AND ECONOMIC IMPACT STATEMENT SENATE STAFF ANALYSIS AND ECONOMIC IMPACT STATEMENT (This document is based on the provisions contained in the legislation as of the latest date listed below.) BILL: SB 8-C SPONSOR: SUBJECT: Senators Brown-Waite

More information

AN ESSAY AND COMMENT ON OREN GROSS, THE NEW WAY OF WAR: IS THERE A DUTY TO USE DRONES? Winston P. Nagan * Megan E. Weeren **

AN ESSAY AND COMMENT ON OREN GROSS, THE NEW WAY OF WAR: IS THERE A DUTY TO USE DRONES? Winston P. Nagan * Megan E. Weeren ** AN ESSAY AND COMMENT ON OREN GROSS, THE NEW WAY OF WAR: IS THERE A DUTY TO USE DRONES? Winston P. Nagan * Megan E. Weeren ** Professor Oren Gross has written a remarkably strong article in defense of the

More information

Interview with Peter Wallensteen*

Interview with Peter Wallensteen* Interview with Peter Wallensteen* Professor Peter Wallensteen is the Dag Hammarskjöld Professor of Peace and Conflict Research at Uppsala University, Sweden, and is also Research Professor of Peace Studies

More information

Warm ups *What is a key cultural difference between Ireland and Northern Ireland? *What is a key political difference between the two?

Warm ups *What is a key cultural difference between Ireland and Northern Ireland? *What is a key political difference between the two? Warm ups 11.28.2016 *What is a key cultural difference between Ireland and Northern Ireland? *What is a key political difference between the two? Lesson Objective: *describe what NATO is *describe key

More information

15413/16 EB/dk 1 DGD 1C

15413/16 EB/dk 1 DGD 1C Council of the European Union Brussels, 9 December 2016 (OR. en) 15413/16 OUTCOME OF PROCEEDINGS From: General Secretariat of the Council On: 8 December 2016 To: Delegations No. prev. doc.: 14795/16 Subject:

More information

Conventional Deterrence: An Interview with John J. Mearsheimer

Conventional Deterrence: An Interview with John J. Mearsheimer Conventional Deterrence: An Interview with John J. Mearsheimer Conducted 15 July 2018 SSQ: Your book Conventional Deterrence was published in 1984. What is your definition of conventional deterrence? JJM:

More information

DRAFT REPORT. EN United in diversity EN. European Parliament 2018/2158(INI) on the state of EU-Russia political relations (2018/2158(INI))

DRAFT REPORT. EN United in diversity EN. European Parliament 2018/2158(INI) on the state of EU-Russia political relations (2018/2158(INI)) European Parliament 2014-2019 Committee on Foreign Affairs 2018/2158(INI) 28.11.2018 DRAFT REPORT on the state of EU-Russia political relations (2018/2158(INI)) Committee on Foreign Affairs Rapporteur:

More information

Concept note. Open briefing of the Counter-Terrorism Committee on the nexus between international terrorism and transnational organized crime

Concept note. Open briefing of the Counter-Terrorism Committee on the nexus between international terrorism and transnational organized crime Concept note Open briefing of the Counter-Terrorism on the nexus between international terrorism and transnational organized crime I. Background United Nations Headquarters, New York; Conference Room 3

More information

Oklahoma CLEET Approved Courses

Oklahoma CLEET Approved Courses Oklahoma CLEET Approved Courses LocalGovU now has 371 Oklahoma CLEET approved courses for Law Enforcement and Corrections officers and another 40 Hours of courses that qualify for Mental Health Credit!

More information

DO TERRORISTS HAVE NO RELIGION?

DO TERRORISTS HAVE NO RELIGION? An Open Access Journal from The Law Brigade (Publishing) Group 151 DO TERRORISTS HAVE NO RELIGION? Written by Dominique Virgil Tuapetel 3rd year Undergraduate Student of Faculty of Law, Universitas Indonesia

More information

THE ARMS TRADE TREATY AND

THE ARMS TRADE TREATY AND All rights reserved. This publication is copyright, but may be reproduced by any method without fee for advocacy, campaigning and teaching purposes, but not for resale. The copyright holders request that

More information

2017 ASEAN COMPREHENSIVE PLAN OF ACTION ON COUNTER TERRORISM

2017 ASEAN COMPREHENSIVE PLAN OF ACTION ON COUNTER TERRORISM 2017 ASEAN COMPREHENSIVE PLAN OF ACTION ON COUNTER TERRORISM Adopted in Manila, the Philippines on 20 September 2017 I. GENERAL / INTRODUCTION... 2 II. AREAS OF COOPERATION... 3 III. COOPERATION WITH DIALOGUE

More information

Civil War erupts in Vietnam Communist North vs. non Communist South Organized by Ho Chi Minh

Civil War erupts in Vietnam Communist North vs. non Communist South Organized by Ho Chi Minh 1956 Elections are cancelled (1 of Geneva Accords) 1957 The Vietcong attack in South Vietnam Vietcong are South Vietnamese communists Guerrilla fighters Civil War erupts in Vietnam Communist North vs.

More information

THE ISLAMIC STATE AND ITS HUMAN TRAFFICKING PRACTICE

THE ISLAMIC STATE AND ITS HUMAN TRAFFICKING PRACTICE THE ISLAMIC STATE AND ITS HUMAN TRAFFICKING PRACTICE 24-25. 10. 2017 Colonel János Besenyő, PhD. Contents 1. Human trafficking across the Middle East 2. Basic motivations towards human trafficking 3. Financial

More information

THE POLITICS OF PREVENTING AND COUNTERING VIOLENT EXTREMISM

THE POLITICS OF PREVENTING AND COUNTERING VIOLENT EXTREMISM THE POLITICS OF PREVENTING AND COUNTERING VIOLENT EXTREMISM Finding local solutions to global challenges 6-8 December 2016 June 2017 DIIS Danish Institute for International Studies Author: Louise Wiuff

More information

Terrorism and New Security Challenges Implications for European-Japanese Security Cooperation

Terrorism and New Security Challenges Implications for European-Japanese Security Cooperation Terrorism and New Security Challenges Implications for European-Japanese Security Cooperation Volker STANZEL Federal Foreign Office There is general agreement among observers of international relations

More information

Delegations will find attached the declassified version of the above document.

Delegations will find attached the declassified version of the above document. Council of the European Union Brussels, 6 April 2016 (OR. en) 15525/2/10 REV 2 DCL 1 DECLASSIFICATION of document: dated: 4 November 2010 new status: Subject: JAIEX 82 ENFOPOL 305 COTER 79 COASI 182 ST

More information

Worldwide Caution: Annotated

Worldwide Caution: Annotated Worldwide Caution: Annotated Terrorism 9/14/2017 On September 14, 2017, the U.S. Department of State s Bureau of Consular Affairs released an updated version of its Worldwide Caution. This report is an

More information

Cyber Prevention: - Not Just Terrorism

Cyber Prevention: - Not Just Terrorism Cyber Prevention: - Not Just Terrorism Mike Hurst MSc. VP, Cyber Enabled Crime CSCSS Founder, Cyberst Ltd. - Cyber Secure Techniques Magna Carta and Henry De Bracton Liberty University School of Law, Virginia.

More information