320 2175 1 PB PDF
320 2175 1 PB PDF
320 2175 1 PB PDF
December 2013
PERSPECTI VES O N TERRORISM Volume 7, Issue 6
Table of Contents:
Welcome from the Editors ......................................................................4
I. Articles
Media Metrics: How Arab and Western Media Construct Success and
Failure in the ‘Global War on Terror’....................................................10
by Sarah V. Marsden
2
December 2013
PERSPECTI VES O N TERRORISM
Volume 7, Issue 6
IV. Resources
Literature on the Conflict in Syria (2011 – November 2013) .............137
Compiled and selected by Judith Tinnes
V. Book Reviews
“Counterterrorism Bookshelf ” – 20 Important Books on Terrorism &
Counterterrorism Related Subjects ....................................................203
by Joshua Sinai
3
December 2013
PERSPECTI VES O N TERRORISM
Volume 7, Issue 6
In this issue of Perspectives on Terrorism we are pleased to present four articles on a variety of
timely topics. First, Sarah Marsden offers a comparative analysis of several hundred Arab and
Western media sources, highlighting their different conceptualisations of what constitutes
‘success’ and ‘failure’ in the ‘War on Terror’. Second, Iromi Dharmawardhane evaluates several
aspects of the post-conflict initiatives in Sri Lanka, and offers recommendations to address
shortcomings and persistent challenges. Third, an international team of scholars led by Mark
Woodward challenge the perception that the Sufi tradition in Islam has always been tolerant
and non-violent while the Salafist tradition is the one consistently associated with intolerance
and violence. Finally, Kathleen Deloughery draws from several incident databases to explain
how and why simultaneous terrorist attacks are more likely to be successful and cause more
fatalities.
This issue of the journal also introduces a new Policy Notes section, in which we will publish
relatively short pieces containing informed analysis and policy recommendations on a variety
of important topics. Josh Meservey inaugurates this section with a timely analysis of Somalia’s
safe havens and their critical importance to al-Shabaab. This is followed by a review of
international counterterrorism assistance to the Horn of Africa, authored by three senior
analysts at the Centre on Global Counterterrorism Cooperation.
Our Research Notes section begins with a description by Jennifer Giroux and colleagues about
a new and important resource on energy security and political violence. Then Richard Chasdi
reviews the methodological issues involved in determining whether or not terrorism poses
similar degrees of risk as other man-made or natural disasters.
In our Resources section, Judith Tinnes offers an extensive and timely list of literature on the
conflict in Syria, and Eric Price has compiled a useful and informative bibliography of
dissertations and theses on terrorism and counterterrorism, written between 1980 and 2013.
4
December 2013
PERSPECTI VES O N TERRORISM
Volume 7, Issue 6
Most titles are ‘clickable’ and guide the reader directly to the full-text versions of the cited
titles. Finally, we conclude with a collection of brief (capsule) book reviews by Joshua Sinai.
This final issue of Volume VII was prepared in the U.S. by the staff of the Center for Terrorism
and Security Studies at the University of Massachusetts Lowell, with special thanks to our
research assistants Suzzette Lopez Abbasciano and Robert Kerins. The first issue of Volume
VIII will be prepared in Vienna, Austria, by Editor-in-Chief Alex Schmid for publication in
February 2014.
Sincerely,
Co-Editor
December 2013
5
December 2013
PERSPECTI VES O N TERRORISM
Volume 7, Issue 6
In order to stimulate the search for excellence in academic research, TRI has created an
annual award for the best PhD thesis that has been successfully defended at a university. For
this purpose, a panel of judges consisting of the three directors of TRI – Robert Wesley, Alex P.
Schmid and James J. F. Forest – now invite those who have completed their PhD thesis
between January and December 2013 to submit a copy to the panel no later than the end of
March 2014. The judges will read and compare the doctoral theses we receive and nominate
the finest submission for the ‘Best PhD Thesis in the Field of Terrorism Studies 2013 Award’.
The Award consists of a monetary prize of US $1,000.- and a formal certificate, signed by the
panel of judges, declaring the winner’s name and the title of the thesis. The award winner will
be announced, and a summary of the thesis will be published in the August 2014 issue of
Perspectives on Terrorism. The Terrorism Research Initiative will also assist the award winner
in finding a publisher for his or her thesis so that the full results of the award-winning
research become available to the scholarly community with minimal delay. The August 2014
issue of the journal will also announce the honorable mention of authors whose theses were
judged second and third best.
Eligible for this annual award are scholars who have obtained their PhD degree in the calendar
year 2013 from an institution of higher education anywhere in the world. The thesis must be
submitted in English (either written in English or translated into English) and should be sent
to the chair of the judges panel in electronic form as a PDF. The PhD thesis must focus on
terrorism/counterterrorism or closely related forms of political violence and armed conflict. It
should be the product of in-depth research and show originality in terms of introducing new
methods, theories or data into its analysis. The submitted thesis should be accompanied by a
cover letter in which the author outlines the novelty and/or uniqueness of the thesis and its
findings.
In those cases where a member of the jury is in any way connected to a person submitting a
PhD thesis, the composition of the jury will be changed to avoid a conflict of interest. In such
cases, a qualified scholar from the Editorial Board of Perspectives on Terrorism will be invited
to take his place.
6
December 2013
PERSPECTI VES O N TERRORISM
Volume 7, Issue 6
The judges are looking forward to receiving and reviewing quality submissions for this award
before 31 March 2014. Submissions should be sent to the chair of the panel of judges, Prof. em.
Alex P. Schmid, at < [email protected] >.
7
December 2013
PERSPECTI VES O N TERRORISM
Volume 7, Issue 6
The Syrian Conflict and the Promotion of Reconciliation and the Implications for
International Security
6 -7 February 2014
The conference seeks to provide an array of Syrian political actors based in Austria and abroad
with an opportunity to offer their insights into the current conflict and explore prospects for
reconciliation. It offers a neutral forum for the exchange of perspectives on the interconnected
issues of the promotion of civil society, political cooperation and bringing violence to an end,
while also addressing their implications for international politics and security. The conference
venue, the Semper Depot of the Akademie der Bildenden Künste, will also host the
photographic exhibition Syrian Perspectives on War.
Conference Agenda
13:30 - 14:00 Opening remarks and introductions by Robert Wesley and Nico Prucha,
Terrorism Research Initiative
14:00 - 14:30 Research Briefing by Cengiz Günay, Austrian Institute for International Affairs:
“Syria at the Crossroads of Turkey and the EU”
14:45 – 15:15 Political Activism, Badran Farwati, Political Analyst, Tansiqiyya: “Against all
Odds versus the Regime of al-Assad”
15:15 – 15:45 Supporting Women and Minorities, Marie-Therese Kiriakly, Verein für
Arabische Frauen: “The Role of Minorities in the Syrian Revolution”
16:15 - 16:45 Kurdish Freedom Party (Azadi), Jamal Omari: “The Kurds and the Regime –
Historical Dissent and Future Prospects”
14:00 – 14:30 Research Briefing, Rüdiger Lohlker, University of Vienna: “Social Media – A
New Layer in Modern Warfare”
14:45 - 15:15 Islamic Voices of the Revolution, Omer Mushaweh: “The Role of the Muslim
Brotherhood in the Syrian Revolution”
8
December 2013
PERSPECTI VES O N TERRORISM
Volume 7, Issue 6
15:15 – 15:45 National Coalition of Syrian Revolution and Opposition Forces (I’tilaf), Kamal
al-Labwani: “Threats for Civil-Society, Reclaiming Authority for the People of
Syria”
17:00 - 17:30 Austrian Muslim Initiative, Tarafa Baghajati: “Syria before and after the Geneva
I and II Talks”
9
December 2013
PERSPECTI VES O N TERRORISM
Volume 7, Issue 6
I. Articles
Media Metrics: How Arab and Western Media Construct Success and
Failure in the ‘Global War on Terror’
by Sarah V. Marsden
Abstract
The media has played an important role in the ‘Global War on Terror’ “(GWOT), and has
received significant scholarly attention as a result. However, the way in which different media
represent and construct notions of success and failure has been less well examined. In addressing
this gap, this article offers a comparative analysis of several hundred media sources drawn from
Western and English language Arab press outlets, published up until the turn of the decade.
Through this analysis, the paper examines the way in which different sources understand progress
and regress in the conflict. The themes that emerge from this corpus suggest, not only that the two
sets of sources demonstrate different conceptualisations of success and failure, but more
interestingly, that through construction of specific metrics, they betray very different
understandings about the nature of the conflict itself. In turn this constructs quite different
interpretations of what ‘winning’ the ‘GWOT might mean for the protagonists. In a largely
consistent interpretation of the GWOT, Arab media interpret the conflict through the lens of
American efforts to assert power and influence on a global stage. Western media metrics, on the
other hand, evolve from a largely militaristic confrontation, to an ideological conflict, and finally
constructing the GWOT as a global effort to bring down a movement. Notably, according to both
Arab and Western measures, the media sources examined here suggest America is losing.
Introduction
The 24-hour news cycle played a key role in defining and constructing the ‘Global War on
Terror’ (GWOT).[1] Efforts to influence the media agenda have seen governments set up
substantial public relation machines to ‘spin’ the news to best effect, and make the case for
their policies.[2] Similarly, al-Qaeda has long recognised the need to fight a media battle
alongside its violent campaign, setting the propaganda battle at the heart of its strategy.[3]
Unsurprisingly therefore, substantial scholarly attention has been paid to the role of the media
in the GWOT.[4] However, there has been comparatively less attention paid to the way in
which different types of media have understood and represented success and failure in the
conflict. What follows addresses this gap, and in doing so takes a comparative approach to
understanding how English language Arab and Western media outlets have constructed
metrics of success and failure in the GWOT.
10
December 2013
PERSPECTI VES O N TERRORISM
Volume 7, Issue 6
The analysis presented below suggests that Arab and Western media outlets interpret progress
and regress in the conflict in different ways. Moreover, the way these differing sources
construct measures of success and failure betray divergent ideas about the very nature of the
conflict itself. Both sets of media construct specific notions of the GWOT which impute the
reasons for the conflict, the motivations of the protagonists and concomitantly, what success
‘looks like’. The metrics used by Western media evolve through the first decade of the conflict,
from a militaristic ‘body-count’ approach, shifting to an ideological war and then to a global
effort to bring down a movement. Arab media interpret the conflict in more geopolitical
terms, through the lens of American hegemony and its efforts to spread power, control vital oil
resources, and support the Israeli state. Through these constructs, they prescribe particular
solutions - one largely military, the other socio-political. Importantly, analysis suggests that
according to both sets of measures, America is losing the GWOT. What follows seeks to
explore how this media output represents success and failure, and how through this, they
construct different interpretative frameworks by which the GWOT is understood. Following a
brief exposition of the methodology employed in the study, a series of measures of progress
and regress are described. The discussion then turns to explore ways in which these measures
construct highly divergent conceptualisations of ‘victory’ in the GWOT.
Methodology
This analysis is based on 192 articles drawn from English language Arab media sources, and
200 drawn from Western media that cover the first 10 years of the conflict. See Tables 1 and 2
for a breakdown of the number of articles drawn from each source over the nine years of
analysis. Because of the focus on English language sources, the specific media outlets were
selected on the basis of somewhat different criteria. Arab sources were largely predetermined
by the availability of English language publications, ‘Western’ sources on the other hand, were
selected to offer insight into primarily American interpretations of success and failure. Hence,
those outlets considered most influential in the major American centres of New York,
Washington and Los Angeles were selected, along with CNN, which has broader reach across
the country. These were supplemented with BBC output, to draw insights from the way these
issues were reported more widely.
11
December 2013
PERSPECTI VES O N TERRORISM
Volume 7, Issue 6
2001 2002 2003 2004 2005 2006 2007 2008 2009 TOTAL
Al Hayat 18 17 13 4 9 6 7 9 83
BBC Monitoring 7 2 9
Arab News 3 4 4 3 14
Al Jazeera 4 8 6 3 4 5 4 34
Asharq Alawsat 8 7 6 5 7 33
Al Arabiya 2 2 5 6 4 19
TOTAL 10 22 25 24 20 23 21 23 24 192
2001 2002 2003 2004 2005 2006 2007 2008 2009 TOTAL
CNN 2 3 5 4 3 5 4 2 6 34
BBC 8 8 8 6 8 6 5 9 4 62
Washington Post 3 5 4 4 3 4 4 3 5 35
LA Times 4 3 4 4 3 5 4 3 5 35
NY Times 2 3 4 4 4 3 6 4 4 34
TOTAL 19 22 25 22 21 23 23 21 24 200
Articles were selected through a search of the various sources’ online repositories using the
terms: War on Terror and al-Qaeda. This identified nearly 10,000 individual news articles,
reduced through a series of filters. First, articles were assessed against two criteria: that they
contained sufficient editorial comment, i.e. that they were not solely descriptive news articles,
and second that they were of sufficient length to provide a reasonable amount of data. The
dataset was further refined according to whether the articles made reference to success and/or
failure in the GWOT. A coding frame generated for the purpose was applied to the data
identifying all references to verifiable and unverifiable success and failure with respect to
America and al-Qaeda.
These data were analysed using thematic analysis,[5] an approach involving a reflexive
relationship between the data, prior theoretical knowledge and research experience.
Predominantly an inductive approach, it aims to elucidate patterns in the data, and uncover
the groundwork of understandings at work. In the initial phase of analysis, sources were read
repeatedly, and preliminary categories describing prominent themes were identified. Further
analysis and coding produced sub-themes, which led to a distillation of the data into a number
of coherent themes that are set out in detail below.[6] Thematic analysis allows greater depth
of analysis than techniques such as content analysis, but does not require the much deeper
examination of text that, for example, discourse analysis demands. Given the scope of the
12
December 2013
PERSPECTI VES O N TERRORISM
Volume 7, Issue 6
analysis and the amount of data that was necessary to offer a sufficiently detailed comparative
analysis, thematic analysis offered an appropriate balance of breadth and depth.
In the process of the research, a number of issues emerged which bear consideration. First, it
was challenging to source a comparable number of English language Arab media articles in
the early years of the conflict, something reflected in the uneven sources over the years. Up
until 2004, there were relatively few mainstream Arab media outlets publishing in English. To
compensate for this, sources were drawn from BBC Monitoring’s translation service, and by
over sampling articles from Al-Hayat. Although this means a somewhat different set of
sources, this approach was necessary to ensure similar amounts of data were available for
comparison across the years. Second, there is a liberal bias evident in the Western media
sources.[7] This is important to bear in mind when interpreting the results, as they do not
purport to offer a cross section of the media, but rather focus on particular sources considered
to share a largely liberal political stance. Similarly, there is something of a ‘Western’, or at the
very least, Saudi bias in the Arab media data. Al Hayat, Arab News, al-Arabiya and Asharq
Alawsat are all financed, supported or based in Saudi Arabia. This has implications for the
extent to which the analysis presented below can be said to relate to wider Arab perspectives
represented in Arabic language media, a subject which demands further investigation. It is
also important to recognise the broad designations of ‘Arab’ and ‘Western’ media are used as
‘shorthand’ for the different sources. Here, ‘Western’, largely means American and whilst still
encompassing a range of sources, is perhaps more homogenous than the Arab press, which
represents a somewhat more diverse source.
Therefore, this article focuses primarily on the dominant themes that emerged through
analysis. Whilst this potentially masks important minority views and debates, in offering an
overview of the most frequently discussed metrics, the paper focuses on those issues
considered most important in the media. With this in mind, what follows draws out the main
features of the discourse through the years of the GWOT, to shed light on how different media
sources interpret and understand success and failure in the conflict.
13
December 2013
PERSPECTI VES O N TERRORISM
Volume 7, Issue 6
[S]ome (mostly on the left) have persisted in the delusion that we are involved
here in something that can be put into some sort of context of normality – a crisis
that can be resolved through legal or diplomatic efforts, or handled with United
Nations resolutions, or addressed by limited military ‘reprisals’.[9]
Through this frame, political, social and diplomatic solutions are excluded, thereby prioritising
a militaristic and retributive response to 9/11. Such an approach is reflected in congruent
measures including ‘body counts’, applied to al-Qaeda, the Taliban, other (often ill-defined)
‘enemy’ actors, as well as US and coalition forces. Military metrics in Afghanistan, and then
Iraq, include measures of ‘collateral damage’; geographical control; stabilising military gains;
shifting levels of violence; number of terrorist attacks; and number of enemy fighters.
Disrupting al-Qaeda’s command and control structure and its training and organisational
apparatus, and keeping them ‘on the run’ are also regularly applied to assessments of progress.
Evidence of success against these measures applies to the home front as well as the battlefields
of Iraq and Afghanistan, with the absence of attacks on the US homeland regularly rehearsed
as a measure of the GWOT’s positive impact.
Periodically ‘scorecards’ are produced which identify a range of factors, including the number
of convictions; detainees in Guantanamo; the financial cost of the conflict; and number of
civilians killed. These can be critical, for example, noting the number of detainees who have at
some point been at Guantanamo (775) vs. the number of detainees convicted (0).[10]
However, they still largely reflect a militarised, counterterrorism framework (such lists do not,
for example, detail the number of cross-cultural exchanges undertaken, or shifts in foreign
policy). In concentrating so heavily on military factors, the media support the idea that the
conflict can best be resolved with violence, measured through battlefield victories or failures.
Although this conceptualisation is particularly prevalent early on in the conflict, it maintains
throughout the years, tracking initial ‘victory’ in Afghanistan and Iraq, and their deterioration
into bloody insurgencies.
14
December 2013
PERSPECTI VES O N TERRORISM
Volume 7, Issue 6
occupier with designs to steal [Iraq’s] wealth and suppress its faith’.[12] Described as the
‘fourth war’ (alongside Iraq, Afghanistan and the international war against al-Qaeda), the war
of ideas is considered vitally important but largely neglected by the Bush administration.
Implicated in this are interim metrics, exemplified in a quote by an anonymous senior military
official: ‘[i]f this is a global battle for hearts and minds, we haven’t even stood up an army yet’.
[13] Hence, the need for a vehicle to gain leverage in the ideological war can be seen as a
further measure of progress.
Although the ideological battle is poorly defined, it is possible to discern three sub-themes.
The first assesses how successful the West is at communicating the ‘real’ reason for US action
in the face of 9/11, and by extension, persuading the audience of the ‘true (positive) nature’ of
America. For example, that the Iraq invasion was designed to free the region of a tyrant, track
down Weapons of Mass Destruction, and spread freedom and democracy for the benefit of the
Iraqi people. Furthermore, that it was not designed to control oil, expand Western hegemony,
and conduct a religious crusade against Islam. The second, and much less commonly
discussed set of measures, are largely political and social, and are described by Michael
Scheuer in an interview with the BBC:
‘Bin Laden is attacking us because a specific set of US policies that have been in
gear for 30 years and haven’t been reviewed, haven’t been debated, haven’t been
questioned.’ … He cited the apparently unquestioning US support for Israel;
America's presence on the Arabian peninsula; and support for regimes perceived
as oppressing Muslims and for Muslim ‘tyrannies’.[14]
Efforts to attack al-Qaeda’s message are a final set of measures, including attempts to degrade
public support for al-Qaeda and stem the tide of recruitment and radicalisation, particularly
as the Iraq war deteriorates. However, clear metrics are hard to discern, beyond efforts to
promote ‘acceptable’ and ‘moderate’ Muslim voices, and Bush’s ‘vague pledge to spread
democracy’.[15] Despite this, they are considered vital and are increasingly described as
superordinate to the militaristic ‘body count’ measures discussed above. According to Daniel
Benjamin and Steve Simon:
Despite the increasingly frequent avowals from Bush and his aides that we are
fighting, in his words, a ‘hateful ideology’, the sad fact is that the United States
still has not provided that opposing narrative. Indeed, it is still fighting against
individual men and measuring progress accordingly. By doing so, it continues to
foster the notion that our opponents are finite in number and destructible and
that, on a good day, we will wipe them out.[16]
15
December 2013
PERSPECTI VES O N TERRORISM
Volume 7, Issue 6
Human rights and the impact on civil liberties are important features of the battle for hearts
and minds. Western press discourse draws out the increasing dissonance between the values
America purports to promote and its behaviour. Measures of Western public support, the
opinions of the judiciary and international partners, as well as Muslim public opinion are all
used to assess progress, becoming a prominent feature of media commentary: ‘[d]oubts,
division and defections have developed among American allies. For many around the world,
sympathy for the United States has changed into suspicion and, for some, even into hatred.
The prisons at Guantanamo Bay and Abu Ghraib, the treatment of prisoners, secret prisons
and rendition flights all added to this feeling.’[20]
16
December 2013
PERSPECTI VES O N TERRORISM
Volume 7, Issue 6
Related to the battle for hearts and minds, the impact of the GWOT is understood in terms of
US standing in the world. Encompassed within this is its perceived legitimacy as a force for
good, the ability to project power at the state level, and the image of America in the eyes of its
own people. The result is a reflective turn that sees commentators compare US prestige and
power before and after 9/11, largely blaming the Iraq war for America’s weakening position.
For instance, as Michael Hirsch notes:
[A]n administration that had sought to reassert U.S. power now finds itself
projecting weakness. An America that was at the top of its game internationally
on Sept. 10, 2001 has squandered its prestige. Iraq is draining the most powerful
Army in history, America’s moral standing in the world is diminished, and our
policies, according to the CIA’s own analysis, may have only helped to foment the
jihadi movement globally. We possess less leverage over the nuclear-minded states
of Iran and North Korea.[26]
A further related issue is the potentially long-term impact on the character of the United
States and its institutions: ‘the price of this president’s military and domestic overreach has
been highest in the loss of faith in America itself, in the values and institutions that have
historically defined this nation.’[27] Measures of progress question whether the US is true to
its own image of a free, liberal democracy. Debates over torture, rendition, civil liberties and
the power of the executive all feature heavily. Interestingly, ‘success’ against these measures
shifts as the conflict goes on, reflecting public and political debates about the relative
importance of different values. In the aftermath of 9/11, protecting the homeland was the
number one priority, which meant sometimes advocating suspension of, for example, habeas
corpus rights. However, as the conflict progresses, success becomes (re)aligned with defending
traditional components of liberal democracy. According to Michael Ignatieff:
17
December 2013
PERSPECTI VES O N TERRORISM
Volume 7, Issue 6
Western attack. Importantly, much greater attention is given to the social, political and
economic influences on the origins and evolution of the GWOT, and their interaction with US
policy, as one observer in al-Arabiya put it:
The behaviour of political leaders is weighed through the lens of different measures. For
example, Bush is criticised for prioritising a military response over political reform and social
development, whilst Obama is initially praised precisely because of this change in emphasis:
‘binding himself politically to the course of diplomacy and negotiations whereas Bush bound
himself militarily to the course of the war in Iraq and the war on terror.’[30] What follows
charts the primary themes by which success and failure has been conceptualised in the Arab
media, beginning with the need to defend Islam and address perceived ‘root causes’ of
terrorism, moving on to reflect on US policy in the Middle East and the extent to which the
GWOT has made the world a safer place, and finally applying the measure of whether
America has upheld the standards of liberal democracy it purports to represent.
Defence of Islam
Defending Islam and protecting Muslim identity are important issues that recur in the Arab
media. Focused on the effort to avoid Islam being conflated with terrorism, the discourse
distances mainstream Islam from al-Qaeda, reflecting an effort to protect Islam against
Western polemic. Metrics therefore include promoting ‘correct’ interpretations of Islam, and
protecting Muslims from being influenced by al-Qaeda’s ideology. Through their commentary,
journalists self-consciously seek to develop and defend a ‘‘unified Arab position’ to protect
pan-Arab identity against ‘Islamic extremism’ and Bin-Ladin’s views.’[31]
Religious, political and civil constituencies are all urged to respond to the threat to Islam, and
are berated when they are perceived to fail: ‘[t]he war on terror has reached London.
Undoubtedly, its first victim is the Muslim population. Why is it then that, unlike the run up
to the war in Iraq, no one single soul, not even a British Muslim, has taken to streets in protest
against the spread of terrorism in the capital?’ [32] Whilst not necessarily constructing the
GWOT as a ‘religious war’, such themes reflect a desire to defend Islam and counter the
growing relationship drawn between terrorism and Islam: ‘Muslims and their religious
institutions have a major role in portraying the true Islam and breaking the artificial link
18
December 2013
PERSPECTI VES O N TERRORISM
Volume 7, Issue 6
between it and terrorism, in addition to getting rid of the effects of 9/11. The U.S. should also
halt all the generalizations; for bin Laden is not all the Arabs, and Taliban is not all Islam.’[33]
At the heart of much of the Arab media discourse on the GWOT, the Israel-Palestine conflict
is one of the primary lenses through which progress and regress is understood. The need to
resolve the conflict is both intrinsic and instrumental, perceived as a way of undermining the
legitimacy of the ‘fanatics’, as well as serving long-term US strategy in the Middle East and
softening Muslim public opinion towards America. Conversely, Israeli ‘terrorism’ and ‘Zionist
propaganda’ are conceptualised as impediments to addressing the root causes of the terrorism
America experienced.
Despite this heavy emphasis on addressing terrorism’s social and political antecedents, there is
debate about the implications of claiming these to be causes of terrorism. For example,
discussing fundraising which supports terrorism, one journalist argues: ‘[we] the Muslims,
especially the Arabs, are really quite surprising. We participate in the crimes, [through giving
money] and then we justify them by our solidarity with the oppressed people and call these
justifications humanitarian positions. But when we find out that these crimes actually killed
people, we do not even apologize.’[37] Hence, the extent of Muslim responsibility for
terrorism, and the need to stop the funding streams that support it are also operationalised as
metrics. Although this is a weaker theme, measures of progress therefore look inwards to the
political and civil responsibility of Arabs and Muslims, as well as outward to American and
Israeli policy.
19
December 2013
PERSPECTI VES O N TERRORISM
Volume 7, Issue 6
There is a paradox in that the US is generally depicted as wishing to ‘consolidate its hegemony
over world affairs as the sole superpower’, [39] but in so doing further degrades its image in
the Arab world. The implication is either that the US cares little for its public perception,
prioritising power over popularity, or that ‘the regnant American ideology is still undergirded
by the view that U.S. power is fundamentally benign and altruistic.’[40] Ultimately, the impact
of Iraq on the regional political situation is seen as a ‘further weakening of the region’s States
and creating better circumstances for the American’s attempt to nibble at the region’s
fringes.’[41]
According to one assessment of the ability of militant groups to organise and recruit: ‘the overt
wars in Afghanistan and Iraq and the covert wars in Pakistan, Somalia and Yemen are mostly
inflaming anger and providing new recruits for al-Qaeda and its mutations, making
intelligence gathering and ‘terror prevention’ ever more impossible.’[43] Assessed by levels of
geopolitical stability: ‘Iran is on the verge of creating a nuclear bomb, China is protecting
Sudan, Russia is backing Syria, Hamas is occupying a third of the new Palestine, Iraq is in the
hands of extremist religious figures and Al Qaeda is present all over the world.’[44] And
measured by the amount of terrorism: ‘[e]ver since the US declared a war against terror, the
phenomenon has been on the rise, not the decline, and the number of suicide operations has
grown by many times over. The war on terror has failed and this failure will continue because
the US is not treating the causes. Instead, the US has helped the phenomenon expand.’[45]
20
December 2013
PERSPECTI VES O N TERRORISM
Volume 7, Issue 6
In the Arab world, there is no heritage of freedom, but there is a long heritage of
inflexibility and misuse of state violence. That is why respecting the human, his
rights and freedoms were priorities of any political reform. … As long as America’s
primary ‘interest’ is fighting terrorism, it will be ready to bargain with reform.[47]
Abu Ghraib, Guantanamo, extraordinary rendition and torture are all cited as examples of
America’s failure in the GWOT. Through these abuses, America provides ‘a model for Israel’s
indiscriminate violence against civilians, and its breach of international humanitarian law …
[because] When the world’s superpower creates conditions of international anarchy by
destroying the checks and balances of the international system, lesser powers feel free to
follow suit.’[48] Conversely, positive progress would see: ‘the restoration of the right moral
authority to the world that holds the dignity of human life in the highest esteem.’[49] On the
international stage, the failure to do so is presented as degrading US capital in the world,
reducing the chances of long-lasting peace, and at the national level is considered likely to
increase the gaps between communities, ultimately working in the militant’s favour.
Discussion
The GWOT has been described as a ‘macro-frame’ within which the political debate takes
place.[50] Although both Arab and Western media critique the GWOT concept, no alternative
paradigm competes with it as an organising construct, remaining the predominant frame by
which the actions of a diverse array of agents, identity groups and causes are understood. The
GWOT therefore comes to be described as an ‘Orwellian nightmare, an ill-defined conflict
with a fractious group of terrorists that seems to be ever-escalating.’[51] Many of these issues
demonstrate the well-worn debate over declaring war against a tactic, as one journalist puts it:
‘President Franklin Roosevelt … did not declare a war against U-boats and kamikaze
pilots.’[52] Consequently, the GWOT construct comes to be portrayed as damaging to the
project it set out to encapsulate. Reflecting this, it became a contested term, its increasingly
problematic nature marked in journalistic discourse by surrounding it in quotation marks,
putting it in italics or adding prefixes such as the ‘so-called’ War on Terror. Despite this, both
21
December 2013
PERSPECTI VES O N TERRORISM
Volume 7, Issue 6
sets of media operate within the GWOT framework, developing distinct discourses in the
metrics they set out, and making different issues about the character and reasons for the war
salient. This is important as the audience sees ‘what the system and frames within them allow
us to see’ [53] through a press which mediates between social and political actors and the
public.[54]
Although the GWOT came to comprise multiple conflicts, [55] it began with an act of
terrorism. In response, the US government had a range of options – political and diplomatic
initiatives, economic measures, overt military action, covert operations, and law enforcement.
[56] All of these ‘instruments of statecraft’ are represented in the GWOT. However, Western
and Arab media give different priorities to these various approaches in their discussion of
success and failure. For the Western media, the conflict was a confrontation with a global
‘phantom enemy’ waged through covert and overt military operations, alongside a public
relations effort. For the Arab media, the GWOT was an extension of US power and a result of
social, political and economic ‘root causes’, implying political and diplomatic responses.
These differing ideas about the nature of the war are reproduced in the measures used to assess
progress, and importantly, reflect different concepts of victory. The American government
approach was predominantly militaristic, something echoed in the Western media.[57] Hence,
metrics of violent conflict are the most common way of understanding success and failure in
the Western press, and resonate in the war of ideas and the battle for hearts and minds.
Achievement against these measures lies in the audience accepting that a military response to
9/11 was appropriate, and that with success will come the ‘hearts and minds’ of Muslim, Arab,
and Western audiences. ‘Winning’ therefore involves US military victory on a global scale,
alongside the acceptance of an assertive American power, able to attract public support for its
version of global governance. In focusing on the social, political and economic aspects of the
conflict, the Arab media instead concentrate on the perceived causes of terrorism and longer-
term solutions. In this construction, a positive outcome involves tackling important socio-
political issues, including the Israel-Palestine conflict and American military interventionism.
Nevertheless, despite conceptualising success and failure in very different ways, both sets of
media normalise the GWOT as an organising framework. In so doing, they produce and
reproduce particular discourses about the nature of the conflict that embed boundaries
between widely dispersed identity groups. For example, Mona Makram Obeid, writing in Al
Hayat suggested that ‘the U.S. under the current administration seems to be dividing the
world in two: the civilized world and the developing world (the other world) that should be
changed by force, without any consideration for the value of cultural specificities.’[58] Whilst
Roger Hardy for the BBC argued that ‘[w]hile coping with Muslim suspicion of the West, the
president also has to deal with the other side of the coin – Western suspicion of Islam. Many
still believe that what’s under way is a clash of civilisations.’[59]
In their construction of the conflict, the media frame their audience’s experience of events and
normalise particular sets of responses. As Richard Jackson argues ‘the language of the ‘war on
22
December 2013
PERSPECTI VES O N TERRORISM
Volume 7, Issue 6
terrorism’ normalises and reifies the practice of the ‘war on terrorism’’ (italics in original).[60]
Culturally and politically bound, [61] Arab and Western media perspectives naturalise US
policy in the GWOT, but in crucially different ways. The Western media normalise military
conflict as a largely appropriate response given the existential threat from a globalised enemy,
and the concomitant need to protect the homeland. The Arab media naturalise these same
responses as a by-product of American desire to assert its global power and secure the
resources and political capital that go with it. In this way, it is possible to see how particular
attributes of the actors come to be associated with specific issues: US hegemony with violent
conflict and occupation, and international terrorism with the need to assert global power and
increase military reach.
Comparative interpretations across such a range of diverse and dynamic sources are bound to
neglect important nuance and context. However, in examining the way Western and Arab
media conceptualised metrics of success and failure in the years when the GWOT paradigm
was at its most salient, this article has demonstrated not only that different sources construct
different metrics, but also that they develop different notions of success and failure. Through
this, they come to normalise the US response to international terrorism by seeing the GWOT
as either a military or a geo-political confrontation. Above all else, this analysis demonstrates
the power of the ‘Global War on Terror’ as an organising framework by which an array of
actors’ behaviour is interpreted and contextualised.
About the Author: Sarah Marsden is a Lecturer in Terrorism Studies at the Handa Centre for
the Study of Terrorism and Political Violence, University of St Andrews. Her current work
examines the social and political outcomes of terrorism, considering both its ineffectiveness, and
exploring why individuals and militant groups move away from violence.
23
December 2013
PERSPECTI VES O N TERRORISM
Volume 7, Issue 6
Support for this research was provided by the Department of Homeland Security, Science and
Technology Directorate, through the National Consortium for the Study of Terrorism and
Responses to Terrorism (START). Any opinions, findings, and conclusions or recommendations in
this document are those of the authors and do not necessarily reflect the views of the Department
of Homeland Security. The author would like to thank Rashmi Singh for her support in the
preparation of the paper, and Daniel Stojanovski for his valuable work compiling the data on
which this analysis is based.
Notes
[1] Cottle, S. (2006). Mediatizing the Global War on Terror: television’s public eye. In A. P. Kavoori and T. Fraley, (Eds.), Media, terrorism, and
theory: a reader, (pp. 19-48). Lanham, MA: Rowman and Littlefield Publishers Inc.
[2] Heibert, R. E. (2003). Public relations and propaganda in framing the Iraq war: a preliminary review. Public Relations Review, 29, (3),
243-255.
[3] Zawahiri famously stated that ‘We are in a battle, and more than half of this battle is taking place in the battlefield of the media. . . .[W]e
are in a media battle for the hearts and minds of our Umma.’ (July, 2006). See Payne, K. (2009). Winning the battle of ideas: propaganda,
ideology, and terror. Studies in Conflict and Terrorism, 32, (2), 109-1128.
[4] See, for example: Lewis, J. (2006). Language wars: The role of media and culture in global terror and political violence. Chippenham: Pluto
Press; van der Veer, P. and Munchi, S. (Eds.) (2004). Media, war and terrorism: Responses from the Middle East and Asia. London: Routledge.
Jackson, R. (2005). Writing the war on terrorism: Language, politics and counter-terrorism. Bath: Manchester University Press. DiMaggio, A. R.
(2008). Mass media, mass propaganda: Examining American news in the ‘War on terror.’ Lanham MD: Lexington Books.
[5] Braun, V. and Clarke, V. (2006). Using thematic analysis in psychology. Qualitative Research in Psychology, 3, 77-101.
[6] (Miles & Huberman, 1994).
[7] Groseclose, T. and Milyo, J. (2005). A measure of media bias. The Quarterly Journal of Economics, CXX, (4), 1191-1237.
[8] The range of analogies applied are just one indication of this, ranging from the Cold War, the Vietnam War and World War II, as well as
efforts to paint the GWOT as an entirely ‘new war’: ‘[t]here are no historical precedents, no flattering parallels with Churchill or JFK that can
be readily appropriated now. We have to figure this one out for ourselves.’ (italics added). Judt, T. (2002, October, 20). The wrong war at the
wrong time. The New York Times. Retrieved from: http://www.nytimes.com/2002/10/20/opinion/the-wrong-war-at-the-wrong-time.html
[9] Kelly, M., (2001, 10 October). With a serious and large intent. The Washington Post. Retrieved from: http://docs.newsbank.com/s/
InfoWeb/aggdocs/UKNB/0EF1091707520A89/0F8BFF68D3921800
[10] Cole, D. and Lobel, J., (2007, 18 November). Are we safer?: A report card on the war on terror. Los Angeles Times. Retrieved from: http://
www.latimes.com/media/acrobat/2007-11/33860990.pdf
[11] Corera, G., (2004 28 September). Analysis: does Bin Laden still count? BBC. Retrieved from: http://news.bbc.co.uk/1/hi/world/
3688282.stm
[12] Benjamin, D. and Simon, S., (2005, 3 October). How not to win the war on terror. Los Angeles Times. Retrieved from: http://
articles.latimes.com/2005/oct/03/opinion/oe-benjamin3
[13] Hirsch, M., (2005, 11 September). 9/11-and counting: four years in, no clear plan. The Washington Post. Retrieved from: http://
www.washingtonpost.com/wp-dyn/content/article/2005/09/09/AR2005090902473.html
[14] Corera, G., (2004, 24 November). War on terror ‘vanishes from agenda.’ BBC. Retrieved from: http://news.bbc.co.uk/1/hi/world/
americas/4034833.stm
[15] Hirsch. 9/11 and counting. Op .cit.
[16] Benjamin and Simon. How not to win. Op. cit.
[17] BBC, (2006, 17 February). ‘US losing media war to al-Qaeda.’ BBC. Retrieved from: http://news.bbc.co.uk/1/hi/world/americas/
4725992.stm
[18] Benjamin, D., (2003, 11 September). Two years later, is terror still spreading?: We need an antidote for a Muslim ideology that breeds
ever more radicalism. Los Angeles Times. Retrieved from: http://articles.latimes.com/2003/sep/11/opinion/oe-benjamin11
[19] McManus, D., (2006, 10 September). Is the U.S. winning this war? Los Angeles Times. Retrieved from: http://articles.latimes.com/2006/
sep/10/nation/na-terror10
[20] Reynolds, P. (2006, 8 September). ‘War on terror’ loses clear direction. BBC. Retrieved from: http://news.bbc.co.uk/1/hi/world/americas/
5319522.stm
[21] Danner, M., (2005, 11 September). Taking stock of the forever war. The New York Times.
24
December 2013
PERSPECTI VES O N TERRORISM
Volume 7, Issue 6
[22] Ignatieff, M., (2004, 2 May). Lesser evils. The New York Times. Retrieved from: http://www.nytimes.com/2004/05/02/magazine/lesser-
evils.html?scp=21&sq=%22war+on+terror%22+al+qaeda&st=nyt
[23] Frantz, D., Meyer, J., Rotella, S. and Stack, M. K., (2004, 26 September). The new face of al Qaeda: Al Qaeda seen as wider threat. Los
Angeles Times. Retrieved from: http://articles.latimes.com/2004/sep/26/world/fg-qaeda26
[24] Bergen, P., (2006, 2 July). Al-Qaeda, still in business. The Washington Post. Retrieved from: http://www.washingtonpost.com/wp-dyn/
content/article/2006/06/30/AR2006063001342.html
[25] Hardy, R. (2005, 24 November). Bush war critics find their voice. BBC. Retrieved from: http://news.bbc.co.uk/1/hi/world/middle_east/
4467042.stm
[26] Hirsch. 9/11 and counting. Op. cit.
[27] LA Times Editorial Board (2007, 11 September). What we’ve lost. Los Angeles Times. Retrieved from: http://www.latimes.com/news/
opinion/la-ed-war11sep11,0,5040527.story
[28] Ignatieff. Lesser evils. Op. cit.
[29] Khouri, R.G., (2008, 10 September). Intemperance keeps terrorism alive. Al Arabiya. Retrieved from: http://www.alarabiya.net/
save_pdf.php?cont_id=56346
[30] El-Khazen, J. (2009, 23 April). The noose is tightening. Al Hayat. Retrieved from: http://www.daralhayat.com/archivearticle/293640
[31] BBC Monitoring, (2001, 8 October). Regional media coverage in wake of attacks. BBC Monitoring Research.
[32] Alhomayed, T. (2005, 22 July). Muslims speak out! Asharq Alawsat, Retrieved from: http://www.asharq-e.com/news.asp?
section=2&id=921
[33] Al Faqi, M. (2004, 16 November). The United States and Islam. Al Hayat.
[34] Ramkumar, K. S., Haider, S., Ali Kahn, G., Ba-Isa, M. and Sharawi, M., (2001, 8 October). Let’s hope sanity will prevail. Arab News.
Retrieved from: http://archive.arabnews.com/?page=1§ion=0&article=9669&d=8&m=10&y=2001
[35] Khouri. Intemperance keeps terrorism alive. Op. cit.
[36] Al Arabiya, (2005, 20 September). Lebanon’s Lahhud thankful over Al-Hariri probe in UN speech. Al Arabiya, via BBC Worldwide
Monitoring.
[37] Al Ziabi, J., (2004, 14 October). Partners in terrorism. Al Hayat.
[38] Badrakhan, A. (2002, 28 November). A losing bet. Al Hayat.
[39] Al Rimawi, M. (2003, 28 January). What comes after the war? Al Hayat.
[40] Said, E. W., (2003, 14 April). A stupid war. Al Hayat.
[41] Iskandar, A. (2006, 11 September). 9/11 and Iraq. Al Hayat. Retrieved from: http://www.daralhayat.com/archivearticle/242013
[42] Ramkumar et al. Let’s hope sanity will prevail. Op. cit.
[43] Bishara, M., (2009, 31 December). Neither wars nor drones. Al Jazeera. Retrieved from: http://english.aljazeera.net/focus/imperium/
2009/12/20091231125821208452.html
[44] Al Rashed, R. (2008, 30 October). Condoleeza: the Middle East is a better place? Asharq Alawsat, Retrieved from: http://www.asharq-
e.com/news.asp?section=2&id=14571
[45] El-Khazen, J., (2005, 28 November). America and the War on Terror. Al Hayat. Retrieved from: http://www.daralhayat.com/
archivearticle/240029
[46] Badrakhan, A. (2003, 12 September). Reproducing terrorism. Al Hayat. Retrieved from: http://www.daralhayat.com/archivearticle/
237811
[47] Badrakhan, A. (2004, 19 February). Reform and terrorism. Al Hayat.
[48] Seale, P. (2006, 4 August). Israel and the US are losing the three-front war. Al Hayat. Retrieved from: http://www.daralhayat.com/
archivearticle/123873
[49] Shobokshi, H. (2007, 26 March). Four years of stupidity. Asharq Alawsat, Retrieved from: http://www.asharq-e.com/news.asp?
section=2&id=8442
[50] Reese, S. D. (2006). The framing project: a bridging model for media research revisited. Journal of Communication, 57, 148-154.
[51] Hirsch. 9/11 and counting. Op. cit.
[52] Bergen, P. (2009, 8 January). Commentary: how Bush botched the war on terror. CNN. Retrieved from: http://edition.cnn.com/2009/
WORLD/meast/01/07/bergen.war.terror/index.html
[53] Reese, S. D. and Lewis, S. C. (2009). Framing the war on terror: the internalization of policy in the US press. Journalism, 10, (6), 777-797.
[54] Strömbäck, J. (2008). Four phases of mediatisation: an analysis of the mediatisation of politics. The International Journal of Press/Politics,
13, (3), 228-246.
25
December 2013
PERSPECTI VES O N TERRORISM
Volume 7, Issue 6
26
December 2013
PERSPECTI VES O N TERRORISM
Volume 7, Issue 6
Abstract [1]
Following the Sri Lankan Government’s military defeat of the internationally proscribed terrorist
organisation, the Liberation Tigers of Tamil Eelam (LTTE) in May 2009, Sri Lanka embarked on
an essential and long-term twofold post-conflict strategy: (i) rehabilitation and reintegration of
former LTTE combatants, and (ii) the rebuilding of the conflict-affected Tamil communities of the
Northern and Eastern Provinces. The rehabilitation program was by many counts a success, with
demonstrated cognitive transformation in attitudes and behaviour of most of the (formerly)
radicalised combatants. Reconciliation initiatives were implemented to fulfill the urgent social,
political, and economic needs of the conflict-affected communities of the North and East. These
reconciliation efforts continue to be implemented and comprise different measures taken in: (1)
resettlement and humanitarian assistance, (2) reconstruction of key transport, economic, health,
and social infrastructure for reintegration, (3) political engagement, and (4) various types of
peace-building work. Sri Lanka’s post-conflict strategy adopts a holistic approach, seeking the
contribution of the public sector, private sector, community organisations, international
organisations, NGOs, and private individuals from different segments of society in Sri Lanka.
However, despite the many effective state-led and other reconciliation efforts undertaken by Sri
Lanka, the author is able to present a number of recommendations to the government of Sri
Lanka to overcome shortcomings in the rehabilitation and reconciliation programs adopted, as
well as other challenges faced by Sri Lanka, such as the relentless disinformation campaign
against the Sri Lankan state pursued by the remnant LTTE cells surviving internationally. To
understand the complex nature of the Sri Lankan conflict and the skillful disinformation
campaign pursued against the Sri Lankan state by the LTTE’s transnational network, a
comprehensive introduction is provided as a part of this article.
Introduction to the Post-Conflict Circumstances and History of the Sri Lankan Conflict
The three decades long “Sri Lankan conflict” came to a conclusive end in May 2009, following
the military defeat of the Liberation Tigers of Tamil Eelam (LTTE), also known as the Tamil
Tigers, an internationally proscribed terrorist organisation. The LTTE was notorious for its
vile terror tactics such as the use of suicide bombers in carrying out attacks on civilians and
the country’s leadership[2], the abducting of children for recruitment as child soldiers[3],
forced money collection from Tamils with threats to life in case of non-compliance[4], attacks
on the country’s economic infrastructure such as the Central Bank of Sri Lanka and the only
international airport, “ethnic cleansing” of Sinhalese and Muslims from the North and East of
Sri Lanka[5],the assassination of Indian Prime Minister Rajiv Gandhi, the assassination of Sri
Lankan President Ranasinghe Premadasa, the systematic assassination of more than 40
27
December 2013
PERSPECTI VES O N TERRORISM
Volume 7, Issue 6
It is instructive to explore these grave allegations briefly, so that some very effective
reconciliation measures adopted by the Sri Lankan state can be appreciated fully. The number
of civilian causalities in the last phase of the war presented by different sources varies greatly.
Fundamentally, the civilian casualty figure of the Sri Lankan war remains unknown.[11]
Gordon Weiss, a former United Nations official in Sri Lanka, estimated 7,000 civilian deaths in
2009, but this figure was not accepted by Sir John Holmes, the then UN Under-Secretary
General for Humanitarian Affairs and Emergency Relief Coordinator, who said this figure was
“unverified and unreliable”.[12] The United States government had received information from
an unnamed organisation that 6,710 people - civilians and LTTE combatants - had died from
January 20 to April 20, 2009.[13] Sri Lanka’s Defence Seminar 2013 revealed that the civilian
death toll is likely to have been between 2,000 and 3,000 in the final phase of the war in May
2009.[14]
The two “leaked” United Nations internal reports, the Darusman Report in March 2011 and
the Petrie Report in November 2012, claimed 40,000 civilian casualties and 70,000 individuals
“unaccounted for”. Both gained much media attention. No sources were named in these
reports to substantiate this very high number of civilian casualties.[15] Sri Lanka views these
two documents as unjust in their treatment of the Sri Lankan conflict and unsubstantiated in
their content.[16] An article of the British newspaper The Guardian noted that, “….privately,
UN staff admitted they were puzzled by the methodology used to achieve the new death toll”,
and that one official stated that “Someone has made an imaginative leap and that is at odds
with what we have been saying before…It is a very dangerous thing to do to start making
extrapolations.”[17] Sri Lanka is also plagued by the call by the United Nations Human Rights
28
December 2013
PERSPECTI VES O N TERRORISM
Volume 7, Issue 6
Given the fact that the LTTE was a despotically run militant organisation[19] that directly
threatened the sovereignty of Sri Lanka and the security of its people, the Sri Lankan
government asserts that these views do not take into account the “principles of self-defence or
reasonableness of retaliation, proportionality, or a technical analysis of the trajectories of the
shells allegedly fired, to determine their source.”[20] It also has to be kept in mind that the
LTTE was the only guerrilla-cum-terrorist group in the world which had an infantry
(“Military”, which included an elite fighting wing and the “Black Tigers” suicide commando
unit), a maritime wing with a shipping fleet (“Sea Tigers”), an air wing (“Air Tigers”), a highly
secretive intelligence group (“Snow Tigers”[21]), as well as international political and
procurement offices.[22]
The British television station “Channel 4” produced three documentaries in 2011, 2012, and
2013[23] which include video footage of the victims of the Sri Lankan war, among them
children and patients in hospitals, from the final phase of the war. It is conspicuous that these
reports do not explain that the LTTE deliberately used civilian posts such as hospitals and
schools to operate heavy weaponry during the final phases of the war.[24] These videos
contain evidence of manipulation such as upside-down editing, sequences being reversed, and
individuals likely to be LTTE combatants being depicted as members of the Sri Lankan Army.
[25] These Channel 4 productions have also been accused of “mix[ing] footage with comment
from unnamed sources with distorted voices and shadowed faces” and that the commentaries
were “intemperate and partisan, and it was all held together by assumptions.”[26] Jacques de
Maio, Head of Operations for South Asia for the International Committee of the Red Cross
(ICRC), stated that, “the LTTE had tried to keep civilians in the middle of a permanent state of
violence. It saw the civilian population as a ‘protective asset’ and kept its fighters embedded
amongst them.”[27] In 2011, the Sri Lankan government stated that, “it was impossible in a
battle of this magnitude, against a ruthless opponent actively endangering civilians, for civilian
casualties to be avoided.”[28]
News reports of alleged torture, such as the British Broadcasting Corporation (BBC)’s “Tamils
still being raped and tortured in Sri Lanka” by Frances Harrison (November 9, 2013)[29], have
also been produced and circulated internationally. In the Frances Harrison video report,
twelve people, including former LTTE combatants, are identified as victims of torture and
rape. Their faces are shown, but names are withheld. The Sri Lankan High Commission in the
United Kingdom has made a statement in response, saying that: “...It is not fair to ask for a
response on claims based on anonymous testimony,” the individuals who claimed to be
victims were likely “paid to discredit Sri Lanka” and are likely to have been tortured by the
LTTE in the past. The Sri Lankan government has firmly refuted that it has engaged in
systematic torture and rape or deliberate targeting of civilians during or after conflict, and
asserts instead that members of the LTTE have fabricated testimonies to seek asylum in
Western countries[30].[31].
29
December 2013
PERSPECTI VES O N TERRORISM
Volume 7, Issue 6
It seems that the Sri Lankan government may be battling a propaganda war conceptualised by
LTTE elements surviving abroad. It has been assessed that “the LTTE international
propaganda war is conducted at an extremely sophisticated level.”[32] In order to counter the
LTTE’s “propaganda war effort”[33], diplomats and politicians of the Sri Lankan state have
only relatively recently begun to appeal to foreign governments and expatriate Sri Lankans,
including politically mainstream Tamils, in an effort to project ground realities in Sri Lanka
and expose the systematically propagated disinformation campaign of the LTTE. Presently, the
LTTE primarily exists overseas in the form of the Nediyavan faction (“Oslo group”)[34], Joe
Emmanuel faction (“London group”: Global Tamil Forum and British Tamils Forum)[35],
Rudrakumaran faction/ Transnational Government of Tamil Eelam (“New York group”) [36],
and Vinyagam faction (“Brussels group”)[37].[38] The LTTE has a presence in 44 countries
outside Sri Lanka, with established structures in twelve of them.[39] Some of the most active
pro-LTTE lobby groups are located in Canada, the United Kingdom, Norway, United States,
Switzerland, and France.[40] Pro-LTTE front organisations exist also in India, Germany, and
Australia, corresponding to the large number of diaspora Tamils that have settled in the
respective countries.[41] The Tamil diaspora provided the LTTE with approximately US $300
million a year[42]; 90-95% of the LTTE’s funds in Sri Lanka came from overseas.[43]
However, despite the LTTE’s powerful disinformation campaign, issues of civilian casualties
and incidents of torture are grave allegations that call for an immediate response by the Sri
Lankan authorities. Although Sri Lanka’s government is indignant about unscrupulous
reporting, to dismantle false narratives and work towards a sustainable peace for Sri Lanka, it
must strive to adopt a strategic public relations campaign to portray an accurate depiction of
the end phase of the conflict to international audiences. Investigation into allegations is
paramount also so that perpetrators of violence, such as rape and torture, can be prosecuted.
Like in Pakistan, Kashmir, Afghanistan, and Iraq, isolated cases of atrocities by government
forces are likely to have occurred in Sri Lanka as well.
The many facets of the Sri Lankan conflict make its contextualisation complex.[44] This is due
to the protracted nature of the LTTE terrorist insurgency, the LTTE’s international network,
the ancient, pre-colonial, and colonial history of Sri Lanka, domestic political and social
developments in the past 40 years, and the nature of international politics.
The post-colonial grievances of the Sinhalese preceded those of the Tamils. The British pre-
independence support of Christianity and the English language[45] had led to the powerful
state sector being dominated by the urban class of English-educated Christian Tamils and
Burghers[46], as well as Christian Sinhalese in Colombo during colonial rule.[47] Under
British colonial rule, English-language medium level schools were also established in
Jaffna[48] by the British administration and were thus attended by the Tamils in Jaffna.[49]
However, 95% of the then 6.6 million Sinhalese population lived away from Colombo and
were educated in Sinhalese.[50] Most of the Sinhalese were thus prevented from obtaining
white-collar jobs in the state sector, for example, civil service entrance examinations were
conducted only in English. As a consequence of the British colonial administration’s “divide
30
December 2013
PERSPECTI VES O N TERRORISM
Volume 7, Issue 6
and rule” tactic, the Sri Lankan Tamils were also treated as a “majority community” and given
equal (not proportionate) political representation to the Sinhalese during British colonial
times[51] – despite the fact that they accounted for only 12% of the country’s population while
the Sinhalese accounted for 70% of the population.[52] Being the majority and having
functioned in a Sinhala-Buddhist social context for millennia, the Sinhalese were less inclined
to adopt English as their first language or Christianity as their religion.
The Sinhala-Only state policies triggered a wave of Tamil aspirations for a separate state. There
grew a Tamil militant underground movement supported by Tamil youth, collectively known
as the Tamil Tigers.[57] The Liberation Tigers of Tamil Eelam (LTTE)[58] led by Velupillai
Prabhakaran was founded in 1972, and was the most dominant among the several separatist,
mostly militant, groups that existed at the time.[59] The LTTE was responsible for the killing
of the (Tamil) Mayor of Jaffna in 1975, a supporter of the SLFP mainstream political party.[60]
The 1977 elections made J. R. Jayawardene of the United National Party (UNP) the head of
government. The Tamil United Liberation Front (TULF) was the largest oppositional party in
parliament at the time. Jayawardene changed the constitution in 1978, replacing the
parliamentary government with a presidential system.[61] The 1978 Constitution included
substantial provisions for Tamils in an effort to secure peace, by giving Tamil the status of a
national language and allowing Tamil to be used in administration and education at several
levels, abrogating the Standardisation Policy which had made it more difficult for Tamil
students to enter university, offering top positions in government to Tamils including Minister
of Justice, and calling for an All-Party Conference to resolve the country’s ethnic tensions.[62]
However, the Tamil Tigers increased their terrorist attacks on the Sinhalese civilian population
in their call for a separate state, which led to Sinhalese counterattacks against Tamils, and
served to put a halt to any negotiations through an All-Party Conference.[63]
In 1983, the most gruesome ethnic riots erupted leading to the deaths of hundreds if not
thousands of Tamils in Colombo by the hands of organised Sinhalese extremist gangs.[64] The
31
December 2013
PERSPECTI VES O N TERRORISM
Volume 7, Issue 6
Sinhalese mob violence began as a reaction to the ambush of a Sri Lankan Army patrol in
Jaffna by the LTTE, which killed thirteen Sinhalese soldiers.[65] The nature of the atrocities
was extremely savage.[66] Similar atrocities were inflicted on the Sinhalese who lived in Tamil
areas.[67] Approximately 150,000 Tamils fled Sri Lanka after the (Black) July 1983 ethnic riots,
[68] forming the Tamil diaspora (presently numbering approximately 800,000 people[69]).
Meanwhile, between 1977 and 1987, the LTTE took control over the Northern areas by
fighting the Sri Lankan Army and murdering any Tamils who opposed them – killing many
more Tamils in this process than the (predominately Sinhalese) Sri Lankan Army.[70] The
LTTE’s first terrorist attack was carried out in 1987 with a suicide bombing at a Sri Lankan
Army camp in Jaffna, which killed 40 members of the Sri Lankan security forces.[71] The
LTTE’s first terrorist attack against civilians occurred in 1984, targeting civilian settlements at
Dollar Farm and Kent Farm in Jaffna, killing 62 civilians, including women and children.[72]
The LTTE has carried out about 400 suicide attacks between 1987 and 2009, killing hundreds
of civilians and injuring many more.[73] Between February 2002 to April 2007, the LTTE
violated ceasefire agreements 3,830 times, while the Sri Lankan government (in turn) violated
ceasefire agreements 351 times.[74]
Although there was a consensus among Sri Lankan Tamils in the 1970s and 1980s regarding
the creation of a separate state for Tamils, the majority of the Tamils living in Sri Lanka have
relinquished the separatist agenda, as state policies have changed significantly during the past
40 years, with no overtly ethnically discriminatory state policies currently in place. Most
Tamils in Sri Lanka also renounced their support for the Liberation Tigers of Tamil Eelam
(LTTE) insurgency due to the increased use of terror tactics.[81] Supporters of the LTTE live
mainly outside of Sri Lanka, as described above. These include Tamils that left Sri Lanka
during the past 50 years due to the change in the language policy, ethnic riots during the 1950s
and the early 1980s, as well as for economic reasons. One common factor that binds these
individuals is that they harbour painful memories of Sri Lanka, which has grown into a hatred
32
December 2013
PERSPECTI VES O N TERRORISM
Volume 7, Issue 6
for the government, irrespective of constructive domestic political and social progress. LTTE
cells overseas and supportive diaspora groups continue to call for a separate state within the
island’s land mass. However, there is a second, smaller group of Tamils living outside of Sri
Lanka, who politically oppose the LTTE. This group is most prominent in London (which
includes the Expatriate Tamil Association); it holds regular demonstrations against the LTTE
there.[82]
It is also crucial to understand the historical and cultural realities of Sri Lanka.[83] Due to its
history as a trading centre since ancient times, Sri Lanka’s culture has been described as having
a “strong cosmopolitan flavour” and “multicultural ethos”[84].[85] To illustrate, two of the
major religious sites of Sri Lanka, Sri Padha/ Adam’s Peak[86] and the Katharagama temple,
are sacred to followers of several faiths at once; the former for the Buddhists (who are
Sinhalese), the Hindus (who are Tamil), and the Muslims (who are ethnic Moors and others),
and the latter for the Buddhists and the Hindus.[87] Pilgrims of the different religions/
ethnicities have always visited these sites side by side in mutual respect. Further, the Sinhalese
and Tamils (and other ethnic groups) lived peacefully in the country throughout the years of
conflict (except for some border Sinhalese villages which the LTTE regularly attacked and
raided, killing and torturing the villagers in the process[88]). It is notable that there were no
incidents of communal violence against Tamils by the Sinhalese, despite the LTTE’s regular
terrorist attacks targeting the Sinhalese civilian population since 1984.[89] Hence, the post-
colonial ethnic riots of the 1950s and 1980s seem a stark aberration to the traditionally
harmonious ethnic relations between the majority of Sri Lankans.
Sri Lanka has suffered tremendously between 1983 and 2009, and pronouncedly so due to
systematic terrorist attacks targeting civilians and, during the final phase of the war, when
many civilians were trapped in gunfire. Altogether, more than 70,000 lives were lost over the
three decades of conflict[90] - a figure that is not disputed. The Sri Lankan government must
make every effort to heal these wounds, especially of those who suffered the most as a
community, the conflict-affected, predominately Tamil population in the north. While much
remains to be done, it is also apparent that the Sri Lankan government is making strides in its
efforts to rebuild the war-torn country.
This article seeks to describe some of the bold and hopefully enduring steps taken by the Sri
Lankan government through a twofold post-conflict strategy: (I) restorative justice for former
LTTE combatants, and (II) rebuilding of the conflict-affected, predominantly Tamil
communities living in the Northern and Eastern Provinces. Sri Lanka’s post-conflict strategy
has also embraced a holistic approach to national reconciliation by seeking the contribution of
the private sector, community organisations, international organisations, NGOs, as well as
private individuals from different segments of society in Sri Lanka. In September 2013, during
the 24th Session of the UN Human Rights Council (UNHRC), many UNHRC member
states[91] commended the significant progress made by the Sri Lankan government in the
areas of rehabilitation, resettlement, resolution of land issues, demining, livelihood
development, and issues of accountability.[92]
33
December 2013
PERSPECTI VES O N TERRORISM
Volume 7, Issue 6
34
December 2013
PERSPECTI VES O N TERRORISM
Volume 7, Issue 6
and other resources made by the United Nations International Organisation for Migration
(IOM), UNICEF, international NGOs, several Western and other governments, local NGOs,
and Sri Lankan private sector organisations.
Several United Nations and humanitarian agencies, notably the IOM and HALO Trust,
assisted the Sri Lankan government in the rehabilitation of former combatants through a
Disarmament, Demobilization and Reintegration program (DDG) in 2009, as well as in the
resettlement of internally displaced persons (IDPs). The IOM, trusted by the Sri Lankan
government, had access to IDP welfare and rehabilitation centres throughout the combatant
rehabilitation process.[104]
The components of the Sri Lankan “6+1 Model” rehabilitation program included: (1)
Educational Rehabilitation, (2) Vocational Rehabilitation, (3) Psychosocial and Creative
Therapies for Rehabilitation, (4) Social, Cultural, and Family Rehabilitation, (5) Spiritual and
Religious Rehabilitation, (6) Recreational Rehabilitation, and (+) Community Engagement.
An aftercare system was also put in place for the rehabilitees who required livelihood support
once the rehabilitation program was completed. This was in the form of guaranteed wage
employment in the newly established Civil Defence Force and Navy Coastguard in the
government sector, or support for self-employment through micro-finance facilities and
business support services.
The rehabilitation program in Sri Lanka was led by two internationally experienced Sri
Lankan psychologists, Malkanthi Hettiarachchi and Peshali Fernando[105]. It was designed
according to the rehabilitation model developed by Singapore’s International Centre for
Political Violence and Terrorism Research(ICPVTR).[106] The research staff from ICPVTR
which included experts in rehabilitation from the Religious Rehabilitation Group (RRG) of
Singapore, assisted the Sri Lankan government in designing and implementing its
rehabilitation program from October 2009 onwards.[107] However, the rehabilitation
program was “indigenised” to suit the Sri Lankan culture.[108] The IOM provided crucial
technical assistance for the vocational rehabilitation and reintegration programs. It also
facilitated study tours for relevant Sri Lankan government officials to study the rehabilitation
programs in Colombia.[109]
The components of the Sri Lankan “6+1 Model” rehabilitation program are described in detail
in an article entitled “Sri Lanka’s Rehabilitation Program: A New Frontier in Counter-
terrorism and Counter-insurgency”, recently published in PRISM: Journal of the Centre for
Complex Operations by Malkanthi Hettiarachchi[110], lead psychologist of Sri Lanka’s
rehabilitation program. Some details relating to the components of the rehabilitation program
provided in the following paragraphs are based on the PRISM article.
35
December 2013
PERSPECTI VES O N TERRORISM
Volume 7, Issue 6
education was also provided, as 10 - 25% of adult beneficiaries could not read and write in the
Tamil language, and the majority did not understand Sinhala or English.
A major component of the Psycho-social and Creative Rehabilitation program was the in-
house counseling provided to beneficiaries. The Centre staff was trained in psychological
counseling and advanced psycho-social skills by a clinical psychologist, a counseling
psychologist, counselors, therapists, and other professionals in psychology. The Mentorship
Program was a part of the Psycho-social Rehabilitation program, in which well-respected
persons of the Sri Lankan Tamil community acted as mentors for the beneficiaries. Creative
therapies, known to have a healing effect on many, helped many beneficiaries to express their
inner thoughts and feelings through artistic means.
Social, Cultural, and Family Rehabilitation included social and educational tours to different
parts of Sri Lanka to gain an understanding of the diversity within the island. These included
visits to universities, schools, and other developments in Colombo, the ethnically diverse
commercial capital of Sri Lanka.[111] Family Rehabilitation consisted of visits by family or
next of kin in a friendly atmosphere conducive to rehabilitation, writing and receiving of
letters, and visits to home villages in the event of a celebration, illness, or a death in the family.
The Spiritual and Religious Rehabilitation was seen to have a strong impact in helping
beneficiaries to emotionally and morally reconcile with their past and develop a state of inner
peace, so that they are psychologically in a position to look to the future. The spiritual
programs that were conducted included yoga and meditation sessions, also encompassing
mindfulness (vipassana) training. Group religious ceremonies with rites and rituals were
conducted, based on a beneficiary’s faith. These ceremonies were led by religious leaders of the
respective Hindu, Christian, and Satya Sai faiths.
36
December 2013
PERSPECTI VES O N TERRORISM
Volume 7, Issue 6
The rehabilitated former LTTE combatants were “reinserted” (resettled) in their original
homes with a three-month reinsertion assistance package that was meant to meet their
preliminary basic needs in terms of shelter, food, clothing, and healthcare. This process sought
to rely on community-based support structures. The final phase of the W-RRR program, the
reintegration of former combatants into their home communities, constituted the two aspects
of social integration and economic integration. The (+1) Community Engagement component
of the rehabilitation program helped to work towards social integration. Community
engagement was vital to overcome the anger and resentment held by some members of the
Tamil community living in villages in the North and East, who were persecuted by the LTTE
or had been held hostage by the LTTE during the final stages of the war.[112] Some of the
efforts included establishing community-based support networks and public reintegration
ceremonies.[113] In this way, the mentoring and further mainstreaming of former LTTE
combatants was meant to constitute a natural and gradual transfer to their respective local
communities. The initial contact between a beneficiary and her/his home community was
established in degrees, beginning with a series of visitations, letters, and phone conversations
as part of the Community Engagement program.[114]
Some beneficiaries were able to enroll in university education, and several also entered the
very competitive medical schools in national universities.[118] The rehabilitation program
conducted for 273 former LTTE child combatants at the premises of the Ratmalana Hindu
College, in partnership with community organisations and private individuals, was found to
be particularly effective due to its special English Language program and Girl Guides and Boy
Scouts programs.[119] English was taught using the comprehensive Montessori Method which
37
December 2013
PERSPECTI VES O N TERRORISM
Volume 7, Issue 6
embraces different learning styles and student-centred learning through non-traditional, non-
competitive, and collaborative teaching methods.[120]
Seventy-eight boys and girls completed the Boy Scouts and Girl Guides programs, which were
adapted to meet the requirements of the rehabilitation program.[121] These programs helped
former child combatants to overcome trauma and past negative experiences through a system
of holistic education. The programs promoted social responsibility and integration, team
spirit, and ethnic and religious harmony through the values they promoted, activity-based
learning, rewards for good behaviour, and practical training useful for resettlement into
society, such as knots training, carpentry, electronics, and first aid training.[122] The
rehabilitation program for child beneficiaries at the Ratmalana school also included
opportunities to visit Colombo for water therapy and other activities.[123]
38
December 2013
PERSPECTI VES O N TERRORISM
Volume 7, Issue 6
main findings[133]: (1) “Significant decline in the detainees’ support for violence toward the
Sinhalese from the moment they joined the deradicalisation program at Time 1 to seven
months later toward the end of the program at Time 2”; (2) “Evidence that this generalised
decline in support for violence and armed struggle is even more pronounced for the most
extreme terrorist members of the organisation;” and (3) that two key ingredients which made
the Sri Lankan rehabilitation successful were: “dignity and adequacy”.[134] Kruglanski and
Gelfand believe that “dignity” was a significant aspect of the rehabilitation program where the
beneficiaries developed genuine friendships with centre staff and guards, and the feeling of
being respected led to deradicalisation.[135] Kruglanski and Gelfand believe that the
perception of “adequacy” of the rehabilitation by the beneficiaries was also significant, i.e. the
adequacy of the attributes of the rehabilitation programs such as the vocational training
component which would help them reintegrate into society.[136] While long-term
effectiveness can only be assessed in later years, the study by Kruglanski and Gelfand is very
significant, especially as scientific research into the effectiveness of rehabilitation programs for
violent extremists has thus far been cited as a shortcoming of rehabilitation programs adopted
previously by several other countries, including the expansive rehabilitation program in Saudi
Arabia.[137]
Thus, the Sri Lankan rehabilitation program can be assessed to have been successful in
countering the LTTE’s violent, ethno-nationalist ideology which demonised the Sinhalese and
Muslim communities of Sri Lanka. Therefore, not only was the Sri Lankan rehabilitation
program able to “disengage” the former combatants, apparent through the zero rate of
recidivism, they were “deradicalised” owing to their cognitive transformation. In this the Sri
Lankan rehabilitation meets the “Key Components of Successful Deradicalisation Programs”
in the article entitled “Deradicalising Islamist Extremists” by Angel Rabasa, Stacie L.
Pettyjohn, Jeremy J. Ghez, Christopher Boucek, published by the RAND Corporation.[138] Sri
Lanka’s rehabilitation program can potentially serve as an effective and low-cost solution for
deradicalising members of a terrorist organisation for other countries emerging from similar
conflicts. Sri Lanka’s rehabilitation program which has cost less than USD 20 million[139],
stands in contrast with others such as in Afghanistan with a budget of over USD 220 million,
[140] with a much less effective outcome (although the nature of Afghanistan’s on-going
conflict presents much greater challenges to reintegration). It also shows that a program
supported by vast funds such as in Saudi Arabia[141] may not be required for the cognitive
transformation of beneficiaries. In undertaking a relatively effective rehabilitation program for
former LTTE combatants, Sri Lanka has fulfilled a recommendation made in the country’s
Lessons Learnt and Reconciliation Commission (LLRC) report produced in November 2011.
However, it can be noted that although there have been no incidents of recidivism or terrorism
related crime since the reintegration of rehabilitated combatants,[142] Sri Lanka’s robust
security platform which continued post-conflict is likely also to be a strong factor for this
post-conflict stability.
39
December 2013
PERSPECTI VES O N TERRORISM
Volume 7, Issue 6
Thus, the economic reintegration component of Sri Lanka’s W-RRR program was not
successful for many rehabilitated combatants, although 100% success in economic
reintegration may be deemed beyond the scope of a developing country such as Sri Lanka. In
August 2013, the Sri Lankan government allocated a further Rs. 525 million (approximately
USD 4.01 million) for loans for assistance in livelihood projects for rehabilitated former
combatants, with a maximum loan of Rs. 250,000 (approximately USD 1,911); authorities have
already received 4,700 loan applications from rehabilitated combatants.[147]
Economic reintegration may have been better achieved if private sector organisations were
formally a part of the aftercare system of the rehabilitation program, in which rehabilitated
combatants would also have guaranteed employment in the private sector of Sri Lanka. The
variety in employment opportunities would have also led to greater job satisfaction among the
newly employed beneficiaries. The lack of jobs or livelihood opportunities post-rehabilitation
has been cited as a major vulnerability of the rehabilitation programs undertaken by several
countries such as Afghanistan (Afghan Peace and Reintegration Program)[148], Algeria[149],
and Pakistan[150]. While the social reintegration of former combatants overtly seems to be
less of a challenge, more research should be undertaken through a monitoring and mentoring
system to gauge its effectiveness through the W-RRR program, especially in light of some
members of the beneficiaries’ home villages initially being opposed to the return of former
LTTE combatants back to their villages.
40
December 2013
PERSPECTI VES O N TERRORISM
Volume 7, Issue 6
engagement, and (4) other reconciliation initiatives relating to the emotional, social, and
economic aspects of reconciliation.
Humanitarian assistance was provided to more than 300,000 displaced persons by the
Ministry of Resettlement of Sri Lanka, assisted by international organisations, NGOs, and
private individuals. This ministry has resettled approximately 280,000 internally displaced
individuals within 2.5 years, while 6,031 persons remain in resettlement camps (as at May
2012).[151] Grants, cooked meals, and dry rations were provided for six months or more after
resettlement. The Sri Lankan Army has contributed to the resettlement effort by building
1,766 houses, and in undertaking the essential, painstaking, and dangerous task of demining
conflict-affected regions.[152] Demining has been completed entirely in the Jaffna Peninsula,
while demining activities continue in some areas of the Northern and Eastern Provinces.[153]
Public services such as water, sanitation, electricity, education, and health facilities were
restored to an extent in the North and East in the initial stages of resettlement. More than
12,000 houses are under construction or have been constructed by the Indian government as
of May 2013. India plans to build a total of 50,000 housing units for the resettled families in
the North and East.[154]
41
December 2013
PERSPECTI VES O N TERRORISM
Volume 7, Issue 6
(from 2012) to encourage investment in agriculture and fisheries in the North and East.
Several hundred private companies[159] have supported social and economic reintegration in
the North and East through large-scale business investments or grassroots level initiatives.
[160]
A smaller-scale, yet notable, social reintegration initiative was undertaken in November 2012
by the Sri Lankan Army in its recruitment of 100 young Tamil women between the ages of 18
and 22 years from the Northeast (Killinochchi and Mullaitivu areas) as Sri Lankan Army
soldiers.[161] This program helped these young women and their families to overcome socio-
economic hardship faced by the still underdeveloped region, and prevent their possible entry
into prostitution due to the lack of employment opportunities in the area. The families,
although initially reluctant, believe employment in the Sri Lankan Army brings income and
social status to their children’s lives.[162] The new recruits were enlisted into the Civil Affairs
Division and are to fill the communication gap between the generally Sinhala-speaking Army
officers and the Tamil-speaking communities in which they serve.[163] The recruits have
received a unique reconciliation-oriented military training in a friendly environment, which
included field excursions to Colombo with opportunities to establish new friendships with
university students in Colombo.[164]
42
December 2013
PERSPECTI VES O N TERRORISM
Volume 7, Issue 6
spokesman and leader of the propaganda wing, are due to enter national politics through
membership in the SLFP.[166]
The government has appointed an all-party Parliamentary Select Committee to discuss the
implementation of the recommendations of Sri Lanka’s Lessons Learnt and Reconciliation
Commission (LLRC) report submitted in November 2011, including the contested 13th
Amendment to the constitution[167] and the subject of devolution of power to the provinces.
Challenges remain as the Tamil National Alliance (TNA) political party has declined its
participation in the Committee, fearing its participation will be construed as agreement to
possible decisions made by the Committee based on a majority consensus (which the TNA
believes it will be in opposition with). Presently, the main oppositional Tamil political parties
such as the TNA are not viewed as effectively engaging with the Sri Lankan government or
genuinely committed to the national reconciliation process, as they are ethnic-based sectarian
parties which sympathise with the separatist ideology of the LTTE.[168] TNA leaders also
openly associate with pro-LTTE organisations working against the Sri Lankan state outside the
country, such as the Transnational Government of Tamil Eelam (TGTE) and Global Tamil
Forum (GTF).[169] With the LTTE having systematically assassinated many prominent and
popular Tamil political leaders in Sri Lanka, there is a great need for a new generation of
mainstream Tamil politicians who are willing to serve all ethnic communities, and assume
national leadership roles in Sri Lanka (such as Lakshman Kadirgamar, the two-time Foreign
Minister of Sri Lanka and likely presidential candidate who was supported by all ethnic groups
of Sri Lanka, and was assassinated by the LTTE in August 2005 for that very reason).
In September 2013, elections were held in the conflict-affected, Tamil dominated Northern
Province for the first time in 25 years.[170] However, the majority of the northern Tamil
population voted for the Tamil National Alliance (TNA) which had an election manifesto that
espoused the self-determination of the Tamil people, thereby rejecting the ruling coalition
government. While conducting provincial elections is a great step towards establishing
normalcy in conflict-affected areas, the election results clearly reveal that the Sri Lankan
government has not reached the “hearts and minds” of the Northern population, despite its
many large-scale projects for economic development in the North.[171] Firstly, to earnestly
engage the conflict-affected Tamil population, the Sri Lankan government must provide
means to achieve immediate livelihood relief. A survey conducted in August 2013 showed that
much of the conflict-affected population continues to suffer from food insecurity.[172]
Additionally, there is much more the Sri Lankan government must provide to the Northern
population to promote reconciliation in the North, such as allowing local participation in the
implementation of development programs,[173] vocational training programs for the people
(for goods/services with a market demand), psychological counseling for victims of violence,
and recruiting a sufficient number of Tamil-speaking police officers, hospital staff, and
government officials to the North to effectively serve the local population. It is encouraging
that 900 Tamil police officers and 1,500 Tamil-speaking Sinhalese police officers have been
43
December 2013
PERSPECTI VES O N TERRORISM
Volume 7, Issue 6
stationed in the Northern and Eastern Provinces recently, so that Tamil residents are able to
make statements to the police in Tamil.[174]
Other initiatives in reconciliation efforts include the commission established in August 2013
by the president of Sri Lanka to investigate cases of missing persons, including abductions and
disappearances, in the Northern and Eastern Provinces.[175] The commission is to produce a
report within six months.[176] If conducted sincerely and transparently, as with the Lessons
Learned and Reconciliation Commission report of 2011[177], the work of this commission
has the potential to greatly increase the trust between the Sri Lankan government and the
conflict-affected community of the North and East. Also in 2013, the University Grants
Commission of Sri Lanka (UGC) began to establish Harmony Centres in universities to
promote harmony and reconciliation among university students belonging to different ethnic
and religious groups.[178] The Education Ministry of Sri Lanka announced in July 2013 that
no new schools are to be established on the basis of ethnicity.[179] This policy decision is
meant to support national reconciliation efforts, as roots of the ethnic conflict in Sri Lanka
also lie in the segregation of communities from childhood through ethnically or linguistically
segregated schools.
The National Reconciliation Unit at the Office of the Adviser on Reconciliation to the
President, Prof. Rajiva Wijesinha, has conducted more than a hundred events promoting
national reconciliation.[180] The Sri Lankan Reconciliation Youth Forum of the National
Reconciliation Unit disseminates information and exchanges ideas, views, and suggestions on
Sri Lanka’s post-conflict reconciliation and development process.[181] A series of National
Conferences on Reconciliation are organised by the Lakshman Kadirgamar Institute of
International Relations and Strategic Studies (under the purview of the Ministry of External
Affairs) to foster reconciliation and further constructive dialogue, in accordance with its
objective of “engaging and promoting peace and addressing post-conflict issues” as per the
Institute’s Act.[182] Sri Lanka has also embarked on many other impactful state- and non-state
led national reconciliation initiatives.[183]
44
December 2013
PERSPECTI VES O N TERRORISM
Volume 7, Issue 6
attribute Evaluation (ME) can also be developed to gauge the outcomes of Sri Lanka’s
rehabilitation program (W-RRR), and to check whether its planned goals and objectives have
been met.[184]
More government support must be given to secure basic needs, as the (six-month) care
package after resettlement was not sufficient for the survival of the resettled communities due
to the lack of livelihood opportunities in the conflict-affected areas. Similarly, the three-month
reinsertion package provided was also not sufficient financial and material assistance for
resettled and rehabilitated former combatants. Many households in the conflict-affected zone
are still believed to be food insecure,[185] despite the government’s initiatives for the conflict-
affected households to adopt home-gardens and animal husbandry. Thus, sustainable
economic development programs that can immediately improve the living standards of the
conflicted-affected population should be adopted by the state as soon as possible. In the future,
the government should also ensure that there is more local participation in implementing
development programs.[186] District secretariats must be empowered to implement
reconciliation initiatives, including local economic development through small and medium-
sized enterprises (SMEs). More support is needed for small and medium scale industries in
the conflict-affected areas.[187] In studying how to achieve successful economic reintegration
of the conflict-affected people, Sri Lanka can study the Malaysian approach more closely,
where significant improvement in the socio-economic conditions of the vulnerable population
was identified as a key to preventing their exploitation by extremist elements in society.[188]
The government should work more proactively with private sector organisations to increase
investment in conflict-affected areas and to encourage more north-south business
partnerships. More public-private partnerships and tax concessions and finance for key
industries are needed to spur economic growth in the conflict-affected areas. Linking the
economies of these regions to the national economy may be the most organic, effective, and
sustainable approach to unite the country. Reconciliation cannot be achieved by state
directives alone. For this, more transport infrastructure needs to be developed by way of a
railway connection that provides direct connection between Jaffna and Colombo.
45
December 2013
PERSPECTI VES O N TERRORISM
Volume 7, Issue 6
National reconciliation and interethnic harmony can perhaps be achieved most effectively
through education and culture. Firstly, there must be an increase in the quality of education,
including higher education, to meet international standards throughout Sri Lanka, so that the
generations to come can more easily enter local and global job markets. To foster
reconciliation, it is imperative that educational courses in interethnic studies and studies in
comparative religion in the context of Sri Lanka be introduced into school and university
curriculums. Restoring and reviving the cultural heritage of all communities, especially that of
the Tamil community, is an urgent and integral part of the national reconciliation process.
[192] To gain the goodwill of the northern Tamil people, it is also necessary to reduce the
military presence in the North. At the same time, the necessary measures for national security
should be retained so that a resurgence of terrorism can be prevented. State recognition of
those perished due to the conflict, including in the end phase, is important for reconciliation.
In this regard, it is very encouraging that the Sri Lankan government has recently announced
that a nationwide census will be conducted to determine the number of lives lost during the
26-year long conflict.[193] Lastly, strengthening principles of democratic governance by
investigation into alleged crimes committed by individual members of the Sri Lankan security
forces, politicians, and gangs is essential to regain the trust of the whole population as well as
the international community.
While the government of Sri Lanka faces such significant challenges in achieving post-conflict
reconciliation, the most formidable threat to its hard-won peace remains the LTTE’s remnant
factions, front organisations, and financing and propaganda units that have survived abroad.
Although the LTTE is militarily defeated, second and third tier leaders and cells operating in
southern India and Western countries are attempting to create unrest, revive terrorism, and
hamper economic development[194] in Sri Lanka. They continue to present a distorted view
of Sri Lanka and continue to radicalise Tamil youth living outside of Sri Lanka.[195]
As a measure to counter the LTTE’s tech-savvy and multi-lingual propaganda machine and its
worldwide mass dissemination of separatist ideology and disinformation, the Sri Lankan
diplomatic arm should, without further delay, embrace new information communication
technologies (ICTs) in its conduct of public diplomacy as well as in day-to-day diplomatic
work. While traditional measures to ensure the security of information and communication
should not be forsaken, ICTs will increase the speed, reach, and effectiveness of
communication by officials of Sri Lanka’s bureau of foreign affairs. This will also enhance the
state’s capacity to engage with the Tamil diaspora, counter reporting against the Sri Lankan
state by ill-informed or ill-willed NGOs and other institutions, circulate positive news items of
stories of post-conflict Sri Lanka, as well as normalise relations with nations hosting large
communities of diaspora Tamils. The LTTE’s leadership has been rightly described as “masters
of deception”[196]: the LTTE’s penetration into civil society and legitimate governments in the
West remains unparalleled by other terror groups due to diaspora constituency pressures.[197]
46
December 2013
PERSPECTI VES O N TERRORISM
Volume 7, Issue 6
About the Author: Iromi Dharmawardhane is a Research Analyst at the International Centre
for Political Violence and Terrorism Research (ICPVTR), S. Rajaratnam School of International
Studies (RSIS), NTU in Singapore. Her areas of interest and research include international
relations, counter-terrorism, post-conflict reconciliation, and religion and philosophy. She holds a
B.A. in International Studies from Monash University (Australia). She is completing a Master of
Commerce Degree at the University of Kelaniya (Sri Lanka). Her recent focus has been on
extremist religious ideologies. She has written a book on comparative religion, entitled ‘The Good
Life: An Introduction to Religion and Consciousness’ (forthcoming at Stamford Lake Publishers).
Notes
[1] An earlier version of this article was published in the ICPVTR Counter Terrorist Trends and Analysis (CTTA) magazine in March 2013
(5:3).
[2] “Taming the Tamil Tigers from Here in the U.S,” Federal Bureau of Investigation (FBI) website, Jan. 10, 2008, accessed Sept. 25, 2013,
http://www.fbi.gov/news/stories/2008/january/tamil_tigers011008;
“Suicide Attacks by the LTTE,” South Asia Terrorism Portal (SATP), accessed Sept. 25, 2013, http://www.satp.org/satporgtp/countries/
shrilanka/database/data_suicide_killings.htm.
[3] “Child Soldiers of The Liberation Tiger of Tamil Eelam (LTTE),” South Asia Terrorism Portal (SATP), accessed Oct. 30, 2013, http://
www.satp.org/satporgtp/countries/shrilanka/terroristoutfits/child_solders.htm;
“Sri Lanka: Tamil Tigers Forcibly Recruit Child Soldiers,” Human Rights Watch, accessed Oct. 30, 2013, http://www.hrw.org/news/2004/11/09/
sri-lanka-tamil-tigers-forcibly-recruit-child-soldiers;
Jaya Menon, “Child soldiers fight LTTE ghosts”, The Times of India, June 24, 2009, accessed Oct. 30, 2013, http://
articles.timesofindia.indiatimes.com/2009-06-24/south-asia/28185065_1_ltte-cadres-kilinochchi-ltte-bunker;
Stephen Sackur, “A Sri Lankan re-education for Tamil child soldiers”, British Broadcasting Corporation (BBC), June 5, 2010, accessed Oct. 30,
2013, http://news.bbc.co.uk/2/hi/8721974.stm.
[4] Jo Becker, “Canada’s Tamils Must Rethink LTTE Support,” Human Rights Watch, accessed Sept. 25, 2013, http://www.hrw.org/english/
docs/2004/12/20/slanka9918.htm.
[5] Asoka Bandarage, “Sri Lanka Towards Peace: An Alternative Perspective,” India Quarterly 68, no. 2 (2012): 103-118.
[6] “Prominent Political Leaders Assassinated by The LTTE,” South Asia Terrorism Portal (SATP), accessed Oct. 30, 2013, http://www.satp.org/
satporgtp/countries/shrilanka/database/index.html.
[7] The Telegraph, “Britain Accuses Tamil Tigers of Using Civilians as Human Shields,” April 16, 2009, accessed Oct. 30, 2013, http://
www.telegraph.co.uk/news/worldnews/asia/srilanka/5161118/Britain-accuses-Tamil-Tigers-of-using-civilians-as-human-shields.html;
Nick Meo, “Civilian "Human Shields" Only weapon Left for LTTE,” Sunday Telegraph, March 26, 2013, accessed Oct. 30, 2013, http://
transcurrents.com/tc/2009/04/civilian_human_shields_only_we.html;
Rajiva Wijesinha in “Sri Lanka Responds to ‘War Crimes’ Claims”, YouTube video, posted by “Al-Jazeera English”, June 15, 2011, accessed Oct.
30, 2013, http://www.youtube.com/watch?v=sdrCR-X4iH0&feature=channel_video_title;
“Subject: Sri Lanka: S/Wci Amb. Williamson’s Geneva Meetings,” Spesial Wikileaks-dokumenter, July 15, 2009, accessed Oct. 30, 2013, http://
www.aftenposten.no/spesial/wikileaksdokumenter/article4109603.ece.
[8] A. A. Gill, “Judged,” The Sunday Times, June 20, 2011 in “Appalling Journalism: Jon Snow and Channel 4 News on Sri Lanka,” Sri Lanka
Media Watch, November 2011, accessed Oct. 30, 2013, http://engagesrilanka.com/images/Appalling%20Journalism.pdf.
[9] Peter Chalk, “Commentary No. 77: Liberation Tigers of Tamil Eelam’s (LTTE) International Organisation and Operations - A Preliminary
Analysis,” Canadian Security Intelligence Service website, Winter 1999, accessed Sept. 25, 2013, http://www.csis-scrs.gc.ca/pblctns/cmmntr/
cm77-eng.asp;
Jo Becker, “Canada’s Tamils Must Rethink LTTE Support,” Human Rights Watch, accessed Sept. 25, 2013, http://www.hrw.org/english/docs/
2004/12/20/slanka9918.htm;
47
December 2013
PERSPECTI VES O N TERRORISM
Volume 7, Issue 6
Shanaka Jayasekera, “TGTE Attempts to Gain Recognition in South Sudan: Govt Must Renew Counter-terrorism Strategies,” Sunday
Observer, March 20, 2011, accessed Oct. 30, 2013, http://www.sundayobserver.lk/2011/03/20/fea13.asp;
Peter Chalk, “Tigers Abroad: How the LTTE Diaspora Supports the Conflict in Sri Lanka,” Georgetown Journal of International Affairs 9, no. 2
(2008): 97-103.
[10] “Taming the Tamil Tigers from Here in the U.S,” Federal Bureau of Investigation (FBI) website, Jan. 10, 2008, accessed Sept. 25, 2013,
http://www.fbi.gov/news/stories/2008/january/tamil_tigers011008.
[11] “Ban Denies UN Covered Up Death Toll in Sri Lanka,” Reuters, June 2, 2009, accessed Oct. 30, 2013, http://news.asiaone.com/News/
Latest+News/Asia/Story/A1Story20090602-145445.html;
“Report to Congress on Incidents During the Recent Conflict in Sri Lanka,” U.S. Department of State website, accessed October 30, 2013,
http://www.state.gov/documents/organization/131025.pdf.
[12] “Ban Denies UN Covered Up Death Toll in Sri Lanka,” Reuters, June 2, 2009, accessed Oct. 30, 2013, http://news.asiaone.com/News/
Latest+News/Asia/Story/A1Story20090602-145445.html.
[13] “Report to Congress on Incidents During the Recent Conflict in Sri Lanka,” U.S. Department of State website, accessed October 30, 2013,
http://www.state.gov/documents/organization/131025.pdf.
[14] Rohan Gunaratna in “Defence Seminar Sri Lanka 2013 – Dr. Rohan Gunaratna”, YouTube video, posted by “SL Army Director Training,”
Sept. 5, 2013, accessed Oct. 30, 2013, http://www.youtube.com/watch?v=TykYCXSmb50.
[15] Shihar Aneez, “Sri Lanka says U.N. Report on Tamil War Casualties Wrong, Biased,” Reuters, Nov. 23, 2012, accessed Oct. 30, 2013,
http://www.reuters.com/article/2012/11/23/us-srilanka-un-idUSBRE8AM0J420121123.
[16] Ibid;
“Sri Lanka Hits Out at UN’s Petrie Report,” Ministry of Defence and Urban Development Sri Lanka website, Nov. 27, 2012, accessed Oct. 30,
2013, http://www.defence.lk/new.asp?fname=Sri_Lanka_hits_out_at_UN_Petrie_report_20121127_03.
[17] Gethin Chamberlain, “Sri Lanka Death Toll 'Unacceptably High', Says UN,” The Guardian, May 29, 2009, accessed Oct. 30, 2013, http://
www.theguardian.com/world/2009/may/29/sri-lanka-casualties-united-nations.
[18] “US Backs Navi’s Assessment on SL,” Daily Mirror, Sept. 26, 2013, accessed Oct. 30, 2013,
http://www.dailymirror.lk/news/36120-us-backs-navis-assessment-on-sl.html.
[19] “Taming the Tamil Tigers from Here in the U.S,” Federal Bureau of Investigation (FBI) website, Jan. 10, 2008, accessed Sept. 25, 2013,
http://www.fbi.gov/news/stories/2008/january/tamil_tigers011008.
[20] “Sri Lanka Hits Out at UN’s Petrie Report,” Ministry of Defence and Urban Development Sri Lanka website, Nov. 27, 2012, accessed Oct.
30, 2013, http://www.defence.lk/new.asp?fname=Sri_Lanka_hits_out_at_UN_Petrie_report_20121127_03.
[21] Ashok Mehta, “Sri Lanka’s Ethnic Conflict: How Eelam Way IV was Won,” Manekshaw Paper, no. 22 (2010), Centre for Land Warfare
Studies (CLAWS), New Delhi. .
[22] “Liberation Tigers of Tamil Eelam (LTTE),” South Asia Terrorism Portal (SATP), accessed Sept. 25, 2013, http://www.satp.org/satporgtp/
countries/shrilanka/terroristoutfits/LTTE.HTM.
[23] Sri Lanka’s Killing Fields (2011), Sri Lanka’s Killing Fields: War Crimes Unpunished (2012), No Fire Zone: In the Killing Fields of Sri Lanka
(2013)
[24] Rajiva Wijesinha in “Sri Lanka Responds to ‘War Crimes’ Claims”, YouTube video, posted by “Al-Jazeera English”, June 15, 2011, accessed
Oct. 30, 2013, http://www.youtube.com/watch?v=sdrCR-X4iH0&feature=channel_video_title.
[25] Ibid
[26] A. A. Gill, “Judged,” The Sunday Times, June 20, 2011 in “Appalling Journalism: Jon Snow and Channel 4 News on Sri Lanka,” Sri Lanka
Media Watch, November 2011, accessed Oct. 30, 2013, http://engagesrilanka.com/images/Appalling%20Journalism.pdf.
[27] “Subject: Sri Lanka: S/Wci Amb. Williamson’s Geneva Meetings,” Spesial Wikileaks-dokumenter, July 15, 2009, accessed Oct. 30, 2013,
http://www.aftenposten.no/spesial/wikileaksdokumenter/article4109603.ece.
[28] Bryson Hull and Ranga Srilal, Ranga, “Sri Lanka Says Avoiding Civilian Deaths was "Impossible”,” Reuters, Aug. 1, 2011, accessed Oct. 30,
2013, http://in.reuters.com/article/2011/08/01/idINIndia-58562720110801.
[29] Frances Harrison, “‘Tamils Still Being Raped and Tortured’ in Sri Lanka,” British Broadcasting Corporation (BBC), last updated Nov. 9,
2013, accessed Oct. 30, 2013, http://www.bbc.co.uk/news/world-asia-24849699.
[30] It is also believed that some former LTTE combatants and others who have sought asylum in Western countries have assumed new
identities, while they continue to be considered “missing” in Sri Lanka.
Shamindra Ferdinando, “Some Considered Missing Given New Identities, Living Abroad – Gotabhaya,” The Island, August 18, 2013, accessed
Oct. 30, 2013, http://www.island.lk/index.php?page_cat=article-details&page=article-details&code_title=86135.
[31] Shamindra Ferdinando, “Some Considered Missing Given New Identities, Living Abroad – Gotabhaya,” The Island, August 18, 2013,
accessed Oct. 30, 2013, http://www.island.lk/index.php?page_cat=article-details&page=article-details&code_title=86135
48
December 2013
PERSPECTI VES O N TERRORISM
Volume 7, Issue 6
[32] Peter Chalk, “Commentary No. 77: Liberation Tigers of Tamil Eelam’s (LTTE) International Organisation and Operations - A
Preliminary Analysis,” Canadian Security Intelligence Service website, Winter 1999, accessed Sept. 25, 2013, http://www.csis-scrs.gc.ca/pblctns/
cmmntr/cm77-eng.asp.
[33] Peter Chalk, “The LTTE Insurgency in Sri Lanka,” in Ethnic Conflict and Secessionism in South and Southeast Asia, (eds) Rajat Ganguly
and Ian Macduff (New Delhi and London: Sage Publications, 2003), 147.
[34] After LTTE’s founding leader Prabhakaran died in Sri Lanka in May 2009, Nediyavan declared himself as the leader of the LTTE. : D.B.S.
Jeyaraj, ““KP” Speaks Out: An Interview with Former Tiger Chief,” Aug. 6, 2010, accessed Oct. 30, 2013, http://dbsjeyaraj.com/dbsj/archives/
1607; D.B.S. Jeyaraj, ““KP” Speaks Out: An Interview with Former Tiger Chief,” Aug. 6, 2010, accessed Oct. 30, 2013, http://dbsjeyaraj.com/
dbsj/archives/1631.
[35] There is a convergence between the Nediyavan Faction and the Joe Emmanuel Faction:
Shanaka Jayasekera, “TGTE Attempts to Gain Recognition in South Sudan: Govt Must Renew Counter-terrorism Strategies,” Sunday
Observer, March 20, 2011, accessed Oct. 30, 2013, http://www.sundayobserver.lk/2011/03/20/fea13.asp.
[36] The Transnational Government of Tamil Eelam (TGTE) overtly supports the LTTE and uses its insignia such as the LTTE flag. See:
Colombo Gazette, “Rudrakumar Wants Ties with India”, June 13, 2013, accessed Oct. 30, 2013, http://colombogazette.com/2013/06/13/
rudrakumar-wants-ties-with-india/;
The leader/ “Prime Minister” of the TGTE, Visvanathan Rudrakumaran, was the international legal advisor to the Liberational Tigers of Tamil
Eelam (LTTE) terrorist organisation and Velupillai Prabhakaran, the late (former) leader of the of the LTTE as well as responsible for the
LTTE’s international affairs.
[37] The Vinyagam faction is primarily an LTTE criminal network:
Shanaka Jayasekera, “TGTE Attempts to Gain Recognition in South Sudan: Govt Must Renew Counter-terrorism Strategies,” Sunday
Observer, March 20, 2011, accessed Oct. 30, 2013, http://www.sundayobserver.lk/2011/03/20/fea13.asp.
[38] Shanaka Jayasekera, “TGTE Attempts to Gain Recognition in South Sudan: Govt Must Renew Counter-terrorism Strategies,” Sunday
Observer, March 20, 2011, accessed Oct. 30, 2013, http://www.sundayobserver.lk/2011/03/20/fea13.asp.
[39] Ashok Mehta, “Sri Lanka’s Ethnic Conflict: How Eelam Way IV was Won,” Manekshaw Paper, no. 22 (2010), Centre for Land Warfare
Studies (CLAWS), New Delhi.
[40] Shanaka Jayasekera, “TGTE Attempts to Gain Recognition in South Sudan: Govt Must Renew Counter-terrorism Strategies,” Sunday
Observer, March 20, 2011, accessed Oct. 30, 2013, http://www.sundayobserver.lk/2011/03/20/fea13.asp.
[41] Ibid.
[42] Ashok Mehta, “Sri Lanka’s Ethnic Conflict: How Eelam Way IV was Won,” Manekshaw Paper, no. 22 (2010), Centre for Land Warfare
Studies (CLAWS), New Delhi;
Debabani Majumdar, “Tamil gangs tackled from ‘Within’,” British Broadcasting Corporation (BBC) News, Feb. 26, 2007, accessed Oct. 30, 2013,
http://news.bbc.co.uk/2/hi/uk_news/england/london/6380817.stm.
[43] Including funds collected for Tamil social service, medical, and rehabilitation programs but are used by the LTTE:
Peter Chalk, “The LTTE Insurgency in Sri Lanka,” in Ethnic Conflict and Secessionism in South and Southeast Asia, (eds) Rajat Ganguly and
Ian Macduff (New Delhi and London: Sage Publications, 2003), 146 - 147.
[44] Asoka Bandarage, “Sri Lanka Towards Peace: An Alternative Perspective,” India Quarterly 68, no. 2 (2012): 103-118.
[45] “Sri Lanka,” Library of Congress Country Studies, last updated Oct. 1988, accessed Oct. 30, 2013, http://lcweb2.loc.gov/cgi-bin/query/r?
frd/cstdy:@field(DOCID+lk0012).
[46] Descendents of the Portuguese and Dutch who settled in Sri Lanka during colonial times (many intermarried with the Sinhalese and
Tamils)
[47] Thomas Sowell, Affirmative Action Around the World: An Empirical Study (New Haven and London: Yale University Press, 2004), 82-83.
[48] Anglicized “Yarlpanam”.
[49] Shenali Waduge, “The Sinhala Only Policy, Tamil “Rights” And The Validity Of Calling Buddhists Extremist In Sri Lanka – OpEd,”
Eurasia Review, Jan. 17, 2013, http://www.eurasiareview.com/17012013-the-sinhala-only-policy-tamil-rights-and-the-validity-of-calling-
buddhists-extremist-in-sri-lanka-oped/.
[50] Asoka Bandarage, “Sri Lanka Towards Peace: An Alternative Perspective,” India Quarterly 68, no. 2 (2012): 103 - 118.
[51] Ibid.
[52] Ibid.
[53] Ibid.
Shenali Waduge, “The Sinhala Only Policy, Tamil “Rights” And The Validity Of Calling Buddhists Extremist In Sri Lanka – OpEd,” Eurasia
Review, Jan. 17, 2013, http://www.eurasiareview.com/17012013-the-sinhala-only-policy-tamil-rights-and-the-validity-of-calling-buddhists-
extremist-in-sri-lanka-oped/.
[54] Sirimavo Bandaranaike was the world’s first female head of state.
49
December 2013
PERSPECTI VES O N TERRORISM
Volume 7, Issue 6
[55] Thomas Sowell, Affirmative Action Around the World: An Empirical Study (New Haven and London: Yale University Press, 2004), 88.
[56] Thomas Sowell, Affirmative Action Around the World: An Empirical Study (New Haven and London: Yale University Press, 2004), 86.
[57] “Sri Lanka: Election of 1977 and More Violence,” Library of Congress Country Studies, last updated Oct. 1988, accessed Oct. 30, 2013,
http://lcweb2.loc.gov/cgi-bin/query/r?frd/cstdy:@field(DOCID+lk0012).
[58] The LTTE was later also known as the “Tamil Tigers” as a shortened form of the group’s name.
[59] Peter Chalk, “The LTTE Insurgency in Sri Lanka,” in Ethnic Conflict and Secessionism in South and Southeast Asia, (Eds.) Rajat Ganguly
and Ian Macduff (New Delhi and London: Sage Publications, 2003), 130.
[60] “Sri Lanka: Election of 1977 and More Violence,” Library of Congress Country Studies, last updated Oct. 1988, accessed Oct. 30, 2013,
http://lcweb2.loc.gov/cgi-bin/query/r?frd/cstdy:@field(DOCID+lk0012).
[61] Ibid.
[62] Ibid.
[63] Ibid.
[64] “Taming the Tamil Tigers from Here in the U.S,” Federal Bureau of Investigation (FBI) website, Jan. 10, 2008, accessed Sept. 25, 2013,
http://www.fbi.gov/news/stories/2008/january/tamil_tigers011008;
Thomas Sowell, Affirmative Action Around the World: An Empirical Study (New Haven and London: Yale University Press, 2004), 89.
[65] “Sri Lanka: The Riots of July 1983,” Library of Congress Country Studies, last updated Oct. 1988, accessed Oct. 30, 2013, http://
lcweb2.loc.gov/cgi-bin/query/r?frd/cstdy:@field(DOCID+lk0012).
[66] Ibid.
[67] Thomas Sowell, Affirmative Action Around the World: An Empirical Study (New Haven and London: Yale University Press, 2004), 90.
[68] “Sri Lanka: The Riots of July 1983,” Library of Congress Country Studies, last updated Oct. 1988, accessed Oct. 30, 2013, http://
lcweb2.loc.gov/cgi-bin/query/r?frd/cstdy:@field(DOCID+lk0012).
[69] Asoka Bandarage, “The Sri Lankan Conflict: A Multi-polar Approach,” Harvard International Review, accessed Sept. 25, 2013, http://
bandarage.com/publications-and-presentations/.
[70] Thomas Sowell, Affirmative Action Around the World: An Empirical Study (New Haven and London: Yale University Press, 2004), 90.
[71] “Suicide Attacks by the LTTE,” South Asia Terrorism Portal (SATP), accessed Sept. 25, 2013, http://www.satp.org/satporgtp/countries/
shrilanka/database/data_suicide_killings.htm.
[72] Ministry of External Affairs of Sri Lanka, LTTE: A Trail of Atrocities, July 2007.
[73] “LTTE leader pays homage to Black Tigers,” TamilNet, July 6, 2008, accessed Oct. 30, 2013, http://www.tamilnet.com/art.html?
catid=13&artid=26268.
[74] “Ceasefire Violations,” South Asia Terrorism Portal (SATP), accessed Sept. 25, 2013, http://www.satp.org/satporgtp/countries/shrilanka/
database/Ceasefire_Violation.htm.
[75] ] Stewart Bell, “Inside Sri Lanka: Your Cash Going to Arms, Say Ex-rebels,” National Post, Sept, 22, 2008, accessed Oct. 30, 2013, http://
www.nationalpost.com/todays_paper/story.html?id=813314;
G. L. Peiris, G.L, “Secessionist War and Terrorism in Sri Lanka: Transnational Impulses,” accessed Oct. 1, 2008, http://
www.protectsrilanka.org/Articles.html.
[76] Ministry of External Affairs of Sri Lanka, LTTE: A Trail of Atrocities, July 2007.
[77] “Sri Lanka: Chapter 1 Historical Setting,” Library of Congress Country Studies, last updated Oct. 1988, accessed Oct. 30, 2013, http://
lcweb2.loc.gov/cgi-bin/query/r?frd/cstdy:@field(DOCID+lk0012);
Sudharshan Seneviratne, “Heritage of an Island Civilization,”Special Report: Commonwealth Heads of Government Meeting 2013 (London:
First, 2013);
Rasanayagarn (1926) in D.G.A Perera, “The Truth about the ‘Tamil Kingdom’ of Jaffna Peninsula,” Ministry of Defence and Urban
Development Sri Lanka website, last updated Dec. 30, 2010, http://www.defence.lk/new.asp?fname=20060706_03; Horsburgh (1916) in
“Sinhalese Place Names in the Jaffna Peninsula,” The Ceylon Antiquary (Vol. II, Part 1), accessed Oct. 1, 2008, http://www.geocities.com/
place.names/horsburgh.doc.
[78] “Sri Lanka: The Eastern Province Question,” Library of Congress Country Studies, last updated Oct. 1988, accessed Oct. 30, 2013, http://
lcweb2.loc.gov/cgi-bin/query/r?frd/cstdy:@field(DOCID+lk0012).
[79] Rasika Jayakody, “Trail of Terror: Is July Still Black? Sinhalese Factor in the Aftermath of Black July,” The Nation, July 28, 2013, accessed
Sept. 25, 2013, http://www.nation.lk/edition/news-features/item/19604-trail-of-terror-is-july-still-black?-sinhalese-factor-in-the-aftermath-
of-black-july.html.
[80] Peter Chalk, “The LTTE Insurgency in Sri Lanka,” in Ethnic Conflict and Secessionism in South and Southeast Asia, (Eds.) Rajat Ganguly
and Ian Macduff (New Delhi and London: Sage Publications, 2003), 151.
50
December 2013
PERSPECTI VES O N TERRORISM
Volume 7, Issue 6
[81] Jo Becker, “Canada’s Tamils Must Rethink LTTE Support,” Human Rights Watch, accessed Sept. 25, 2013, http://www.hrw.org/english/
docs/2004/12/20/slanka9918.htm.
[82] “Sri Lankan Expatriates Protest Against LTTE Terrorism,” Permanent Mission of Sri Lanka to the United Nations website, last updated July
28, 2008, accessed Oct. 30, 2013, http://www.lankamission.org/content/view/590/2/;
R. Srikanthan, “LTTE Domination in the United Kingdom,” Daily News, Jan. 23, 2007, accessed Oct. 30, 2013, http://archives.dailynews.lk/
2007/01/23/fea02.asp.
[83] Although the Sinhalese and Tamils have a long history of living harmoniously in Sri Lanka, they have a culturally distinct heritage and
identity. The Sinhalese first came to the island in the 6th century B.C.E. from Orissa in the north-east of India, followed by waves of migration
from different parts of India in ancient times. Sri Lanka, then regionally known just as Lanka, was at that time already inhabited by some
indigenous tribes whose identity was neither Sinhalese nor Tamil. The northern Sinhalese kingdoms were infrequently invaded since the 2nd
century B.C.E. by South Indian kingdoms and in the 14th century a Tamil South Indian dynasty established a kingdom in the northern most
part of Sri Lanka, which is now known as Jaffna. The Jaffna Peninsula comprises much of the land mass of the medieval Jaffna Tamil kingdom.
Large stretches of north-central jungles separated the Sinhalese and the Tamils at this time, and as a result the Tamils developed a more
“distinct and confident” culture, reinforced by the revival of Hinduism in India. They looked to South India for culture and tradition.
Generally, both the Sinhalese and Sri Lankan Tamils view themselves as being unique due to their language, ethnicity, culture, and religion. :
“Sri Lanka: Rise of Sinhalese and Tamil Ethnic Awareness,” Library of Congress Country Studies, last updated Oct. 1988, accessed Oct. 30,
2013, http://lcweb2.loc.gov/cgi-bin/query/r?frd/cstdy:@field(DOCID+lk0012);
“Sri Lanka: Background,” The World Factbook, accessed Oct. 30, 2013, https://www.cia.gov/library/publications/the-world-factbook/geos/
ce.html;
“Sri Lanka: Decline of the Sinhalese Kingdom, 1200-1500: Invasion, Disease, and Social Instability,” Library of Congress Country Studies, last
updated Oct. 1988, accessed Oct. 30, 2013, http://lcweb2.loc.gov/cgi-bin/query/r?frd/cstdy:@field(DOCID+lk0012);
“Sri Lanka: Politics and Society: Race, Religion, and Politics,” Library of Congress Country Studies, last updated Oct. 1988, accessed Oct. 30,
2013, http://lcweb2.loc.gov/cgi-bin/query/r?frd/cstdy:@field(DOCID+lk0012).
[84] Sudharshan Seneviratne, “Heritage of an Island Civilization,” Special Report: Commonwealth Heads of Government Meeting 2013
(London: First, 2013).
[85] Holt in Mavis L. Fenn, “A Review of Buddhist Fundamentalism and Minority Identities in Sri Lanka,” Journal of Buddhist Ethics,
accessed Oct 1, 2008, http://www.buddhistethics.org/6/fenn991.html.
[86] Sacred footprint rock formation at summit of a small mountain in central Sri Lanka.
[87] Sudharshan Seneviratne, “Heritage of an Island Civilization, ”Special Report: Commonwealth Heads of Government Meeting 2013
(London: First, 2013).
[88] Walter Jayawardhana, “Tamil Tigers Entered a Sinhalese Village Preparing for the New Year Festival and Slaughtered Ruthlessly Six
Women and a Man,” Asian Tribune, April 13, 2013, accessed October 30, 2013, http://www.asiantribune.com/node/5301.
[89] Rasika Jayakody, “Trail of Terror: Is July Still Black? Sinhalese Factor in the Aftermath of Black July,” The Nation, July 28, 2013, accessed
Sept. 25, 2013, http://www.nation.lk/edition/news-features/item/19604-trail-of-terror-is-july-still-black?-sinhalese-factor-in-the-aftermath-
of-black-july.html.
[90] “Taming the Tamil Tigers from Here in the U.S,” Federal Bureau of Investigation (FBI) website, Jan. 10, 2008, accessed Sept. 25, 2013,
http://www.fbi.gov/news/stories/2008/january/tamil_tigers011008.
[91] Azerbaijan, Belarus, Brazil, China, Cuba, Egypt, Indonesia, Japan, Kuwait, Myanmar, New Zealand, Pakistan, The Philippines, The
Russian Federation, South Sudan, Thailand, Uzbekistan, Venezuela:
UNHRC Member States Commend Progress in Sri Lanka’s Reconciliation Process,” Colombo Page, Sept. 28, 2013, accessed Oct. 30, 2013,
http://www.colombopage.com/archive_13B/Sep28_1380351664CH.php.
[92] UNHRC Member States Commend Progress in Sri Lanka’s Reconciliation Process,” Colombo Page, Sept. 28, 2013, accessed Oct. 30, 2013,
http://www.colombopage.com/archive_13B/Sep28_1380351664CH.php.
[93] Brigadier Darshana Hettiarachchi, (Former) Commissioner General of Rehabilitation, Telephone Interview, January 15, 2013.
[94] Ibid.
[95] Malkanthi Hettiarachchi, “Sri Lanka’s Rehabilitation Program: A New Frontier in Counter Terrorism and Counter Insurgency,” PRISM:
Journal of the Center for Complex Operations 4, no. 2 (2013), 105 - 119.
[96] For example, the LTTE carried out attacks on key economic infrastructures such as the Central Bank of Sri Lanka and the Bandaranaike
International Airport. The LTTE also targeted ancient religious sites, engaged in the systematic assassination of prominent Tamil and
Sinhalese political leaders, conducted“ethnic cleansing” campaigns of Sinhalese and Muslims from the North of Sri Lanka and continuously
attacked civilians in the South.
[97] Jaya Menon, “Child soldiers fight LTTE ghosts”, The Times of India, June 24, 2009, accessed Oct. 30, 2013, http://
articles.timesofindia.indiatimes.com/2009-06-24/south-asia/28185065_1_ltte-cadres-kilinochchi-ltte-bunker;
Rohan Gunaratna, “The LTTE and Suicide Terrorism,” Frontline 17, no. 3 (2000), accessed Sept. 25, 2013, http://www.frontline.in/static/html/
fl1703/17031060.htm;
51
December 2013
PERSPECTI VES O N TERRORISM
Volume 7, Issue 6
Ruwan M. Jayatunge, “The Psychopathology of the LTTE Suicide Bombers,” Groundviews.org, Feb. 20, 2009, accessed Oct. 30, 2013, http://
groundviews.org/2009/02/20/the-psychopathology-of-the-ltte-suicide-bombers/;
“Netherlands to Probe LTTE Front Organizations Run Private Schools”, Colombo Page, Oct. 5, 2011, accessed Oct. 3o, 2013, http://
www.colombopage.com/archive_11B/Oct05_1317838745CH.php;
“Counterterrorist Body to Probe Tamil Schools,” Radio Netherlands Worldwide website, Oct. 5, 2011, accessed Oct. 30, 2013, http://
www.rnw.nl/english/bulletin/counterterrorist-body-probe-tamil-schools.
[98] Camelia Nathaniel, “LTTE Rump Buying People with Accumulated Funds – Prof. G. L. Peiris,” The Sunday Leader, Sept. 8, 2013, http://
www.thesundayleader.lk/2013/09/08/ltte-rump-buying-people-with-accumulated-funds-prof-g-l-peiris/;
“Pro-LTTE Misinformation Campaign Cracked,” Sunday Observer, March 10, 2013, accessed Oct. 30, 2013, http://www.sundayobserver.lk/
2013/03/10/sec02.asp.
[99] “Child Soldiers of The Liberation Tiger of Tamil Eelam (LTTE),” South Asia Terrorism Portal (SATP), accessed Oct. 30, 2013, http://
www.satp.org/satporgtp/countries/shrilanka/terroristoutfits/child_solders.htm;
“Sri Lanka: Tamil Tigers Forcibly Recruit Child Soldiers,” Human Rights Watch, Nov. 12, 2004, accessed Oct. 30, 2013, http://www.hrw.org/
news/2004/11/09/sri-lanka-tamil-tigers-forcibly-recruit-child-soldiers;
Jaya Menon, “Child soldiers fight LTTE ghosts”, The Times of India, June 24, 2009, accessed Oct. 30, 2013, http://
articles.timesofindia.indiatimes.com/2009-06-24/south-asia/28185065_1_ltte-cadres-kilinochchi-ltte-bunker;
Stephen Sackur, “A Sri Lankan re-education for Tamil child soldiers”, British Broadcasting Corporation (BBC), June 5, 2010, accessed Oct. 30,
2013, http://news.bbc.co.uk/2/hi/8721974.stm.
[100] Hamed El-Said, “De-Radicalising Islamists: Programmes and their Impact in Muslim Majority States”, Developments in Radicalisation
and Political Violence, 2012, International Centre for the Study of Radicalisation and Political Violence (ICSR), London.
[101] Malkanthi Hettiarachchi, “Sri Lanka’s Rehabilitation Program: A New Frontier in Counter Terrorism and Counter Insurgency,” PRISM:
Journal of the Center for Complex Operations 4, no. 2 (2013), 105 - 119.
[102] Ibid.
[103] Ibid.
[104]Rohan Gunaratna, “Conference Paper: Reconciliation after Terrorism: The Sri Lanka Experience,” D.B.S.Jeyaraj.com, accessed July 7,
2013, http://dbsjeyaraj.com/dbsj/archives/10144.
[105]Rohan Gunaratna, “Rehabilitating Sri Lanka’s Tamil Tigers,” Counter Terrorist Trends and Analysis 2, no. 5 (2010): 5 - 9.
[106] Ibid.
[107] Ibid.
[108] Ibid.
[109] Ibid.
[110] Malkanthi Hettiarachchi, “Sri Lanka’s Rehabilitation Program: A New Frontier in Counter Terrorism and Counter Insurgency,” PRISM:
Journal of the Center for Complex Operations 4, no. 2 (2013), 105 - 119.
[111] “Colombo – Sri Lanka,” Global Cities Research Institute website, accessed Oct. 30, 2013, http://global-cities.info/placemarks/colombo-
sri-lanka.
[112] Malkanthi Hettiarachchi, “Sri Lanka’s Rehabilitation Program: A New Frontier in Counter Terrorism and Counter Insurgency,” PRISM:
Journal of the Center for Complex Operations 4, no. 2 (2013), 105 - 119.
[113] Ibid.
[114] Ibid.
[115] “Sri Lanka: Former Tamil Tigers still Searching for Reconciliation,” The Guardian, June 2, 2012, accessed Oct. 30, 2013, http://
www.theguardian.com/global-development/2012/jun/04/sri-lanka-tamil-tigers-reconciliation.
[116] Some of the information cited in the preceeding paragraphs included in the passages dealing with the rehabilitation of former
combatants above were obtained through primary interviews with Sri Lanka’s (former) Commissioner General of Rehabilitation, Brigadier
Dharshana Hettiarachchi, and the Lead Psychologist of Sri Lanka’s rehabilitation program, Ms. Malkanthi Hettiarachchi as indicated by the
corresponding endnotes (Brigadier Dharshana Hettiarachchi and Ms. Malkanthi Hettiarachchi share the same last name, but are not related
to each other). Brigadier Dharshana Hettiarachchi was interviewed to verify the total number of rehabilitated combatants and related details
(up to January 2013 when the interview was conducted). Ms. Malkanthi Hettiarachchi was interviewed for clarification on psychological
assessments made with relation to the effectiveness of the rehabilitation program. Six primary interviews were conducted for the next section
on the rehabilitation of child combatants, specifically to gain more information on the program which included the special English Language
program and Girl Guides and Boy Scouts programs, as sufficient information was not available through secondary sources. Interviews were
with rehabilitated combatants were not conducted; this was due to constraints in time as well as due to the fact that the impact of the
rehabilitation program can be assessed through Kruglanski and Gelfand’s study of Sri Lanka’s rehabilitation program, which is based on
interviews with over 9,000 rehabilitees.
52
December 2013
PERSPECTI VES O N TERRORISM
Volume 7, Issue 6
[117] Malkanthi Hettiarachchi, “Sri Lanka’s Rehabilitation Program: A New Frontier in Counter Terrorism and Counter Insurgency,” PRISM:
Journal of the Center for Complex Operations 4, no. 2 (2013), 105 - 119.
[118] Ibid.
[119]“Empowering child soldiers”, The Sunday Times, March 27, 2011, accessed Oct. 30, 2013, http://www.sundaytimes.lk/110327/Magazine/
sundaytimesmirror_01.html.
[120] Bernadine Anderson, Owner and Principal - La Petite Fleur Montessori House of Children (LPF Schools), Face-to-face Interview,
Dehiwala, Sri Lanka, Dec. 6, 2012.
[121] Shanta Jayalath, Chief Commissioner of Sri Lanka Girl Guides Association, Face-to-face Interview, Sri Lanka Girl Guides Association
(Headquarters), Colombo, Sri Lanka, Dec. 10, 2012;
Mangala Peiris, Deputy Chief Commissioner of Sri Lanka Girl Guides Association, Face-to-face Interview Sri Lanka Girl Guides Association
(Headquarters), Colombo, Sri Lanka, Dec. 10, 2012;
Marlene Dissanayake, Provincial Commissioner (Former Chief Commissioner) of Sri Lanka Girl Guides Association, Face-to-face Interview,
Sri Lanka Girl Guides Association (Headquarters), Colombo, Sri Lanka, Dec. 10, 2012;
Nimal De Silva, Chief Commissioner of Sri Lanka Scouts Association, Face-to-face Interview, Sri Lanka Scout Association Headquarters,
Colombo, Sri Lanka, Dec. 10, 2012;
Gaitan Motha, Scoutmaster in Child Rehabilitation Program, Face-to-face Interview, Lakshman Kadirgamar Institute of International
Relations and Strategic Studies, Colombo, Sri Lanka, Dec. 17, 2012.
[122]Ibid.
[123]Gaitan Motha, Scoutmaster in Child Rehabilitation Program, Face-to-face Interview, Lakshman Kadirgamar Institute of International
Relations and Strategic Studies, Colombo, Sri Lanka, Dec. 17, 2012.
[124] Malkanthi Hettiarachchi, “Sri Lanka’s Rehabilitation Program: A New Frontier in Counter Terrorism and Counter Insurgency,” PRISM:
Journal of the Center for Complex Operations 4, no. 2 (2013), 105-119.
[125] Malkanthi Hettiarachchi, Lead Psychologist of Sri Lanka’s Rehabilitation Program, Telephone Interview, Oct. 29, 2013.
[126] Ibid.
[127] Ibid.
[128] Ibid.
[129] Arie Kruglanski in “Sri Lanka Defense Seminar 2012: Rehabilitation of Tamil Tigers,” YouTube video, posted by “Defence Sri
Lanka,”Aug. 10, 2012, accessed July 7, 2013, http://www.youtube.com/watch?v=u-XDYL13a2M.
[130]Arie Kruglanski and Michelle Gelfand, Rehabilitation of Former LTTE Cadres in Sri Lanka: A Preliminary Report, 2011, University of
Maryland, College Park.
[131] Ibid.
[132] Arie Kruglanski in “Sri Lanka Defense Seminar 2012: Rehabilitation of Tamil Tigers,” YouTube video, posted by “Defence Sri
Lanka,”Aug. 10, 2012, accessed July 7, 2013, http://www.youtube.com/watch?v=u-XDYL13a2M.
[133] Arie Kruglanski and Michelle Gelfand, Rehabilitation of Former LTTE Cadres in Sri Lanka: A Preliminary Report, 2011, University of
Maryland, College Park.
[134] Ibid.
[135] Positive ratings were also reported by former combatants, namely: positive perceptions reported of the rehabilitation center staff
(96.43% of beneficiaries), the rehabilitation center (70.14% of beneficiaries) and the rehabilitation center guards (94.57% of beneficiaries);
Malkanthi Hettiarachchi, “Sri Lanka’s Rehabilitation Program: A New Frontier in Counter Terrorism and Counter Insurgency,” PRISM:
Journal of the Center for Complex Operations 4, no. 2 (2013), 105 - 119;
Arie Kruglanski in “Sri Lanka Defense Seminar 2012: Rehabilitation of Tamil Tigers,” YouTube video, posted by “Defence Sri Lanka,”Aug. 10,
2012, accessed July 7, 2013, http://www.youtube.com/watch?v=u-XDYL13a2M.
[136] Arie Kruglanski and Michelle Gelfand, Rehabilitation of Former LTTE Cadres in Sri Lanka: A Preliminary Report, 2011, University of
Maryland, College Park.
[137] “Executive Summary: Conference on Rehabilitation and Reintegration of Violent Extremist Offenders: Good Practices and Lessons
Learned 6-9 December 2011, The Hague,” International Centre for Counter-Terrorism (ICCT), The Hague.
[138] Angel Rabasa, Stacie L. Pettyjohn, Jeremy J. Ghez, and Christopher Boucek, (2010), “Deradicalising Islamist Extremists,” RAND
Corporation Monograph Series, RAND Corporation, Santa Monica.
[139] The Sri Lankan government has spent Rs. 2.5 billion (approximately USD 19.1 million) on the rehabilitation of former LTTE members
since May 2009 (as of December 2012); “A Group of Rehabilitated Ex-LTTE Cadres have been Recruited as Pre-school Teachers in the North
and East,” LLRCAction.gov.lk, Dec. 10, 2012, accessed Oct. 30, 2013, http://www.llrcaction.gov.lk/index.php/news/91-rehabilitation/139-
rehabilitated-ex-ltte-cadres-to-tech-at-pre-schools.
53
December 2013
PERSPECTI VES O N TERRORISM
Volume 7, Issue 6
[140] “Afghanistan Peace and Reintegration Programme (APRP),” United Nations Development Programme (UNDP) website, accessed Oct.
30, 2013, http://www.undp.org/content/afghanistan/en/home/operations/projects/crisis_prevention_and_recovery/aprp/.
[141] Christopher Boucek, “Saudi Arabia’s “Soft” Counterterrorism Strategy: Prevention, Rehabilitation, and Aftercare,” Carnegie Paper 97,
2008, Carnegie Endowment for International Peace, Washington, D.C.
[142] Malkanthi Hettiarachchi, “Sri Lanka’s Rehabilitation Program: A New Frontier in Counter Terrorism and Counter Insurgency,” PRISM:
Journal of the Center for Complex Operations 4, no. 2 (2013), 105 - 119.
[143] “Sri Lanka: Former Tamil Tigers still Searching for Reconciliation,” The Guardian, June 2, 2012, accessed Oct. 30, 2013, http://
www.theguardian.com/global-development/2012/jun/04/sri-lanka-tamil-tigers-reconciliation.
[144] S. Thillainathan, “Rehabilitation of Ex-LTTE Cadres, not Highlighted in Geneva,” Sunday Observer, March 17, 2013, accessed Oct. 30,
2013, http://www.sundayobserver.lk/2013/03/17/sec03.asp.
[145] “Wages: The Context and Issues,” Secretariat for Senior Ministers website, accessed Oct. 30, 2013, http://www.nhrep.gov.lk/index.php?
option=com_content&view=article&id=114&Itemid=59&lang=en.
[146] “Food Insecurity, Debt Rise in Sri Lanka’s North,” Jakarta Globe, Sept. 24, 2013, accessed Oct. 30, 2013, http://
www.thejakartaglobe.com/international/food-insecurity-debt-rise-in-sri-lankas-north/.
[147] Ranil Wijayapala, “Livelihood Project Loans for Ex-Combatants,” Sunday Observer, Aug. 25, 2013, accessed Oct. 30, 2013, http://
www.sundayobserver.lk/2013/08/25/sec01.asp.
[148] Deedee Derksen, “Impact or Illusion? Reintegration under the Afghanistan Peace and Reintegration Program,” Peace Brief 106
(Washington, D.C.: United States Institute of Peace (USIP), 2011).
[149] Hamed El-Said, “De-Radicalising Islamists: Programmes and their Impact in Muslim Majority States”, Developments in Radicalisation
and Political Violence (London: International Centre for the Study of Radicalisation and Political Violence (ICSR), 2012).
[150] Shehzad H. Qazi, “A War Without Bombs: Civil Society Initiatives Against Radicalisation in Pakistan,” Policy Brief 60, (Washington, D.
C.: Institute for Social and Policy Understanding (ISPU), 2013).
[151] “Three Years of Success in Post War Sri Lanka,” Ministry of Defence and Urban Development Sri Lanka website, May 24, 2012, accessed
Oct. 30, 2013,
http://www.defence.lk/new.asp?fname=three_years_of_success_in_post_war_20120523_05;
“Sri Lanka Vows to Resettle Tamils,” British Broadcasting Corporation (BBC), May 29, 2009, accessed Oct. 30, 2013, http://news.bbc.co.uk/2/
hi/south_asia/8061623.stm;
Rohan Gunaratna, “Conference Paper: Reconciliation after Terrorism: The Sri Lanka Experience,” D.B.S.Jeyaraj.com, accessed Oct. 30, 2013,
http://dbsjeyaraj.com/dbsj/archives/10144.
[152] Rohan Gunaratna, “Conference Paper: Reconciliation after Terrorism: The Sri Lanka Experience,” D.B.S.Jeyaraj.com, accessed Oct. 30,
2013, http://dbsjeyaraj.com/dbsj/archives/10144.
[153] Ajith Nivard Cabraal, “Role of the Business Community in Reconciliation,” National Conference on the Role of the Business Community
in Reconciliation Conference Report, Lakshman Kadirgamar Institute of International Relations and Strategic Studies (LKIIRSS), Colombo.
[154] “India Launches Housing Project in Sri Lanka’s Eastern Province,” Colombo Page, May 23, 2013, accessed July 7, 2013, http://
www.colombopage.com/archive_13A/May23_1369250695CH.php.
[155] Ajith Nivard Cabraal, “Role of the Business Community in Reconciliation,” National Conference on the Role of the Business Community
in Reconciliation Conference Report, Lakshman Kadirgamar Institute of International Relations and Strategic Studies (LKIIRSS), Colombo.
[156] Reconstruction of key transport infrastructure included road reconstruction in the North and East including the completion of the
Paranthan-Pooneryn Highway, A32 (Puttlam to Mannar), A35 (Paranthan to Mullaitivu), and reconstruction of 250 km of railroad
(Vavuniya-KKS, Madawachchiya-Madhu, Madu-Thailimannar, and Omanthei-Pallai). The Paranthan to Poonakari, Mankulam to Mullativu,
and Jaffna-KKS roads are under construction, and the Kandy-Jaffna A9 highway has commenced development from Galkulama to
Medawachchiya, from Vavuniya to Mankulam, and Nawatkuli to Mannar as at January 2012. The Kinniya Bridge, Trincomalee Bridge,
Mannar Bridge and causeway, Sangupidy Bridge, Navakkuli Bridge, and many smaller bridges have been completed. In June 2013, the
reconstruction of the Iranamadu Domestic Airport in Kilinochchi in the Northern Province of Sri Lanka was completed.
[157]Five major irrigation schemes and 115 minor irrigation schemes are being developed. Health services have been restored through the
construction of 164 health institutions in conflict-affected areas. A large number of small-scale sanitation constructions have been built,
including 14,539 latrines. In addition, 10,891 water wells have been cleaned.
[158]Through the Self-Help Groups (SHGs) program, 8,534 loans were disbursed amounting to Rs. 459 million in the Northern Province and
18,123 loans were disbursed amounting to Rs. 818 million in the Eastern Province between the years 2008 and 2011.
[159] The private sector organizations included Brandix Lanka, John Keells, Hayleys, Virtusa, Nestle, Lanka ORIX Finance, 99X Technology,
Academy of Design, and Mt. Lavinia Hotels.
[160] A large number of motor boats and nets have been distributed to the fishing community and several thousands of cattle, goats, and
poultry have been distributed to households in promotion of sustainable livelihood opportunities by the Ministry of Resettlement. The
Ministry also implements grassroots level participatory development programs, and has launched plans for the establishment of Millennium
Development Goals model villages in the North and East with the active participation of affected communities and other stakeholders.
54
December 2013
PERSPECTI VES O N TERRORISM
Volume 7, Issue 6
Economic zones and industrial parks have been established in the North and East, and the government has set-up vocational training centers
and technical colleges for skills development, including opportunities for youth to develop entrepreneurship skills. The “Northern Spring”
program is being implemented by the Ministry of Economic Development to develop the Northern Province with regard to infrastructure
development, agricultural and fisheries development, livelihood promotion, housing, and educational facilities and a Work Task Force under
the Ministry inspects and conducts the development projects. The Asian Development Bank (ADB) extended a loan of USD$ 154.4 million to
reconstruct 120 km of provincial roads as part of the Northern Road Connectivity Project in 2010.
[161] Interviews with two new Tamil female recruits from Kilinochchi and Mannar into the Sri Lankan Army (names withheld); Face-to-face
Interviews, “Enhancing Knowledge and Virtues” program conducted by the Office of the Director of Social Development Affairs to the
President, Presidential Secretariat, Colombo, Sri Lanka, January 11, 2013;
Brigadier Manoj Mudannayake, Chief Coordinator, Face-to-face Interview, “Enhancing Knowledge and Virtues” program conducted by the
Office of the Director of Social Development Affairs to the President, Presidential Secretariat, Colombo, Sri Lanka, January 11, 2013;
“Sri Lankan Army to Recruit 100 Tamil Girls,” Xinhua, Nov. 15, 2012, accessed Oct. 30, 2013, http://news.xinhuanet.com/english/world/
2012-11/15/c_131977103.htm.
[162] Ibid.
[163] Ibid.
[164] Ibid.
[165]Lakshman Kadirgamar Institute of International Relations and Strategic Studies (LKIIRSS), Inaugural National Conference on
Reconciliation Conference Report, 2012, Colombo.
[166]“KP, Thamilini, Daya Master Apply for UPFA Nominations,” Daily Mirror, July 3, 2013, accessed July 7, 2013, http://www.dailymirror.lk/
news/31782-kp-thamilini-daya-master-apply-for-upfa-nominations.html.
[167]The implementation of the 13th Amendment to the Sri Lankan Constitution is contested in Sri Lanka as it was not adopted
constitutionally. Although the bill on the 13th Amendment to the Constitution was passed with 136 votes for and 11 votes against it in
Parliament in 1987, a referendum was not held to seek the people’s approval as per the then majority decision of the Supreme Court. It is
believed that the then Sri Lankan President J.R. Jayawardene adopted the 13th Amendment due to rising internal pressure (terrorism) and
external pressure (threat from India), and suppressed public opposition to the 13th Amendment prevailing at the time. On 8 July 2013, the
President of Sri Lanka, Mahinda Rajapaksa, communicated to the visiting Indian National Security Advisor, Shiv Shanker Menon that
devolving land and police powers to the provinces as provisioned by the 13th Amendment was problematic for a country small in size such as
Sri Lanka. It is believed that the central government of India continues to feel pressure from the southern state of Tamil Nadu to push Sri
Lanka to adopt the 13th Amendment. During a one-to-one meeting on the same day with the Indian National Security Advisor, Gotabhaya
Rajapaksa, Defence Secretary of Sri Lanka, stated unequivocally that the repeal of the devolution of police powers to the provinces under the
13th Amendment was “non-negotiable”. The Sri Lankan Secretary of Defence stated that devolution of police powers to the provinces will
undermine the national security of Sri Lanka and that it will thus not serve to alleviate (political) grievances faced by the Tamil minority
community in Sri Lanka. The Supreme Court of Sri Lanka decided unanimously on 26 September 2013 that land powers are vested in the
Central Government and not the Provincial Governments, according to the 13th Amendment to the Constitution;
“President Urges India to Pressure TNA to join PSC,” The Island, July 9, 2013, accessed Sept. 25, 2013, http://www.island.lk/index.php?
page_cat=article-details&page=article-details&code_title=83201;
“Not Devolving Police Powers under 13A Non-negotiable, Gota tells Menon,” The Island, July 13, 2013, accessed Sept. 25, 2013, http://
www.island.lk/index.php?page_cat=article-details&page=article-details&code_title=83532;
“Pressure Sri Lanka against Repealing 13th Amendment, Jayalalithaa Urges Centre,” The Hindu, July 14, 2013, accessed Sept. 25, 2013, http://
www.thehindu.com/news/national/tamil-nadu/pressure-sri-lanka-against-repealing-13th-amendment-jayalalithaa-urges-centre/
article4914818.ece;
“Video: SC Determines Land Powers with Centre,” Daily Mirror, Sept. 26, 2013, accessed Oct. 30, 2013, http://www.dailymirror.lk/news/
36086-sc-determines-land-powers-with-centre.html;
“Judgment on Land: Story Untold,” The Sunday Times, Sept. 29, 2013, accessed Oct. 30, 2013, http://www.sundaytimes.lk/130929/news/
judgment-on-land-story-untold-64191.html.
[168] “TNA Hasn’t Abandoned “Eelam” Ideology – Sri Lankan Minister,” Tamil Guardian, July 5, 2013, accessed July 7, 2013, http://
www.tamilguardian.com/article.asp?articleid=8238.
[169] S. Ferdinando, “Overseas Tigers Shaken by Debilitating Split,” The Island, March 13, 2011, accessed July 7, 2013, http://www.island.lk/
index.php?page_cat=article-details&page=article-details&code_title=20629;
L. Keerthisinghe, “TGTE’s Call for a UN Monitored Protection Mechanism in North and East,” Daily News, May 29, 2013, accessed July 7,
2013, http://www.dailynews.lk/2013/05/29/fea03.asp;
“TNA Hasn’t Abandoned “Eelam” Ideology – Sri Lankan Minister,” Tamil Guardian, July 5, 2013, accessed July 7, 2013, http://
www.tamilguardian.com/article.asp?articleid=8238;
“Expelled German NGO in Talks with TNA, TNPF, GTF,” The Island, July 2 2013, accessed Oct. 30, 2013, http://www.island.lk/index.php?
page_cat=article-details&page=article-details&code_title=82716.
[170] “UNHRC Member States Commend Progress in Sri Lanka's Reconciliation Process,” Colombo Page, Sept. 28, 2013, accessed Oct. 30,
2013, http://www.colombopage.com/archive_13B/Sep28_1380351664CH.php.
55
December 2013
PERSPECTI VES O N TERRORISM
Volume 7, Issue 6
[171]Rajiva Wijesinha, “Towards Reconciliation”, Special Report: Commonwealth Heads of Government Meeting 2013 (London: First, 2013).
[172] “Food Insecurity, Debt Rise in Sri Lanka’s North,” Jakarta Globe, Sept. 24, 2013, accessed Oct. 30, 2013, http://
www.thejakartaglobe.com/international/food-insecurity-debt-rise-in-sri-lankas-north/.
[173] Rajiva Wijesinha, “Towards Reconciliation”, Special Report: Commonwealth Heads of Government Meeting 2013 (London: First, 2013).
[174] “Sri Lanka Police deploy thousands of Tamil speaking officers to the North and East,” Colombo Page, Dec. 5, 2013, accessed Dec. 9,
2013, http://www.colombopage.com/archive_13B/Dec05_1386227181JV.php.
[175] “Presidential Commission to Investigate Missing Persons,” The Island, Aug. 14, 2013, accessed Oct. 30, 2013, http://www.island.lk/
index.php?page_cat=article-details&page=article-details&code_title=85837;
“Commissioners Appointed to Investigate into Missing Persons,” Daily Mirror, Aug. 14, 2013, accessed Oct. 30, http://www.dailymirror.lk/
news/33824-commission-appointed-to-investigate-into-missing-persons.html.
[176] Ibid.
[177] “UNHRC Member States Commend Progress in Sri Lanka's Reconciliation Process,” Colombo Page, Sept. 28, 2013, accessed Oct. 30,
2013, http://www.colombopage.com/archive_13B/Sep28_1380351664CH.php.
[178] “‘Harmony Centres’ in Campuses to Resolve Student Issues,” The Sunday Times, Aug. 18, 2013, accessed Oct. 30, 2013, http://
www.sundaytimes.lk/130818/news/harmony-centres-in-campuses-to-resolve-student-issues-58186.html.
[179]Dasun Edirisinghe, “No More New Ethnicity-based Schools,” The Island, July 7, 2013, accessed Oct. 30, 2013, http://www.island.lk/
index.php?page_cat=article-details&page=article-details&code_title=83070.
[180] “Sri Lanka Makes Public Draft Policy on Reconciliation,” China Daily, March 11, 2012, accessed July 7, 2013, http://
www.chinadaily.com.cn/xinhua/2012-03-11/content_5383572.html.
[181]“About Us”, Sri Lankan Reconciliation Youth Forum website, accessed July 7, 2013, http://reconciliationyouthforum.org/.
[182]The National Conferences on Reconciliation are conducted to engage the diverse sectors of society. The Kadirgamar Institute has
conducted seven National Conferences on Reconciliation thus far: Inaugural National Conference on Reconciliation (November 24, 2011),
National Conference on the Role of the Business Community in Reconciliation (January 24, 2012), National Conference on the Role of
Education in Reconciliation (March 13, 2012), National Conference on the Role of Women in Reconciliation (July 23, 2012), National
Conference on the Role of ICT in Reconciliation (September 18, 2012), the National Conference on the Role of Youth in Reconciliation
(January 2, 2013), and the National Conference on the Role of Arts and Culture in Reconciliation (May 16, 2013). Post-conference policy
papers with recommendations to the Government on how to facilitate different segments of society in reconciliation efforts have been
developed by the institute.
[183]Mark Taking the National Reconciliation Conference series outside of Colombo for the greater benefit and participation of the conflict-
affected community, the University Grants Commission (UGC) of Sri Lanka and the University of Jaffna organized the National Conference
on the Role of Higher Education in Reconciliation on June 13-14, 2013 in Jaffna, northern Sri Lanka, marking the university community’s
commitment to the national reconciliation process.
A “National Program Promoting Ethnic Harmony and Developing Leadership Skills of Students from Conflict-affected Areas in the North
and East and Difficult Areas in the South” (“Sisu Diriya National Program”) has been in operation since 2006, and is conducted by the Office
of the Director of Social Development Affairs to the President, Presidential Secretariat. The program is aimed at reducing post-traumatic
stress, reviving the education of children who have been displaced and whose education was disrupted by LTTE activities, developing
leadership skills of youth, and promoting interaction between ethnic groups to contribute to national interethnic and interreligious harmony.
The Office of the Director of Social Development Affairs to the President together with the University Grants Commission of Sri Lanka are
presently planning the establishment of Harmony Centers in all universities, schools, and districts to conduct activities in reconciliation.
An outstanding example of a non-state initiated reconciliation program in Sri Lanka are the dance performances undertaken by the Aru Sri
Art Theatre. This theatre, founded in 2004 by Mrs. Arunthathy Sri Ranganathan, promotes ethnic harmony through visual and performing
arts and has conducted numerous dances and multicultural concerts with this goal. These performances include the Oriental Music Orchestra
performance in Sri Lanka on March 6, 2012, in which 100 young musicians from all districts of Sri Lanka performed in unison. Aru Sri Art
Theatre also held a dance festival in Bintaan, Indonesia, on April 12-13, 2012 and in Singapore on April 14, 2012, where Sinhalese (Buddhist
and Christian) and Tamil (Hindu and Christian) dancers presented dances together under Hindu themes in performing two classical
Bharathanatya compositions and the Cosmic Dance of Shiva.
[184] John Horgan and Kurt Braddok (2010), “Rehabilitating the Terrorists?: Challenges in Assessing the Effectiveness of Deradicalisation
Programs”, Terrorism and Political Violence, 22: 267 - 291.
[185] “Food Insecurity, Debt Rise in Sri Lanka’s North,” Jakarta Globe, Sept. 24, 2013, accessed Oct. 30, 2013, http://
www.thejakartaglobe.com/international/food-insecurity-debt-rise-in-sri-lankas-north/.
[186] Rajiva Wijesinha, “Towards Reconciliation”, Special Report: Commonwealth Heads of Government Meeting 2013 (London: First, 2013).
[187] Ibid.
[188] Hamed El-Said, “De-Radicalising Islamists: Programmes and their Impact in Muslim Majority States”, Developments in Radicalisation
and Political Violence, 2012, International Centre for the Study of Radicalisation and Political Violence (ICSR), London.
[189] Sunimal Fernando, Ten Year National Plan for a Trilingual Sri Lanka (2012 – 2021): Draft Plan 22nd June 2011, The Official Website of
the Data and Information Unit of the Presidential Secretariat, Sri Lanka, accessed Oct. 30, 2013,
56
December 2013
PERSPECTI VES O N TERRORISM
Volume 7, Issue 6
http://www.priu.gov.lk/news_update/Current_Affairs/Ten%20Year%20National%20Plan%20-%20English.pdf.
[190] Rajiva Wijesinha, “Towards Reconciliation”, Special Report: Commonwealth Heads of Government Meeting 2013 (London: First, 2013).
[191] Ibid.
[192] Iromi Dharmawardhane, ”Sri Lanka: The Role of Arts and Culture in Reconciliation”, Eurasia Review, April 23, 2012, accessed July 7,
2013, http://www.eurasiareview.com/23042012-sri-lanka-the-role-of-arts-and-culture-in-reconciliation-analysis/.
[193] “Sharma Welcomes SL Census,” Daily Mirror, Dec. 9, 2013, accessed Dec. 9, 2013, http://www.dailymirror.lk/news/39692-sharma-
welcomes-sl-census.html;
“Sri Lanka Informs Diplomatic Community of Current Developments in the Country”, Colombo Page, Dec. 9, 2013, accessed Dec. 9, 2013,
http://www.colombopage.com/archive_13B/Dec09_1386529712CH.php.
[194]For example, pro-LTTE groups such as “Boycott Sri Lanka” (http://www.boycottsrilanka.com/) work to discourage the purchase of
goods produced in Sri Lanka;
Tamil diaspora groups call for the boycott of Sri Lankan goods and services, for example the boycott of Sri Lankan Airlines in January 2008:
“Tamil Diaspora calls for Sri Lankan Boycott,” Tamil Guardian, Jan. 23, 2008, accessed Oct. 30, 2013, http://www.tamilguardian.com/
article.asp?articleid=1545.
[195] “The Concept and Beginning of the "Thamilcholai" School System,” Ministry of Defence and Urban Development Sri Lanka website, Dec.
12, 2012, accessed Oct. 30, 2013, http://www.defence.lk/new.asp?fname=20111205_03.
[196] T. Thavarajah, “LTTE Deception will be Exposed with EU Ban - Karuna Group,” The Island, May 30, 2006, accessed Oct. 30, 2013,
http://www.island.lk/2006/05/30/opinion2.html.
[197] “Miliband and London Tamil Protests of 2009 – WikiLeak,” IndyMedia.org, last updated Dec. 10, 2010, accessed Oct. 30, 2013, http://
www.indymedia.org.uk/en/2010/12/469470.html;
Julian Borger, “Wikileaks Cables: David Miliband Focused on Sri Lankan War 'to Win Votes',” The Guardian, Dec. 1, 2010, accessed Oct. 30,
2013, http://www.theguardian.com/world/2010/dec/01/wikileaks-david-miliband-sri-lanka.
57
December 2013
PERSPECTI VES O N TERRORISM
Volume 7, Issue 6
Abstract
It is often assumed that there is a strong correlation, if not a causal relationship between varieties
of Muslim thought and violent tendencies. Salafism is often associated with intolerance and
violence and Sufism with tolerance and nonviolence. In this article we demonstrate that these
assumptions are baseless. Based on analysis of historical and contemporary cases from Southeast
Asia and West Africa, we show that there is no significant correlation between theology and
violent tendencies. Some violent groups are Sufi and others Salafi, while some non-violent groups
are Salafi, others Sufi. Policy makers are therefore ill-advised to use theological orientation as a
factor in assessing the violent potential of Muslim movements and organisations.
Introduction
In policy oriented and (to a lesser extent) academic literature on political Islam there is a
pervasive assumption that Salafism, especially its Wahhabi variant, is tied to violent extremism
and that Sufism (Muslim mysticism) is inherently tolerant and peaceful. These assumptions are
virtually axiomatic and rarely subject to serious scrutiny. The academic literature on Sufism
tends to focus on classical texts by Rabi’a al-Adawiyya (713-801), Muhyi’l-Din ibn’l-Arabi
(1165-1240), Jalaluddin al-Rumi (1207-1273) and other gnostic Sufis whose major themes
were the love of God, the quest for union with the divine and the equivalence of all religions.
[1] This orientation is mirrored in the anthropological literature that champions popular
Sufism for acceptance of local cultures and the role of peaceful Sufi syechs and merchants in
the spread of Islam.[2] Carl Ernst observes that there has been a tendency for western scholars
to view Sufism as a peaceful alternative to an inherently violent orthodox Islam since the early
nineteenth century.[3] Salafis are typically depicted as exclusivist, intolerant of local cultures
and other religions and, particularly in the post-9/11 literature, as being the embodiment of
inherently violent Islam, and are associated with “conversion by the sword.” [4] Ibn Saud’s 18th
century wars of conquest and Rumi’s 13th century verses about churches, mosques and
synagogues as houses of God have become archetypes in contemporary Western discourse
about Salafis and Sufis.
These views are perhaps most clearly articulated in the writings of Ed Husain and Stephen
Schwartz and others located on the cusp of scholarship and advocacy journalism. Even though
they are highly polemical, their works are important because they are more widely read, and
58
December 2013
PERSPECTI VES O N TERRORISM
Volume 7, Issue 6
arguably have greater influence on the policy community, than those of more objective
academic authors.
Schwartz has written that: “Sufis seek mutual civility, interaction, a cooperation between every
human being.” He describes Muhammad Ibn Abd al-Wahhab (1703-1792), the founder of the
Salafi sect that carries his name, as “a simpleton from the wilderness,” whose teachings
inspired: “Al-Qaida on September 11, 2001, as well as in Iraq and everywhere else the terrorist
conspiracy sheds blood.” He characterizes al-Wahhab’s principal theological work, Kitab
Tawhid (The Book of the Unity of God), as: “a handbook for the interrogation and punishment
of ‘thoughtcrime.’” [5]
Husain states that: “Almost all Salafis believe and constantly remind each other of the need to
be loyal only to Muslims, and to hate, be suspicious of, not work in alliance with, and ensure
only minimal/necessary interaction with non-Muslims. This attitude is underpinned by the
Salafi creedal belief in al-wala wa al-bara, broadly translated as fidelity to Muslims and hatred
for non-Muslims.” [6] Madawi al-Rasheed [7] and Quintan Wiktorowicz [8] are more nuanced
but retain the view that Salafism is inherently intolerant, makes pervasive use of demonisation
and other forms of symbolic violence, and the ideology if not practice of jihad. Wiktorowicz,
for example, distinguishes between reformist and jihadi Salafis but maintains that reformist
refrain from violence only because the Muslim community is not yet ready for jihad.
In this article we make two basic points about the violent Salafi/peaceful Sufi dichotomy: 1. It
is factually incorrect. 2. Theological orientation cannot be used as a predictor of either violent
or nonviolent behaviour. Broadly defined theological orientations including Salafism and
Sufism are not prime movers or causal factors leading to either acceptance or rejection of
violence against religious others as a political strategy. They can, however, be used to
legitimate a priori dispositions towards both. In the case of violent movements many
theologies become tools for the demonisation of designated enemy others. The very same
theologies can be used to promote tolerance, and even acceptance of religious diversity.
The analysis presented here relies on ethnographic, historical and survey data and methods for
modeling Muslim social movements developed at the Centre for the Study of Religion and
Conflict at Arizona State University based on objective criteria that do not reference the
theological issues central to debates between Salafis and Sufis.[9] We draw on examples of
violent and nonviolent Sufi and Salafi movements in Southeast Asia and West Africa we have
observed since 2008 and on historical cases from both regions dating to the 17th century.
These regions are significant because they are home to some of the world’s largest Muslim
populations, and strategically important because of concerted efforts by the Saudi state, Saudi-
sponsored non-governmental organisations and private donors to spread Salafi teachings.
Violence is taken as a dependent variable and we made no a priori assumptions concerning
independent variables. In this paper we report on negative findings. Theological factors,
including the difference between Sufism and Salafism are not associated with violence or non-
violence. Our findings parallel those of the US government sponsored Political Instability
59
December 2013
PERSPECTI VES O N TERRORISM
Volume 7, Issue 6
Taskforce, according to which religious differences are not statistically significant factors in
models forecasting internal conflicts such as civil wars and rebellions.[10]
Our analysis is based on ethnographic fieldwork conducted in both regions and is framed by
works of other scholars concerned with the history of Islam in these areas and the Middle
East. Comparative ethnographic research was guided by cross-regional consultation and the
use of common research protocols. In this paper we examine ways in which Muslims of both
theological orientations alternatively reject and embrace violence relying on a combination of
ethnographic and historical data.
Varieties of Sufism
Sufism is what Anne Marie Schimmel called “the mystical dimension of Islam.” [12] It is
grounded in individual experience of, and self-identification with, God. The Sufi quest is often
described as a journey (sair illallah) beginning with withdrawal from the world and reflection
on religious and social truths. Reflection leads to meditation (muraqaba) cultivating such
virtues as repentance, morality, and trust in God. When the cultivation of one virtue is
complete, the traveller receives signs urging her/him to move on to another. The final
destination is the state of al-fana (annihilation): overcoming the ego, erasing will and volition
and emptying the self so that it can be filled with God’s vision, love and will. This leads to bliss,
a sense of being one with God and the cosmos, appreciation of the meanings of life and Islam,
heightened ethical consciousness and patterns of social relations rooted in it. Sufism can
assume a myriad of ethical, philosophical and institutional forms.
Ethical Sufism is based on the concept of ihsan (goodness). Husn, the root from which ihsan
is derived, refers to positive qualities in general. God is al-Muhsin, the doer of Ihsan. The
Qur’an also connects ihsan to everything praiseworthy, including sincerity, trust in God,
worship, love and good deeds.[13] Ethical Sufism dates to the first centuries of the Islamic era.
It began as a moral protest against political triumphalism, rigid legalism and ritualistic piety in
60
December 2013
PERSPECTI VES O N TERRORISM
Volume 7, Issue 6
the early periods of Islamic history. Its most basic themes are renunciation of individual will
and everything other than God. It took several distinctive forms. Hasan al-Basri (642-728)
stressed abandoning concern with the material world; Rabi’a al-Adawiyya (713-801) is
renowned for her all-consuming love of God and efforts to aid the poor despite her own
poverty; Al-Harith ibn Asad Al-Muhasabi (781-857), developed strategies for introspection
and the cultivation of virtue. Abu Hamid al-Ghazali wove these themes together in his
Alchemy of Happiness, considered by many to be the classical formulation of ethical Sufism.
[14] An overarching theme is that love of God should come before desire of worldly and
otherworldly rewards.
Ethical Sufism is basically apolitical, though it often leads to protests against manifest injustice.
The writings of the early Ethical Sufis, especially those of al-Ghazali are read and admired
throughout the Muslim world. Even Wahhabis who are unrelenting in their opposition to
philosophical and institutional Sufism, are drawn to these ethical teachings.[15]
Philosophical Sufism focuses on attaining insight into spiritual meanings of Islam, the
metaphysical foundations of existence and relationships between creator and created. It
teaches that there is only one reality of which everything else is an expression. This Absolute
Being is often called al-Haqq (The Truth). It is undivided, eternal, and unknowable by
ordinary means. It manifests itself in creation through which it is known; hence it is manifest
in and hidden from creation. The Sufi journey leads to realisation of this truth.
Sufi thinkers express their insights into these questions in quite different ways. Four of the
most influential are Muhyi’l-Din ibn al-Arabi (1165-1240), known for his complex, esoteric
formulations of Sufi teachings; Jalaluddin al-Rumi (1207-1273), widely acknowledged as the
greatest of the Sufi poets; Khawaja Muhammad Hafez-e Shirazi (1325-1390), a Persian poet
whose works are widely know throughout Asia as well as his native Iran; and Mansur al-Hallaj
(858-922), known for bold, seemingly heretical statements concerning relationships between
humanity and divinity and disregard for rituals including the five daily prayers required by the
Shari’ah. While they differ in detail, these Sufi luminaries share a unitarian conception of
reality and the view that the mystical path culminates in union with the divine.[16]
Ibn al-Arabi wrote at least four hundred books in which he formulated complex mystical-
doctrinal systems. He claimed they were divinely inspired and Prophet Muhammad had
dictated some of them to him. Ibn al-Arabi’s most basic contribution to Sufism was the
doctrine of wahdat al-wujud (Unity of Being). According to Ibn al-Arabi, creation is the self-
manifestation of the Truth, and the cosmos is a mirror image of the Creator. Divinity and
humanity are only superficially distinct. The divine is the inward aspect, while the human
form is the outward aspect of the Truth. Humans are microcosms of the whole of creation. An
individual attaining the highest level of mystical consciousness becomes al-insan al-kamil, the
Perfect Human and the fullest manifestation of Divine Reality. One of the implications of
wahdat al-wujud is that ultimately nothing is real except the Divine. This is a Philosophical
Sufi interpretation of tauhid.[17]
61
December 2013
PERSPECTI VES O N TERRORISM
Volume 7, Issue 6
While Ibn al-Arabi relied on scholastic logic, Rumi relied on poetic and narrative forms and
appealed to emotion. Rumi combined the doctrine of the unity of being with an emphasis on
divine love that unites the created with creator, often referred to as lover and beloved. For
Rumi, duality and division are illusions. It follows that sectarian differences, even those
between Muslims and “unbelievers” are at once illusionary and an unfolding of Divine Truth.
Hence his statement that the person of God is “beyond infidelity and religion.” [18] Rumi also
describes those traversing the mystical path as being without religion or ethnicity, in a shared
quest for, and love of the One. Rumi’s popularity in Europe and North America is among the
factors contributing to the belief that Sufism is inherently peaceful and tolerant.
Ibn al-Arabi, Rumi and most other philosophical Sufis offered only muted critiques of
orthodox piety. Al-Hallaj, on the other hand, offered vocal, public critiques of outward piety.
Like other Sufis, he distinguished between the outward form (zahir) of Islam associated with
the Shar’iah and the internal essence (batin), associated with Sufism. His lack of concern with
externality led him to flagrant violation of Shar’iah to make the point that true piety is more
than ritualistic compliance with Shar’iah. He is also famous for verbal outbursts contradicting
basic Islamic tenets such as: “I am the Truth” for which he was executed, or martyred,
depending on one’s point of view. While most Muslim religious authorities hold such views to
be scandalous, they are nonetheless an enduring element of philosophical Sufi discourse and
of popular Sufism, especially in South and Southeast Asia [19] Works by Rumi and Ibn al-
Arabi are part of the curriculum in many Islamic schools in Southeast Asia and West Africa.
They are also discussed in public religious talks, especially during the fasting month of
Ramadan.
Institutional Sufism emerged gradually. Its origins are obscure and complex. By the 12th
century it took the form of hierarchically organised religious orders known as tariqa.[20] Each
has a particular formulation of the mystical path and set of devotional practices adopted from
ethical and philosophical Sufism. Other beliefs and practices are rooted in local cultures. Some
of these religious orders remained local, while others spread throughout the Muslim world.
They were also among vehicles through which Islam spread in Africa and Asia.[21] Today Sufi
religious orders continue to play important roles in Muslim life nearly everywhere even in
countries where they have been outlawed and forced underground by Salafi (Saudi Arabia) or
secular (Turkey) governments. There are also increasingly globalized Sufi networks that rely
on the Internet to telescope relationships between local devotees and their globally oriented
leaders.
Saint veneration is an important component of institutional Sufism and popular Islam nearly
everywhere. People believed to have journeyed far on the mystical path are revered as saints
(friends of God). Saints are thought to have mystical or magical powers and the ability to
bestow blessing (barakah) and healing and to help their devotees with the problems of daily
life. The quest for barakah also motivates pilgrimage to the graves of saints (ziyarah), one of
the most popular forms of Sufi piety in West Africa, Southeast Asia and elsewhere in the
Muslim world. Others visit graves simply to show respect to the holy woman or man.[22]
62
December 2013
PERSPECTI VES O N TERRORISM
Volume 7, Issue 6
Differences concerning the propriety of saint veneration are among the most contentious
issues in contemporary conflicts between Sufis and Salafis. In Saudi Arabia, Yemen, Mali,
Malaysia and Indonesia Salafis have earned the undying enmity of Sufis for destroying holy
graves. The emotional intensity of these conflicts cannot be overstated.
From the 13th century until the rise of Salafi movements in the 19th century Sufism permeated
Muslim discourse. Institutional Sufism was particularly influential. [23] In West Africa and
Southeast Asia Sufis still constitute substantial majorities of the Muslim populations. In
Indonesia, for example, a survey conducted by the Centre for the Study of Religion and
Conflict at Arizona State University in 2013 indicated that 77.5% of Muslims regard the core
Sufi devotional practice of visiting graves to be essential or desirable, while only 2.1%
responded that it is essential not to do. In Nigeria a survey conducted in 2011 showed 78.3%
of Muslims regard visiting graves as essential or desirable while 15.4% responded that it is
essential not to do.
In societies in which the validity of mystical insight is widely accepted, those who possess it
easily acquire enormous moral authority and social influence that can easily be translated into
political authority. Many historical and contemporary rulers have sought moral authority
through the patronage of Sufi orders; some go to the extreme of depicting themselves as saints.
[24] In Southeast Asia and West Africa Sufi sultanates that have limited (Yogyakarta,
Indonesia) or no (Sokoto, Nigeria) formal authority continue to exercise enormous moral
authority and political influence. Sufi moral authority has also been used for grassroots social
mobilization, including the instigation of rebellions and insurgencies.[25] The most recent
example is an invasion of the Malaysian state of Sabah by claimants to the throne of the Sulu
Sultanate in the Southern Philippines.
Varieties of Salafism
Salafism is a conservative, behaviourally oriented form of Islam. Wahhabism is a variety of
Salafism founded in Arabia in the 18th century, and is the official religion of Saudi Arabia
today.[26] Linguistically, Salafi is an abbreviation of al-salaf al-salih (the pious ancestors).
Salafism seeks to preserve or re-establish visions of Islam believed to have been practiced by
the Prophet Muhammad and his companions. It focuses primarily on “correct” religious and
social behaviour. Salafis focus on Sunnah (the practice of the Prophet Muhammad as recorded
in Hadith), as a model for subsequent generations of Muslims. Anything other than this is
considered religiously reprehensible innovation (bida). Non-salafi Muslims also value Sunnah
but distinguish between commendable and reprehensible innovation. Salafis have little use for
the Sufi cultivation of intuitive knowledge of God.
Salafism has been a persistent strand in Muslim discourse since the 9th century. It has taken
many forms, and debates about who are the true Salafis are bitterly contested. Three related
concepts—scriptural literalism, scriptural theology, and a revivalist ethos—are central to all
forms of Salafism. Salafis regard scripture as God’s clear commands that require
63
December 2013
PERSPECTI VES O N TERRORISM
Volume 7, Issue 6
implementation. Other Muslims regard scripture as communication from God that must be
studied and understood prior to implementation. Many Salafis condemn Sufism and local
cultural practices as unbelief that negates Islamic identity. This practice, known as takfir is
among the doctrinal roots of Salafi radicalism.
There are other beliefs and practices on which Salafis differ. The most politically salient
difference is that between pacifists who emphasize personal, social and ritual purity in their
own communities, and activists who seek to impose their views on others. Activist strategies
include preaching, the use of print, broadcast and electronic media as tools for proselytization,
participation in electoral politics and violent jihad, among others.
Most variants of Salafism can be traced to the teachings of the 8th-9th century jurist Ahmad
Ibn Hanbal (780-855). Subsequent Salafi luminaries, whose works remain influential, include
the 13th-14th century Hanbalite jurist Ibn Tamiyyah (1263-1328) and Muhammad b. Abd al-
Wahhab (1703-1792) the founder of the Wahhabi sect. There are many others who are not as
well known.
Ibn Hanbal maintained that only the Qur’an and Hadith are legitimate sources of law and
theology. He rejected Aristotelian logic that began to influence Muslim thought in the 8th
century and metaphorical readings of scripture. He was particularly concerned with
maintaining the “purity” of ritual practice and religious belief. He regarded post 7th century
developments to be unacceptable bida.[27]
Ibn Tamiyyah was the systematiser of Salafi thought. He reaffirmed Ibn Hanbal’s scriptural
conservatism and introduced an uncompromising literalist interpretation of tauhid. He taught
that worship and devotion should be directed to God without any intermediary. For Ibn
Tamiyyah, seeking the blessings of angles, saints and righteous people, and pilgrimage to
tombs of saints is polytheism (shirk). This is the gravest sin in Islam, which if not recanted,
leads to eternal damnation and can be punished by execution. This position rapidly became
one of the defining features of Salafism. It is extremely controversial and brings Salafis into
conflict with most other Muslims, for whom these practices are central elements of Muslim
piety.[28]
Early Salafi thought was not inherently political, but became so because it challenged the
established orthodoxy tied to institutional Sufism. Ibn Hanbal avoided the sectarian
controversies that divided the Muslim community of his day. The contentious nature of these
debates had made heresy a grave concern in intellectual circles and the community at large
and hence to the political leadership that valued stability. Ibn Taymiyyah, on the other hand,
was known for heated polemics that led to conflict with religious and political authorities. He
was jailed for his polemical teachings five times and died in prison.
Ibn Abd al-Wahhab was the first Salafi scholar to have the opportunity to establish his
theological views as socio-political reality. He was born into a family of Hanbalite jurists in
Najd, a remote region in Eastern Arabia. He studied with leading Hanbali scholars in Syria,
64
December 2013
PERSPECTI VES O N TERRORISM
Volume 7, Issue 6
Iraq and Iran as well as in Mecca and Medina. He returned to Najd in 1750 and began
preaching against customs and religious practices he considered to be shirk. His major
contribution to Salafi thought was Kitab al-Tawhid, in which he summarized Ibn Taymiyyah's
understanding of shirk. He distinguished between greater and lesser shirk. Both lead to eternal
damnation but only greater shirk is punishable (by death) in this world. Greater shirk includes
the use of amulets, traditional healing practices and saint veneration. Lesser shirk is belief in
causality other than that of God and public displays of religious piety including the collective
devotional practices of Sufi orders.[29]
Initially Ibn Abd al-Wahhab failed to convince the people of Najd to accept Salafism. He then
contracted an alliance Muhammad Ibn Saud (d. 1765) the Emir of Dar'iyyah in northeastern
Arabia. The alliance stipulated that Ibn Saud would support Ibn Abd al-Wahhab’s religious
program in return for his endorsement of Ibn Saud’s political agenda. Saudi conquests of most
of Arabia led to the establishment of a Wahhabi theocracy in which the coercive power of the
state is used to enforce Salafi norms.[30] It is important to note that many Saudi-Wahhabi
social norms, especially restrictions on women’s public roles, are rooted in Najd Bedouin
culture as much as in Islamic scripture, if not more so.
Like Sufism, Salafism is not inherently political. Salafi moral authority flows from the claim
that it seeks to restore Islam to its pristine condition. If this claim is accepted, Salafism
becomes a powerful basis for social mobilization against grievances including colonialism,
corruption, economic inequality, political disenfranchisement and other forms of injustice.
The oil boom of the 1970s and 1980s enabled the Saudi government and foundations backed
by the royal family including the Muslim World League (Rabita al-Alam al-Islami/MWL) to
devote enormous financial resources to attempts to spread Salafism.[31] The League has
played a crucial role in promoting Salafism in Southeast Asia and West Africa. MWL provides
scholarships for students to study at Saudi Arabian Islamic Universities and supports schools
and mosques that graduates establish when they return home.[32]
Religious Orientations and Violence: Southeast Asian and West African Cases
Wahhabism and Salafism have been associated with violence and terrorism because Al Qaeda
and related terrorist organisations embrace the synthesis of Wahhabi religious teachings and
Muslim Brotherhood activism formulated by Sayid Qutb.[33] There are Southeast Asian and
West African Salafi groups that share this orientation and others that steadfastly oppose
violence. There are also violent and nonviolent organisations rooted in Sufi teachings in both
regions. There are also groups of both religious orientations that have alternated between
participating in, and opposing, violence in shifting political contexts. There is also a tendency
for Salafis to seek accommodation with other Muslims on social and religious issues that do
not compromise their understanding of tauhid. There are Salafi movements in West Africa
and Southeast Asia that originally engaged in harsh takfir that now view their Sufi opponents
65
December 2013
PERSPECTI VES O N TERRORISM
Volume 7, Issue 6
as Muslims of a different type with whom they share common social and sometimes political
agendas. This is what Woodward (et al) have described as the “domestication” of Salafism.[34]
This circle contributed to the development of Salafism and exerted an equally strong influence
on the development of Shar’iah centric Sufism. Ibrahim al-Kurani (1616-1690) was among the
most renowned 17th century Ahli Hadith scholars. He was known for mastery of Hadith and
his exposition of Ibn al-Arabi’s Philosophical Sufism. He was the founder of Salafi and Sufi
lineages that are influential in Southeast Asia and West Africa to this day.[37] The West
African lineages gravitated toward Salafism and those in Southeast Asia towards Shari’ah
centric Sufism.
Salih al-Fulani (1753-1803), from present day Guinea, was one of the leading figures in the
Ahli Hadith movement at the end of the 18th century He was a contemporary of Muhammad
ibn Abd al-Wahhab, though the nature of their relationship is not known. West African
scholars from this lineage including Abd al-Rahman al-Ifriqi, (1908-1957) and Umar al-Falata
(1925-1999) figured significantly in the Saudi religious establishment in the 20th century.[38]
Southeast Asian ulama were prominent in Sufi orders and Shafite legal scholarship in Mecca
and Medina throughout 19th and early 20th centuries.[39] Most returned to their native lands
after the Saudi conquest of the holy cities in 1926. Organised Salafi movements first developed
in Southeast Asia in the mid-19th century and in West Africa a century later. In both regions
these movements focused on local concerns as well as on the trans-regional Salafi issues of
theological and ritual purity.
66
December 2013
PERSPECTI VES O N TERRORISM
Volume 7, Issue 6
Subbanu al-Muslimin has been most successful in urban areas. It is a middle class movement,
appealing primarily to modern elites and merchants. Salafi movements have also resonated
with the urban middle class in Burkina Faso, Cote d’Ivoire, Ghana and Niger.[40] Subbanu al-
Muslimin’s anti-Sufi rhetoric has sometimes led to violent confrontations with supporters of
Sufi orders, who remain the majority in West African Muslim societies. By the 1990s the
frequency and intensity of these clashes had diminished as the ethos of confrontation gave way
to one of what Kaba terms “the new ethic of disagreement” in which Sufis and Salafis
understand each other, not as kafir, but as different kinds of Muslims.[41] There have been
similar developments throughout West Africa.
Jama’atu Izalat al-Bid’a wa Iqamat al-Sunna (the group removing bida and restoring the
Sunna/ Izala) is the largest and most influential Salafi movement in West Africa.[42] It was
founded in Jos, Nigeria in 1978 and has branches in neighboring countries. Like other West
African Salafi movements Izala sponsors modern Islamic schools, opposes Sufism and
traditional cultural practices, and often engages in harsh takfiri rhetoric.
Izala also has features reflecting its north Nigerian origins. For example, its organisational
structure and performative style reflect the political culture of the military regimes that ruled
Nigeria for extended periods (1969-1979, 1984-1999). Izala is hierarchically organised with a
centralized top-down leadership. It also has a security force whose members wear military-
style uniforms. They serve as guards and escorts for Izala officials to whom they give military
style salutes at public events.
Izala was founded by al-Shaykh Abubakar Mahmud Gumi (1922-1992). He was educated in
traditional Islamic schools in Nigeria and developed his Salafi ideas independently in the
1940s. He was especially concerned with bida and the purification of ritual practice. He
studied in the Sudan during the 1950s and became closely associated with the Saudi Wahhabi
establishment in the 1950s-1960s. He was Grand Kadi (judge) of Northern Nigeria
(1962-1976). He was also a founding member of WML and was instrumental in securing
scholarships for Nigerian students to study in Saudi Arabian Islamic universities. Gumi made
effective use of modern mass media, especially radio and newspapers to spread Salafi ideas,
67
December 2013
PERSPECTI VES O N TERRORISM
Volume 7, Issue 6
most notably vehement takfiri denunciation of Sufi orders. A Sufi backlash in the mid-1970s
led Gumi’s followers to establish Izala as a formal organisation.
Like many Salafi movements Izala is prone to factionalism. Some splinter groups moderated
their views and sought accommodation with traditionalist Muslims in the same way that
Subbanu al-Muslimin did. Others became even more militant. There have been occasional
violent confrontations between Salafi and Sufi groups throughout West Africa. Boko Haram is
the only Salafi organisation to employ violence as a strategy for spreading Salafi teachings and
practices; it also challenges the legitimacy of the state. It is a breakaway Izala faction
established in 2001. Its goal is to implement Izala discourse of takfīr by waging violent
campaigns against opponents.[43] It espouses a radical anti-western and anti-modern
ideology that defines modern western education and government employment as religiously
unacceptable. Since 2003 more than 3,000 people have been killed in confrontations between
Boko Haram fighters and Nigerian security forces and in incidents of sectarian violence. It is
important to note that other groups based on similar teachings chose to isolate themselves
from what they perceive to be a corrupt society. Significantly other Izala factions strongly
oppose Boko Haram violence.
68
December 2013
PERSPECTI VES O N TERRORISM
Volume 7, Issue 6
Persatuan Islam (Persis/Unity of Islam) founded in the 1920s by Indonesian and Singaporean
scholars. It is not a mass organisation but has exerted great influence on Southeast Asian Salafi
thought.[47] Persis takes very strong positions opposing bida, Sufism and local cultures, and
engages in harsh takfiri rhetoric. While some early Persis leaders were Pan Islamists who
considered the idea of the state to be un-Islamic, others—especially Mohammed Natsir
(1908-1993)—were proponents of Shari’ah based nationalism. Activists from Persis
backgrounds have adapted a range of political strategies, ranging from electoral politics to
terrorism.
Natsir was perhaps the most important Southeast Asian Salafi intellectual of the twentieth
century. He maintained relationships with Islamic nationalists, including non-Salafis,
regionally and globally. Politically he was a pragmatist. He was Prime Minister of Indonesia
(1950-51) and leader of the Islamic political party Majelis Syuro Muslim Indonesia (Masyumi)
from 1945 until it was outlawed in 1960. He was imprisoned between 1960 and 1966 for
involvement in an ethno-religious rebellion. After his release he founded Dewan Dakwah
Islamiyah Indonesia (Indonesian Council for the Propagation of Islam/DDII).[48]
Like his Nigerian counterpart Gumi, Natsir was a prominent figure in MWL. DDII is a
conduit through which MWL funds flow into Indonesia. It works closely with Lembaga
Pengetahuan Islam dan Arab (Institute for Islamic and Arabic Studies/LIPIA), which is a
public diplomacy arm of the Saudi Arabian government as well as an Islamic school, and
Imam Muhammad ibn Saud Islamic University in Riyadh.[49] Efforts by Natsir and DDII
contributed to the emergence of Salafi organisations and movements with diverse political
orientations. Of these the campus based Tarbiyah (Islamic Education) movement that
developed in the 1980s is particularly significant. It is a broadly based social movement that
gave rise to numerous organisations including the non-violent Partai Keadilan Sejahtera (PKS,
The Justice and Prosperity Party) that participates in elections and Hizbut Tahir Indonesia that
does not.[50] DDII has never been implicated in violence but was associated with violent
groups operating in Eastern Indonesia between 2000 and 2002, and now support groups
engaging in attacks against members of the Ahmadiyah sect.
Pondok Pesantren Imam Bukhari (PPIB) in Surakarta is one of many Salafi schools supported
by MWL. It was founded by Ahmad Faiz after he completed his studies at Imam Ibn Saud
University in 1994. The curriculum focuses on Wahhabi religious teachings and preparing
students for the afterlife. There are approximately two thousand students. Most are
Indonesians; others are from Malaysia and Singapore. Faiz rejects terrorism and other forms
of religiously motivated violence and in an interview stated that: “Terrorists use Islamic norms
to justify their sins.”
As in West Africa, some Southeast Asian Salafi communities live in self-imposed social
isolation. Some were formerly jihadi but renounced violence when Saudi ulama declared that
it was no longer justified. They lead pious lives and avoid contact with what they consider to
be a hopelessly defiled world. Some have established villages in remote areas and support
69
December 2013
PERSPECTI VES O N TERRORISM
Volume 7, Issue 6
themselves by selling herbal medicines. There are small communities with similar religious
orientations in Malaysia and Singapore. They are more integrated into economic life than their
Indonesian counterparts, but avoid contact with religious others. In some parts of Malaysia,
Salafis have a larger public presence and control as many as a third of the mosques.
Jemaah Islamiyah (JI) is the most significant violent Salafi organisation in Southeast Asia. It is
a transnational terrorist group established in 1993 with the goal of establishing a Wahhabi
Caliphate that has operated in Indonesia, Malaysia, the Philippines and Singapore.[51] Many
JI members studied at schools supported by DDII. They acquired violent Salafi ideologies at
schools linked to the “Nguruki network” of schools that combine Salafi and Jihadi teachings.
Abu Bakr Ba’asyir (b. 1938) is widely regarded as JI’s spiritual mentor and was one of the
founders of the Nguruki network. He is a former DDII activist who spent 17 years in Malaysia
and Singapore spreading violent Salafi teachings. Ba’asyir was also one of the founders of
Majelis Mujahedeen Indonesia, an umbrella group for radical organisations. Prior to being
convicted on terrorism charges in 2011, he used extreme takfiri rhetoric in sermons, stating
that 90% of Indonesian Muslims are actually kafir. In an interview he stated that “Jihad is
more important than prayer.”[52]
From the seventeenth-century onward, Institutional Sufism has provided a framework for
organising religious communities, educational institutions, social networks, and economic
collectivities tied to rural agriculture. In the course of its historical evolution in the region,
70
December 2013
PERSPECTI VES O N TERRORISM
Volume 7, Issue 6
Sufism has been both pacifist and violent. The West African Sufi jihads provide convincing
refutations of the idea that Sufism is intrinsically peaceful.
For more than 250 years (1645-1900) Sufi leaders (marabouts) waged a series of jihad in
attempts to establish Islamic theocracies. Nasir al-Din (d. 1674) led the first of these in what is
today southern Mauritania. It was followed by many others, the most theoretically significant
of which are those of Usman dan Fodio (1754-1817)—leading to the creation of the Sokoto
Caliphate in present day northern Nigeria—and al-Hajj Umar Tall (1797-1865), which led to
the Toucouleur Islamic Empire in parts of what are now Guinea, Senegal and Mali.
The West African jihads were complex events. Ethnic relations and tribal warfare, tensions
between Islamic scholars and political elites, slave-raiding to supply the Atlantic slave trade,
the involvement of European powers (eventually through colonialism) and the end of the slave
trade all contributed to the origins and decline of this pre-modern jihadi tradition. Scholars
debate the contributions of these factors to the development of a jihad centred political
culture. There is, however, a consensus concerning the roles played by Sufi leaders, the
importance of Sufism in West African jihadi ideologies and the use of master-disciple
relationships and tariqa Sufism as tools for social mobilization and as the basis for the
construction of collective identities in the theocracies the jihads sought to establish.
Usman dan Fodio, the founder of the Sokoto Caliphate provides a clear example. He had a
vision in which he saw the Prophet Muhammad, his companions and other prophets and
saints, including al-Shaykh Abd al-Qadir al-Jilani (1077-1166), the founder of the Qadiriyya
tariqa to which dan Fodio belonged. According to dan Fodio’s account of this vision, al-Jilani
anointed him as the leader of saints (Imam Al-Awliyaa), and enjoined him “to command what
is good and to forbid what is reprehensible.” Then al-Jilani decorated dan Fodio with the
“Sword of Truth” and ordered him to “unsheathe it against the enemies of God.” (54) For dan
Fodio, this was the spiritual and moral authorization for his jihad.
Al-Hajj Umar Tall invoked the doctrines of the Tijaniyya tariqa in his articulation of the
doctrinal basis of jihad. In his magnum opus Kitab rimah hizb al-rahim ‘ala nuhur hizb al-
rajim (“The Book of the Lances of the Party of Allah the Merciful against the Necks of the
Party of Satan the Accursed”), he employed the sectarian Tijani discourse of spiritual election
to legitimise his military and political agendas. This discourse proclaims that the Tijaniyya
supersedes all other Sufi orders because of the exclusive guarantee of salvation Ahmad al-
Tijani, its founder, received from the Prophet Muhammad for himself and his followers. Umar
Tall also employed the Tijani doctrine of inkar that demonises all who reject the Tijani
doctrine of spiritual election to refute his opponents.
The Tijani demonisation of other Sufi jihadis is an example of the ways in which Sufi doctrine
can be used in contentious discourse about the differential legitimacy of jihadi movements and
theocracies. This discourse also figured significantly in the rivalry between leaders of the
Sokoto Caliphate and the Borno Empire. Polemical theological exchanges between them
71
December 2013
PERSPECTI VES O N TERRORISM
Volume 7, Issue 6
began in the nineteenth-century and have continued until the present, spanning pre-colonial,
colonial and post-colonial periods in West African history.
The establishment of colonial rule c. 1880s-1910s effectively ended this series of jihads and
incorporated the Sufi theocracies into colonial regimes, or abolished them altogether. In these
contexts, the West African Sufi orders were transformed in many ways. While the legacy and
rhetoric of the Sufi theocracies provided a framework for anti-colonial resistance, most of the
Sufi orders preferred strategies of avoiding colonial regimes. They created an Islamic public
sphere outside of the colonial system. By the end of the colonial period in the 1960s, the image
of the Sufi orders as pacifists had effectively replaced the earlier image of the Sufis as jihadi
empire builders. With the rise of Salafi movements in the region, the new idea of Sufi pacifism
gained even more credibility.
Sufi radicalism was transformed but not totally abandoned. This is particularly true of the
Tijaniyya order. Exclusivist discourses of spiritual election and the demonisation of others
remain constant sources of tension between Tijanis and other Muslims. The Qadiriyya order
has engaged this exclusivist discourse by constructing an alternative discourse of spiritual
election. Given the high stakes in the intra-Sufi discourses and counter-discourses (i.e.
spiritual salvation, religious authority, control of mosques, generating and controlling mass
followings) there have been instances of intra-Sufi violence. Confrontations between different
Tijaniyya branches were also common during the 1950s and 1960s. Intra Sufi tension and
conflicts ended only after the Salafi threat against all Sufis became clear during the 1970s. In
this context, Sufi radicalism redirected itself to counteract the denunciation of Sufism as
“totally un-Islamic” in Salafi takfiri discourse. Contemporary Sufi radicalism takes the form of
more flamboyant observance of the very practices—reverence for saints, visiting their shrines,
celebrating their birthdays, etc.—condemned as un-Islamic by the Salafis. With salvation
threatened, validity of the worshipped questioned, and religious communal identity castigated,
the stakes are high enough for the tension between Sufis and Salafis to erupt into violence. Sufi
radicalism in West Africa remains, but finds new forms in changing contexts, just as Salafi
radicalism does.
72
December 2013
PERSPECTI VES O N TERRORISM
Volume 7, Issue 6
Muslims practice Sufism independent of organised tariqa. As is true in West Africa, many
jurists are also Sufis.
Responses to European intrusion beginning in the 16th century included bitter protracted wars
in which Muslim rulers appealed to concepts of authority rooted in Philosophical Sufism and
later to rebellions based on similar principles led by princes and ulama. Among the most
protracted anti-colonial struggles were the Java War (1825-1830) and the Aceh War
(1914-1973). [58] In both cases Sufism and jihad legitimised resistance and were used for
social mobilization. In Aceh resistance to Dutch colonialism and the Indonesian state
continued until 2004. Smaller scale rebellions predicting the expulsion of kafir and coming of
a Just King (Ratu Adil) occurred in Java until the 1940s.[59] Social movements based on
similar principles are still encountered. Most of the hundreds of traditional Muslim states in
the region came to terms with colonialism, and developed ritual systems, based on Sufi
principles, including putative royal control of barakah.[60] Many of the ulama retreated to the
countryside, where, as in West Africa, they avoided conflict with colonial states and
established alternative public spheres based on Sufi principles.
Nadhlatul Ulama (NU), with approximately eighty million followers, is the largest Southeast
Asian Sufi movement. It was founded in 1926 partly in response to the Wahhabi occupation of
Mecca and Medina. [61] It is based in east Java in Indonesia. NU is led by kyai, charismatic
figures combining the attributes of Shar’iah oriented ulama and Sufi syechs. Many kyai are
reputed to have great mystical powers. There are more than 15,000 pesantren (boarding
schools) affiliated with NU, many of which are linked to Sufi religious orders. NU piety
emphasizes prayers for the dead (tahlilan), pilgrimage to holy graves (ziyarah) and the
recitation of salawaat (poetry invoking the Prophet Muhammad), which are popular among
Sufis everywhere.[62]
NU has stridently opposed terrorism and other forms of violence and promoted religious
pluralism since Abdurrahman Wahid (1940-2009) assumed its leadership in 1984. Wahid also
maintained that inter-religious dialog and cooperation are obligatory for all Muslims. He was
especially concerned with social justice and minority rights.
NU’s position on violence has been consistent for three decades. This does not, however, imply
that its theology is incompatible with violence. NU leaders and the rank and file have resorted
to extreme violence when convinced that the organisation and Islam were threatened. In 1965
NU played a major role in the mass slaughter of Indonesian communists. To this day, many
NU leaders who participated in the killings believe that they were necessary to defend Islam.
[63]
Today, Banser, NU’s paramilitary wing, is used to support pluralist policies. It has been
deployed to provide security for Christmas services and NU Sufi religious celebrations
threatened by violent Salafi groups. Banser leaders make it clear that they will not tolerate
interference with these events and will respond with force if necessary. At an event we
73
December 2013
PERSPECTI VES O N TERRORISM
Volume 7, Issue 6
Banser is a hybrid force. Members are armed with bamboo staves and high-powered
slingshots. They are also trained in pencat silat, a Javanese martial arts tradition that combines
physical and spiritual training. Some are thought to have the power of invulnerability and the
ability to overcome opponents without resorting to physical force. They acquire these powers
through repeated pilgrimage to graves and other holy places associated with saints and sultans,
meditation and amulets obtained from kyai. Experts in this mystical-martial tradition are
sometimes referred to as “NU Special Forces.” They do not carry weapons because, it is said,
they do not need to. Banser inspires awe and respect from people it serves and protects, and
fear in the hearts of its enemies.
In Malaysia, a group based on similar Sufi principles carried out one of the most serious jihadi
attacks in the country’s history. Persaudaraan Ilmu Dalam al-Ma’unah (The al-Ma’unah
Brotherhood of Spiritual Knowledge) was established by Mohammed Amin Mohammed
Razali, known to his followers as Ustad (religious teacher) Amin or Syech in 1999. Razali had
studied mystical healing and pencat silat at an Indonesian pesantren. He claimed to act on the
authority of God and saints dwelling in a mystical dimension, to walk on water and to have
the power of invulnerability. The group’s motto was “Jihad is our path! Islam will triumph!” In
July of 2000 he and a group of 29 followers seized a military arms depot and proclaimed a
jihad against the Malaysian government. They subsequently surrendered to authorities. Most
received prison terms but Razali was convicted of waging war against the king and hanged.
[65]
The clearest contemporary Indonesia case of violent Sufism is Front Pembela Islam (Islamic
Defenders Front – FPI). Its motto is “Live honorably or die a martyr.” Rezieq Syihab and
Misbahul Anam, both of whom are Sufis, founded FPI in 1998. Most rank and file members
are from NU backgrounds. Rituals conducted at FPI headquarters in Jakarta closely resemble
those common in NU communities. FPI members we interviewed described Rizieq as a syech
who cleanses the souls of his followers.
FPI describes itself as a movement committed to combating sin, vice and heresy. It is known
for attacks on those it deems “deviant” and for “sweepings” (ransacking) of nightclubs, bars,
massage parlours and other establishments promoting what it considers to be immoral
activities, especially during Ramadan. FPI actions have yielded few fatalities but many victims
have been severely injured. More violent attacks in which there have been fatalities have been
directed against the Ahmadiyah sect of Islam which is widely condemned for heresy because
of the belief that its founder Mirza Ghalam Ahmad (1908-1935) was a prophet.[66]
74
December 2013
PERSPECTI VES O N TERRORISM
Volume 7, Issue 6
Invoking scholarly authority enables Alexiev and others to establish an aura of authenticity for
baseless claims about religiously justified violence and the theology of jihad. We have shown
that the categorical distinction between peaceful Sufism and violent Salafism is untenable. The
claim that Sufis subscribe to the teachings of the greater, peaceful jihad and Salafis to the
violent, lesser jihad is also incorrect. All Muslim theologies, including Wahhabism, subscribe
to the notion that the greater jihad is the struggle against the self.
Proponents of Sufi policy often invoke the works of scholars concerned with the classical texts
of philosophical Sufism and Sufi leaders committed to countering violent extremism and invite
them to speak at policy-oriented conferences. Salafis and Wahhabis with similar political
agendas receive far less attention. Policies and policy recommendations based on the “peaceful
Sufi”/“violent Salafi” distinction are fundamentally misguided. The cases examined in this
article clearly show that both Sufism and Salafism are used to justify peaceful and violent
political action. Policy makers and policy-oriented scholars would be well advised to abandon
the quest for theological roots of violence and theological tools for combating it. More
attention should be paid to variables that measure political attitudes and behaviour,
particularly tolerance of religious diversity, as well as the extent and types of political change
that religious movements and organisations seek to accomplish.
The widely acclaimed book The Illusion of an Islamic State: How an Alliance of Moderates
Launched a Successful Jihad Against Radicalisation and Terrorism in the World's Largest
Muslim-Majority Country, edited by Syaafi Maarif and Abdurrahman Wahid, and published by
the Libforall Foundation provides an ironic illustration.[69] The book is a strident criticism of
violent, intolerant variants of Indonesian political Salafism but ignores violent intolerant
variants of Indonesian political Sufism. Both editors champion diversity and tolerance as
religious virtues and sound policy. Ma’arif is former general secretary of Muhammadiyah—a
Salafi organisation. Wahid was general secretary of Nadhlatul Ulama—a Sufi organisation.
75
December 2013
PERSPECTI VES O N TERRORISM
Volume 7, Issue 6
They were close friends; shared commitments to democracy, social justice, tolerance and
nonviolence mattered more to them than theological difference. On the opposite end of the
spectrum, Rizieq Syihab, who is a Sufi, and Abu Bakr Ba’asyir, who is a Salafi, have both served
on the editorial board of the Islamist tabloid Suara Islam (Voice of Islam) that demonises
“liberal” Muslims and encourages violence against the Ahmadiyah and other “deviants.” Again,
political orientations and shared commitments to intolerance matter more than theological
differences.
Notes
[1] A. Schimmel, The Mystical Dimension of Islam, New York: The Other Press, 1975.
[2] C. Geertz, Islam Observed: Religious Development in Morocco and Indonesia, New Haven: Yale University Press, 1968; M. Gilsenan, Saint
and Sufi in Modern Egypt London: Oxford University Press, 1973. D. Westerlund and E. Rosander (Eds.) African Islam and Islam in Africa:
Encounters between Sufis and Islamists. Athens: Ohio University Press, 1997.
[3] C. Ernst, “Preface” In: M. Sells (Ed.) Early Islamic Mysticism: Sufi, Qur’an, Mi’raj, Poetic and Theological Writings. New Jersey: Paulist Press,
1996.
[4] J. Habib, Ibn Sa’ud’s Warriors of Islam: The Ikhwan of Najd and Their Role in the Creation of the Sa’udi Kingdom,1910-1930. Leiden: Brill,
1978; D. Gold, Hatred’s Kingdom: How Saudi Arabia Supports the New Global Terror, Washington DC: Regnery Publishing, 2003.
[5] S. Schwartz, The Other Islam: Sufism and the Road to Global Harmony, New York: Random House, 2008.
[6] E. Husain, “Should Egypt Fear the Rise of Salafis?” The Atlantic, 4 December, 2011.
[7] M. al-Rasheed, Contesting the Saudi State: Islamic Voices from a New Generation. Cambridge: Cambridge University Press, 2007.
[8] Q. Wiktorowicz, “The Salafi Movement in Jordan,” International Journal of Middle East Studies 32 (2) 219-240, 2000. The Management of
Islamic Activism: Salafis, the Muslim Brotherhood, and State Power in Jordan. Albany: State University of New York Press, 2001.
[9] S. Tikves, S. Banerjee, H. Temkit, S. Gokalp, H. Davulcu, A. Sen, A., S. Corman, M. Woodward, I. Rohmaniyah and A. Amin, “A System
for Ranking Organisations Using Social Scale Analysis,” Social Network Analysis and Mining Journal, 3 (3), 2013, pp. 313-328.
[10] J. Goldstone, R. Bates, D. Epstein, T. Gurr, M. Woodward, M. Lustick and J. Ulfelder, “A Global Model for Forecasting Political
Instability,” American Journal of Political Science, 54 (1), 2010, pp. 190 - 208.
[11] A. Schimmel, op. cit.; R. Meijer, Global Salafism: Islam’s New Religious Movement, New York: Columbia University Press, 2009.
[12] A. Schimmel, op. cit.
[13] S. Murata and W. Chittick, Visions of Islam (Visions of Reality), New York: Paragon House, 1998.
[14] M. Watt, The Faith and Practice of al-Ghazzali, Oxford: One World, 2000.
[15] A. Schimmel, op. cit.
[16] S. Murata and W. Chittick, op. cit.
[17] W. Chittick, Sufi Path of Knowledge: Ibn Al-Arabi's Metaphysics of Imagination, Albany: State University of New York Press, 1998.
[18] Rumi is the most popular poet in the global English speaking community. For an account of his life and teaching directed at English
speaking readers see F. Lewis, Rumi - Past and Present, East and West: The Life, Teachings, and Poetry of Jalal al-Din Rumi, Oxford: One World,
2007.
[19] L. Massignon, The Passion of al-Hallāj: Mystic and Martyr of Islam, Princeton: Princeton University Press, 1982.
76
December 2013
PERSPECTI VES O N TERRORISM
Volume 7, Issue 6
[20] J. Trimingham. The Sufi Orders in Islam, Oxford: Oxford University Press, 1971.
[21] D. Westerlund and E. Rosander, op. cit.; M. Van Bruinessen, “The Origins and Development of Sufi Orders (Tarekat) in Southeast Asia,”
Studia Islamika - Indonesian Journal for Islamic Studies, Vol. 1, No. 1, 1994, pp. 1 - 23.
[22] M. Geijbels, “Aspects of the Veneration of Saints in Islam, with Special Reference to Pakistan,” The Muslim World, Vol. 68 . M.
Woodward, Java, Indonesia and Islam, New York: Springer, 2011, pp. 176 – 186.
[23] C. Ernst, op. cit.
[24] M. Woodward, op. cit.
[25] A. Bennigsen, “Muslim Guerilla Warfare in the Caucasus (1918–1928),” Central Asia Survey, vol. 2, no. 1, pp. 45-56; I. Lewis (Ed). Islam in
Tropical Africa, Oxford: Oxford University Press, 1980; Van Bruinessen, op. cit.
[26] B. Lawrence, Defenders of God: the Fundamentalist Revolt Against the Modern Age. Columbia: University of South Carolina Press, 1995.
[27] C. Melchert, Ahmad ibn Hanbal (Makers of the Muslim World), Oxford: Oneworld, 2006.
[28] M. Menom, Ibn Taimīya's Struggle Against Popular Religion: With an annotated translation of his Kitāb iqtiḍāʾ aṣ-ṣirāṭ al-mustaquīm
mukhālafat aṣḥāb al-jaḥīm, The Hague: Mouton 1976.
[29] E. Sirriye, “Modern Muslim interpretations of shirk,” Religion, 20 (2), 1990, pp. 139 - 159.
[30] N. De Long-Bas, Wahhabi Islam: From Revival and Reform to Global Jihad, New York: Oxford University Press, 2004; D. Commins, The
Wahhabi Mission and Saudi Arabia, New York: I. B. Tarus, 2009.
[31] Hasan, N.. Saudi expansion, the Salafi campaign and Arabised Islam in Indonesia. In M. Al-Rasheed (Ed.), Kingdom Without Borders.
Saudi Arabia’s Political, Religious and Media Frontiers. New York: Columbia University Press, 2008.
[32] M. Woodward and I. Rohmaniyah, “Wahhabi Perspectives on Pluralism and Gender: A Saudi – Indonesian Contrast,” Arizona State
University Centre for Strategic Communications Report nom. 1203, 2012. http://csc.asu.edu/wp-content/uploads/pdf/128.pdf
[33] T. Hegghammer, “Jihadi—Salafis or Revolutionaries? On religion and Politics in the Study of Militant Islamism.” In: R. Meijer (Ed.)
Global Salafism: Islam’s New Religious Movement. New York: Columbia University Press, 2009, pp. 224 – 266.
[34] M. Woodward, A. Amin, I. Rohmaniyah and D. Coleman, “Muslim Education, Celebrating Islam and Having Fun as Counter-
Radicalization Strategies in Indonesia,” Perspectives on Terrorism, Vol. 4, Issue 4, 2010, pp. 28 - 50.
[35] J. Hunwick, “The Career and Teachings of A West African 'Alim in Madinah” in A. Green, (Ed.), In Quest of Islamic Humanism: Arabic
and Islamic Studies in Memory of Mohamed al-Nowaihi, Cairo: American University in Cairo Press, 139-54, 1984.
[36] A. Azra, The Origins of Islamic Reformism in Southeast Asia: Networks of Malay-Indonesian and Middle Eastern 'Ulama' in the Seventeenth
and Eighteenth Centuries. Honolulu: University of Hawaii Press, 2004. K. El-Rouayheb, “Opening the Gate of Verification: the Forgotten Arab-
Islamic Florescence of the 17th Century,” International Journal of Middle East Studies, Vol. 38, 2006,, pp. 263 – 281.
[37] J. Voll, “Hadith Scholars and Tariqahs: An Ulama’ Group in the 18th Century Haramayn and Their Impact in the Islamic World,” Journal
of Asian and African Studies, Vol.15, Issues 3 - 4, 1980, pp. 246-67.
[38] S. Lacrox, “Between Revolution and Apoliticism: Muhammad Nasir al-Din al-Albani’s Influence on the Shaping of Contemporary
Salafism” In: R. Meijer (Ed.), Global Salafism: Islam’s New Religious Movement, London: Hurst 2009, pp. 58 - 80.
[39] Azra, op. cit.
[40] L. Kaba, “The Politics of Quranic Education among Muslim Traders in the Western Sudan: The Subbanu Experience,” Canadian Journal
of African Studies/Revue Canadienne des Études Africaines, 10(3). 1976, pp. 409 - 421; see also: L. Kaba, The Wahhabiyya: Islamic Reform and
Politics in French West Africa, Evanston: Northwestern University Press, 1974; and: R. Niezen, “The Community of Helpers of the Sunna:
Islamic Reform among the Songhay of Gao (Mali),” Africa, 1990, Vol. 3, pp. 399-424.
[41] L. Kaba, “Islam in West Africa: Radicalism and the New Ethic of Disagreement, 1960-1990,” In: N. Levtzion and R. Pouwels (Eds.) The
History of Islam in Africa, Athens. Ohio University Press. 1993.
[42] On Izala sse: R, Launay, Traders without Trade. Cambridge: Cambridge University Press, 1982; Beyond the Stream: Islam and Society in a
West African Town, Los Angeles: University of California Press, 1992.
[43] Anonymous, The Popular Discourses of Salafi Radicalism and Salafi Counter-radicalism in Nigeria: A Case Study of Boko Haram,
Journal of Religion in Africa, Vol. 42,2012, pp. 118 – 144..
[44] H. Zakariya, “From Makkah to Bukit Kamang?: The Moderate versus Radical Reforms in West Sumatra (ca. 1784-1819),” International
Journal of Humanities and Social Sciences Vol. 1, No.14, pp. 195-203.
[45] H. Federspeil, Sultans, Shamans, and Saints: Islam and Muslims in Southeast Asia, Honolulu: University of Hawaii Press, 2007.
[46] On Muhammadiyah, see: Alfian, Muhammadiyah. The Political Behaviour of a Muslim Modernist Organisation under Dutch Colonialism,
Yogyakarta: Gadjah Mada University Press 1989; M. Nakamura, The Crescent Arises over the Banyan Tree: A Study of the Muhammadiyah
Movement in a Central Javanese Town. Yogyakarta, Gadjah Mada University Press, 1978; D. Noer, The Modernist Muslim Movement in
Indonesia, 1900–1942 Kuala Lumpur: Oxford University Press, 1973.
[47] H. Federspiel, Islam and Ideology in the Emerging Indonesian State: The Persatuan Islam (Persis), 1923 to 1957. Leiden: Brill, 2001.
77
December 2013
PERSPECTI VES O N TERRORISM
Volume 7, Issue 6
[48] W. Liddle, “Media Dakwah Scripturalism. One Form of Political Thought and Action in New Order Indonesia,” in: M. Woodward (Ed.)
Toward A New Paradigm: Recent Developments in Indonesian Islamic Thought, Tempe: Program for Southeast Asian Studies Monograph
Series, Arizona State University, 1996; M. Woodward, A. Amin, I. Rohmaniyah, C. Lundry,“Indonesia’s Prosperity and Justice Party and the
Question of Culture,” Contemporary Islam, 2012: 1-17.
[49] N. De Long-Bas, Wahhabi Islam: From Revival and Reform to Global Jihad, New York: Oxford University Press, 2004; D. Commins, The
Wahhabi Mission and Saudi Arabia, New York: I. B. Tarus, 2009.
[50] Y. Machmudi, Islamising Indonesia: The Rise of Jemaah Tarbiyah and the Prosperous Justice Party (PKS). Canberra: Australian University
Press, 2008.
[51] Z. Abuza, Militant Islam in Southeast Asia: Crucible of Terror. Boulder: Lynne Rienner, 2003; G. Barton, Jemaah Islamiyah: Radical
Islamism in Indonesia, Singapore: National University of Singapore Press, 2005.
[52] International Crisis Group (2010) Indonesia: The Dark Side of Jama’ah Ansharut Tauhid (JAT), Brussels: International Crisis Group, Asia
Briefing Number 107. http://www.crisisgroup.org/en/regions/asia/south-east-asia/indonesia/B107-indonesia-the-dark-side-of-jamaah-
ansharut-tauhid-jat.aspx (Accessed July 26, 2012). Temby, Q. Imagining and Islamic State in Indonesia: From Darul Islam to Jemaah
Islamiyah, Indonesia, 89, 24-36, 2010.
[53] Z. Wright, "West Africa, Sufism," In: Oxford Islamic Studies Online. http://
www.oxfordislamicstudies.com.turing.library.northwestern.edu/article/opr/t343/e0083 (accessed Apr 11, 2013).
[54] M. Hiskett, The Sword of Truth: The Life and Times of the Shehu Usuman Dan Fodio (Islam and Society in Africa). Evanston:
Northwestern University Press, 1994.
[55] S. al-Attas, Some Aspects of Sufism as Understood and Practiced among the Malays, Singapore: Malaysian Sociological Research Institute,
1963; M. Ricklefs, (Mystic Synthesis in Java: A History of Islamization from the Fourteenth to the Early Nineteenth Centuries. White Plains, NY:
EastBridge 2007. P. Riddell, Islam in the Malay-Indonesian World: Transmission and Responses, Hurst: London, 2002.
[56] Soebardi, The Book of Cabolek, The Hague: Martinus Nijhoff, 1975.
[57] M. Van Bruinessen, Martin “Pesantren and Kitab Kuning: Continuity and Change in a Tradition of Religious Learning”; in: Wolfgang
Marschall (Ed.), Texts from the Islands: Oral and Written Traditions of Indonesia and the Malay World [Ethnologica Bernica, 4]. Berne:
University of Berne, 121-145, 1994; “The Origins and Development of Sufi Orders (Tarekat) in Southeast Asia,” Studia Islamika - Indonesian
Journal for Islamic Studies 1(1): 1-23; Z. Dhofier,The Pesantren Tradition: The Role of the Kyai in the Maintenance of Traditional Islam in Java.
Tempe: Program for Southeast Asian Studies, Arizona State University, 1999; M. Woodward, op. cit.
[58] P. Carey, The Origins of the Java War (1825-1830) London: Longmans 1976, C. Hurgronje, The Achehnese, two vols, (translated from
Dutch into English by A. O'Sullivan), Leiden: E.J. Brill, 1906;
[59] S. Kartodirdjo, The Peasants revolt of Banten in 1888: Its Conditions, Course, and Sequel: A Case of Social Movements in Indonesia, The
Hague: Koninklijk Instituut voor Taal-, Land- en Volkenkunde, 1966.
[60] M. Woodward, Islam in Java: Normative Piety and Mysticism in the Sultanate of Yogyakarta, Tucson : The University of Arizona Press,
1989.
[61] G. Fealy and G. Barton (eds.) Nahdlatul Ulama, traditional Islam and modernity in Indonesia. Syndey: Monash Asia Institute, 1996. Bush,
Robin (2009); Nahdlatul Ulama and the Struggle for Power within Islam and Politics in Indonesia, Singapore, National University of Singapore,
Institute of Southeast Asian Studies, 2009.
[62] M. Woodward, I. Rohmaniyah, A. Amin, S. Ma’arif, D. Murtaugh Coleman and Muhammad and S. Umar, “Ordering What is Right,
Forbidding What is Wrong: Two Faces of Hadhrami Dakwah in Contemporary Indonesia”, Review of Indonesian and Malaysian Affairs, 46 (2)
105–46, 2012.
[63] M. Woodward, “Only Now Can We Speak: Remembering Politicide in Yogyakarta,” Journal of Social Issues in Southeast Asia, 26 (1),
36-57, 2011.
[64] M. Woodward, Ethnographic field notes, April 18, 2012.
[65] Z. Mohamed, Al-Maunah: Kebenaran Yang Sebenar (The Naked Truth). Kuala Lumpur: Zabidi Publications, 2003.
[66] M. Woodward, et. al. 2012.
[67] L. Curtis and H. Mullick, “Reviving Pakistan's Pluralist Traditions to Fight Extremism,” Heritage Foundation,2009. http://
www.heritage.org/research/reports/2009/05/reviving-pakistans-pluralist-traditions-to-fight-extremism Z. Baran (ed.) Understanding Sufism
and its Potential Role in US Policy, Nixon Centre Conference Report March 2004. http://www.islamawareness.net/Sufism/sufism_us_policy.pdf
A. Rabasa, Building Moderate Muslim Networks, http://www.rand.org/pubs/monographs/MG574.html
[68] A. Alexiev, Understanding Sufism and its Potential Role in US Policy, Nixon Centre Conference Report March 2004. http://
www.islamawareness.net/Sufism/sufism_us_policy.pdf
[69] A. Wahid and S. Ma’arif (eds.) The Illusion of an Islamic State: How an Alliance of Moderates Launched a Successful Jihad Against
Radicalization and Terrorism in the World's Largest Muslim-Majority Country, Jakarta: Libforall Foundation, 2011.
78
December 2013
PERSPECTI VES O N TERRORISM
Volume 7, Issue 6
Abstract
While terror attacks that are a part of a coordinated effort receive attention in the popular media,
they have not received much attention in the academic literature. The decision to carry out
simultaneous attacks should be examined as one of the choices a terrorist organisation makes
about the method of attack. Determining the impact of simultaneous attacks vis-à-vis a single
attack can explain why groups would use this method. Up to one quarter of all attacks coded in
two major databases, GTD and ITERATE, may be part of a simultaneous campaign. Empirical
analysis shows simultaneous attacks are more likely to be successful and cause more fatalities,
though not in a one-to-one fashion. These results underline the importance of considering
simultaneous attacks in empirical analysis.
Introduction
Why do some terrorist organisations group their attacks close together, while others spread
them out? For instance, Al-Qaeda is well known for carrying out simultaneous attacks—that
is, having different terror cells hit more than one location at approximately the same time. It is
accepted in the literature that terrorist organisations choose the method and location of their
attack in order to achieve political or economic destabilization of the targeted government and
to garner media attention for their cause. To carry out a single attack versus a simultaneous
campaign is a decision for terrorists to consider, yet researchers have not examined these
decisions closely. This article will examine why groups would carry out simultaneous
campaigns over single attacks: what are the benefits?
In two of the largest terrorism datasets, International Terrorism: Attributes of Terrorist Events
(ITERATE) [1] and the Global Terrorism Database (GTD) [2], attacks are coded as single
events, even when they are carried out as part of a coordinated campaign.[3] Unfortunately,
neither dataset specifically denotes whether or not attacks are coordinated. In order to
complete any analysis, this project will first determine which attacks formed part of a
coordinated campaign.
Since the most commonly used datasets disaggregate simultaneous attacks, the empirical
literature on terrorism has a dearth of academic studies on this type of attack. Theoretical
papers have examined the scale of terrorist attacks. Past research shows that the scale of a
terrorist attack can help the targeted government to estimate the size of the organisation’s
resources.[4] Coordinated attacks are by definition of a larger scale. The terror attacks of
79
December 2013
PERSPECTI VES O N TERRORISM
Volume 7, Issue 6
September 11, 2001 (a simultaneous attack with four component attacks), was of a scale not
seen before.[5] Economic impact models of terror attacks have shown that simultaneous
attacks can magnify the impact of a terror attack.[6] This article will differentiate between
simultaneous attacks and single attacks using empirical analysis. In the past, empirical
investigations of terrorism have largely ignored the presence of simultaneous attacks in the
ITERATE and the GTD datasets. Not recognising that these attacks can be very different from
single attacks may have biased the results of many past studies.
Potentially biased studies fall into two main categories: examining the level of terrorism or
examining the impact of terrorism. In the former, terrorism is the dependent variable, while in
the latter it is the independent variable. When a researcher is predicting the level of terrorism
in a country/region/year given certain attributes, each attack, even if part of a coordinated
effort, is coded separately. This coding is potentially problematic since attacks that are part of a
coordinated effort are made under the same decision making process. For instance, terrorist
organisations consider military expenditures when choosing a country to attack; that decision
should only matter one time for a coordinated campaign. If all attacks are thought to be single
attacks, then the terrorist organisation would be making that decision every time they carried
out an attack. Therefore, the dependent variable would be systematically higher than the true
value when coordinated attacks are present in the system. Such a measurement of the
dependent variable is problematic, but only detrimental to the predictions of the past models
if the measurement error is correlated with the independent variables, thus biasing the
parameter estimates. It is highly likely that simultaneous attacks, the source of the
measurement error, are correlated with some of the variables that factor into the resulting level
of terrorism.
Potentially more problematic are the implications for studies assessing the impact of terrorism.
For instance, there have been studies looking into the impact of terrorism on tourism [7],
urban development [8], public opinion [9], and industry.[10] In these studies, terrorism is
used as an independent variable to explain another phenomenon. Therefore, if any of the
attacks coded are part of a coordinated effort, then that independent variable will be measured
with error, i.e. the measure of terrorism will be overestimated. This counting system assumes
that the individual attacks within a simultaneous effort have a one-to-one additive effect,
which may not be true. For instance, if a coordinated attack consists of two attacks, then this
counting system implies that each of the two attacks have the same impact as a different single
attack. If an independent variable is measured with such an error then this can lead to biased
estimates of the parameters. Therefore, the impact of terrorism that these empirical studies are
obtaining may not be the true parameter estimates.
Given the potential for bias in results ignoring simultaneous attacks, it is worthwhile to
explore how common this type of attack is in terrorism datasets. First, the theoretical
arguments surrounding simultaneous campaigns and impact of attacks are discussed. Second,
the data used in the analysis will be presented. Third, follows an examination of the
80
December 2013
PERSPECTI VES O N TERRORISM
Volume 7, Issue 6
methodology and results from the empirical analysis. Finally, suggestions will be offered for
future research and analysis on simultaneous attacks.
Theoretical Arguments
Which is better for the terrorist organisation, carrying out many individual attacks throughout
the year or concentrating on one large simultaneous set of attacks? To make an assessment of
this, we must start from the assumption that terrorist organisations are choosing their optimal
number of attacks given their budget constraints and the role that attacks play in their main
goals: destabilization, media attention, and recruiting new members.[11] Due to budget and
training constraints, organisations must decide whether to apply their resources to single
attacks spread out over time or devote time and energy to a smaller number of coordinated
attacks.
Coordinated attacks are likely to kill more people than single attacks. First, since these attacks
usually take place in two or more separate locations, there tends to be an increase in the total
number of potential victims. Additionally, individuals with greater skills and capabilities are
assigned to harder terrorist attacks and these individuals tend to be both more successful and
kill more people on average.[12] Simultaneous attacks require more planning and
coordination; everything else being equal, they are harder to execute than single attacks, thus
individuals with more advanced abilities will be assigned to these tasks. As a result,
coordinated attacks should cause more deaths than single attacks.
Similarly, coordinated attacks could be more successful than single attacks. There are two ways
to calculate the success of simultaneous attacks. First, one can use the maximum success of all
attacks within the campaign. Only one portion of the attack needs be successful in order to
incite fear and create direct victims. Second, the average of the success of each attack within
the coordinated effort can be used to accurately measure the effectiveness of the campaign.
Simultaneous attacks should be more successful than single attacks for two reasons. If a single
attack that is part of a coordinated effort is unsuccessful, the campaign can still be a success if
one of the other parts of the effort is successful. Additionally, more able individuals are
assigned to harder tasks [13]. Therefore, due to planning and coordination issues, more able
individuals should be assigned to coordinated terrorist efforts, thus leading to more successful
simultaneous attacks.
If simultaneous attacks tend to produce more fatalities and are more successful, these attacks
should receive more media coverage. A single unsuccessful attack may not receive media
attention, but a coordinated campaign with one unsuccessful component is likely to be
reported. Additionally, the higher the number of casualties, the greater amount of media
attention the attack is likely to receive.[14] Therefore, if coordinated attacks do generate more
fatalities, then simultaneous attacks in developed countries are more likely to garner media
attention than single attacks. This increased news coverage can have the effect of bringing the
motives of the terrorist organisation to the forefront, thus satisfying one of their main goals. In
81
December 2013
PERSPECTI VES O N TERRORISM
Volume 7, Issue 6
fact, the coordinated attacks on September 11th had a permanent effect of increasing the
number of news stories on terrorism.[15]
Based on these reflections, two hypotheses concerning the impact of simultaneous attacks will
be tested in the empirical section:
H1: Simultaneous campaigns tend to kill more people than single attacks.
H2: Simultaneous campaigns tend to have higher success rates than unsuccessful campaigns.
Data
Data for this project were derived from three main sources. Data on terrorist attacks come
mostly from the University of Maryland’s Global Terrorism Database (GTD). The GTD is a
comprehensive dataset covering both domestic and transnational terrorist events from 1970
until 2007 and beyond to the present day. It is one of the very few datasets with a worldwide
coverage that also contains information on domestic terror events. Therefore, by using the
GTD, we are able to obtain a fuller picture of the total amount of terrorism occurring in the
world.[16]
However, this dataset is not without its shortcomings. First, the information in the GTD was
collected entirely from open sources. Therefore, bias could be introduced to the model if
attacks are not reported in public sources. Attacks that are stopped in the planning stages and
not reported to the media are also not included. Additionally, the GTD does not contain full
data for the year 1993. Finally, the GTD uses an operationalised definition of success, resulting
in over 90 percent of attacks being coded as successes.
The ITERATE dataset, which was developed by Edward Mickolus, contains more granular
information on the success of terror attacks. In ITERATE, success is coded on a 0-6 scale, with
information on attacks stopped in the planning stages, attacks executed unsuccessfully, and
attacks carried out as intended. For instance, the four attacks comprising the events of
September 11th, 2001 are all coded as successes in the GTD. However, ITERATE codes the
attacks on the World Trade Center and the Pentagon as successes, but the crash of United
Flight 93 is coded as an attack that was executed, but unsuccessfully. This information
provides a much sharper picture of the difference in success between different attacks than the
information in the GTD. Therefore, the analysis on the success of simultaneous attacks vis-à-
vis single attacks will be carried out using ITERATE.[17]
Since neither dataset separately denotes when attacks are a part of a coordinated event, the
available data was used to construct which attacks are most likely to constitute simultaneous
attacks. Several different definitions of coordinated events were considered; however, in order
to not overstate the effects of simultaneous attacks in this article, the strictest definition of
simultaneous attacks was chosen. In order for two or more attacks to be considered part of a
82
December 2013
PERSPECTI VES O N TERRORISM
Volume 7, Issue 6
simultaneous campaign, the attacks must be carried out on the same day, in the same country,
by the same group, using the same method.
Under this definition, approximately 25 percent of the attacks coded in the GTD are part of a
simultaneous campaign. The breakdown of simultaneous campaigns by year can be seen in
Figure 1. This definition probably understates the proportion of simultaneous campaigns in
the dataset. By definition, if the group perpetrating the attack is unknown, the attack cannot
be part of a simultaneous campaign. Approximately 38 percent of all attacks in the dataset
were carried out by unknown perpetrators. Relaxing the definition of simultaneous attacks to
only consider the day, location, and method of attack shows approximately 30 percent of all
attacks listed in the GTD as being part of simultaneous campaigns. Additionally, groups can
carry out coordinated attacks in different countries. For example, in 1998 local members of the
Egyptian Islamic Jihad (affiliated with the global Al-Qaeda network) carried out coordinated
truck bombs in Kenya and Tanzania. Since these attacks took place in separate countries, they
will not be coded as simultaneous attacks. However, relaxing the definition of simultaneous
attacks to only consider the day, method, and group, shows 26 percent of all attacks listed in
the GTD are part of simultaneous campaigns. Using the strictest definition may exclude some
attacks that are part of coordinated efforts, but it should minimise the number of single attacks
which are incorrectly classified as part of a simultaneous campaign.
When utilising the information from ITERATE, the same technique is used to define
simultaneous attacks – the attacks must have taken place on the same day, location, method,
and group. Approximately 13 percent of the total attacks in the ITERATE dataset are part of a
coordinated campaign. This number is lower than the corresponding calculations in the GTD
83
December 2013
PERSPECTI VES O N TERRORISM
Volume 7, Issue 6
A third set of data is derived from the Big Allied and Dangerous (BAAD I) dataset.[18] This
dataset codes information on terrorist group characteristics. The dataset contains a snapshot
of each terrorist organisation at one point in time between 1998 and 2005. Information
offering insight into group capability includes data on age, size, ideology, territorial holdings,
and number of alliances. Information from BAAD will be used to control for the
characteristics of terrorist organisations that may lead to more terror fatalities.
Results
First the number of fatalities will be examined. Since some terrorist organisations do not
intend to kill individuals with their attacks, group characteristics from the BAAD dataset will
be added to this analysis. Figure II shows the number of fatalities in single attacks and attacks
that are part of a coordinated campaign. II.
84
December 2013
PERSPECTI VES O N TERRORISM
Volume 7, Issue 6
Figure II
Since the early 1980s, attacks as part of a coordinated effort have led to more fatalities. In
order to verify this relationship, other characteristics that also determine the number of
fatalities must be added to a regression equation. When information from the BAAD dataset is
used in the regression analysis, only attacks carried out by perpetrators in the BAAD dataset
between 1998 and 2005 are included, which further restricts the sample. While this sub-
sample is non-random, the groups in the BAAD dataset were not selected based on whether or
not they carried out simultaneous attacks. Therefore, it is plausible that the sub-sample is
random on the known characteristics, and especially our characteristic of interest –
simultaneous attacks. In Figure II, the time period from 1998-2005 records a larger divergence
in fatalities from single attacks versus coordinated campaigns than earlier time periods. This
divergence may indicate that coordinated campaigns are different in this time period than
earlier. However, in Figure I, this time period experienced fewer attacks that were part of a
coordinated effort. These issues need to be remembered when generalisations are made.
In this regression, the number of people killed in each attack will be a function of whether or
not the attack was simultaneous, whether or not there were regional effects, year effects, attack
type effects, group ideology, number of allies, and whether or not the attack was a suicide
attack. The number of people killed is censored at 0 – meaning that many attacks result in no
fatalities, so a Tobit model will be employed. The Tobit model allows the econometrician to
account for different types of 0’s in the dependent variable.[19] In this case, the number of
85
December 2013
PERSPECTI VES O N TERRORISM
Volume 7, Issue 6
people killed may be 0 because the attack was unsuccessful in killing anyone or because the
group never had any intention of causing casualties.
The results from the Tobit estimation can be seen in Table I. The coefficient of simultaneous is
positive and significant, implying that attacks that are a part of simultaneous campaigns tend
to kill more people. On average, 45 percent more fatalities occur in simultaneous campaigns
than in single attacks, all else being held constant. Note that while the number of people killed
increases with simultaneous attacks, the increase is not one-to-one with the scale of the attack.
By definition, a simultaneous attack must have at least two attacks as components. However,
the number of people killed in a coordinated effort less than doubles. This finding lends
credence to the issues raised earlier, namely that using counts to measure the impact of terror
attacks could lead to biased results when single and simultaneous accounts are treated the
same way.
25.24***
Simultaneous
(5.30)
52.70***
Suicide Mission
(5.91)
2.77
Leftist Only
(5.69)
10.17**
Religion Only
(4.86)
-0.46
Ethnic Only
(13.07)
39.70**
Large
(15.29)
2.10***
Alliance
(0.35)
Region FE Yes
Time FE Yes
Type FE Yes
-100.74
Constant
(17.16)
Observations 2851
Next, how simultaneous attacks impact the success of terrorist attacks was examined using the
ITERATE dataset. Since information on group characteristics are not used to explain success,
the regression is no longer restricted to only the years where BAAD data is available. The
impact of simultaneity on success is weaker, as can be seen in Table II, but provides evidence
that simultaneous attacks are more successful than single attacks.
86
December 2013
PERSPECTI VES O N TERRORISM
Volume 7, Issue 6
Three specifications of the model were run. For each specification, attacks that are part of a
coordinated effort are combined to count as a single attack and denoted as “simultaneous”.
Other variables in the regression that may characterize success include location of attack,
method of attack, and year of attack.
Country and year fixed effects are included in this regression. The level of success by year
varies from a low of 4.5 to a high of 5.8 on a six point scale. The average level of successful
terror attacks in individual countries varies between 2.5 and 6.0 on a six point scale. Therefore,
differences between different countries and years need to be taken into account in the
regression model. One reason for these differences in success may be the level of deterrence by
the targeted country; this should help determine success. Therefore, countries that spend more
on deterrence should experience fewer successful attacks. The amount of money spent on
deterrence depends on the country’s determination of the risk they may face. Controlling for
the year of attack will control for differences in deterrence by year. However, deterrence
spending is not the only factor that determines success. Method of attack also plays a role. For
instance, suicide attacks may be harder to deter than other methods. ITERATE codes the
method of attack into twenty-five broad categories including assassination, bombing, hostage
taking, hijacking, and armed assault, etc. The average success by type of attack varies from 2.5
to 5.9 on ITERATE’s six point scale.
Three models, referring to three ways to operationalise success, are presented in Table 2. In
Model 1, success of a coordinated campaign is assigned the value of its most successful
component. In a coordinated campaign, only one component of the attack has to be successful
in order for the public to view the attack as a success. Since the dependent variable is an
ordinal variable between 0 and 6, an ordered logit estimation is run. In this model,
simultaneous attacks are more successful than single attacks. Next, success of a coordinated
87
December 2013
PERSPECTI VES O N TERRORISM
Volume 7, Issue 6
campaign is assigned the value of the average success of each of its components. This
definition of success is the most intuitive in operational terms, but it is more difficult to
address empirically. The success variable is still between 0 and 6, but for simultaneous
campaigns the variable is not necessarily an integer. In Model 2, a Tobit estimation is run on
the average success variable. Tobit was used since there are many censored variables at both
the upper and lower limits of the success scale. The results of this estimation model show no
relationship between simultaneous attacks and success. In Model 3, the average success of each
terrorist campaign is still used, but this number is rounded to its nearest integer value,
allowing an ordered logit regression. Model 3 reveals a positive relationship between
simultaneous attacks and success. Examining the odds ratio for Model 1 and Model 3 reveals
that a coordinated campaign increases the probability of success by between 46 and 172
percent.
Both hypotheses, H1 and H2, were supported by the empirical analysis – simultaneous
campaigns generate more fatalities and are more successful. However, the number of fatalities
increases by only 45 percent, while the number of attacks involved at least doubles. The impact
of the simultaneous attack is greater than the impact of a single attack, but in a smaller
proportion to the increase in size. If the goal of the terrorist group is maximizing the number
of deaths on a specific day, then it would make sense to use simultaneous attacks. If the goal of
the group is to maximize the total number of fatalities in a year, single attacks may be more
worthwhile. Hypothesis H2 is also supported, though results depend on how success for
coordinated campaigns is defined. A terrorist group that is interested in successfully carrying
out their planned attacks may be more interested in using simultaneous campaigns. Given the
support for H1 and H2, considering each part of the campaign individually, as has been done
by the past literature, may not be appropriate.
Conclusions
Simultaneous attacks have been largely ignored by the empirical literature on terrorism. In this
article, several specifications are considered to classify which events are a part of simultaneous
campaigns. The strictest definition - same day, group, location, and type of attack - is used in
all analyses to protect against incorrectly classifying attacks as simultaneous.
The goal of this article was to examine the impact of simultaneous attacks. The hypotheses
stated that simultaneous attacks would be more successful and lethal. The empirical results
suggest that simultaneous attacks have a higher probability of success. Additionally,
simultaneous attacks generate more fatalities, but not on a “one-to-one” basis. This research
has established that single attacks are different from attacks that are part of a coordinated
effort, even though these two types of attacks are treated the same by the empirical
quantitative literature. This difference should be considered in the future to ensure that results
obtained from using terrorism counts are not biased. A closer look should also be given in
future analyses with regard to the definition of “success”. An attack, or a set of attacks, might
88
December 2013
PERSPECTI VES O N TERRORISM
Volume 7, Issue 6
be “successful” in tactical terms but be a strategic failure. Beyond the “success” of individual or
coordinated acts of terrorism, there is the issue of long-term effects. Terrorism as a mode of
conflict waging has a poor record of achieving its ultimate objectives.[20]
About the Author: Kathleen Deloughery is an Assistant Professor of Public Administration and
Policy at the University at Albany, SUNY. She received her Ph.D. in Economics from The Ohio
State University in 2009. Professor Deloughery’s main research interests include the economics of
terrorism, radicalization, and political violence. She can be reached at
[email protected].
Notes
[1] Edward Mickolus, Todd Sandler, Jean Murdock, and Peter Flemming. International Terrorism: Attributes of Terrorist Events Data
Codebook, July 2002.
[2] National Consortium for the Study of Terrorism and Responses to Terrorism (START). (2012). Global Terrorism Database [Data file].
Retrieved from http://www.start.umd.edu/gtd
[3] For instance, both datasets code the events of September 11th, 2001, as four separate attacks.
[4] Per Baltzer Overgaard (1994). “The Scale of Terrorist Attacks as a Signal of Resources.” The Journal of Conflict Resolution. Vol. 38, No. 3,
pp. 452-478.
[5] Hoffman, Bruce (2002). “Rethinking Terrorism and Counterterrorism Since 9/11.” Studies in Conflict & Terrorism. Vol 25, Issue 5, pp
303-316.
[6] Gordon, Peter; Moore, James E. II; Richardson, Harry W.; and Pan, Qisheng, "The Economic Impact of a Terrorist Attack on the Twin
Ports of Los Angeles- Long Beach" (2005). Non-published Research Reports. Paper 23. http://research.create.usc.edu/nonpublished_reports/
23
[7] Walter Enders, Todd Sandler, and Gerald F. Parise (1992). An Econometric Analysis of the Impact of Terrorism on Tourism. Kyklos 45, pp.
531-554.
[8] Edward Glaeser and Jesse Shapiro (2002). “Cities and Warfare: The Impact of Terrorism on Urban Form.” Journal of Urban Economics.
Volume 51, Issue 2, pp. 205-224.
[9] Theodore Downes-Le Guin and Bruce Hoffman (1993). The Impact of Terrorism on Public Opinion - 1988-1989. Santa Monica, CA: RAND
Corporation.
[10] Claude Berrebi and Esteban Klor (2005). “The Impact of Terrorism across Industries: An Empirical Study.” C.E.P.R. Discussion Papers
5360.
[11] Frey, B.S. and S. Luechinger (2008). "Three Strategies to Deal with Terrorism." Economic Papers Vol. 27, No. 2, pp.107-114.
[12] Effi Benmelech and Claude Berrebi (2007) “Human Capital and the Productivity of Suicide Bombers.” Journal of Economic Perspectives,
Vol. 21, No. 3, pp. 223-238.
[13] Ibid.
[14] Dominic Rohner and Bruno S. Frey. (2007) “Blood and ink! The common-interest-game between terrorists and the media.” Public
Choice, Volume 133, pp. 129-145.
[15] Ibid.
[16] National Consortium for the Study of Terrorism and Responses to Terrorism (2012).
[17] Mickolus, et al. International Terrorism. July 2002.
[18] Victor H. Asal and R. Karl Rethemeyer. (2008). “The Nature of the Beast: Terrorist Organisational Characteristics and Organisational
Lethality.” Journal of Politics, Vol. 70, No. 2, pp. 437- 449.
[19] A zero inflated negative binomial was also run. The results are robust and available upon request.
[20] Cf. Alex P. Schmid and Rashmi Singh. Measuring Success and Failure in Terrorism and Counter-Terrorism: US Government Metrics of
the Global War on Terror. In: Alex P. Schmid and Garry F. Hindle. After the War on Terror. Regional and Multilateral Perspectives on
Counter-Terrorism Strategy. London: RUSI, 2009, pp. 33-61; Max Abrahms. The Political Effectiveness of Terrorism Revisited. Comparative
Political Studies, Vol. 45, No. 3, pp. 266 -293.
89
December 2013
PERSPECTI VES O N TERRORISM
Volume 7, Issue 6
Abstract
Al-Shabaab’s recent terror attack on the Westgate mall in Nairobi is not, as some have argued, a
sign of the group’s desperation, but rather reveals its strength. Its most radical leader recently
consolidated his control of the group, and the AMISOM offensive has stalled, ceding safe havens
within the country that allow al-Shabaab to regroup and prosecute the insurgency it has
launched. But the anti-Shabaab coalition has neither a sufficient number of troops nor the
trained counterinsurgent forces required to root out the group. The coalition instead has to find a
way for now to keep al-Shabaab off-balance in its sanctuaries, perhaps with elite unit and UAV
strikes, while the international community trains adequate indigenous forces. The ultimate
solution to the al-Shabaab challenge is the long-term project of building a legitimate Somali
government; but in the meantime, Shabaab cannot be allowed to gather its strength to launch
more attacks from its sanctuaries.
Introduction
The terrible tragedy at the Westgate mall in Nairobi, Kenya, is now ended. The final toll is still
unclear, but at the time of this writing 72 people are confirmed dead, well over 150 injured,
and more than 60 still missing.[1] Kenya and the other countries that lost citizens are now left
to mourn, while their leaders face the task of preventing another such attack.
Analysts are still grappling with what this assault tells us about the Somali terrorist group, al-
Shabaab, that claimed the attack. Ken Menkhaus, the eminent Somali expert, posted an article
describing the attack as a sign of “desperation” by the group.[2] But others argued that the
episode instead reveals al-Shabaab’s strength, rather than a desperate bid to claw back some
relevance.[3]
Those making the latter argument better capture the group’s trajectory. It is true that the
African Union Mission in Somalia (AMISOM) offensive in Somalia hurt al-Shabaab. The
coalition’s [4] capture of Kismayo and Mogadishu damaged the group’s income as it is no
longer able to rely on the taxes from Kismayo’s port or Mogadishu’s Bakara Market, making it
difficult to provide the same sort of financial benefits to its fighters that induced many of them
to join in the first place.[5] This and other factors have led to waves of defections.[6]
Furthermore, al-Shabaab has lost much of the infrastructure it used for transmitting
propaganda, such as several of its radio stations, another happy outcome of the coalition’s
90
December 2013
PERSPECTI VES O N TERRORISM
Volume 7, Issue 6
offensive.[7] And while there are no solid numbers on just how many insurgents have been
killed in the offensive, they are likely significant.[8]
The group also recently experienced an extraordinary spasm of internecine violence. In mid-
June, Shabaab factions met in a series of clashes in southern Somalia;[9] after the dust settled,
it was clear that the group’s Emir, Ahmed Abdi Godane, had moved swiftly and with
extraordinary ruthlessness against several challengers. His men killed at least two prominent
leaders of the group, including a fellow founder. Another founder fled to the shelter of his
clansmen, and the group’s spiritual leader tried to defect to the Somali Federal Government
(SFG) and was arrested.[10] A month later, Godane’s men finally caught up with the group’s
most prominent foreign fighter, an American named Omar Hammami, and killed him as well.
[11] Al-Shabaab was reeling.
But the purge also left Ahmed Abdi Godane, its most radical and ruthless leader, firmly in
control of the group. Godane is a fanatic, a true believer in the worst excesses of the violent
Islamic sub-sect known as Salafi-Jihad, and is committed to the idea of global war against any
who do not agree with his narrowly defined beliefs. The Westgate slaughter was likely both a
very public reminder of his new supremacy within the group to anyone who questioned it, as
well as a signal of his willingness to prosecute jihad more vigorously in the region.
And while AMISOM made excellent progress against the group, their offensive is now stopped
in its tracks. In June of this year, AMISOM switched to a “protection-of-civilians” strategy that
consists of consolidating its gains and proactively protecting civilians under its control.[12]
Protecting civilians is a critical piece of any counterinsurgency strategy, but AMISOM may
also have calculated that pushing further into Shabaab-held territory would leave its troops
stretched too thin to effectively hold the areas it has already liberated, opening up a dangerous
opportunity for Shabaab.
That is why al-Shabaab’s Westgate attack should be understood as a warning, rather than as a
death rattle. The parts of Somalia out of which the group has yet to be pushed serve as safe
havens where it is free to rest, regroup, and plan attacks in service of the insurgency it has
launched against the SFG and its allies.
Safe havens are an obvious problem for counterinsurgents. Insurgents that have them have
historically been far more difficult to defeat than those kept on the run: the Afghan Taliban’s
ability to safely ensconce itself in sanctuaries in Pakistan is one of the major reasons ISAF has
struggled to bring order to Afghanistan, while the Viet Cong enjoyed the safety of Laos and
Cambodia for most of the Vietnam War.[13] Fortunately, all of Somalia’s neighbors are
committed to defeating Shabaab and denying it a safe haven within their borders, but the
group does not need to look that far afield for sanctuary; it has found it in the forbidding
forests of Lower Jubba near the Kenyan border and the Galgala Mountains in the North.[14]
Counterinsurgency doctrine has much to say about how terrain and cover of the type found in
those areas is highly appealing to insurgents looking for an area in which to hide and negate
91
December 2013
PERSPECTI VES O N TERRORISM
Volume 7, Issue 6
their foe’s advantages in conventional weaponry. Gebru Tareke, a historian at Yale University
who has studied the Ethiopian insurgencies, describes the “ideal terrain” for insurgents as an
“expansive area of forests, marshes, or mountain ranges and gorges,”[15] another author
speaks of “swamps, mountains, and forests,”[16] while the USMC Small Wars Manual warns
that Marines should expect to battle insurgents in “mountainous, wooded terrain.”[17]
The forests of Lower Jubba are on par as an ideal safe haven with all of those examples. They
have served as a traditional sanctuary for Somali extremists for nearly 20 years, and have been
described as “a vast area of inaccessible jungles” and “remote bush.”[22] These areas have
already caused the coalition problems. The Kenyan Defence Force’s (KDF) advance towards
Kismayo was slowed when its mechanized units had trouble navigating the forests, while the
Shabaab guerrillas made good use of the ample cover to avoid the KDF’s superior firepower.
[23]
Perhaps more concerning is the mountainous Galgala region of Puntland and its network of
caves and training camps. The area is notoriously inaccessible and has explicitly been
compared on more than one occasion to Afghanistan’s Tora Bora mountains.[24] Stratfor
released a report pointing out that the vegetation is so thick in the mountains, and the weather
hot enough during the day, that fighters may be able to evade targeting systems from weapons
platforms, including infrared targeting.[25] Its proximity to Yemen has in the past made it an
ideal base from which to both send and receive weapons and fighters across the Gulf of Aden;
reports of boatloads of fighters in that area, and of skiffs stuffed with weapons likely meant for
al-Shabaab, suggests the group is utilizing this traditional smuggling route.[26]
Worse yet, a radical militia led by Yasin Kilwe operates in that area and hosts several hundred
al-Shabaab fighters, including senior leaders.[27] The Puntland authorities have never been
able to subdue Kilwe’s group, and it has reportedly even captured parts of the Galgala region
while also launching a deadly attack against a military base in Puntland. In February 2012, the
militia formally joined al-Shabaab.[28]
These realities suggest that there is a critical need to keep pressing the attack against al-
Shabaab and root it out of its sanctuaries, but also that it will not be easy. To begin with, more
troops will be needed. A RAND study found that the average troop level during
counterinsurgency campaigns in permissive environments was 2 soldiers per 1,000 residents,
while for non-permissive environments it was 13 soldiers per 1,000 residents.[29] Somalia is
92
December 2013
PERSPECTI VES O N TERRORISM
Volume 7, Issue 6
As of June 2013, AMISOM was at full troop strength with just under 18,000 soldiers in the
country,[31] though the African Union wishes to bump that number up to about 24,000.[32]
Diplomats estimate that Ethiopia has about 8,000 soldiers inside Somalia, though no one
knows the number for sure.[33] And it is difficult to determine how many troops currently
serve in the Somali National Army; there are “theoretically” 10,000, though the likely number
is far lower.[34] There are also a number of allied militias whose numbers are similarly vague:
in early 2010, U.S. intelligence officials estimated Ras Kamboni had between 500 and 1,000
fighters, and in 2012 a Stanford University project estimated that Ahlu Sunna Wal Jama had
around 2,000 fighters.[35] Numbers for the various other militias are even more difficult to
find.
Whatever the actual force levels at the coalition’s disposal, they are too few for AMISOM to
continue its push against al-Shabaab. And in some ways the numbers are irrelevant as al-
Shabaab is no longer interested in testing AMISOM in a conventional battle for superiority, as
evidenced by the group’s tactical decision over the last two years. When the KDF advanced
into Kismayo in late 2012 it proceeded slowly, and its eventual final push featured a night-time
amphibious assault spearheaded by Special Forces troops with Somali security forces bearing
down from the interior.[36] But resistance was surprisingly light; al-Shabaab had abandoned
the city, its final major stronghold and biggest source of funding, practically without offering
serious resistance.[37]
Al-Shabaab’s Kismayo withdrawal reflected the same decision the group made one year earlier
in Mogadishu, suddenly withdrawing from a city for which it had battled for years.[38] Both
choices were strategic decisions to avoid a devastating confrontation with a suddenly robust,
reinvigorated AMISOM force that possessed far superior conventional military capabilities.
After the fall of Kismayo, an al-Shabaab commander said as much: “We got orders from our
superiors to withdraw from the city... this is part of broader military tactics we have set for the
enemy."[39]
The “broader military tactics” to which the commander was alluding are guerrilla tactics.
According to several reports, the group had been planning to switch to an insurgency strategy
for more than a year at the time of the Kismayo withdrawal,[40] and abandoning fixed
positions in the cities was in keeping with their new strategy. And it was not just the major
cities that al-Shabaab abandoned; it declined to defend nearly all areas it held in the face of
approaching troops.[41]
93
December 2013
PERSPECTI VES O N TERRORISM
Volume 7, Issue 6
An al-Shabaab commander, Sheikh Mohamed Ibrahim, articulated the strategy further when
speaking of the group’s withdrawal from Mogadishu: “Now we are saving money, while the
enemy pays more and more to secure land it seized, recruit new soldiers, pay for services. Do
you think really they can continue like that forever? Already we are in Mogadishu every night,
carrying out attacks.”[42] There is a self-serving element to his statement as al-Shabaab did not
want to appear weak after its withdrawal from Mogadishu, but it is also an articulation of
classic insurgency strategy. Ibrahim’s words echo Robert Taber’s arresting metaphor for an
insurgent:
The guerrilla fights the war of the flea. The flea bites, hops, and bites again,
nimbly avoiding the foot that would crush him. He does not seek to kill his enemy
at a blow, but to bleed him and feed on him, to plague and bedevil him, to keep
him from resting and to destroy his nerve and morale.[43]
There is a further complication for AMISOM. It takes forces trained in counterinsurgency and
with a different mindset from the conventional warfighter’s, a certain “flair for dealing with
civilians,” to be effective against an insurgency.[44] The U.S. Marine Corps believed so strongly
in the necessity of training troops specifically for fighting insurgents that its Small Wars
Manual devotes an entire chapter to the subject.[45]
Without such training, the results can be damaging indeed. The Nigerian army is currently
having extreme difficulty suppressing Boko Haram in the northern parts of the country, in
part because its soldiers are untrained in counterinsurgency tactics.[46] President George W.
Bush’s administration focused on building a U.S. force designed for conventional conflict,
which left it ill-equipped to go about necessary counterinsurgency activities in Iraq and
Afghanistan, and contributed to the Iraqi population turning against the American presence.
[47] And in the war that haunts the United States still, Vietnam, part of the blame for the loss
has been pinned on the fact that U.S. servicemen were untrained in counterinsurgency tactics.
[48]
The bulk of the troops trying to suppress al-Shabaab have no training in the specific skill set
necessary to succeed in this new tactical environment. Kenya’s elite forces in Somalia, the
Rangers and Special Forces, have had some counterinsurgency training from the British and
Americans.[49] Yet the rest of Kenya’s forces have not. In fact, one KDF soldier offered to a
journalist the following worrisome analysis for fighting insurgents: “In guerrilla warfare you
don't need training…You just need to know how to shoot and duck."[50] And one of Kenya’s
allies in the current fight, Ugandan President Yoweri Museveni, publicly questioned whether
the Kenyan military was prepared for guerrilla fighting.[51]
The records of the other security forces that make up the coalition are mixed, but none are
crack counterinsurgent forces. Ethiopia has fought a number of domestic guerrilla movements
in its Oromia, Afar, and Ogaden regions,[52] but failed to quell the Shabaab-led insurgency
94
December 2013
PERSPECTI VES O N TERRORISM
Volume 7, Issue 6
that began in 2006 after the Ethiopian National Defense Force invaded the country, resulting
in them ultimately being driven out.[53] The Ugandan army has experience fighting
insurgents in the north of its own country, but its actions there have been stained by credible
allegations of human rights abuses, and it remains feared and disliked by some Ugandans in
those areas.[54]
And Somalia’s national security forces have a whole host of problems that make them
unsuitable for a counterinsurgency campaign, not least because they are largely composed of
“groups of untrained young men” used to the power a weapon brings.[55] Many of these
youths may well be proficient asymmetric fighters as Somalia has for decades been a harsh
training ground in such types of combat. Yet they lack the necessary discipline and regard for
the protection of civilians that is critical for successful counterinsurgency, and already have
been credibly accused of a range of human rights’ abuses.
Human Rights Watch has issued several reports that are cause for serious concern in this
respect, including one in March 2013 concerning the plight of IDPs in Somalia:
The BBC documented abuse in IDP camps as well, reporting that 1,700 women were raped in
2012 in the camps, and quoted a U.N. estimate that “men in uniform” perpetrated 70% of the
assaults.[57]
Human Rights Watch has also reported on “summary executions and torture” inflicted by pro-
government militias in Beletwayne and Baidoa,[58] and in December 2012 urged Kenyan
authorities not to repatriate Somali refugees to liberated areas because of “ongoing fighting
and abuses against civilians in areas controlled by Kenyan forces and allied militias.”[59]
Several cases of coalition abuse against civilians were egregious enough to spark an
international outcry. One case, in January 2013, is particularly concerning as it suggests the
government tried to cover up a crime committed by government security forces and then
engaged in reprisals against those who reported the abuse. A woman who reported being
raped by members of the Somali security forces was charged along with several others for
“insulting a government body,” among other charges.[60] The charges against her were
eventually dropped, though the journalist involved in the case remained in jail for months
afterwards.[61]
In April 2013, President Mohamud in a speech to police cadets in Mogadishu admitted for the
first time that Somali security forces had engaged in rapes against civilians—he went on to say
95
December 2013
PERSPECTI VES O N TERRORISM
Volume 7, Issue 6
that security forces who rape and rob Somalis need to be fought the same as al-Shabaab.[62] It
was an important and helpful step by the president, and will hopefully serve as a credible
warning that mistreatment of civilians will not be tolerated. But the human rights abuses
highlight the broader issues of poor discipline that make the Somali security forces thoroughly
ill-equipped to help AMISOM dislodge al-Shabaab insurgents from its safe havens.
The international community is aware of the urgent need to train Somalia’s indigenous
security forces, and in fact have been working on it for years—Kenya, Uganda, Ethiopia, and
the European Union have all spent time trying to whip various Somali National Army and
militia forces into shape. But most of the training appears to be for fundamentals [63] and not
the more sophisticated counterinsurgency training that is necessary. International donors are
designating funds for police and other security force training,[64] which is positive, but much
more will be required.
AMISOM and the SFG are thus caught on the horns of a nasty dilemma: allowing al-Shabaab
to continue unmolested in its safe havens means the group will be able to continue to marshal
its strength to fight its enemies, as well as plan the sorts of terror attacks it launched at
Westgate. But restarting the offensive will leave AMISOM too thinly stretched in the areas it
has already liberated. Furthermore, chasing Shabaab into the heavy forests of Lower Jubba, or
the mountains of Galgala, will mean AMISOM’s conventional military superiority will be
largely neutralized, allowing Shabaab to fight on a more or less equal footing, a classic guerrilla
strategy.
AMISOM needs, then, to find a way to keep the terrorists off-balance but avoid committing
troops who are untrained for this sort of combat and who will get chewed up. It should
conduct short, sharp strikes by Kenya’s elite units who are trained in asymmetric warfare [65]
—UAV strikes could also help, though the daunting terrain may make them less effective.
Reliable and accurate intelligence will be critical, so AMISOM should be looking to its Somali
counterparts to develop strong sources among the local communities. Meanwhile, the
international community should redouble its efforts to train Somali security forces, as
bringing in even more foreign troops to address the troop level shortfalls runs the risk of
antagonizing Somalis.
Ultimately, the al-Shabaab problem is a political one that will require a political solution. Until
there is a government in Somalia that can prove to Somalis it is their best hope for prosperity
and stability, Shabaab will be able to garner some level of support from among the population,
despite its general unpopularity. Yet building a state is a long-term project, and the immediate
challenge of al-Shabaab’s sanctuaries in Somalia remains, and it requires a smart
counterinsurgency approach.
As U.S. Representative Tom Cotton recently remarked in a speech about al-Qaeda, “When you
have to worry about personal security, you barely have time to plan a meal, much less plan and
execute a mass attack.”[66] Al-Shabaab, safe in its sanctuaries, had the time to plan a
sophisticated and, by the evil metrics terrorists use, extraordinarily successful attack in
96
December 2013
PERSPECTI VES O N TERRORISM
Volume 7, Issue 6
Nairobi. AMISOM and the rest of the international community must devise a way to again
pursue al-Shabaab, not only to give the SFG more time for state-building, but also to deny al-
Shabaab the safe haven it needs to plot such horrors as we witnessed recently in Nairobi.
About the Author: Josh Meservey recently joined the Africa Center at the Atlantic Council as
the Assistant Director. He is co-author, with James Forest and Graham Turbiville, of a
monograph on the al-Shabaab insurgency to be published by the U.S. Joint Special Operations
University. Sections of this article have been adapted from the forthcoming monograph.
Notes
[1] “61 Still Missing from Kenya Mall Attack.” Voice of America, September 26, 2013. http://www.voanews.com/content/sixty-one-still-
missing-from-kenya-mall-attack/1757568.html, and Pearson, Michael, Zain Verjee, and Nima Elbagir. “Kenyan Police Vow to ‘Finish and
Punish’ Westgate Mall Terrorists.” CNN, September 24, 2013. http://edition.cnn.com/2013/09/23/world/africa/kenya-mall-attack/index.html?
hpt=hp_t1.
[2] Menkhaus, Ken. “What The Deadly Attack On A Kenya Mall Was Really About.” ThinkProgress, September 22, 2013. http://
thinkprogress.org/security/2013/09/22/2662191/deadly-attack-kenya-mall-sign-desperation/.
[3] Zimmerman, Katherine. “We Are Losing Fight Against al-Shabaab.” CNN World, September 23, 2013. http://
globalpublicsquare.blogs.cnn.com/2013/09/23/we-are-losing-fight-against-al-shabaab/.
[4] The “coalition” as used in this article refers to all of the different military forces fighting al-Shabaab: AMISOM, the Ethiopian National
Defense Force, Ahlu Sunna Wal Jama, Ras Kamboni, Somali National Army, and other militias and various armed groups.
[5] Guled, Abdi. “Former Somali Militants Recall Cruelty, Death.” Readingeagle.com, July 11, 2012. http://readingeagle.com/article.aspx?
id=398400#.UYs27YXIM7A, and AS Defector Series Report 6: Reasons for Defection or Escape. Native Prospector: East Bridge. Navanti Group,
September 6, 2012, p. 2.
[6] “Al-Shabaab Militants Defecting to Somali Side.” The Daily Star, June 16, 2012. http://www.dailystar.com.lb/News/Middle-East/2012/
Jun-16/177051-al-shabaab-militants-defecting-to-somali-side.ashx#axzz20L6tthFR, and “Can Somalia’s Cheap Peacekeeping Defeat al-
Shabab?” BBC News Africa, June 11, 2012. http://www.bbc.co.uk/news/world-africa-18392212.
[7] Al-Shabaab Defector Series Report 5: Communications and Media Access. Native Prospector: East Bridge. Navanti Group, August 29, 2012,
p. 5.
[8] Mohamed, Mahmoud. “Al-Shabaab Beleaguered with Deep Internal Disputes.” Sabahi, March 26, 2012. http://sabahionline.com/en_GB/
articles/hoa/articles/features/2012/03/26/feature-01.
[9] “Somalia: Rifts Between Al Shabab Fighters Spreads to Hudur.” AllAfrica, June 22, 2013. http://allafrica.com/stories/201306220198.html?
aa_source=slideout, and “Somalia: Al Shabaab Dispute Turns Violent, Factions Emerge.” Garoweonline, June 21, 2013. http://
www.garoweonline.com/artman2/publish/Somalia_27/Somalia_Al_Shabaab_dispute_turns_violent_factions_emerge.shtml, See also
“Somalia’s al-Shabab Militants in ‘Deadly Feud’.” BBC News, June 20, 2013. http://www.bbc.co.uk/news/world-africa-22988404.
[10] “Al-Shabaab Kill Two of Their Own Chiefs.” Daily Nation, June 30, 2013. http://www.nation.co.ke/News/africa/Al-Shabaab-kill-two-of-
their-own-chiefs/-/1066/1899520/-/item/0/-/s1bediz/-/index.html, and “Somali Forces Arrest Islamist Leader in Mogadishu.” The Daily Star,
June 30, 2013. http://www.dailystar.com.lb/News/Middle-East/2013/Jun-30/222047-somali-forces-arrest-islamist-leader-in-
mogadishu.ashx#axzz2YqlZ5IfS.
[11] Kulish, Nicholas. “American Jihadist Is Believed to Have Been Killed by His Former Allies in Somalia.” The New York Times, September
12, 2013. http://www.nytimes.com/2013/09/13/world/africa/american-jihadist-is-believed-killed-by-ex-allies-in-somalia.html?_r=1&.
[12] Williams, Paul D. “The African Union Mission in Somalia and Civilian Protection Challenges.” Stability: International Journal of Security
& Development 2, no. 2 (2013): 1–17. doi:http://dx.doi.org/10.5334/sta.bz, p. 3.
[13] Jones, Seth G. “What Went Wrong in Afghanistan? Allowing a Sanctuary in Pakistan.” The RAND Blog, March 5, 2013. http://
www.rand.org/blog/2013/03/what-went-wrong-in-afghanistan-allowing-a-sanctuary.html, and Snepp, Frank. “The Vietnam Syndrome.” Los
Angeles Times, May 5, 2013. http://www.latimes.com/news/opinion/commentary/la-oe-snepp-lessons-of-vietnam-20130505,0,5276212.story
[14] Aynte, Abdi. “Al-Shabaab and Post-transition Somalia.” African Arguments, September 3, 2012. http://africanarguments.org/2012/09/03/
al-shabaab-and-post-transition-somalia-by-abdi-aynte/.
[15] Tareke, Gebru. The Ethiopian Revolution: War in the Horn of Africa. The Yale Library of Military History. New Haven: Yale University
Press, 2009, p. 48.
[16] Sollom, Lt. Col. A. H. “Nowhere Yet Everywhere.” In Modern Guerrilla Warfare: Fighting Communist Guerrilla Movements, 1941-1961,
edited by Franklin Mark Osanka, 15–24. New York: The Free Press of Glencoe, 1962, p. 19.
[17] U.S. Marine Corps Small Wars Manual. New York, NY: Cosimo Reports, 2010, pp. 6 - 3.
97
December 2013
PERSPECTI VES O N TERRORISM
Volume 7, Issue 6
[18] Dickinson, Elizabeth. “Rumble in the Jungle: The Changing Strategy of FARC.” L’Occidentale, July 8, 2011. http://www.loccidentale.it/
node/108486.
[19] Nagl, John A. Learning to Eat Soup with a Knife: Counterinsurgency Lessons from Malaya and Vietnam. Paperback ed. Chicago: University
of Chicago Press, 2005, p. 69.
[20] King, Laura. “Fighting Erupts in Afghanistan’s Tora Bora Mountains Between NATO, Insurgent Forces.” Los Angeles Times, December 30,
2010. http://articles.latimes.com/2010/dec/30/world/la-fg-afghanistan-tora-bora-20101230.
[21] Boot, Max. The Savage Wars of Peace: Small Wars and the Rise of American Power. 1st pbk. ed. New York: Basic Books, 2003, pp. 297, 240
- 252.
[22] Aynte, “Al-Shabaab and Post-transition Somalia,” and “Somalis Flee as Troops Advance Towards Islamist Bastion.” Google, September 18,
2012. http://www.google.com/hostednews/afp/article/ALeqM5guGQPbkAR8nGoUa-eq3QwjSpb-qw?
docId=CNG.a15f80d65332895b2c4e4b98a68f8426.141.
[23] Boswell, Alan, and Abdi Ibrahim. “East Africa Debates What Happens to Southern Somalia If Al Shabab Is Routed.” McClatchy, August
14, 2012. http://www.mcclatchydc.com/2012/08/14/162259/east-africa-debates-what-happens.html.
[24] “Shabaab Bolster Northern ‘Tora Bora’ Base.” News24, October 23, 2012. http://www.news24.com/Africa/News/Shabaab-bolster-
northern-Tora-Bora-base-20121023, and Joselow, Gabe. “Puntland Instability Underscores Somali Militants’ Staying Power.” Voice of America,
December 8, 2012. http://www.voanews.com/content/insecurity-in-puntland-underscores-al-shabab-staying-power/1561164.html. See also
Aynte, “Al-Shabaab and Post-transition Somalia.”
[25] “Al Shabaab’s Retreat to the Al Madow Mountains.” Stratfor Global Intelligence, n.d.
[26] Pelton, Robert Young. “Al-Shabaab Fighters on the Run.” SomaliaReport, July 1, 2012. http://www.somaliareport.com/index.php/post/
2472, and “Somalia: ‘Al-Shabab Weapons Seized in Puntland’.” BBC News Africa, October 19, 2012. http://www.bbc.co.uk/news/world-
africa-20003253.
[27] Somali, Ahmed, Ahmed Abdi, and Mohamed Ahmed. “Militia Seizes Control of Puntland Region.” SomaliaReport, November 5, 2011.
http://www.somaliareport.com/index.php/post/721. Shabaab’s Galgala militia was originally headed by Mohamed Said Atam, but he was
replaced by Kilwe. Atam is now believed to be operating in the South. See Al-Shabaab Organizational and Leadership Structure. Native
Prospector: East Bridge. Navanti Group, May 16, 2012, p. 9. See also AFP (October 23, 2012).
[28] Somali, Abdi and Ahmed, “Militia Seizes Control of Puntland Region.” See also “Somalia’s al-Shabab Targets Puntland Military.” BBC
News, December 5, 2012. http://www.bbc.co.uk/news/world-africa-20614050, and Pelton, Robert Young, Sucaad Mire, and Mohamed
Nuxurkey. “Atom Militia Declares Allegiance to Shabaab.” SomaliaReport, February 25, 2012. http://www.somaliareport.com/index.php/post/
2915.
[29] The Beginner’s Guide to Nation-Building. Santa Monica, CA: RAND National Security Research Division, 2007, p. 41.
[30] “Somalia.” CIA - The World Factbook, May 7, 2013. https://www.cia.gov/library/publications/the-world-factbook/geos/so.html. See also
“Somaliland.” Unrepresented Nations and Peoples Organization, March 25, 2008. http://www.unpo.org/members/7916.
[31] Williams, Paul D. “The African Union Mission in Somalia and Civilian Protection Challenges”, op. cit, p. 2.
[32] “African Union Calls for More African Troops in Somalia.” Reuters, October 12, 2013. http://www.reuters.com/article/2013/10/12/us-
somalia-amisom-idUSBRE99B02K20131012.
[33] Maasho, Aaron. “Ethiopian Troops Quit Somali City, but no Full Withdrawal Planned.” Reuters, July 22, 2013. http://www.reuters.com/
article/2013/07/22/us-ethiopia-somalia-idUSBRE96L0HX20130722.
[34] Backhaus, Anne, and Johannes Korge. “German Soldiers Help Train Somali Soldiers at Camp in Uganda.” Spiegel Online, October 22,
2012. http://www.spiegel.de/international/world/german-soldiers-help-train-somali-soldiers-at-camp-in-uganda-a-861885.html.
[35] Roggio, Bill. “Shabaab Absorbs Southern Islamist Group, Splits Hizbul Islam.” The Long War Journal, February 1, 2010. http://
www.longwarjournal.org/archives/2010/02/shabaab_absorbs_sout.php. See also “Ahlu Sunna Wal Jama.” Stanford University: Mapping
Militant Organizations, July 18, 2012. http://www.stanford.edu/group/mappingmilitants/cgi-bin/groups/view/109#cite30.
[36] Gisesa, Nyambega. “Licensed to Kill: The World of Kenya’s Elite Forces.” Sunday Nation, December 18, 2012. http://www.nation.co.ke/
Features/DN2/The-world-of-Kenyas-elite-forces/-/957860/1645208/-/item/2/-/ndyuqj/-/index.html, and “Somalia: Al Shabaab Militants
Abandon Kismayo After African Union Attack.” GlobalPost, September 29, 2012. http://www.globalpost.com/dispatch/news/regions/africa/
somalia/120929/somalia-al-shabaab-militants-abandon-kismayo-after-au-attack.
[37] Guled, Abdi. “After Kenyan Attack, Somali Militants Abandon City.” Yahoo! News, September 29, 2012. http://news.yahoo.com/kenyan-
attack-somali-militants-abandon-city-091910473.html.
[38] Pflanz, Mike. “Al-Shabaab Rebels Withdraw from Somali Capital.” The Telegraph, August 6, 2011. http://www.telegraph.co.uk/news/
worldnews/africaandindianocean/somalia/8685953/Al-Shabaab-rebels-withdraw-from-Somali-capital.html.
[39] “Somalia Islamists Abandon Kismayo Amid AU Attack.” BBC News Africa, September 29, 2012. http://www.bbc.co.uk/news/world-
africa-19769058.
[40] Verini, James. “The Last Stand of Somalia’s Jihad.” Foreign Policy, December 17, 2012. http://www.foreignpolicy.com/articles/2012/12/17/
the_last_stand_of_somalias_jihad. See also Aynte, “Al-Shabaab and Post-transition Somalia,” and Marchal, Roland. “History Repeats Itself in
Somalia.” NewStatesman, August 20, 2012. http://www.newstatesman.com/blogs/world-affairs/2012/08/history-repeats-itself-somalia.
98
December 2013
PERSPECTI VES O N TERRORISM
Volume 7, Issue 6
[41] Pelton, Robert Young. “Liberation of Merka Has Historical Implications.” SomaliaReport, August 27, 2012. http://
www.somaliareport.com/index.php/post/3592/Liberation_of_Merka_Has_Historical_Implications, and Aynte, “Al-Shabaab and Post-
transition Somalia.”
[42] Abdinor, Abdiaziz, and Mike Pflanz. “In Somalia, Optimism Rises.” The Christian Science Monitor, August 18, 2012. http://
www.csmonitor.com/World/Africa/2012/0818/In-Somalia-optimism-rises.
[43] Taber, Robert. War of the Flea: The Classic Study of Guerrilla Warfare. Washington, D.C: Brassey’s, 2002, pp. 49-50.
[44] Boot, Max. The Savage Wars of Peace: Small Wars and the Rise of American Power, op. cit., p. 299.
[45] U.S. Marine Corps Small Wars Manual, op. cit., chapter 4.
[46] “A Threat to the Entire Country.” The Economist, October 29, 2012.
[47] The Beginner’s Guide to Nation-Building, op cit,; and Gordon, Michael R., and Bernard E. Trainor. Cobra II: The Inside Story of the
Invasion and Occupation of Iraq. 1st Vintage Books ed. New York: Vintage Books, 2007, p. 567.
[48] Boot, Max. The Savage Wars of Peace: Small Wars and the Rise of American Power, op. cit., p. 299.
[49] Gisesa, Nyambega. “Licensed to Kill: The World of Kenya’s Elite Forces”, op. cit.
[50] Verini, James. “The Last Stand of Somalia’s Jihad”, op. cit.
[51] Boswell, Alan. “WikiLeaks: U.S. Warned Kenya Against Invading Somalia.” McClatchy, November 18, 2011. http://
www.mcclatchydc.com/2011/11/18/130739/wikileaks-us-warned-kenya-against.html.
[52] “World Armies>Ethiopia.” Jane’s World Armies, November 30, 2012.
[53] “Somalia and the Shabab: It’s Not over Yet.” The Economist, October 6, 2012. http://www.economist.com/node/21564258.
[54] Hopwood, Julian. We Can’t Be Sure Who Killed Us: Memory and Memorialization in Post-conflict Northern Uganda. International Center
for Transitional Justice, February 2011. http://ictj.org/publication/we-can%E2%80%99t-be-sure-who-killed-us-memory-and-
memorialization-post-conflict-northern-uganda, pp. 6, 14.
[55] Gatehouse, Gabriel. “Hundreds of Women Raped in Somali Camps for Displaced.” BBC News, April 10, 2013. http://www.bbc.co.uk/
news/world-africa-22100946.
[56] Hostages of the Gatekeepers: Abuses Against Internally Displaced in Mogadishu, Somalia. Human Rights Watch, March 2013. http://
www.hrw.org/reports/2013/03/28/hostages-gatekeepers-0, pp. 3 - 4.
[57] Gatehouse, “Hundreds of Women Raped in Somali Camps for Displaced.”
[58] “Somalia: Pro-Government Militias Executing Civilians.” Human Rights Watch, March 28, 2012. http://www.hrw.org/news/2012/03/28/
somalia-pro-government-militias-executing-civilians.
[59] “Kenya: Somalia Unsafe for Refugees to Return.” Human Rights Watch, March 30, 2012. http://www.hrw.org/news/2012/03/30/kenya-
somalia-unsafe-refugees-return.
[60] “Somalia: Anger over Woman Charged After Alleging Rape.” BBC News Africa, January 30, 2013. http://www.bbc.co.uk/news/world-
africa-21259395.
[61] “Somali Woman Cleared in ‘False Rape’ Case.” BBC News Africa, March 3, 2013. http://www.bbc.co.uk/news/world-africa-21647203.
[62] Som, Maalik. “Somalia President Admits Rapes By Security Forces.” AllAfrica, April 10, 2013. http://allafrica.com/stories/
201304100672.html?aa_source=slideout.
[63] For a look at the EU’s training efforts, see Anne Backhaus and Johannes Korge, “German Soldiers Help Train Somali Soldiers at Camp in
Uganda,” as well as “EU Day Celebrated in Somalia-EUTM Somalia in Mogadishu: A Milestone/The New Era.” European Union, May 15,
2013. http://www.consilium.europa.eu/eeas/security-defence/eu-operations/eu-somalia-training-mission/news-in-brief?lang=en. For
reference to Ethiopia’s training of Somali forces, see “Ahlu Sunna Wal Jama.” For Uganda’s: Hatcher, Jessica. “Somalia’s Young Army Recruits
Face Uphill Battle for Credibility.” The Guardian, April 19, 2013. http://www.guardian.co.uk/global-development/2013/apr/19/somalia-army-
uphill-battle-credibility. For Kenya’s: James Verini, “The Last Stand of Somalia’s Jihad”, op. cit.
[64] Hutton, Robert. “U.K. Pledges $280 Million of Aid to Somalia for Arms, Food.” Bloomberg, May 7, 2013. http://www.bloomberg.com/
news/2013-05-07/u-k-pledges-280-million-of-aid-to-somalia-for-arms-food.html. See also “EU Pledges 44 Million Euros Aid at Somalia
Conference.” Africa Review, May 7, 2013. http://www.africareview.com/News/EU-pledges-44-million-euros-aid-at-Somalia-conference/-/
979180/1845018/-/aymmib/-/index.html.
[65] Gisesa, Nyambega.“Licensed to Kill: The World of Kenya’s Elite Forces”, op. cit.
[66] “September 10, 2013: Remarks to the American Enterprise Institute | Congressman Tom Cotton.” Accessed September 27, 2013. http://
cotton.house.gov/media-center/speeches/al-qaeda-today.
99
December 2013
PERSPECTI VES O N TERRORISM
Volume 7, Issue 6
Abstract
The Horn of Africa has long been a recipient of foreign security assistance, with significant funds
increasingly devoted to supporting subregional civilian-oriented counterterrorism efforts over the
past decade. Despite efforts to better coordinate delivery, counterterrorism programming in the
subregion generally remains fragmented, short-term, and siloed in implementation. This article
argues that it is time to rethink the international community’s approach to counterterrorism
assistance to the Horn of Africa and calls for a cohesive regional approach that not only bridges
the gap between security and development, but also the gap between counterterrorism and
human security. It emphasizes that the international community must not only better coordinate
existing streams of counterterrorism assistance to the region, but also rethink how this assistance
is designed and the ways it can be delivered to complement broader subregional development and
security agendas. After a brief introduction to international counterterrorism assistance to the
Horn of Africa, the article examines linkages across three thematic streams of programming being
delivered to the subregion: anti-money laundering and countering the financing of terrorism;
criminal justice capacity building assistance to counter terrorism; and, countering violent
extremism. This discussion will highlight the need for a regional risk reduction strategy for the
Horn of Africa that not only builds on the interplay of different streams of counterterrorism
assistance, but on synergies across broader subregional development and security agendas as well.
Introduction
As communities in the Horn of Africa struggle to overcome a range of deeply complex
development and security challenges, persistent threats posed by violent extremism and
transnational terrorism remain serious national security concerns both for the subregion and
the international community. Though the subregion has long been a recipient of foreign
security assistance, international support for subregional counterterrorism efforts has become
increasingly civilian-oriented over the past several years. While the shift toward civilian-
oriented counterterrorism can be credited with a number of significant gains, its long-term
impact on reducing terrorism-related risks in the subregion remains to be seen.
As the nature, scope and extent of civilian counterterrorism assistance to the greater Horn of
Africa has become increasingly diverse, the time is ripe to reflect on where counterterrorism
fits in the long view of the development and security challenges of the subregion. It is time to
Greater integration across these streams of assistance, already being delivered by a multiplicity
of international actors is an important first step to strengthening national resilience to
terrorism-related risks in the subregion. However, international counterterrorism assistance
alone cannot sustainably address the challenges posed by terrorism in the Horn of Africa.
Aligning this assistance with mutually reinforcing local, national, and regional development
and security efforts is essential for long-term impact. Each thematic discussion offers a
sampling of constructive ideas for adapting existing programming priorities for greater
alignment with local development and security objectives. Following the conclusion of these
thematic discussions, we highlight a selection of widely-supported, but often overlooked
practices for donor governments delivering civilian counterterrorism assistance in the greater
Horn of Africa subregion.
It is impossible to cover the depth and complexity of the development-security nexus of the
greater Horn of Africa in the form of a single journal article. Accounting for these
complexities in accordance with the local contexts is essential for effective development and
security cooperation, and we encourage readers to refer to our extensive footnotes for
additional information and resources on issues we may have been unable to address more
extensively in the text.
Background
The greater Horn of Africa has made a number of promising economic and political gains in
recent years.[1] Several countries have been riding a wave of rapid economic growth, and
despite lingering conflict, South Sudan secured independence following a successful public
referendum in 2011, and a new Federal Government of Somalia has been inaugurated with
overwhelming support from the international community. Nevertheless, the subregion faces
an array of ongoing challenges stemming from underdevelopment, weak governance,
widespread poverty, intermittent violent conflict, and other sources of human insecurity,
including transnational terrorism and organized crime. Pressures to decisively address these
transnational terrorist and criminal threats are testing the limits of national capabilities and
resilience. Governments are often unable to meet the basic needs of local communities, let
alone the challenges posed by complex transnational terrorist threats.
How can this cycle be broken? Part of the solution is already in place. The greater Horn of
Africa has been a key geographic focus of bilateral and multilateral counterterrorism-related
assistance since the 1990s.[2] This is not surprising given the transnational security risks
emanating from Somalia and Yemen, and long-held concerns over the danger posed by the al-
Qaida cells based around the greater subregion over the past two decades.[3] Particularly over
the last five years, international capacity building and technical assistance to the greater Horn
of Africa and elsewhere has increasingly focused on civilian counterterrorism assistance
activities. While at times articulated in the context of broader strategic frameworks, assistance
may end up ultimately being fragmented in implementation. Even when conceptualized to
achieve high-level strategic objectives, donor counterterrorism assistance can often get lost in
translation by the time it reaches the ground. Indeed, many counterterrorism projects are
designed with inadequate consideration of the sectoral capacity deficiencies of local
government institutions, or the complexity of society-state relationships, and have been largely
disconnected from broader development and security initiatives being undertaken across
local, national and regional contexts.
Though there have been some signs of improvement in the strategic coordination of such
programming, the field remains somewhat ad-hoc and short-term in scope. To address this
challenge, multilateral initiatives such as the Global Counterterrorism Forum (GCTF),
established in 2011, and its Horn of Africa Working Group under the leadership of the
European Union and Turkey, have been working to bring coherence to civilian
counterterrorism assistance efforts across the greater subregion.[4] However, strengthening
coordination of diverse counterterrorism initiatives is only half the battle. Aligning this
assistance to complement broader development and security agendas will be essential for
sustainably addressing threats posed by terrorism in the long term.
money laundering and countering the financing of terrorism (AML/CFT) regulatory regime
may threaten to deter foreign investment and leave financial flows vulnerable to criminal
exploitation. In the context of the massive financial growth in the Ethiopian example, an
independent report by Global Financial Integrity estimates that the country lost over 11.7
billion dollars in illicit financial outflows over the last decade.[6] These assets, which might
have served in the further expansion of Ethiopia’s economic and human development
potential, have instead been redirected for purposes unknown. Indeed, portions could have
been funneled in support of international terrorism and criminal activities including a range
of illicit enterprises such as human trafficking rings or the financing of piracy in the Gulf of
Aden. These challenges are not unique to Ethiopia, and many countries in the subregion,
including Ethiopia, have made significant strides in strengthening their AML/CFT regimes
over the past few years.
Curbing criminal and terrorist access to financial support depends on the financial integrity of
all members of the international community. Strengthening national AML/CFT regimes, as
well as regional cooperation on AML/CFT throughout the Horn of Africa, has been a key area
of focus of international counterterrorism assistance to the subregion. Common AML/CFT
program activities can include a range of legislative and policy related technical assistance and
institutional capacity building projects—particularly the strengthening of national financial
intelligence units. A cross-section of international support, particularly from Denmark and
the United States, has served in enhancing platforms for subregional dialogue, awareness,
technical assistance and capacity for strengthening national and regional AML/CFT
infrastructure.[7]
Effective AML/CFT regulatory regimes also depend highly on the capacity of national
criminal justice systems and strong cross-border legal cooperation to properly investigate and
prosecute financial crime and prevent the financing of terrorism.[8] Due to the cross-border
nature and transnational risks posed by money laundering and terrorist financing, a multi-
sectoral regional approach is thus required to sustainably reduce the risk of illicit financial
flows in the subregion. Robust financial oversight and reporting standards and expansive
formal banking and revenue collection infrastructure provide the most advantageous
environment for the implementation of a comprehensive regulatory oversight regime.
However, the economic infrastructure and degree of financial inclusion across the subregion
varies widely between rural and urban markets and across national contexts. Local economic
activity for a vast majority of the subregion’s population is overwhelmingly cash-based, though
mobile money platforms are increasingly penetrating the region expanding financial access.
Ultimately, safeguarding the integrity of regional financial flows through regulatory and
monitoring mechanisms will have limited impact on reducing the risks associated with money
laundering and terrorist financing if not informed by a risk-based approach to AML/CFT, and
aligned with efforts to strengthen financial access and inclusion, for example, through:
i) Supporting the development of national and regional guidance and good practices for the
implementation of Financial Action Task Force (FATF) standards in the context of cash-
based, low-income, and high-poverty economic contexts. There is a dearth of technical
guidance on AML/CFT regime development in the context of the subregion’s economic
and risk environment. The development of detailed and practical case studies and
guidance notes on implementing the FATF standards in the developmental and fragile
contexts of the Horn of Africa would be extremely beneficial for national authorities in
the subregion.[9]
ii) Facilitating dialogue and deepening a regional knowledge base on ways to strengthen
regulatory oversight without restricting financial access or compromising financial
inclusion. The heightened international pressure on the subregion and evidence of
growing internal momentum for stronger AML/CFT in some national contexts, must not
be at the expense of greater financial inclusion and poverty alleviation objectives.[10]
Support for national and regional dialogues on enhancing financial integrity in a way that
protects and economically empowers poor and marginalized populations can serve as the
basis for developing innovative locally-owned solutions to regulatory challenges.
iii) Exploring trade-based financial, value-transfer, and remittance corridors across the
greater subregion. While a baseline study of regulatory regimes and financial flows in the
context of AML/CFT has already been undertaken in Intergovernmental Authority on
Development (IGAD) member states by the IGAD Security Sector Program, a deeper
understanding of the risks related to informal financial flows in neighboring Tanzania
and Yemen would be useful for the delivery of targeted risk-based assistance and a more
effective strategic approach to AML/CFT in the subregion.[11]
Often regardless of context, justice and security development assistance to the Horn of Africa
—as elsewhere—generally focuses on enhancing the security and capacity of governments
over the safety and empowerment of communities, and the same can be said of
counterterrorism assistance.[15] Yet, the strengthening of state enforcement and external
cooperation capacities as priorities of counterterrorism assistance, even in the context of
‘human rights’ and ‘rule of law’, are not substitutes for improved justice and policing for
populations in the greater subregion.[16] As suggested in the opening of the GCTF’s Rabat
Memorandum, effective criminal justice practices to counter terrorism “must be built on a
functional criminal justice system that is capable of handling ordinary criminal offenses while
protecting the human rights of the accused.”[17] Creating synergies between counterterrorism
programming and broader national justice and security development initiatives is essential for
building basic criminal justice capacity to address everyday challenges and institutional
competence to address new challenges as they arise.[18] There are a number of opportunities
to strengthen both core criminal justice service delivery, as well as enhance national
interagency capacity and coordination and regional cooperation to counter transnational
terrorism. The following ideas can help guide such an approach:
ii) Developing national and regional training capacity in human rights-compliant criminal
justice practices. Claims that investigation techniques grounded in human rights and the
rule of law are both strategically and tactically superior to coercive techniques are too
infrequently supported by concrete practical instruction.[20] Stronger long-term
partnerships should be made with states in the region to strengthen law enforcement
training infrastructure capable of disseminating these practices, not only in the context of
countering terrorism, but as a core element of good policing for public security.
At the same time, terrorist groups in the subregion have become well-known for their use of
the internet and social networking platforms to effectively reach out to wider global audiences.
Following Kenya’s intervention in southern Somalia in late 2011, Al-Shabaab took the battle to
the world wide web, engaging in a drawn out war of words on Twitter with the Kenya Defence
Force spokesman.[25] Their latest Twitter account was shutdown in the immediate aftermath
of the September 2013 Westgate attack.[26] Anwar al Awlaki, former editor of AQAP’s
English-language periodical Inspire, whose extremist rhetoric was widely circulated among
radicals world-wide via the web, was based in Yemen for a number of years before being killed
by an American drone strike in 2011.[27] The savvy use of new media by extremist groups in
the subregion, if not a prime factor behind local terrorist recruitment, has figured prominently
in influencing the ideas of violent extremists and terrorists well beyond the greater Horn.[28]
International CVE and CVE-related assistance in the Horn of Africa is diverse in character,
often delivered through grassroots level programming in collaboration with civil society, and
in some cases, directly in partnership with local communities.[29] CVE programming at the
community level can be an extremely sensitive endeavor, and must be carefully tailored
according to the context in which being implemented. The dynamics of an individual’s
connection to their community, community perceptions of the state, and the nature of these
relationships in a broader socio-economic and political environment, are of particular
ii) Facilitate trust-building, and joint training activities between communities, civil society
and local authorities. Facilitating direct community member-police officer collaboration
in the joint development of community safety strategies, or through joint community-
police training activities can serve in empowering community members and local
authorities as mutually accountable partners for the betterment of their shared
community.[34] When community-police relations are built on trust and mutual respect,
community members will have a greater willingness to cooperate and share information
with local officers for more effective crime and terrorism prevention.
iii) Support localized and high-impact civic education, empowerment, leadership, and
entrepreneurial initiatives for marginalized populations. While not directly related to
risks of violent extremism, many communities in the greater Horn of Africa face
conditions of acute deprivation and socio-political marginalization. Alleviating these
conditions through dynamic grassroots projects can help strengthen community
cohesion and resilience to a range of internal and external stresses, including violent
i) Set priorities, develop objectives and design programming in collaboration with local
partners in accordance with local context and local needs. ‘Promoting local ownership’
cannot be left until after program priorities have already been formulated. The most
crucial period for local partners to assert ownership over an initiative is during the
inception and design phases where core local stakeholders can directly influence the
terms and objectives of a program.
iii) Conduct more rigorous assessments and evaluations with the aim of building a stronger
regional community of practice. Context-specific needs assessments and program
evaluations are essential for measuring progress and identifying remaining gaps. This
information should be used to build a stronger regional community of practice and
knowledge-sharing for the delivery of more effective and targeted assistance partnerships
among local and international partners.
Conclusion
This article highlighted a number of starting points for a critical reexamination of existing
counterterrorism assistance efforts to the Horn of Africa, and how they might be better
aligned for sustainable impact. If terrorism is a long-term challenge, then sustainable support
for long-term solutions is required to address it. The challenges posed by various
manifestations of terrorism in the greater Horn of Africa are deeply intertwined with those
related to good governance, economic development, and human security. As the nature, scope
and extent of civilian counterterrorism assistance to the greater Horn of Africa has become
increasingly diverse, the time is ripe to reflect on how counterterrorism fits in the long view of
the development and security challenges of the subregion
Notes
[1] In this policy brief, the greater Horn of Africa refers to Intergovernmental Authority on Development (IGAD) member states: Djibouti,
Ethiopia, Kenya, Somalia, South Sudan, Sudan, and Uganda; as well as Tanzania and Yemen.
[2] For general background reading on regional and international counterterrorism initiatives in the greater Horn of Africa, see: Peter
Kagwanja, “Counter-Terrorism in the Horn of Africa: New security frontiers, old strategies,” African Security Review 15, no. 3 (2006); Lauren
Ploch, “Countering Terrorism in East Africa: The U.S. Response,” Congressional Research Service (CRS) Report for Congress (CRS, 3 Nov 2010)
http://www.fas.org/sgp/crs/terror/R41473.pdf; David H. Shinn, “Walking the Line: U.S. Security Policy in East Africa and the Horn,” World
Politics Review (20 Feb 2013) http://www.worldpoliticsreview.com/articles/12722/walking-the-line-u-s-security-policy-in-east-africa-and-
the-horn.
[3] Clint Watts, Jacob Shapiro and Vahid Brown, “Al-Qaida's (Mis)Adventures in the Horn of Africa,” Harmony Project (West Point, NY:
United States Military Academy Combating Terrorism Center, 2007) http://www.ctc.usma.edu/posts/al-qaidas-misadventures-in-the-horn-
of-africa.
[4] See: Global Counterterrorism Forum, Co-Chairs’ Summary of the Inaugural Meeting of the Horn of Africa Working Group (8-10 Feb
2012) http://www.thegctf.org/documents/10303/20542/Co-Chairs%27%20Summary+of+9-10+Feb+2012+Working+Group+Meeting+in
+Dar+es+Salaam.
[5] World Bank, “Ethiopia Economic Update – Laying the Foundation for Achieving Middle Income Status” (Addis Ababa, 18 June 2013)
http://www.worldbank.org/en/news/press-release/2013/06/18/ethiopia-economic-update-laying-the-foundation-for-achieving-middle-
income-status.
[6] Sarah Freitas, “Illegal Ethiopian Capital Flight Skyrocketed In 2009 To US$3.26 Billion” Financial Transparency Coalition (5 Dec 2011)
http://www.financialtransparency.org/2011/12/05/illegal-ethiopian-capital-flight-skyrocketed-in-2009-to-us3-26-billion/.
[7] For example, see: “EU and the US cooperation on countering the financing of terrorism in the Horn of Africa region,” press release of the
Danish Presidency of the EU, Danish Ministry of Foreign Affairs (6 Aug 2012) http://usa.um.dk/en/news/newsdisplaypage/?
newsid=0f83adcf-b642-4db9-8db6-bcd1e03f03bd. Also see: GCTF, Co-Chair’s Summary of the Second Plenary Meeting of the Horn of Africa
Region Capacity-Building Working Group—Countering Terrorist Financing (5-6 March 2013) http://www.thegctf.org/documents/
10303/40363/Co-Chairs+Summary-Second+Working+Group+Meeting.
[8] See recommendations 30-31 and 36-40 of Financial Action Task Force (FATF), International Standards on Combating Money Laundering
and the Financing Of Terrorism & Proliferation: The FATF Recommendations (February 2013) http://www.fatf-gafi.org/media/fatf/
documents/recommendations/pdfs/FATF_Recommendations.pdf.
[9] Note that FATF’s guidance on “Anti-Money Laundering and Terrorist Financing Measures and Financial Inclusion” (2013) offers useful
insight on the application of FATF recommendations in the context of financial inclusion in developing countries. This guidance is general in
scope, and gives less attention to the technical challenges of institutional regime development in heavily cash-based economies with limited
formal financial infrastructure.
[10] An instructive literature review undertaken by Andrew McDevitt at the Governance and Social Development Resource Centre’s
(GSDRC’s) Research Helpdesk suggested that “AML initiatives are seen as particularly inappropriate for preventing and detecting money
laundering in predominantly cash-based economies or in countries where reliance on parallel or informal transfer systems is the norm, as is
the case in many developing countries. They are also seen as unduly restrictive on financial service providers working with low-income
people, such as micro-finance institutions.” - Andrew McDevitt, “Helpdesk Research Report: Money Laundering and Poverty Reduction,”
GSDRC (4 Nov 2009) http://www.gsdrc.org/docs/open/HD625.pdf.
[11] See: Tu’emay Aregawi Desta and James Cockayne, eds. ISSP-CGCC Joint Baseline Study on Anti-Money Laundering and Countering the
Financing of Terrorism in the IGAD Subregion (New York and Addis Ababa, May 2012) http://www.globalct.org/wp-content/uploads/2012/11/
AML_Report.pdf.
[12] See: ‘Terrorism out of Somalia: a Q&A with Ken Menkhaus and Christopher Boucek, Carnegie Endowment for International Peace (23
Sep 2010) http://carnegieendowment.org/2010/09/23/terrorism-out-of-somalia/wnc#reach; and, Watts, et. al., ‘Al-Qa’ida’s
(Mis)Adventures’ (2007).
[13] See: Center on Global Counterterrorism Cooperation and IGAD Security Sector Program, Fighting Terror Through Justice: Implementing
the IGAD Framework for Legal Cooperation Against Terrorism (New York and Addis Ababa, May 2012) http://www.globalct.org/wpcontent/
uploads/2012/06/TaskForce_Report_May20121.pdf. Note that while Djibouti and Ethiopia have ratified the conventions, neither party has
deposited declarations of readiness for entry into force.
[14] For example, see: George Kegoro, “The effects of counter-terrorism measures on human rights: the experience of East African countries,”
Understanding Terrorism in Africa: In search for an African Voice (Pretoria: Institute for Security Studies (ISS), 2007) pp. 51-57; Samual M.
Makinda, “The impact of the War on Terrorism on Governance and Human Rights in Sub-Saharan Africa,” Understanding Terrorism in
Africa: Building Bridges and Overcoming the Gaps, Wafula Okumu and Anneli Botha, eds. (Pretoria: ISS, 2008), pp. 32-35; Human Rights
Watch (HRW), Why Am I Still Here? The 2007 Horn of Africa Renditions and the Fate of those Still Missing (HRW, 2008), available at http://
www.hrw.org/reports/2008/09/30/why-am-i-still-here-0; and, Open Society Justice Initiative, Counterterrorism and Human Rights Abuses in
Kenya and Uganda: The World Cup Bombing and Beyond (Open Society Foundations (OSF), 2013) http://www.opensocietyfoundations.org/
sites/default/files/counterterrorism-human-rights-abuses-kenya-uganda-20130403.pdf.
[15] This point was highlighted at the report of international expert meeting on “The Politics of Practice: Security and Justice Programming
in FCAS [Fragile and Conflict-affected States],” hosted by the Overseas Development Institute (ODI) in November 2012, http://
www.odi.org.uk/sites/odi.org.uk/files/odi-assets/events-documents/4948.pdf. Additionally, these issues are discussed at length in: OECD,
OECD DAC Handbook on Security System Reform: Supporting Security and Justice (OECD, 2007) http://www.oecd.org/development/
conflictandfragility/38406485.pdf.
[16] For rule of law- and justice- related indictors for states in the greater Horn of Africa, see: Mo Ibrahim Foundation, 2013 Ibrahim Index of
African Governance: Summary (Mo Ibrahim Foundation, 2013) http://www.moibrahimfoundation.org/downloads/2013/2013-IIAG-
summary-report.pdf. Note that ‘safety and rule of law’ is the only category that has been subject to measured decline since 2000. Also, see:
Transparency International, The East Africa Bribery Index 2013, (Kenya, 2013) http://www.tikenya.org/index.php/more-links/publications/
corruption-surveys/east-africa-bribery-index. Note that the highest aggregate bribery scores of public institutions across the East African
Community were accorded to the respective police forces of all five member countries. For country-specific examples on: Kenya, see, Patricia
Kameri Mbote and Migai Akech, Kenya Justice Sector and the Rule of Law: A review by AfriMAP and the Open Society Initiative for Eastern
Africa (OSF, 2011) http://www.ielrc.org/content/a1104.pdf; and, Amnesty International, ‘Police Reform in Kenya: A Drop in the Ocean
(London, 2013) http://www.amnesty.nl/sites/default/files/public/kenya_afr_32_001_2013.pdf; on Uganda, see, Human Rights Watch,
“’Letting the Big Fish Swim’ Failures to Prosecute High-Level Corruption in Uganda” (2013) http://www.hrw.org/sites/default/files/reports/
uganda1013_ForUpload_0.pdf; on Somalia, see, UK FCO, Human Rights and Democracy Report 2012, Section IX: Somalia (UK FCO, 2013)
[35] USAID’s Kenya Transition Initiative (KTI) is an instructive example. See: www.usaid.gov/kenya.
[36] For example, see: Denmark, Whole of Government Stabilisation Programme for the Wider Horn of Africa/East Africa 2011-2014, http://
etiopien.um.dk/en/~/media/Etiopien/Documents/Programme%20Document%20-%20Peace%20and%20Stabilisation%20Fund%20Horn
%20of%20Africa.pdf; European Union, A Strategic Framework for the Horn of Africa, Annex I of the Council conclusions on the Horn of
Africa (14 Nov 2011), http://register.consilium.europa.eu/pdf/en/11/st16/st16858.en11.pdf.
Abstract
The January 2013 attack on the In Amenas natural gas facility drew international attention.
However this attack is part of a portrait of energy infrastructure targeting by non-state actors
that spans the globe. Data drawn from the Energy Infrastructure Attack Database (EIAD) shows
that in the last decade there were, on average, nearly 400 annual attacks carried out by armed
non-state actors on energy infrastructure worldwide, a figure that was well under 200 prior to
1999. This data reveals a global picture whereby violent non-state actors target energy
infrastructures to air grievances, communicate to governments, impact state economic interests,
or capture revenue in the form of hijacking, kidnapping ransoms, theft. And, for politically
motivated groups, such as those engaged in insurgencies, attacking industry assets garners media
coverage serving as a facilitator for international attention. This research note will introduce
EIAD and position its utility within various research areas where the targeting of energy
infrastructure, or more broadly energy infrastructure vulnerability, has been addressed, either
directly or indirectly. We also provide a snapshot of the initial analysis of the data between
1980-2011, noting specific temporal and spatial trends, and then conclude with a brief discussion
on the contribution of EIAD, highlighting future research trajectories.
Introduction
Attacks aimed at energy infrastructure have increased over the last decade, a trend that is
correlated with the growing political and economic instability in oil and gas producing
regions. Terrorism, insurgent tactics, maritime piracy, sabotage, targeted activism, etc., are
part of the bouquet of violent phenomena where energy infrastructures have been targeted.
Despite this, research on the targeting of energy infrastructure has remained in various
research silos, particularly the study of terrorism or resource conflict studies, without
branching out across other areas of research on violent phenomena in general, and the
targeting behaviours of violent non-state actors (VNSA) more explicitly.[1] In one attempt to
fill this gap the Center for Security Studies at ETH Zurich in collaboration with the Paul
Scherrer Institute (PSI) developed the Energy Infrastructure Attack Database (EIAD): a
compilation of data from 1980 through 2011 on reported (criminal and political) attacks/
threats to energy infrastructures by non-state actors—which includes the range of actors from
politically motivated groups (e.g. terrorists) to other criminal actors such as those committing
acts of maritime piracy and armed banditry.
This fully searchable database (contained in an Excel datasheet) contains over 8,000 coded
incidents, spanning the globe.[2] In addition to including attacks (both successful and
unsuccessful) that aim to cause physical harm or damage, when possible other threats such as
plots are also included so to capture the full breadth of (non-state) threats to energy assets.
Furthermore, it is not just devoted to attacks aimed at the oil and gas sector (both onshore and
offshore), but across all energy sectors (Biomass, Coal, Geothermal, Hydropower, Nuclear,
Solar, and Wind) and electricity in general. Furthermore, within these sectors energy
infrastructures (EI) include all human (energy sector personnel), physical (energy sector
physical assets) and information (energy sector cyber systems supporting operations)
infrastructures.[3]
This Research Note on EIAD aims to introduce this new dataset and our analysis on the
targeting of energy infrastructure. We continue this discussion by first examining some key
research themes where the targeting of energy infrastructure, or more broadly energy
infrastructure vulnerability, has been addressed, either directly or indirectly. In this respect,
we try to make the case that EIAD, and the ideas built emerging from its development, are
interconnected with various research discussions and thus hope that its future utility will
encourage cross-fertilization of research and analysis. Following this discussion we provide a
snapshot of our initial analysis of the data between 1980-2011, noting specific trends and
assessments. Finally, we conclude with a brief discussion on the contribution of EIAD and
highlight future research trajectories.
Why EIAD?
When examining VNSA threats to Energy Infrastructures (EI), academic and policy
discussions are often focused on terrorist threats to EI (part of which is connected to debates
on energy security) or the relationship between conflict and natural resources, the latter of
which is more about the conditions in which national resource abundance is related to
conflict. There has also been a growing body of literature focusing on how businesses should
operate in conflict-affected areas. In the process to develop the targeting energy infrastructure
project the EIAD research team decided to look beyond ‘terrorist targeting’ in order to capture
other types of non-state, violent phenomena. In doing so, we found these various research
strands to be relevant for not only building up our understanding of this area but also
positioning our analysis and where we see EIAD being particularly useful to further studies
and analysis.
Previous Work
One of the more notable, earlier studies in this field of research was carried out by Kjøk and
Lia (2001) [4] and examined non-state threats against petroleum infrastructure. Using the
ITERATE database of international terrorism, the authors found that 79 per cent of terrorist
strikes against petroleum infrastructure (between 1922 to 1999) were made by domestic
terrorist groups. In addition, the authors also noted a general increase, over time, in the
number of attacks against petroleum infrastructures.[5] Another study, published in 2008,
looked more specifically at the interest and capability of al-Qaeda attacking ‘economic
targets’ (particularly EI),[6] an attempt not too dissimilar from other efforts in the post 9/11
era.[7] Mihalka and Anderson (2008) linked the analysis to global energy security concerns,
found that despite verbal overtures global jihadists affiliated with al-Qaeda have not made EI,
and economic targets more broadly, a serious priority. More recently, a 2010 study, “Terrorist
Targeting and Energy Security,” sought to uncover the general patterns and characteristics of
contemporary terrorist targeting of EI.[8] Though Toft et al (2010) found a certain geographic
concentration of attacks, similar to Simonoff et al (2005) [9], they did not find a correlation
between energy rich countries and the number of EI attacks, nor did they observe a
correlation between certain terrorist ideologies and EI targeting. Outside of these larger
studies, there have also been some case studies that take into account dynamics or factors at
the local level. Studies on specific countries,[10] regions,[11] or terrorist groups or Violent
Non-State Actors (VNSAs) [12] have rendered some interesting insights; however, they
continue to fall short of looking at the community interplay with other VNSA in regions
where violence is prevalent and EI is vulnerable. Furthermore, all of these studies tend to focus
on threats to the oil and gas sector, while EIAD is a dataset that captures threats to all energy
sectors.
A second area of research - the resource conflict literature - is a useful resource for capturing
some of the conditions in which energy infrastructure becomes vulnerable. In many cases, one
can see a correlation between the increase in attacks aimed at petroleum infrastructure and
the growing instability in oil producing/exporting states.[13] However, such studies have met
some criticism. A subsequent study by Lujala et al (2007) found that it is not so much about
the hydrocarbons per se, but rather the existence of conflict in areas where oil is located that
may lead to, or exacerbate, conflict and thus, by extension, increase vulnerability.[14] Looking
at the impact to oil and gas supplies during conflict, Luciani (2011) found that oil and gas
installations are relatively resilient in armed conflict; but such conflicts tend to hinder
investment and reduce revenues.[15] Of course, as demonstrated by numerous studies, such
debates, correlations and linkages are certainly not new but nevertheless useful when assessing
the spaces where EI vulnerability is directly or indirectly addressed.[16]
A third literature strand examines how businesses, particularly multinational corporations and
those in extractive industries, are rather normative in the way debating how companies should
operate in conflict-affected areas. The underlying theme in such debates is that business actors
are significant players in the host environment, not only serving as partners with the host
government but also with the host community where they require the social license to build
and operate the infrastructure to carry out their activities. In this respect, through their
operations they become intertwined with the different social and technical spaces, often
meaning that they operate in or around conflict zones and may even contribute to conflict by
the sheer expectations their activities create. This creates enormous challenges as not all state
actors have the capacity or the will to provide security, giving way to the potential for business
actors to incur “substantial war damages and rising security costs” and risk “being publicly
associated with bloodshed and human rights violations”.[17] Yet, even in this discussion there
is little research that examines the challenges that arise from businesses having to engage (or
inadvertently engaging) with VNSAs, particularly when their assets are threatened. Business
actors bring the capacity to build large compounds, oftentimes well-equipped and developed,
to house their staff, bring in large machinery to develop complex facilities and other
infrastructures to conduct their business activities. They are responsible for extraction and
production activities as well as bringing mineral products to the global market. All of this is
supported by business operations, which include a capable staff and infrastructure.
Meanwhile, community members continue to live without the same access to such services.
The lack of electricity or access to decent roads, or any roads at all, creates a sense of tension
that gives way to the formation of grievances which may in turn lead to violence aimed at the
energy sector.
Brought together, when reviewing this literature not only did we find a gap in the types of
violence and energy sectors considered within studies on the targeting of energy
infrastructure (with an overwhelming focus on terrorist threats to oil and gas assets) but we
also found that very few studies examined how violence emerges and evolves within a complex
socio-technical space where infrastructural imbalances are both a large driver of conflict and
influence the targeting behaviours of VNSAs. As a result, rather than using terrorism datasets
to analyze trends, we decided that a new dataset needed to be developed to include other
energy sectors as well as other types of violence carried out by non-state actors. Furthermore,
given the growing extent and intensity of the non-state threats to EI, more comprehensive
tools for risk assessment and management in the field of energy security are needed.
Acknowledging the absence of an integral open-source that deals explicitly with attacks aimed
at EI, the EIAD was developed to fill this research gap.
aimed at energy infrastructure are included in EIAD and coded and sourced accordingly.
Where EIAD departs from GTD is in its inclusion of other forms of non-state violence. This
requires the use of various kinds of open source information (databases such as the
International Maritime Bureau Piracy reports, news articles, etc.) to gather information on
other (namely non-terrorist related) incidents where energy infrastructures have been
targeted. In addition we have begun to receive incident information on the targeting of oil and
gas infrastructures, in particular, from private sources such as companies and governments.
At present, EIAD contains reported threats (plots, hoax, etc.) and attacks (successful, failed
and foiled) on EI throughout the world between 1980 and 2011. Each coded incident in the
database has its geo-reference, which will allow the visualisation of data by means of mapping
tools and Geographic Information System (GIS) software, allowing the geo-statistical analysis
to identify spatial patterns and hotspots. Another unique aspect of the EIAD is that we do not
code for motivation but rather for attack type (e.g., assassination, assault, bombing, etc.) and
instrument used (e.g., firearms, explosive-dynamite, arson/firebombing, etc.). The aspect of
motivation was omitted due to errors in reporting as well as the fact that the motivation of the
perpetrator is not always obvious and in many cases not known/reported. Nevertheless, EIAD
includes a category for ‘Perpetrator Group/Actor’, which can help with identifying motivation/
intent.
Given that we used data drawn from the GTD as well as other databases and resources, the
first step of the database development process involved gathering, structuring and aggregating
data from various sources. This allowed us to merge duplicate data as well as address
redundancies. This step involved combing through the coded data to address duplications and
also fill gaps in information where possible. During this step we also addressed any incidents
that contained multiple attacks, disaggregating them when and where necessary. By
disaggregation we are referring to our decision to have single incidents which involve multiple
type or locations of an attack to be disaggregated such that each attack within the incident is
recognized as both connected to another incident (by being marked as a ‘multiple attack’) as
well as having its own incident ID. After consultation with various experts during the
development of EIAD’s coding methodology we determined that the tendency for VNSA to
carry out small, oftentimes multiple attacks in confined periods of time best reflected the
nature of the threat and the capability of the threat actor. Single incidents that involve large
damage are represented in EIAD; however, they are less frequent than the smaller types of
attacks, most of which are targeting numerous points across a pipeline, or various connecting
electrical pylons, for example.
Once we had our master dataset, another reviewer examined the data to address incorrect data
entry or irregularities as well as another person that carried out the quantitative analysis.
Overall, while such a massive data collection, aggregation, and structuring will render some
overlaps or errors we have attempted to mitigate such lapses through these steps of verification
and review. It is also our intention to continually maintain EIAD as a living database, one that
through feedback from users can continuously be improved.
Most of our incidents contain one source, though we have aimed for two sources in the
interest of verification. For all incidents where verified data sources have been cited, such as
GTD or the International Maritime Bureau, typically one source has been referenced. In
addition we have also received some data from companies and governments, which provide
data that is often not found in media sources. In such cases, we list the source as “private”, if
there is an agreement of confidentiality, or list the actual name of a source provider if
permitted. However, this issue of sourcing brings up two limitations of the data. For one, we
need more primary data in order to increase the robustness and accuracy of the incident
information. In many cases we only list ‘explosives’ (for example) as the attack type or
instrument used as opposed to having access to more detailed information on the type of
explosive. First of all, this type of specific information, which is difficult to access as it
commonly remains in the confidential knowledge bank of governments and companies, is
important for research as it enables analysis on the behaviour and tactics of violent actors over
time. Secondly, this type of more detailed information would provide more exact information
on the location of attacks. Most of our geo-coded information on the location of attacks refers
to a city or in some cases a region. This is due to the lack of specific, geo-coded reporting from
open sources. In comparison, the information that we have received from primary data
sources has offered more specific geo-coded information, which in turn can be helpful for not
only visualising hotspots at the micro level and tracking the movement patterns of violence
but also for improving qualitative analysis on the area where violence emerges.
Analysis
The present analysis of EIAD includes 8.602 data records encompassing the years 1980-2011.
[19] In the 1980s and 1990s a total of 1808 and 1508 events were recorded, whereas in the
2000s with 4,223 events it more than doubled. The two years available for the 2010s already
amount to 1,063 EI attacks, indicating that a further increase could be expected if no drastic
changes in the overall situation and/or boundary conditions will occur in the next few years.
Figure 1 shows the annual numbers of attacks for this period as well as the respective decade
averages. The apparent overall upward trend in EI attacks is also statistically confirmed by a
non-parametric Man-Kendall test (n = 32, Z = 3.16, p = 0.01). It is worthwhile to note that the
year 1993 appears to be a substantial outlier to this trend with only 14 attacks; however it does
not affect the prevailing pattern. This can be illustrated by replacing the 1993 value by the
average of 1992 and 1994, which increases the decade average by a modest 10%.
The low 1993 value can be explained by the fact that EIAD uses the Global Terrorism Database
(GTD) as one of its key primary information sources for terrorism related incidents. The data
for 1993 were lost prior to the compilation of GTD and despite several efforts could not be
recollected (GTD Codebook).[20] Cumulated country level statistics in the Appendix of the
above cited GTD document suggest that GTD should contain almost 5,000 incidents for 1993.
Within our ongoing EIAD coding efforts we were also not able to obtain a better coverage of
individual EI attacks for 1993, which is why EIAD currently has the same data gap for 1993
like GTD.
Figure 1: Annual number of EI attacks and decadal averages over the period 1980 – 2011.
The vast majority of EI attacks in the period 1980-2011 were classified as successful (8.211),
distantly followed by foiled (175) and failed (203) attacks. The remaining 0.15% was
categorized as threat (8), plot (3) and unknown (2). Though we code for hoaxes, we do not
have any incidents coded as such in the database. This high share of successful attacks can be
explained by several factors. Certain energy infrastructures such as pipelines and transmission
lines are due to their “linear” nature relatively easy targets, and are therefore exposed to a high
attack pressure. Furthermore, production and transit of energy carriers takes place in or passes
through less developed countries that do not have the financial means to harden such
infrastructures and provide high protection levels. Finally, we can safely assume that we are
not capturing a completely comprehensive picture, given that many attacks go unreported and
thus do not surface in the media. This may be more important for foiled and failed attacks,
and particularly threats, plots and hoaxes, which are also not the main focus of EIAD. In fact,
most companies would prefer to keep threats to their assets as quiet as possible. Of course, this
is one of the consequences, and indeed drawbacks, of relying on public or open sources for
information, particularly as it concerns threats to energy infrastructures that are often owned/
operated by private actors.
The Cano Limon pipeline in Colombia provides an example of how guerrilla attacks by
Revolutionary Armed Forces of Colombia (FARC) and National Liberation Army of Colombia
(ELN) could be significantly reduced from 2002 to 2004 due to a strong militarisation of the
area as well as the demobilisation and reintegration of paramilitaries in Colombia [21].
However, this improvement in security was at the expense that exploration of new reserves
came practically to a standstill. More recently, approaches involving engagement of local
communities have been adopted by industry and affected countries to increase local support
through participation processes, socio-economic benefits, and protection of the environment.
In contrast, “point sources” such as refineries or power plants are thus easier to protect against
physical and cyber-attacks. EIAD data clearly supports this notion with close to 50% of attacks
attributable to electricity transmission lines and sub-stations, followed by oil pipelines (ca.
15%), oil transports by road tanker and natural gas pipelines (each in the order of 7%). Finally,
a rather large amount of almost 40% or 3413 of EI attacks were considered multiple attacks.
The multiplicity of attacks within a specific country points to the power of ‘tactical contagion’
within certain contexts and which contribute to the crests of the wave. For example, to identify
the motivational complexity of such cases, fieldwork carried out by Giroux in 2012 in Nigeria
and Colombia, two prominent locations in EIAD where EI has been frequently targeted
(tactical contagion), revealed that though many of the attacks were carried out by political
motivated groups, such as the FARC in Colombia, the motivation for attacks were various.
Some attacks were carried out as a way to send political messages while others were motivated
by pure economic reasons (e.g. threats to EI as a form of extortion).
Among the EI attacks in the observed period of time, 80.4% were carried out with some type
of bombing device, followed by several other attack types with more than 100 events that
cumulatively amount to 15.0% (Figure 2). Siege and hostage events contribute a low 0.4%,
whereas armed attacks, cyber-attacks and vandalism with a share of 0.1% are practically
negligible.
The low levels of cyber incidents capture the coding challenges within this area. Due to lack of
information, particularly on the actor (state or non-state), including incidents, such as the
infamous Stuxnet worm that targeted supervisory control and data acquisition (SCADA)
systems in the energy sector,[22] is a hurdle. For one, the actor of this event, like many cyber
attacks, is unknown and may very well be a state actor, which would mean that it does not
meet EIAD’s coding criteria. Other incidents, such as hijacking typically refer to vessels
carrying energy (e.g. oil or gas products), offshore whereas assassination attacks involve the
targeting of specific energy personnel. Lastly, it should be noted that 4.1% of all events could
not be assigned to a specific category because of incomplete information in the available
incident summary, and thus are classified as unknown.
Figure 3 shows the spatial distribution of EI attacks by country for the years 1980-2011(Only
events
that
could
be
accurately
geo-‐referenced
were
considered,
which
is
why
only
6990
out
of
all
8602
EI
attacks
are
shown
in
the
@igure). It is in the visualisation of EIAD
incidents and the breakdown of attacks by country that the role of tactical contagion comes to
life, illuminating the specific areas (or hotspots) where EI attacks have been particularly
common.
The top 3 countries were Colombia (1.381 EI attacks), Iraq (1.085) and Pakistan (1.009)
accounting for 49.7% of all EI attacks in the years 1980 - 2011.
• India, Angola, Philippines, Thailand and Russia (100+ attacks each) contributed
another 11.8%.
• Spain, Turkey, Yemen and Guatemala (50+ attacks each) sum up to 3.8%.
• The remaining 69 countries for which data were available accounted for the
remaining 8.9%, and roughly two thirds of them contributed 0.1% or less.
Figure 4 illustrates the top three country clusters (Colombia, Iraq and Pakistan), and provides
additional information on the temporal dynamics as well as involved energy sectors and
infrastructure types in each cluster. The combined representation of these two factors with the
temporal aspects allow for a more subtle differentiation of country hotspots.
In the case of Colombia, three distinct peaks of EI attacks can be observed from 1988-1992,
1999-2002 and 2005-2007. It is worthwhile noticing that the first peak is less pronounced than
the two others, and that after the second peak the annual numbers of attacks do not decrease
again to similar low levels as before. The peak from 1988-92 is clearly attributable to the
petroleum sector and attacks on the Cano Limon pipeline. The second peak comprises a
combination of attacks on oil pipelines and transmission lines, with attacks on the former
dominating in 2001, and on the latter in the years 1999, 2000 and 2002. The strong decrease in
attacks on oil pipelines between 2002 and 2004 is then due to the previously mentioned
militarisation of the Cano Limon pipeline region.
Iraq exhibited a clear peak from 2004 to 2007, with 2005 and 2006 having more than 300 and
250 attacks, respectively. Overall, oil pipelines and transmission lines were most often
attacked, followed by attacks directed at energy and government personnel. Across the years
included in this analysis, there were some shifts in patterns of infrastructures predominantly
affected, i.e. oil pipelines in 2004, oil pipelines and transmission lines in 2005, personnel in
2006, and all categories about equally in 2007.
In Pakistan, between about 70 and 140 attacks per year occurred from 2005 to 2010, and then
the number of attacks nearly doubled to 270 in 2011. The actual impacts on Pakistan’s energy
sectors and infrastructures can be divided as follows. The lower peak period concerned mostly
transmission lines (2005-2009) and natural gas pipelines, whereas the high peak in 2011 is a
combination of transmission lines, oil transport by road tanker and natural gas pipelines. As
illustrated by these top three cluster countries, it is important not only to look at spatial
clustering (hotspots), but also to analyze the temporal patterns and underlying mechanisms
creating these clusters through time.
Figure 4: Annual numbers of EI attacks for top three countries, including identification of
temporal attack peaks in the period 1980-2011.
conceptualized the patterns of clustering as type of ‘tactical contagion’ within specific areas or
locales as well as across regions. In other words, we denote a common pattern whereby attacks
on energy infrastructures are often multiple events and concentrated both in time and space,
resulting in distinct hotspots. We also found that attacks predominantly take place on “linear”
energy infrastructures (e.g. pipelines and transmission lines) that are difficult to protect and
often pass through remote areas. Therefore, consequences in terms of fatalities and casualties
are mostly minor, although when attacks occur frequently (in terms of multiple and connected
events), they can result in substantial business and supply disruptions. For example, in Iraq,
between January and August 2013 there were over 30 bombings aimed at the Kirkuk-Ceyhan
pipeline, which led to repeated downtime for repairs.
Looking ahead, there are multiple avenues for future research that can adopt and develop
other conceptual approaches to understand trends as well as continue to improve EIAD’s
utility. For one, EIAD has room for further development, particularly in the area of fostering
avenues for a community of interest – made up of public and private partners – to provide and
help improve the quality of information. This can help address some of the information
shortcomings discussed earlier. In addition, given that we have identified discernible patterns
in the data (i.e. ‘tactical contagion’ or hotspots) there is the potential to use EIAD to forecast
likely future clusters. This will require further analysis on the correlating factors across regions
that lead to clusters, and would be a worthwhile endeavor. At a micro-level more cases studies
are needed to add depth and breadth to EIAD – simply analysing the data at a macro level has
already revealed some interesting insights and illuminates some of the context-specific factors
and nuances that can, in turn, inform policy prescriptions and recommendations.
Jennifer Giroux is a Senior Researcher for the Risk & Resilience Team at the Center for Security
Studies (CSS) at ETH Zurich. She also heads the targeting energy infrastructure research project
through which the Energy Infrastructure Attack Database (EIAD) was developed. Peter
Burgherr is Head of the Technology Assessment group, Laboratory for Energy Systems Analysis,
at Switzerland’s Paul Scherrer Institute. He is also the primary person responsible for PSI’s
database ENSAD (Energy-Related Severe Accident Database), which is the world's largest
database on severe accidents in the energy sector. Laura Melkunaite is a Project Assistant at the
CSS; she has worked on the development of EIAD
Notes
[1] Acts of war against energy infrastructures by states are not covered in EIAD
[2] For access to EIAD see: http://www.css.ethz.ch/research/research_projects/index_EN/EIAD
[3] Overall the EIAD consists of 10 main categories and sub-categories to be discussed in the section ‘EIAD Structure, Data Collection, &
Analysis’.
[4] Ashild Kjøk & Brynjar Lia. Terrorism and Oil – An Explosive Mixture? A Survey of Terrorist and Rebel Attacks on Petroleum Infrastructure
1968-1999. FFI/RAPPORT 2001/04031, Norwegian Defence Research Establishment, 2001. Online at: http://www.ffi.no/no/Rapporter/
01-04031.pdf
[5] Ibid, p. 22.
[6] Michael Mihalka & David Anderson. Is the Sky Falling? Energy Security and Transnational Terrorism. Strategic Insights, Center for
Contemporary Conflict at the Naval Postgraduate School in Monterey, California, July 2008.
[7] For example see: John C. K. Daly. Saudi Oil Facilities: Al-Qaeda's Next Target? Terrorism Monitor 4, Issue 4, 2006; Gal Luft. Pipeline
sabotage is terrorist's weapon of choice. Energy Security, March 28, 2005.
[8] Peter Toft, Arash Duero & Arunas Bieliauskas. Terrorist targeting and energy security. Energy Policy, 38, 2010.
[9] S.J. Simonoff, C. Restrepo, R. Zimmerman & E.W. Remington. Trends for Oil and Gas Terrorist Attacks. I3P Report No. 2, Hanover, NH:
The I3P, November 2005.
[10] Babatunde Anifowose, Damian M. Lawler, Dan van der Horst & Lee Chapman. Attacks on oil transport pipelines in Nigeria: A
quantitative exploration and possible explanation of observed patterns. Applied Geography, 32, 2011; Jennifer Giroux. Turmoil in Delta: Trends
and Implications. Perspectives on Terrorism, 2: 8, 2008.
[11] See: Pavel K. Baev. Reevaluating the Risks of Terrorist Attacks Against Energy Infrastructure in Eurasia. China and Eurasia Forum
Quarterly, Vol. 4, No. 2, 2006; Jennifer Giroux. Targeting Energy Infrastructure Examining the Terrorist Threat in North Africa and its Broader
Implications. Circunstancia 7: 18, 2009.
[12] John Robb. Brave New War: The Next Stage of Terrorism and the End of Globalization. John Wiley & Sons Inc., Hoboken, New Jersey,
2007; Toft et al. 2010.
[13] Halvard Buhaug. Relative Capability and Rebel Objective in Civil War. Journal of Peace Research, Vol. 43, No. 6, 2006; Michael L. Ross.
Blood Barrels: Why Oil Wealth Fuels Conflict. Foreign Affairs, May/June 2008.
[14] Päivi Lujala, Jan Ketil Rod & Nadja Thieme. Fighting over Oil: Introducing a New Dataset. Conflict Management and Peace Science, 24,
pp. 239-256, 2007.
[15] Giacomo Luciani. Armed Conflicts and Security of Oil and Gas Supplies. CEPS Working Document, No. 352, 2011. http://
www.princeton.edu/~gluciani/pdfs/WD%20352%20_SECURE_%20Luciani%20on%20Armed%20Conflicts.pdf.
[16] E.g.: Paul Collier & A. Hoeffler. On economic causes of civil war. Oxford Economic Papers, 50: 4, P. 563-573, 1998; Michael Ross. What do
we know about natural resources and civil war? Journal of Peace Research, 41: 3, pp. 337-56, 2004.
[17] Nicole Deitelhoff & Klaus Dieter Wolf. Corporate Security Responsibility? Corporate Governance Contributions to Peace and Security in
Zones of Conflict. Pelgrave Macmillan, p. 3, 2010.
[18] Gary LaFree & Laura Dugan. Introducing the Global Terrorism Database. Terrorism and Political Violence, 19: 1, pp. 81-204, 2007.
[19] This is a snapshot of a larger data analysis and study that was supported by the United States Institute for Peace in partnership with our
host institutions. The full data analysis with case studies will be featured in another publication.
[20] See the GTD Codebook, p.3: www.start.umd.edu/gtd/downloads/Codebook.pdf
[21] Markus Koth. Demobilization and Reintegration of Paramilitaries in Colombia. Bonn International Center for Conversion (BICC) Papers,
July 2005.
[22] J.P. Farwell and Rafal Rohozinski. Stuxnet and the Future of Cyber War. Survival: Global Politics and Strategy 53: 1, pp. 23–40, 2011.
Abstract
A recurring question posed to researchers is whether or not terrorism poses similar degrees of risk
as other man-made or natural disasters. There are some specialists, such as John Mueller, who
argue that somewhat ironically, the threat of terrorism is vastly exaggerated.[1] This begs the
question : compared to what? The underlying aim of this Research Note is to point out some basic
methodological and contextual issues to consider, rather than making an attempt to provide hard
answers regarding relative individual and collective risks. However, an effort is made to place
some empirical findings into appropriate political and social contexts. The framework for
discussion includes: basic conceptual problems regarding the notion of “risk”; a comparison of
certain basic terrorism incident rates with rates for homicides and illness; and identification of
possible future directions to gauge risk assessment within the context of a more holistic systems
perspective.
Introduction
The conceptualization of risk requires much more than a delineation of type of risk from
specific threats. Indeed, John Monahan suggests that even within the realm of terrorism
studies, terrorism is a necessary but insufficient term that clusters a wide ranging group of
phenomena, thereby in effect working to provide impediments to meaningful research about
explanatory variables for specific (sub-) types of terrorist assaults.[2] For Monahan, it follows
there should be efforts to standardize understandings of seminal concepts such as whether
terrorist assaults comprise “a process” or are composed of discrete “events” or perhaps are
either or both under certain select circumstances.[3] Still another critical issue that Monahan
points to is that scholars must differentiate between the risk of terrorist assaults associated
with recruitment of terrorist activists by contrast to the risk of terrorism with recruitment of
constituency groups in what Monahan calls “supply roles.”[4]
Equally important, there is no one generally recognizable and widely shared conceptualization
or definition of the broader notion of “risk.”[5] As David Shields at Walsh College puts it,
“there is a difference between ‘risk to’ and ‘risk of ’ conceptualizations.” To extrapolate, what
seems significant in the case of the “risk to” notion is that underlying emphasis is placed on
the object of risk (i.e., what will happen to that object), by contrast to the “risk of ” notion that
places emphasis on the sources and origins of “risk” as a driver of action.
At the same time, “risk to” is a more active, temporal, and proximate conceptualization of the
risk condition, while “risk of ” is a more dormant condition or tense that has inherent potential
for change into a more active form. Moreover, there is also a range of risk “perception or
Seen from a slightly different angle, Monahan also notes there is a clear distinction between
“risk reduction,” a concept that requires almost singular focus on “causal factors” as Kraemer
et. al. (1997) put it, and “risk assessment,” that in turn revolves around “likelihood” or
“probability.”[7] Indeed, what is significant here is Monahan suggestion that there are
fundamental differences between threat assessment of victimization - which is the focus of
this Research Note - and assessment of risk focused on the individual, namely those who are
deemed to present various degrees of threat or potential threat to society as political terrorists
do.[8]
For instance, a range of empirical results about terrorism compiled by the National
Consortium for the Study of Terrorism and Responses to Terrorism (START) is presented by the
U.S. Department of State for the evaluation of terrorism trends in 2012, presumably to help
gauge risk for a variety of actors. Those data are as good an example as any of broad types of
data with a range of problems that include the implicit assumption that different types of
targets share the same degree of threat even at different geographical locales and at different
periods of time.[12] For example, consider the chart from the START- U.S. Department of
State data reproduced below.
Such relative frequencies by country are important findings that articulate the basic
parameters of terrorism: the ten highest numerical amounts of terrorist assault incidents per
country. As this report points out, the top four countries, namely Pakistan, Iraq, Afghanistan,
and India are found in Asia, with three out of four of those countries with over 1,000
incidents. In addition, the Philippines in South East Asia ranks ninth out of the ten countries
that experienced the highest number of terrorist assaults in 2012.[13]
While these findings are useful, what is also significant is that the foregoing are aggregated
measures of attacks by country that do not distinguish between urban and rural locales, region
of the country, locales rich with precious metals and other natural resources, neighborhood
clusters, and individual neighborhoods. [14] The variation in the range of “average numbers
killed per attack” from .41 in the case of India, to 4.94 persons killed per incident in the case
of Syria underscores the importance of “contextual factors” intrinsic to specific operational
environments such as the “civil war” in Syria that began in 2010.[15] What seems significant
for our purposes, namely to acquire some rough assessment of risk from available data, are
mean number of deaths and injuries that result from terrorist assaults. Plainly, the mean rates
are comparatively low when terrorism is compared to other broader forms of political violence
and armed conflict that do not have a clear beginning, middle, and end point as do terrorist
assaults or other specific acts of force.
For example, Syria, in the throes of a full blown civil war where the highest means of death
and injury were found, had a mean for death of only 4.94 persons killed (657/133) per attack,
by contrast to a rate of injuries over 2.7 times as large, but still with a mean of only 13.44
(1,787/133). In turn, the average rate of death in Afghanistan, itself characterized by an
insurgency between the Taliban and affiliate groups against the Karzai government and its
ISAF allies, experienced terrorist assaults where the mean for deaths, presumably over the
entire country, was only 2.57 (2,632/1,023), in comparison to the mean for injuries that was
not much higher at 3.63 (3,715/1,023). Clearly, these are rather crude indicators for the
reasons previously mentioned, but it is probably no exaggeration to say that the likelihood of
victimization by means of a terrorist assault is less than the likelihood for certain other
discrete acts of political violence such as sustained warfare or large scale natural disasters like
floods or pandemics.[16]
To reiterate, the problems associated with an assessment of accurate measures of risk across
different types of “man-made” or natural phenomena is from the start hampered in many data
compilations by the absence of more specific disaggregated data for specific geographical
locales and political factors such as holidays or commemoration of landmark events that are
inextricably bound up with increased risk.[17] Put another way, political events are a dynamic
and critically important part of any “contextual environment” and commemoration of major
or minor political events, landmark events, religious holidays, or secular holidays as well as
reactions to government assassinations or war may increase - or conceivably decrease by
means of “augmented security” - the likelihood of terrorist assaults and victimization.
This chart reflects findings where a basket of GPI countries had a mean of 6.7 murders per
100,000 of the population in 2008, by contrast to slightly less in 2009. A spike begins from
2009-2010, and the murder rate per 100,000 people continues to increase with an average rate
of 10.9 per 100,000 in 2013. At this moment in time, there is no effective way to compare data
on terrorism offered by START’s GTD- Department of State cited earlier to the aggregate
country homicide rates provided by the “Global Peace Index 2013” study because of
standardization measurement problems.[21] In the broader sense, this is an underlying
problem with many data sets that makes comparisons of relative frequencies of events and
next, calculating accurate risk assessment exceedingly difficult.
At the same time, it is probably no exaggeration to say that while environmental infrastructure
effects, such as economic blight, overcrowding and crime, coupled with family and small
group interactions motivate a very small percentage of individuals to “act out” based on
political motivations (i.e., terrorism) by contrast to a somewhat larger percentage who engage
in common criminal activity, the number of people exposed to economic blight conditions
and disruptions in family and social circles but who somehow navigate through by means of
self medication (i.e., drugs or alcohol) is far greater.[22] In turn, that suggests that such
effective and sustained environmental pressures have greater effects on a larger segment of
society with continuous duration thereby in effect making rates of homicide, rape, and suicide
as well as other crimes a more significant cause for concern than terrorism when thinking
about the chances of victimization.
In the broadest sense, those findings chronicle that out of 526,000 violent deaths worldwide
from 2004-2009, some 75.285% or 396,000 were classified as “intentional homicides,” by
contrast to 54,000 or some 10.26% of the total that are classified as “unintentional homicides.”
In turn, 21,000 deaths or almost 4.0% of the total amount are classified as “killings during legal
interventions,” defined by the “Global Burden of Armed Violence 2011” report as “...violent
deaths of civilians by law enforcement and state security forces during legal interventions
-....”[24] What seems significant here is that only some 10.45 % of violent deaths
(55,000/526,000) happened within the context of “direct conflict deaths” (i.e., “terrorist
activities” and/or “conflict settings”) and that is only 1,000 more chronicled cases compared to
the 54,000 “unintentional homicides” chronicled. [25] At the same time, the term “terrorist
activities” is an extremely imprecise and nebulous term; it might conceivably include deaths of
civilians in counterterror assaults or civilian deaths as terrorists prepare explosives improperly.
That sort of imprecision might skew results in data replication efforts. Notwithstanding that,
based on “Global Burden of Armed Violence” data, the amount of death associated with
common criminal activity (i.e., “interpersonal violence,” “gang violence,” “economically
motivated crime”) far exceeds, by a factor of at least 7.2, the amount of death associated with
terrorism (55,000 X 7.2 = 396,000).
In turn, additional data from the “Global Burden of Armed Violence 2011” provides a
breakdown by country and region of “violent death per 100,000 of population” from 2004 to
2009.” It identifies 58 countries with 10 or more violent deaths per 100,000 of a country’s
population. The five countries that are found to have the highest annual “violent death” rate
per 100,000 of the population are: El Salvador (62.0), Iraq (60.0), Jamaica (58.1), Honduras
(49.0), and Colombia (44.5). In addition, those data illustrate that many countries with
comparatively high rates of “violent deaths” per 100,000 of the population are found in the
developing world. The glaring exceptions are Puerto Rico and the Russian Federation that are
found to have a “violent death” rate of about 20 per 100,000 of the populace and 17.2 per
100,000 respectively.[26] To put those results in some perspective, the World Health
Organization (WHO) “Leading Cause of Death” global statistics for 2011 report that the risk
of “lower respiratory infections” that result in death is “46 deaths per 100,000 population,” by
contrast to “43 deaths per 100,000 population” elicited by “chronic obstructive pulmonary
disease.”[27]
The WHO report illustrates that almost one third of those countries (27.5% or 16/58 states)
has been characterized by a “main armed conflict” or one that has recently passed into eclipse.
In 10 of those 16 states, “...the incidence of homicide is actually greater than the number of
direct conflict deaths.”[28] The underlying focus on intra-national violence as opposed to
interstate war dovetails well with the perspective taken by Cooper, Merz, and Shah’s work
where specific sets of empirical findings are framed by descriptions and statistics that point to
a general decrease in international conflict and the intensity of warfare deaths in the
contemporary world.[29]
and identify modalities between types of death outcomes and complex sources and origins of
causal factors.
Much of the data available from IGO and NGO sources about death from illness is also
comprised of aggregate data by country or region.[31] At the same time, it is probably no
exaggeration to say that disaggregated data is more intrinsic to methodologies in this public
policy domain as specific geographical locales afflicted with such problems are oftentimes
almost the sole focus of many studies. In the case of broader overviews of death rates from
illness by region, WHO statistics for the single most predominant causes of death provide
numerical amounts and percentage rates.
For example, there were 1,018,000 “cardiovascular diseases” related deaths in the “African
Region” in 2011 or 10.7 % of the total number of deaths (9,538,000) across articulated “cause”
categories. In a similar vein, there were 1,859,000 cardiovascular disease related deaths in the
“Region of the Americas” that comprised 29.5% of the 6,302,000 deaths total across categories.
Plainly, we can extrapolate that the scope of deaths for illness by region eclipses rates for
terrorist assaults.
Final Reflections
There are several underlying themes throughout this Research Note that deserve attention.
First, there is a significant difference between risk appraisal and the presentation of cumulative
statistics about terrorism, related events, and a variety of natural calamities caused by illness -
be it directly or as a result of other natural events such as tornadoes, flood, earthquakes, or
hurricanes. All too frequently, there is no standardized unit of measurement available to make
even the roughest comparisons between frequency rates, let alone intensity magnitude rates.
As if that were not enough of a problem, there are different ways of appraising risk: the notions
of “risk of ” and “risk to” that Shields described are only two conceptualizations of risk. Indeed,
that condition parallels the many and competing definitions of the notion of “resiliency”
found in the literature.[32] In future endeavors, scholars might have to develop parallel
conceptualizations of risk appraisal for what Zinnes would call “integrative” studies.[33] This
is also warranted by the fact that relative occurrences of terrorist attacks and/or death,
homicide and different types of illnesses are usually associated with broader “conflict
conditions”- a term which itself is problematic as all societies are plagued with social,
economic, and political inequalities and consequently, a host of “conflict conditions.”[34]
At the same time, the problem or set of challenges and opportunities is much more
fundamental and even more complex. Plainly, we can extrapolate from some of the data
presented to see how “feedback loops” between disease and malnutrition (e.g., malnutrition
leads to illness; a mother who is ill cannot provide for children who become malnourished),
indirect pathways of effect between “disease” and “malnutrition,” and “educational attainment”
influence outcomes.[35] Indeed, it is not difficult to see how links between lack of educational
attainment, and the low socio-economic status (SES) that follows, can lead to a condition of
“frustration-aggression” that for some, but certainly not all, may lead to criminality and for a
smaller number, to terrorism or other forms of political violence.[36]
About the Author: Richard J. Chasdi is Associate Professor of Management in the Department
of Management at Walsh College, Troy, Michigan. He is a participating faculty member in the
newly established Center for Strategic Analysis and Assessment (CSSA) led by Professor Sheila R.
Ronis and Walsh College. The CSSA derives from the Project on National Security Reform
(PNSR), a bipartisan Washington, DC based policy group focused on national security reform.
Notes
[1] John Mueller (2004). “A False Sense of Insecurity?” Regulation. Fall, pp. 42-46.
[2] John Monahan (2011). “The Individual Risk Assessment of Terrorism” In Psychology, Public Policy, and Law. 10 October. (Online First
Publication doi:10.1037/a0025792), pp. 14-17.
[3] Ibid, pp. 15-16, 13, 6-8.
[4] Ibid., p. 16.
[5] For instance, Alex Schmid defines “risk” as “the degree of danger associated with a given operation, course of action, or failure to act in a
crisis situation,” adding, that “for mathematical modeling purposes, risk is often expressed as the probability of an unwanted occurrence
multiplied by the severity of its consequences.” – Alex P. Schmid. The Routledge Handbook of Terrorism Research. London & New York:
Routledge, 2011, p. 683.
[6] Jervis, Robert (1976). Perception and Misperception in International Politics. Princeton, N.J.: Princeton University Press.
[7] J. Monahan (2011), pp. 6n7, 4. – A. P. Schmid describes “risk assessment” in terms of “calculation and/or simulation of the degree of
danger attached to a course of action for the purpose of uncertainty reduction.” – A. P. Schmid, op. cit., p. 683.
[8] J. Monahan, op.cit. ,pp. 20, 17-18, 27-28.
[9] J. Monahan, op. cit., pp. 17, 14-15. Plainly, such data about rates murder and terrorist assaults by region and city do exist but there is a
problem with standardization across studies that include coding issues. That emergent reality is what Dina A. Zinnes might call a condition
with an emphasis on “cumulative” rather than on “integrative” processes. Dina A. Zinnes (1976). “The Problem of Cumulation” In Search of
Global Patterns, Ed. James Rosenau New York: Free Press; Dina A. Zinnes. (1976). Contemporary Research in International Relations: A
Perspective and a Critical Appraisal. New York: Free Press.
[10] Richard J. Chasdi (2010). Counterterror Offensives for the Ghost War World: The Rudiments of Counterterrorism Policy. Lanham, MD:
Lexington Books; Richard J. Chasdi (2002). Tapestry of Terror: A Portrait of Middle East Terrorism, 1994-1999. Lanham, MD: Lexington
Books; Richard J. Chasdi (1999). Serenade of Suffering: A Portrait of Middle East Terrorism, 1968-1993. Lanham, MD: Lexington Books.
[11] Tara Cooper, Sebastian Merz, and Mila Shah (2011). “A More Violent World? Global Trends in Organized Violence.” In Berghof
Handbook for Conflict Transformation. Bergohof Foundation 42 (http://www.berghof-handbook.net/)
[12] U.S. Department of State. “National Consortium for the Study of Terrorism and Responses to Terrorism: Annex of Statistical
Information, Office of the Coordinator of Counterterrorism, Country Reports on Terrorism 2012 Report, May 30, 2013.”
[13] Ibid.
[14] One research project that attempts some of this is the “Global Black Spots – Mapping Global Insecurity Program”, conducted at Syracuse
University in the Maxwell School of Citizenship and Public Affairs. Dr. Bartosz Hieronim Stanislawski Research Fellow, Moynihan Institute of
Global Affairs and Institute for National Security and Counterterrorism e-mail correspondence, November 29, 2010; December 14, 2010.
[15] R. Chasdi (2010), op. cit.
[16] Khusrav Gaibulloev and Todd Sandler (2008). “The Impact of Terrorism and Conflicts on Growth in Asia, 1970-2004.” ADBI Institute
Discussion Paper No., pp. 113 & 6. (http:www.adbi.org/files/dp113.terrorism.impact.growth.asia.1970.2004.pdf). Still, terrorist assaults have
degrees of underlying economic cost. According to Gaibulloev and Sandler, in “Western Europe...each additional transnational terrorist
incident per million persons reduced economic growth by about 0.4 percentage points in a given year.” In the case of Israel, Gaibulloev and
Sandler describe a study in 2004 by Eckstein and Tsiddon that illuminates, “....that Israel lost 10% of its per capita income during the three-
year intifada beginning in the fourth quarter of 2000. In effect, terrorism reduced Israeli economic growth to zero during this violent era.”
[17] Richard J. Chasdi (1999). Serenade of Suffering: A Portrait of Middle East Terrorism: 1968-1993. Lanham, MD: Lexington Books; Richard
J. Chasdi (2002). Tapestry of Terror: A Portrait of Middle East Terrorism, 1994-1999. Lanham, MD: Lexington Books.
[18] This type of “geo-spatial analysis” with “integrative” approaches to analysis of “contextual factors” is now undertaken at Argonne
National Laboratories. At Walsh College, the newly established Center for Strategic Analysis and Assessment (CSAA) will partner with
Argonne National Laboratories to conduct a series of research projects that use a systems analysis approach to delve into broader national
security policy issues.
[19] Institute for Economics & Peace (2013), p. 40.
[20] One would expect that for homicide, the quintessential crime, reliable data are available worldwide. However, that is not the case. As Jan
van Dijk has pointed out, “....police-recorded homicide rates suffer to some extent from the same flaws of underreporting and poor recording
as other police-recorded crime statistics. In countries where security forces are among the main perpetrators of violent crimes, reporting and
recording will be low. In many developing countries, administrative systems and communication infrastructures of police services preclude
proper recording of even the most serious types of crime.(...)”....in developing countries, even for as serious a crime as homicide, a significant
proportion of crimes committed is never reported to the police or never recorded. In many developing countries, even police-recorded
homicides have their dark numbers.” – J.v. Dijk. The World of Crime: Breaking the Silence on Problems of Security, Justice, and Development
Across the World. Los Angeles, Sage Publications 2008, pp. 75-76.
[21] An additional problem is the quality of medical services: Attempted murder rates in two countries might be the same but in the country
with better medical emergency services the survival rate is likely to be much higher.
[22] J. Monahan, op. cit., p. 21; Larry J. Siegel and Chris McCormick (2010). Criminology in Canada: Theories, Patterns, and Typologies; Fourth
Edition. Toronto, Ontario: Nelson Education Ltd; Albert J. Reiss Jr. and Jeffrey A. Roth. (Eds.) (1993). Understanding and Preventing Violence.
Washington, DC: National Academy Press; David P. Barash and Charles P. Webel (2002). Peace and Conflict Studies. Thousand Oaks, CA: Sage
Publications.
[23] Global Burden of Armed Violence 2011 report (www.genevadeclaration.org); Blogs.worldbank.org (http://blogs.worldbank.org/
publicsphere/today-s-grimfographic-how-many-people-die-violent-death-where-and-how#comment-1384); Institute for Economics & Peace.
(2013).
[24] “Global Burden of Armed Violence” (2011), pp. 44 & 51. In contrast, “intentional homicides” are defined in this compilation as, “...deaths
as a result of interpersonal violence, gang violence, economically motivated crime -....” In turn, “unintentional homicides” are defined as,
“...deaths as a result of ‘accidental killings’ -....” Lastly, “direct conflict deaths” are defined as “...deaths as a result of armed conflicts, political
violence, and terrorism - ...” This last category seems problematic as both “and” and “or” appear to be used in that “Global Burden of Armed
Violence” report.
[25] Ibid. We are told that, “the GBAV database – a comprehensive database on lethal violence covering the years 2004-09 highlights that, on
average, an estimated 526,000 people died violently....”
[26] Ibid., p. 53.
[27] World Health Organization. “WHO regions,” “Disease and Injury Regional Mortality Estimates for 2000-2011.” (http://www.who.int/
healthinfo/global_burden_disease/estimates_regional/en/index.html).
[28]“Global Burden of Armed Violence 2011,” p. 52.
[29] T. Cooper, S. Merz, and M. Shah (2011). op. cit.
[30]Ibid., pp. 25-26.
[31] For example, see “Lifetime odds for selected causes, United States 2009” where the top three conditions that elicited death include (1)
“Heart disease 1 in 7 (14.2%)”; “Cancer 1 in 7” (14.2%); (2) “Chronic lower respiratory disease 1 in 28” (3.6 %) (3) “Intentional self-harm 1 in
106” or a little less than 1.0%. (http:img.gawkerassets.com/img/18uzs80jqyy7agif/original.gif).To be sure, those empirical results would be
more informative if underlying distinctions were made by race, gender, socio-economic status, region, and urban/rural distinctions to reflect
subtleties and nuances.
[32] Richard J. Chasdi (2013). “A ‘Resiliency Continuum’ of Terrorist Assaults at the Nation-State Level of Analysis.” Armed Forces and Society,
March 7 (Online First:doi10.1177/0095327X1247) (publication pending).
[33] Zinnes (1976a); Zinnes (1976b).
[34] Institute for Economics & Peace. “Global Peace Index 2013- Measuring the State of Global Peace.” New York: pp. 40-43, 1-2(http://
www.visionofhumanity.org/pdf/gpi/2013_Global_Peace_Index_Report.pdf); “Global Peace Index 2013: the full list.” Datablog: Facts are
sacred. (http://www.guardian.co.uk/news/datablog/2013/jun/11/global-peace-index-2013?goback=%2Egde_1841466_member_250542686).
Presumably, these terms refer to “violent,” namely physical conflict, but of course violence is a continuous variable marked by degrees; it is not
a dichotomous variable. The terms “domestic conflict,” “local conflict,” as well as “international conflict” are used in that publication for
example,
[35] British Broadcasting Corporation. 2013. “Malnutrition hits school performance, Warns Save the Children.” 27 May (http:www.bbc.co.uk/
news/world-22685208#story_continues_1); A. Reiss and J. Ross (1993), op. cit., pp. 296-298, 304.
[36] A. Reiss and J. Ross, op. cit.; John Dollard, Leonard W. Doob, Neal E. Miller, O.H. Mowrer, and Robert R. Sears (1939). Frustration and
Aggression. New Haven, CT: Yale University Press.
[37] David L. Sallach (2013). “Topos Modeling of Social Conflict: Theory and Methods.” Computational institute, Argonne National
Laboratories, Argonne IL; University of Chicago, Chicago, IL., 1-13; Molly M. Ginty (2013). “Analysis: pollution risks worse for developing
world women.” UPI.com (http://www.upi.comTop_News/Analysis/2013/05/20/Pollution-risks-worse-for-developing-world-women/
WEN-3621369080433/); BBC News World. 2013. “More than seven million refugees displaced in 2012 – UN” (http://www.bbc.co.uk/news/
world-22963060?print=true); Monahan (2011), 22. It follows from Monahan’s work that what amounts to a “systems approach” or perhaps a
“sub-systems approach” is articulated by Ginges, Hansen, and Norenzayan (2009) who inform us in their “coalitional commitment
hypothesis” that religion serves as an indirect explanatory factor in suicide terrorist assaults. Monahan suggests that is the case precisely
because religious frameworks, but not necessarily religious observance, essentially craft or reinforce what Choi and Bowles (2007) call
“parochial altruism.”
IV. Resources
Literature on the Conflict in Syria (2011 – November 2013)
Compiled and selected by Judith Tinnes
Abstract
This bibliography contains journal articles, book chapters, books, edited volumes, theses, grey
literature, bibliographies and other resources on the Syrian conflict. To keep up with the rapid
changing political events, more recent publications have been prioritized during the selection
process. The literature has been retrieved by manually browsing more than 200 core and
periphery sources in the field of Terrorism Studies. Additionally, full-text and reference retrieval
systems have been employed to expand the search.
NB: All websites were last visited on 17.11.2013. - See also Note for the Reader at the end of
this literature list.
Keywords: bibliography, resources, literature, Syria, conflict, uprising, civil war, Assad regime
Carnegie Middle East Center (2012-): Guide to Syria in Crisis. URL: http://carnegie-mec.org/
specialprojects/SyriainCrisis/?type=analysis&lang=en
Global Observatory (2013, June 24): A Resource Guide to the Syrian Conflict. URL: http://
theglobalobservatory.org/reports/522-a-resource-guide-to-the-syrian-conflict.html
Lynch, Marc (2013, September 4): A Syria Reading List. Abu Aardvark's Middle East Blog.
URL: http://lynch.foreignpolicy.com/posts/2013/09/04/a_syria_reading_list
Syrian Studies Association (n.d.): Syrian Studies Association Bulletin. URL: https://
ojcs.siue.edu/ojs/index.php/ssa/index
Armbruster, Jörg (2013): Brennpunkt Nahost: Die Zerstörung Syriens und das Versagen des
Westens. Frankfurt: Westend.
Haney, Antoine; Nicholson, Carter M. (Eds.) (2013): Conflict Zones: Syria and Mali. (Global
Political Studies). Hauppauge: Nova Science.
Hashemi, Nader; Postel, Danny (Eds.) (2013): The Syria Dilemma. (Boston Review Books).
Cambridge: The MIT Press.
Hokayem, Emile (2013): Syria's Uprising and the Fracturing of the Levant. (Adelphi Series).
Abingdon: Routledge.
Khatib, Line (2011): Islamic Revivalism in Syria: The Rise and Fall of Ba'thist Secularism.
(Routledge Studies in Political Islam, Vol. 7). Abingdon: Routledge.
Lawson, Fred H. (2013): Global Security Watch: Syria. Santa Barbara: Praeger.
Lefèvre, Raphaël (2013): Ashes of Hama: The Muslim Brotherhood in Syria. New York: Oxford
University Press.
Lesch, David W. (2012): Syria: The Fall of the House of Assad. New Haven: Yale University
Press.
Pierret, Thomas (2013): Religion and State in Syria: The Sunni Ulama from Coup to Revolution.
(Cambridge Middle East Studies, Vol. 41). Cambridge: Cambridge University Press.
Starr, Stephen (2012): Revolt in Syria: Eye-Witness to the Uprising. London: Hurst.
van Dam, Nikolaos (2011): The Struggle for Power in Syria: Politics and Society under Asad and
the Ba'th Party. (Rev. 4th ed.). London: I.B. Tauris.
Yazbek, Samar (2012): A Woman in the Crossfire: Diaries of the Syrian Revolution. [Translated
by Max Weiss]. London: Haus Publishing.
Ziadeh, Radwan (2013): Power and Policy in Syria: Intelligence Services, Foreign Relations and
Democracy in the Modern Middle East. (Rev. ed.). London: I.B. Tauris.
Theses
Akkerhuis, Dianne (2013, August): Western vs. Muslim Media on the Civil War in Syria: An
Empirical Analysis of Huntington’s Clash of Civilizations. (Master's Thesis, Utrecht University,
Utrecht, The Netherlands). URL: http://igitur-archive.library.uu.nl/student-theses/
2013-0927-200954/UUindex.html
Back, Peter (2013, June): "We are all Hamza Alkhateeb": En analyse af voldelige billeder og
sociale medier i den syriske borgerkrig. (Master's Thesis, Roskilde University, Roskilde,
Denmark). URL: http://rudar.ruc.dk/handle/1800/11034
Bagherpour, Amir K. (2012, Spring): Religion and the Evolution of Democracy: A Revised
Selectorate Model for the Arab Spring. (Doctoral Dissertation, Claremont Graduate University,
Claremont, United States). URL: http://scholarship.claremont.edu/cgu_etd/53/
Corro, Megan Catherine (2013, March): The Arab Uprisings and the Unveiling of the Shiite
Crescent. (Master's Thesis, Georgetown University, Washington DC, United States). URL:
http://m.repository.library.georgetown.edu/handle/10822/558369
Eivazian-Tabrizi, Arby (2012, Fall): The Role of Foreign Intervention in Revolutions. (Master's
Thesis, San Diego State University, San Diego, United States). URL: http://sdsu-
dspace.calstate.edu/handle/10211.10/3203
Fondren, Billy R. (2009, March): The Muslim Brotherhood in Egypt, Jordan and Syria: A
Comparison. (Master's Thesis, Naval Postgraduate School, Monterey, United States). URL:
http://calhoun.nps.edu/public/handle/10945/4854
Gilbert, Victoria J. (2013, May): Syria for the Syrians: The Rise of Syrian Nationalism,
1970-2013. (Master's Thesis, Northeastern University, Boston, United States). URL: http://
www.academia.edu/3432163/
Syria_for_the_Syrians_The_Rise_of_Syrian_Nationalism_1970-2013
Halderman, Frank Douglas (2013, April): Issue Indivisibility as an Explanatory Model for the
Arab Spring. (Master's Thesis, University of British Columbia, Vancouver, Canada). URL:
https://circle.ubc.ca/handle/2429/44406
Hasler, Stefan (2012, June): Explaining Humanitarian Intervention in Libya and Non-
Intervention in Syria. (Master’s Thesis, Naval Postgraduate School, Monterey, United States).
URL: http://calhoun.nps.edu/public/handle/10945/7355
Khatib, Line (2010): Islamic and Islamist Revivalism in Syria: The Rise and Fall of Secularism in
Ba'thist Syria. (Doctoral Dissertation, McGill University, Montreal, Canada). URL: http://
digitool.library.mcgill.ca/R/?func=dbin-jump-full&object_id=94949
Maddox, Jacob M. (2013, March): Building Peace in a Post-Assad Syria. (Master’s Thesis, Naval
Postgraduate School, Monterey, United States). URL: http://calhoun.nps.edu/public/bitstream/
handle/10945/32859/13Mar_Maddox_Jacob.pdf
Poltoratskaia, Tatiana (2010, December): Russia’s Role in the Middle East: Russian Weapons
Sales to the Syrian Arab Republic 1950-2010. (Master's Thesis, The University of Texas at
Austin, Austin, United States). URL: http://repositories.lib.utexas.edu/handle/2152/ETD-
UT-2010-12-2508
Silverstein, Shayna Mei (2012, July): Mobilizing Bodies in Syria: Dabke, Popular Culture, and
the Politics of Belonging. (Doctoral Dissertation, University of Chicago, Chicago, United
States). Available from ProQuest Dissertations and Theses database. (UMI No. 3513514)
Abrams, Sam (2013, June): Aiding Opposition Civilian Authority in Syria. Small Wars Journal,
7/2013. URL: http://smallwarsjournal.com/jrnl/art/aiding-opposition-civilian-authority-in-
syria
Abu Ahmad. George (2013, Summer): Order, Freedom and Chaos: Sovereignties in Syria.
Middle East Policy, 20(2), 47-54. DOI: http://dx.doi.org/10.1111/mepo.12019
Adelkah, Nima (2013, February): If Syria is Attacked, will Iran Retaliate? Terrorism Monitor,
11(4), 4-5. URL: http://www.jamestown.org/uploads/media/TM_011_Issue04.pdf
al-Gharbi, Musa (2013, Spring): Syria Contextualized: The Numbers Game. Middle East Policy,
20(1), 56-67. DOI: http://dx.doi.org/10.1111/mepo.12003
Al-Hardan, Anaheed (2012): A Year on: The Palestinians in Syria. Syrian Studies Association
Bulletin, 17(1). URL: https://ojcs.siue.edu/ojs/index.php/ssa/article/view/2720
Allison, Roy (2013, July): Russia and Syria: Explaining Alignment with a Regime in Crisis.
International Affairs, 89(4), 795-823. DOI: http://dx.doi.org/10.1111/1468-2346.12046 URL:
http://www.chathamhouse.org/sites/default/files/public/International%20Affairs/
2013/89_4/89_4_01_Allison.pdf
al-Shishani, Murad Batal (2012, November): Jihad in Syria: A Profile of Jabhat al-Nusra.
Terrorism Monitor, 10(22), 4-6. URL: http://www.jamestown.org/uploads/media/
TM_010_Issue22_01.pdf
al-Shishani, Murad Batal (2013, January): Syria Emerges as a New Battlefield for Jordan’s
Jihadists. Terrorism Monitor, 11(1), 4-5. URL: http://www.jamestown.org/uploads/media/
TM_011_Issue01_03.pdf
al-Shishani, Murad Batal (2013, April): “Obliged to Unite under One Banner”: A Profile of
Syria’s Jaysh al-Muhajireen wa’l-Ansar. Terrorism Monitor, 11(8), 4-5. URL: http://
www.jamestown.org/uploads/media/TM_011_Issue08_01.pdf
al-Shishani, Murad Batal (2013, September): Syrian Jihadists React to the Threat of U.S.
Military Intervention. Terrorism Monitor, 11(18), 4-5. URL: http://www.jamestown.org/
uploads/media/TM_011_Issue18_01.pdf
Álvarez-Ossorio, Ignacio (2013): Evolution and Outlook of the Syrian Crisis. In: European
Institute of the Mediterranean (IEMed) (Ed.) (2013): Mediterranean Yearbook 2013. Barcelona:
IEMed, 13-17. URL: http://www.iemed.org/observatori-en/arees-danalisi/arxius-adjunts/
anuari/iemed-2013/Alvarez%20Ossorio%20Syrian%20Crisis%20EN.pdf
Anzalone, Christopher (2013, July): Zaynab’s Guardians: The Emergence of Shi`a Militias in
Syria. CTC Sentinel, 6(7), 16-21. URL: http://www.ctc.usma.edu/wp-content/uploads/2013/08/
CTCSentinel-Vol6Iss7.pdf
Asseburg, Muriel (2013): Syria’s Civil War: Geopolitical Implications and Scenarios. In:
European Institute of the Mediterranean (IEMed) (Ed.) (2013): Mediterranean Yearbook 2013.
Barcelona: IEMed, 18-23. URL: http://www.iemed.org/observatori-es/arees-danalisi/arxius-
adjunts/anuari/iemed-2013/Asseburg%20Syria%20Geopolitical%20Implications%20EN.pdf
Asseburg, Muriel (2013, February): Syrien: Ziviler Protest, Aufstand, Bürgerkrieg und
Zukunftsaussichten. Aus Politik und Zeitgeschichte, 63(8/2013), 11-17. URL: http://
www.bpb.de/system/files/dokument_pdf/APuZ_2013-08_online.pdf
Awad, Najib George (2012): The Christians and the “Islamist Threat” Theory: Reflections on
Syria (1). In: And Freedom Became a Public-Square: Political, Sociological and Religious
Overviews on the Arab Christians and the Arabic Spring. (Studien zur Orientalischen
Kirchengeschichte, Vol. 46). Zürich: LIT Verlag, 84-101.
Awad, Najib George (2012): The Christians and the “Islamist Threat” Theory: Reflections on
Syria (2). In: And Freedom Became a Public-Square: Political, Sociological and Religious
Overviews on the Arab Christians and the Arabic Spring. (Studien zur Orientalischen
Kirchengeschichte, Vol. 46). Zürich: LIT Verlag, 102-122.
Bank, André; Mohns, Erik (2013): Die syrische Revolte. In: Annette Jünemann; Anja Zorob
(Eds.): Arabellions: Zur Vielfalt von Protest und Revolte im Nahen Osten und Nordafrika.
Wiesbaden: Springer, 85-106. DOI: http://dx.doi.org/10.1007/978-3-531-19273-4_5
Barfi, Barak; Zelin, Aaron Y. (2013, October 10): Al Qaeda's Syrian Strategy: Can Islamic
Jihadists Win Hearts and Minds in the War against Assad? Foreign Policy. URL: http://
www.foreignpolicy.com/articles/2013/10/10/al_qaeda_s_syrian_strategy
Bartell, Dawn L.; Gray, David H. (2012, Fall): Conflict in Syria and the Opportunity to Reduce
Iran’s Regional Influence and Iran’s Threat to the International Community. Global Security
Studies, 3(4), 136-147. URL: http://globalsecuritystudies.com/Bartell%20Syria.pdf
Batrawi, Samar (2013, October): The Dutch Foreign Fighter Contingent in Syria. CTC Sentinel,
6(10), 6-10. URL: http://www.ctc.usma.edu/wp-content/uploads/2013/10/CTCSentinel-
Vol6Iss10.pdf
Bickel, Markus (2013, February): Syrien, Iran, Hisbollah, Hamas: Bröckelt die Achse? Aus
Politik und Zeitgeschichte, 63 (8/2013), 30-36. URL: http://www.bpb.de/system/files/
dokument_pdf/APuZ_2013-08_online.pdf
Bishku, Michael B. (2012, Fall): Turkish-Syrian Relations: A Checkered History. Middle East
Policy, 19 (3), 36-53. DOI: http://dx.doi.org/10.1111/j.1475-4967.2012.00546.x
Blanford, Nicholas (2013, August): The Battle for Qusayr: How the Syrian Regime and Hizb
Allah Tipped the Balance. CTC Sentinel, 6 (8), 18-22. URL: http://www.ctc.usma.edu/wp-
content/uploads/2013/08/CTCSentinel-Vol6Iss8.pdf
Blank, Laurie R.; Corn, Geoffrey S. (2013, May): Losing the Forest for the Trees: Syria, Law,
and the Pragmatics of Conflict Recognition. Vanderbilt Journal of Transnational Law, 46(3),
693-746. URL: http://www.vanderbilt.edu/jotl/2013/05/losing-the-forest-for-the-trees-syria-
law-and-the-pragmatics-of-conflict-recognition/
Carey, Sabine C.; Mitchell, Neil J.; Lowe, Will (2013, March): States, the Security Sector, and
the Monopoly of Violence: A New Database on Pro-Government Militias. Journal of Peace
Research, 50 (2), 249-258. DOI: http://dx.doi.org/10.1177/0022343312464881
Carlino, Ludovico (2012, December): Jihadists Exploit Syrian Turmoil as the Islamic State of
Iraq Makes a Comeback. Terrorism Monitor, 10 (23), 7-9. URL: http://www.jamestown.org/
uploads/media/TM_010_Issue23.pdf
Casula, Philipp (2013, June): Civil War, Revolution or Counter-Insurgency? The Syrian
Conflict through Russian Eyes. Russian Analytical Digest, 128, 4-7. URL: http://
mercury.ethz.ch/serviceengine/Files/ISN/165529/ipublicationdocument_singledocument/
c74f93a7-c54f-40bc-8bb9-0aa0fae46ad9/en/Russia+in+the+Syrian+Conflict.pdf
Catusse, Myriam (2013): When the Syrian Crisis Sheds Light on the Lebanese Crises. In:
European Institute of the Mediterranean (IEMed) (Ed.) (2013): Mediterranean Yearbook 2013.
Coleman, Michael (2013, Summer): The Rising Tide of Syria. Global Security Studies, 4(3),
15-42. URL: http://globalsecuritystudies.com/Coleman%20Syria-AG.pdf
Dahi, Omar S.; Munif, Yasser (2012, August): Revolts in Syria: Tracking the Convergence
between Authoritarianism and Neoliberalism. Journal of Asian and African Studies, 47(4),
323-332. DOI: http://dx.doi.org/10.1177/0021909611431682
Dawisha, Adeed (2013): Lions and Savages: Syria. In: The Second Arab Awakening: Revolution,
Democracy, and the Islamist Challenge from Tunis to Damascus. New York: W. W. Norton &
Company, 179-204.
Demir, Sertif; Rijnoveanu, Carmen (2013, Summer): The Impact of the Syria Crisis on the
Global and Regional Political Dynamics. Türk Dünyası İncelemeleri Dergisi, 8 (1), 55-77. URL:
http://www.egeweb.ege.edu.tr/tdid/files/dergi_13/09.pdf
Demirtaş, Birgül (2013, Spring): Turkish-Syrian Relations: From Friend “Esad” to Enemy
“Esed”. Middle East Policy, 20 (1), 111-120. DOI: http://dx.doi.org/10.1111/mepo.12008
Denselow, James (2012, October): The Syria Balancing Act: Supporting Transition, Avoiding
Blowback. CTC Sentinel, 5 (10), 20-22. URL: http://www.ctc.usma.edu/wp-content/uploads/
2012/10/CTCSentinel-Vol5Iss103.pdf
Dettmer, Jamie (2013, July): Syrian Jihadists Struggle for Supremacy in the Armed Opposition.
Terrorism Monitor, 11(15), 8-10. URL: http://www.jamestown.org/uploads/media/
TM_011_Issue15_04.pdf
Donker, Teije Hidde (2013): Islamic Social Movements and the Syrian Authoritarian Regime:
Shifting Patterns of Control and Accommodation. In: Steven Heydemann; Reinoud Leenders
(Eds.): Middle East Authoritarianisms: Governance, Contestation, and Regime Resilience in
Syria and Iran. (Stanford Studies in Middle Eastern and Islamic Societies and Cultures).
Stanford: Stanford University Press, 107-126.
Doornbos, Harald; Moussa, Jenan (2013, August 1): Blue-Eyed Jihad: An Exclusive
Conversation with European Radicals Fighting for an Islamic State in Syria. Foreign Policy.
URL: http://www.foreignpolicy.com/articles/2013/08/01/
we_will_win_this_fight_european_jihadists_syria
Doran, Michael S.; Shaikh, Salman (2011): Syria: The Ghosts of Hama. In: Kenneth M. Pollack
et al. (2011): The Arab Awakening: America and the Transformation of the Middle East.
Washington DC: Saban Center for Middle East Policy, Brookings Institution, 230-242.
Dorsey, James M. (2012): Syrian Soccer Star Symbolizes Game’s Importance in Protests. Syrian
Studies Association Bulletin, 17 (1). URL: https://ojcs.siue.edu/ojs/index.php/ssa/article/view/
2721
Dunia, Khawla (2013): And the Demonstrations Go On: Diary of an Unfinished Revolution
(Syria). [Translated by Robin Moger]. In: Layla Al-Zubaidi; Matthew Cassel (Eds.): Writing
Revolution: The Voices from Tunis to Damascus. London: I.B. Tauris, 179-208.
Düvell, Franck (2013): Turkey, the Syrian Refugee Crisis and the Changing Dynamics of
Transit Migration. In: European Institute of the Mediterranean (IEMed) (Ed.) (2013):
Mediterranean Yearbook 2013. Barcelona: IEMed, 278-281. URL: http://www.iemed.org/
observatori/arees-danalisi/arxius-adjunts/anuari/iemed-2013/Duvell%20Turkey%20Syrian
%20Refugees%20EN.pdf
Emadi, Hafizullah (2011): Requiem for the Baath Party: Struggle for Change and Freedom in
Syria. Mediterranean Quarterly, 22 (4), 62-79. DOI: http://dx.doi.org/
10.1215/10474552-1471512
Fildis, Ayse Tekdal (2012, Summer): Roots of Alawite-Sunni Rivalry in Syria. Middle East
Policy, 19(2), 148-156. DOI: http://dx.doi.org/10.1111/j.1475-4967.2012.00541.x
Fishman, Brian (2007): Fighting Fire with Fire: Destroying the Syrian Muslim Brotherhood.
In: James J. F. Forest (Ed.): Countering Terrorism and Insurgency in the 21st Century:
International Perspectives. (Vol. 3: Lessons from the Fight against Terrorism). Westport:
Praeger Security International, 430-442.
Fishman, Brian (2012, May): The Evidence of Jihadist Activity in Syria. CTC Sentinel, 5 (5),
4-10. URL: http://www.ctc.usma.edu/wp-content/uploads/2012/05/CTCSentinel-Vol5Iss5.pdf
Gavioli, Riccardo (2012): The Italian Reaction to the Syrian Crisis. Syrian Studies Association
Bulletin, 17(1). URL: https://ojcs.siue.edu/ojs/index.php/ssa/article/view/2718
Gelvin, James L. (2012): Two Surprises: Algeria and Syria. In: The Arab Uprisings: What
Everyone Needs to Know. New York: Oxford University Press, 93-118.
Gerlach, Daniel; Metzger, Nils (2013, February): Männer, die auf Leichen starren: Wie unser
Bild vom Krieg in Syrien entsteht. Aus Politik und Zeitgeschichte, 63 (8/2013), 3-11. URL:
http://www.bpb.de/system/files/dokument_pdf/APuZ_2013-08_online.pdf
Greig, J. Michael (2013, April): Intractable Syria? Insights from the Scholarly Literature on the
Failure of Mediation. Penn State Journal of Law & International Affairs, 2 (1), 48-56. URL:
http://elibrary.law.psu.edu/jlia/vol2/iss1/7/
Gudmundson, Per (2013, September): The Swedish Foreign Fighter Contingent in Syria. CTC
Sentinel, 6(9), 5-9. URL: http://www.ctc.usma.edu/wp-content/uploads/2013/09/CTCSentinel-
Vol6Iss9.pdf
Gunter, Michael M. (2013): The Kurdish Spring. Third World Quarterly, 34 (3), 441-457. DOI:
http://dx.doi.org/10.1080/01436597.2013.785339
Habeeb, William Mark (2012): Syria. In: The Middle East in Turmoil: Conflict, Revolution, and
Change. (Hot Spot Histories). Santa Barbara: Greenwood, 181-206.
Hanano, Amal (2013): Framing Syria. In: Iskandar, Adel; Haddad, Bassam (Eds.): Mediating
the Arab Uprisings. Washington DC: Tadween Publishing, 58-65.
Hashim, Ahmed S. (2013, March): On the Road to Damascus? Jihadists in the Syrian Civil
War. Counter Terrorist Trends and Analysis, 5 (3), 11-15. URL: http://www.pvtr.org/pdf/CTTA/
2013/CTTA-March13.pdf
Hegghammer, Thomas; Zelin, Aaron Y. (2013, July 7): How Syria's Civil War Became a Holy
Crusade: One of the World's Most Influential Clerics Declares War. Foreign Affairs. URL:
http://www.foreignaffairs.com/articles/139557/thomas-hegghammer-aaron-y-zelin/how-
syrias-civil-war-became-a-holy-crusade
Heras, Nicholas A. (2013, March): A Divided Society: The Impact of the Syrian Crisis on
Lebanon. Terrorism Monitor, 11(5), 5-7. URL: http://www.jamestown.org/uploads/media/
TM_011_Issue05_03.pdf
Heras, Nicholas A. (2013, May): Syrian Turkmen Join Opposition Forces in Pursuit of a New
Syrian Identity. Terrorism Monitor, 11(11), 4-6. URL: http://www.jamestown.org/uploads/
media/TM_011_Issue11_05.pdf
Heras, Nicholas A. (2013, October): The Battle for Syria’s Al-Hasakah Province. CTC Sentinel,
6 (10), 22-25. URL: http://www.ctc.usma.edu/wp-content/uploads/2013/10/CTCSentinel-
Vol6Iss10.pdf
Heydemann, Steven and Reinoud Leenders (2013): Authoritarian Governance in Syria and
Iran: Challenged, Reconfiguring, and Resilient. In: Steven Heydemann and Reinoud Leenders
(Eds.): Middle East Authoritarianisms: Governance, Contestation, and Regime Resilience in
Syria and Iran. (Stanford Studies in Middle Eastern and Islamic Societies and Cultures).
Stanford: Stanford University Press, 1-34.
Holtmann, Philipp (2013, June): Syria: A Best Case, a Worst Case and Two Most Likely
Scenarios. Perspectives on Terrorism, 7 (3), 135-146. URL: http://www.terrorismanalysts.com/
pt/index.php/pot/article/view/275
Hummel, Stephen (2013, September): The Risk of Non-State Actors Acquiring Chemical
Weapons in Syria. CTC Sentinel, 6 (9), 1-4. URL: http://www.ctc.usma.edu/wp-content/
uploads/2013/09/CTCSentinel-Vol6Iss9.pdf
Jaeger, Kinan; Tophoven, Rolf (2013, February): Der Syrien-Konflikt: Internationale Akteure,
Interessen, Konfliktlinien. Aus Politik und Zeitgeschichte, 63 (8/2013), 23-30. URL: http://
www.bpb.de/system/files/dokument_pdf/APuZ_2013-08_online.pdf
Jamestown Foundation, The (2012, December): A Profile of Syrian Jihadist Omar Bakri
Muhammad. Militant Leadership Monitor, 3 (12). URL: http://mlm.jamestown.org/single/?
tx_ttnews[tt_news]=40259&tx_ttnews[backPid]=591&no_cache=1#.UkGK4deZiOx
Jones, Seth G. (2013): Syria's Growing Jihad. Survival, 55 (4), 53-72. DOI: http://dx.doi.org/
10.1080/00396338.2013.823034
Joshi, Shashank; Stein, Aaron (2013, February-March): Not Quite “Zero Problems”: Ankara's
Troubles in Syria. The RUSI Journal, 158(1), 28-38. DOI: http://dx.doi.org/
10.1080/03071847.2013.774637 URL: http://shashankjoshi.files.wordpress.com/2009/12/
turkeysyrianato.pdf
Joubin, Rebecca (2012): Buq'at Dau' (Spotlight) Part 9 (2012): Tanfis (Airing), a Democratic
Facade, Delayed Retribution, and Artistic Craftiness. Syrian Studies Association Bulletin, 17(2).
URL: https://ojcs.siue.edu/ojs/index.php/ssa/article/view/2810
Katz, Mark N. (2013, Summer): Russia and the Conflict in Syria: Four Myths. Middle East
Policy, 20(2), 38-46. DOI: http://dx.doi.org/10.1111/mepo.12018
Katz, Mark N. (2013, June): The Impact of the Syrian Conflict on Russian Relations with other
Middle Eastern Countries. Russian Analytical Digest, 128, 2-4. URL: http://mercury.ethz.ch/
serviceengine/Files/ISN/165529/ipublicationdocument_singledocument/c74f93a7-
c54f-40bc-8bb9-0aa0fae46ad9/en/Russia+in+the+Syrian+Conflict.pdf
Khan, Veryan; Mitzcavitch, Andrew (2013, May): How Terrorists Cooperate: Perspectives on
Jabhat al-Nusra’s Links with Al Qaeda. Counter Terrorist Trends and Analysis, 5 (5), 6-10. URL:
http://www.pvtr.org/pdf/CTTA/2013/CTTA-May13.pdf
Khashan, Hilal (2013, Winter): Will Syria’s Strife Rip Lebanon Apart? Middle East Quarterly,
20 (1), 75-80. URL: http://www.meforum.org/3462/syria-civil-war-lebanon
Khashan, Hilal (2013, Spring): Hezbollah’s Plans for Lebanon. Middle East Quarterly, 20 (2),
81-86. URL: http://www.meforum.org/3534/hezbollah-lebanon
Kildron, Lance (2012, Winter): The Libyan Model and Strategy: Why it won't Work in Syria.
Journal of Strategic Security, 5(4), 35-50. DOI: http://dx.doi.org/10.5038/1944-0472.5.4.3
Kilo, Michel (2013): Syria … The Road to where? In: Khair El-Din Haseeb (Ed.) (2013): The
Arab Spring: Critical Analyses. Abingdon: Routledge, 159-172.
Kozhanov, Nikolay (2013): Russian Support for Assad’s Regime: Is There a Red Line? The
International Spectator, 48 (2), 25-31. DOI: http://dx.doi.org/10.1080/03932729.2013.796776
Krech, Hans (2012): Al Qaeda in the Levant and the Civil War in Syria. ORIENT, 3/2012,
45-50.
Landis, Joshua (2012, Spring): The Syrian Uprising of 2011: Why the Asad Regime is Likely to
Survive to 2013. Middle East Policy, 19 (1), 72-84. DOI: http://dx.doi.org/10.1111/j.
1475-4967.2012.00524.x
Lang, Jennifer (2013, July): Turkey’s Counterterrorism Response to the Syrian Crisis.
Terrorism Monitor, 11(14), 4-6. URL: http://www.jamestown.org/uploads/media/
TM_011_Issue14_03.pdf
Lange, Katharina (2013, February): Syrien: Ein historischer Überblick. Aus Politik und
Zeitgeschichte, 63 (8/2013), 37-43. URL: http://www.bpb.de/system/files/dokument_pdf/
APuZ_2013-08_online.pdf
Leenders, Reinoud (2013): Prosecuting Political Dissent: Courts and the Resilience of
Authoritarianism in Syria. In: Steven Heydemann and Reinoud Leenders (Eds.): Middle East
Authoritarianisms: Governance, Contestation, and Regime Resilience in Syria and Iran.
(Stanford Studies in Middle Eastern and Islamic Societies and Cultures). Stanford: Stanford
University Press, 169-199.
Lefèvre, Raphaël (2013): Between Pragmatism and Radicalism: The Syrian Muslim
Brotherhood and the Ba'ath Regime. In: George Joffé (Ed.): Islamist Radicalisation in Europe
and the Middle East: Reassessing the Causes of Terrorism. London: I.B. Tauris, 156-180.
Levitt, Matthew (2009, September): Foreign Fighters and their Economic Impact: A Case
Study of Syria and al-Qaeda in Iraq (AQI). Perspectives on Terrorism, 3 (3), 14-24. URL: http://
www.terrorismanalysts.com/pt/index.php/pot/article/view/74
Levitt, Matthew (2010, Winter): Syria's Financial Support for Jihad. Middle East Quarterly,
17(1), 39-48. URL: http://www.meforum.org/2579/syria-financial-support-jihad
Levitt, Matthew; Zelin, Aaron Y. (2013, August): Hizb Allah’s Gambit in Syria. CTC Sentinel, 6
(8), 14-17. URL: http://www.ctc.usma.edu/wp-content/uploads/2013/08/CTCSentinel-
Vol6Iss8.pdf
Lister, Charles (2013, August 29): New Fears for Syria’s Jihadists. The Middle East Channel.
URL: http://mideast.foreignpolicy.com/posts/2013/08/29/new_fears_for_syria_s_jihadists
Lister, Charles (2013, September 9): Syria's Insurgency beyond Good Guys and Bad Guys. The
Middle East Channel. URL: http://mideast.foreignpolicy.com/posts/2013/09/09/
syrias_insurgency_beyond_good_guys_and_bad_guys
Lister, Charles; Smyth, Phillip (2013, October 31): Syria's Multipolar War. The Middle East
Channel. URL: http://mideast.foreignpolicy.com/posts/2013/10/31/syrias_multipolar_war
Lund, Aron (2012, October 15): Holy Warriors: A Field Guide to Syria's Jihadi Groups. Foreign
Policy. URL: http://www.foreignpolicy.com/articles/2012/10/15/holy_warriors
Lund, Aron (2013, August): The Non-State Militant Landscape in Syria. CTC Sentinel, 6 (8),
23-28. URL: http://www.ctc.usma.edu/wp-content/uploads/2013/08/CTCSentinel-
Vol6Iss8.pdf
Ma’ayeh, Suha Philip (2013, October): Jordanian Jihadists Active in Syria. CTC Sentinel, 6 (10),
10-12. URL: http://www.ctc.usma.edu/wp-content/uploads/2013/10/CTCSentinel-
Vol6Iss10.pdf
Mohns, Erik; Bank, André (2012, Fall): Syrian Revolt Fallout: End of the Resistance Axis?
Middle East Policy, 19 (3), 25-35. DOI: http://dx.doi.org/10.1111/j.1475-4967.2012.00545.x
Morris, Justin (2013, September): Libya and Syria: R2P and the Spectre of the Swinging
Pendulum. International Affairs, 89(5), 1265-1283. DOI: http://dx.doi.org/
10.1111/1468-2346.12071 URL: http://www.chathamhouse.org/sites/default/files/public/
International%20Affairs/2013/89_5/89_5morris.pdf
Mousa, Salma (2012): To Protest or not to Protest? The Christian Predicament in the Syrian
Uprising. Syrian Studies Association Bulletin, 17 (2). URL: https://ojcs.siue.edu/ojs/index.php/
ssa/article/view/2802
Mucha, Witold (2013): Does Counterinsurgency Fuel Civil War? Peru and Syria Compared.
Critical Studies on Terrorism, 6 (1), 140-166. DOI: http://dx.doi.org/
10.1080/17539153.2013.765704
Murray, Donette (2013): Military Action but not as we Know it: Libya, Syria and the Making
of an Obama Doctrine. Contemporary Politics, 19 (2), 146-166. DOI: http://dx.doi.org/
10.1080/13569775.2013.785827
Napolitano, Valentina (2013, Fall): Hamas and the Syrian Uprising: A Difficult Choice. Middle
East Policy, 20 (3), 73-85. DOI: http://dx.doi.org/10.1111/mepo.12034
Nepstad, Sharon Erickson (2013, May): Mutiny and Nonviolence in the Arab Spring:
Exploring Military Defections and Loyalty in Egypt, Bahrain, and Syria. Journal of Peace
Research, 50 (3), 337-349. DOI: http://dx.doi.org/10.1177/0022343313476529
Noueihed, Lin; Warren, Alex (2012): The Struggle for Syria. In: The Battle for the Arab Spring:
Revolution, Counter-Revolution and the Making of a New Era. New Haven: Yale University
Press, 215-242.
Oehring, Otmar (2013, September): Die syrische Flüchtlingskrise als Folge des ungelösten
Syrien-Konflikts. KAS Auslandsinformationen, 9/2013, 67-85. URL: http://www.kas.de/wf/de/
33.35435/
O’Leary, Carole A.and Nicholas A. Heras. (2013, June): The Tribal Factor in Syria’s Rebellion:
A Survey of Armed Tribal Groups in Syria. Terrorism Monitor, 11(13), 10-13. URL: http://
www.jamestown.org/uploads/media/TM_011_Issue13_03.pdf
Panikoff, Jonathan (2013, May): Syria: The True Chaos will Begin after the Fall of the Regime.
Small Wars Journal, 5/2013. URL: http://smallwarsjournal.com/jrnl/art/syria-the-true-chaos-
will-begin-after-the-fall-of-the-regime
Pantucci, Raffaello (2012, November): China Claims Uyghur Militants are Seeking a Syrian
Battlefield. Terrorism Monitor, 10(22), 6-7. URL: http://www.jamestown.org/uploads/media/
TM_010_Issue22_01.pdf
Pantucci, Raffaello (2013, February): British Fighters Joining the War in Syria. CTC Sentinel,
6(2), 11-15. URL: http://www.ctc.usma.edu/wp-content/uploads/2013/02/CTCSentinel-
Vol6Iss2.pdf
Paust, Jordan J. (2013, April): Use of Military Force in Syria by Turkey, NATO, and the United
States. University of Pennsylvania Journal of International Law, 34 (2), 431-446. URL: https://
www.law.upenn.edu/live/files/2062-paust34upajintll4312012pdf
Perliger, Arie (2013, August): Israel’s Response to the Crisis in Syria. CTC Sentinel, 6 (8), 9-11.
URL: http://www.ctc.usma.edu/wp-content/uploads/2013/08/CTCSentinel-Vol6Iss8.pdf
Phillips, Christopher (2012): Syria's Torment. Survival, 54 (4), 67-82. DOI: http://dx.doi.org/
10.1080/00396338.2012.709389
Phillips, Christopher (2013): The Civil War in Syria: The Variety of Opposition to the Syrian
Regime. In: European Institute of the Mediterranean (IEMed) (Ed.) (2013): Mediterranean
Yearbook 2013. Barcelona: IEMed, 24-29. URL: http://www.iemed.org/observatori/arees-
danalisi/arxius-adjunts/anuari/iemed-2013/Phillips%20Opposition%20to%20Syrian
%20Regime%20EN.pdf
Pierret, Thomas (2013): The State Management of Religion in Syria: The End of "Indirect
Rule"? In: Steven Heydemann; Reinoud Leenders (Eds.): Middle East Authoritarianisms:
Governance, Contestation, and Regime Resilience in Syria and Iran. (Stanford Studies in Middle
Eastern and Islamic Societies and Cultures). Stanford: Stanford University Press, 83-106.
Pope, Hugh (2013, August): Turkey’s Tangled Syria Policy. CTC Sentinel, 6 (8), 4-8. URL:
http://www.ctc.usma.edu/wp-content/uploads/2013/08/CTCSentinel-Vol6Iss8.pdf
Price, Bryan (2013, August): Syria: A Wicked Problem for All. CTC Sentinel, 6 (8), 1-4. URL:
http://www.ctc.usma.edu/wp-content/uploads/2013/08/CTCSentinel-Vol6Iss8.pdf
Prucha, Nico and Ali Fisher (2013, June): Tweeting for the Caliphate: Twitter as the New
Frontier for Jihadist Propaganda. CTC Sentinel, 6(6), 19-23. URL: http://www.ctc.usma.edu/
wp-content/uploads/2013/06/CTCSentinel-Vol6Iss6.pdf
Rehman, Zia Ur (2013, September): Pakistani Fighters Joining the War in Syria. CTC Sentinel,
6(9), 9-11. URL: http://www.ctc.usma.edu/wp-content/uploads/2013/09/CTCSentinel-
Vol6Iss9.pdf
Rosiny, Stephan (2013): Syrien: Vom Bürgerkrieg zum regionalen Flächenbrand? GIGA Focus
Nahost, 8/2013. URL: http://www.giga-hamburg.de/de/system/files/publications/
gf_nahost_1308.pdf
Rosiny, Stephan (2013, Fall): Power Sharing in Syria: Lessons from Lebanon's Taif Experience.
Middle East Policy, 20 (3), 41-55. DOI: http://dx.doi.org/10.1111/mepo.12031
Rubin, Michael (2010, Winter): Syria's Path to Islamist Terror. Middle East Quarterly, 17(1),
27-37. URL: http://www.meforum.org/2513/syria-islamist-terrorism
Saab, Bilal Y. (2013, July): The Syrian Spillover and Salafist Radicalization in Lebanon. CTC
Sentinel, 6 (7), 8-12. URL: http://www.ctc.usma.edu/wp-content/uploads/2013/08/
CTCSentinel-Vol6Iss7.pdf
Sadjadpour, Karim (2013, August): Iran’s Unwavering Support to Assad’s Syria. CTC Sentinel, 6
(8), 11-13. URL: http://www.ctc.usma.edu/wp-content/uploads/2013/08/CTCSentinel-
Vol6Iss8.pdf
Salama, Vivian (2012, October): Covering Syria. The International Journal of Press/Politics, 17
(4), 516-526. DOI: http://dx.doi.org/10.1177/1940161212456774
Savelsberg, Eva (2013): The Kurdish Factor in the Syrian Revolution. Syrian Studies
Association Bulletin, 18 (1). URL: https://ojcs.siue.edu/ojs/index.php/ssa/article/view/2858
Scadlock, Ryan (2013, June): Fracture Lines: The Evaluating the Possibility of a Sectarian
Future for Syria. Small Wars Journal, 6/2013. URL: http://smallwarsjournal.com/jrnl/art/
fracture-lines-the-evaluating-the-possibility-of-a-sectarian-future-for-syria
Schumann, Christoph; Jud, Andrea (2013, February): Staatliche Ordnung und politische
Identitäten in Syrien. Aus Politik und Zeitgeschichte, 63(8/2013), 44-49. URL: http://
www.bpb.de/system/files/dokument_pdf/APuZ_2013-08_online.pdf
Seeberg, Peter (2013): The Arab Uprisings and the EU's Migration Policies: The Cases of
Egypt, Libya, and Syria. Democracy and Security, 9 (1-2), 157-176. DOI: http://dx.doi.org/
10.1080/17419166.2013.747909
Sen, Kasturi; Al-Faisal, Waleed; AlSaleh, Yaser (2013): Syria: Effects of Conflict and Sanctions
on Public Health. Journal of Public Health, 35 (2), 195-199. DOI: http://dx.doi.org/10.1093/
pubmed/fds090
Shammas, Michal (2013): Die Christen Syriens und ihre Angst vor Veränderung. In: Thorsten
Gerald Schneiders (Ed.): Der Arabische Frühling: Hintergründe und Analysen. Wiesbaden:
Springer, 181-190. DOI: http://dx.doi.org/10.1007/978-3-658-01174-1_11
Simon, Steven et al. (2013, Fall): Symposium: The Crisis in Syria: What are the Stakes for its
Neighbors? Middle East Policy, 20(3), 1-26. DOI: http://dx.doi.org/10.1111/mepo.12029 URL:
http://www.thechicagocouncil.org/UserFiles/File/Conferences/
symposium_crisisinsyria_nkhoury.pdf
Simpson, Charles (2011, Winter): Assessing the Arab Spring in Libya and Syria: A
Compilation of Varying Statements from Key Actors. Connections, 11(1), 55-67. URL: https://
pfpconsortium.org/de/journal-issue/connections-quarterly-journal-winter-2011
Smyth, Phillip (2013, Summer): The Popular Front for the Liberation of Palestine-General
Command (PFLP-GC) and the Syrian Civil War. Middle East Review of International Affairs,
17 (2), 55-72. URL: http://www.gloria-center.org/2013/08/the-popular-front-for-the-
liberation-of-palestine-general-command-pflp-gc-and-the-syrian-civil-war/
Smyth, Phillip (2013, August): From Karbala to Sayyida Zaynab: Iraqi Fighters in Syria’s Shi`a
Militias. CTC Sentinel, 6 (8), 28-32. URL: http://www.ctc.usma.edu/wp-content/uploads/
2013/08/CTCSentinel-Vol6Iss8.pdf
Sorenson, David S. (2013, Autumn): US Options in Syria. Parameters, 43 (3), 5-15. URL:
http://strategicstudiesinstitute.army.mil/pubs/parameters/issues/
Autumn_2013/1_Sorenson.pdf
Spyer, Jonathan (2012, Fall): Syrian Regime Strategy and the Syrian Civil War. Middle East
Review of International Affairs, 16 (3). URL: http://www.gloria-center.org/2012/11/syrian-
regime-strategy-and-the-syrian-civil-war/
Stanton, Andrea L. (2012): Visual Aspects of the Syrian Revolution. Syrian Studies Association
Bulletin, 17 (1). URL: https://ojcs.siue.edu/ojs/index.php/ssa/article/view/2722
Starr, Stephen (2012, November): Shabiha Militias and the Destruction of Syria. CTC Sentinel,
5 (11-12), 12-14. URL: http://www.ctc.usma.edu/wp-content/uploads/2012/11/CTCSentinel-
Vol5Iss11-125.pdf
Stern, Moran; Ross, Dennis (2013, Summer-Fall): The Role of Syria in Israeli-Turkish Relations.
Georgetown Journal of International Affairs, 14 (2), 115-128. URL: https://
www.washingtoninstitute.org/uploads/Documents/opeds/Ross20130731-
GeorgetownJournal.pdf
Szanto, Edith (2012): “Syria Love”: Watching Syrian Propaganda in Iraq. Syrian Studies
Association Bulletin, 17 (2). URL: https://ojcs.siue.edu/ojs/index.php/ssa/article/view/2806
Taheri, Amir (2013): Has the Time Come for Military Intervention in Syria? American Foreign
Policy Interests, 35 (4), 217-220. DOI: http://dx.doi.org/10.1080/10803920.2013.822756
Talhamy, Yvette (2012, Spring): The Muslim Brotherhood Reborn: The Syrian Uprising.
Middle East Quarterly, 19 (2), 33-40. URL: http://www.meforum.org/3198/syria-muslim-
brotherhood
Taşpınar, Ömer (2012, Summer): Turkey's Strategic Vision and Syria. The Washington
Quarterly, 35 (3), 127-140. DOI: http://dx.doi.org/10.1080/0163660X.2012.706519 URL:
http://csis.org/files/publication/twq12SummerTaspinar.pdf
Tawil, Camille (2013, March): Al-Qaeda in the Islamic Maghreb Calls on North African
Jihadists to Fight in Sahel, not Syria. Terrorism Monitor, 11(6), 5-6. URL: http://
www.jamestown.org/uploads/media/TM_011_Issue06_02.pdf
Terc, Mandy (2012): “Our Real Educated People:” Neoliberalism and Syria’s New Elites. Syrian
Studies Association Bulletin, 17 (2). URL: https://ojcs.siue.edu/ojs/index.php/ssa/article/view/
2804
Thakur, Ramesh (2013, Spring): R2P after Libya and Syria: Engaging Emerging Powers. The
Washington Quarterly, 36 (2), 61-76. DOI: http://dx.doi.org/10.1080/0163660X.2013.791082
URL: http://csis.org/files/publication/TWQ_13Spring_Thakur.pdf
Thomas, Andrew (2013, Fall): “Pariah States” and Sanctions: The Case of Syria. Middle East
Policy, 20 (3), 27-40. DOI: http://dx.doi.org/10.1111/mepo.12030
Troyansky, Vladimir (2012): Russia’s Support for al-Asad’s Syria: Reasons Old and New. Syrian
Studies Association Bulletin, 1 7(1). URL: https://ojcs.siue.edu/ojs/index.php/ssa/article/view/
2710
United States Military Academy, Defense and Strategic Studies Division (2013, September):
West Point’s Defense and Strategic Studies “War Council” Series. Small Wars Journal, 9/2013.
URL: http://smallwarsjournal.com/jrnl/art/west-point%E2%80%99s-defense-and-strategic-
studies-%E2%80%9Cwar-council%E2%80%9D-series
van Dam, Nikolaos (2013): Closing the Dutch Institutes in Bilad al-Sham. Syrian Studies
Association Bulletin, 18 (1). URL: https://ojcs.siue.edu/ojs/index.php/ssa/article/view/2845
van Wilgenburg, Wladimir (2013, July): Kurdish Rebels Look to Form Transitional
Government in Syria. Terrorism Monitor, 11(15), 5-6. URL: http://www.jamestown.org/
uploads/media/TM_011_Issue15_03.pdf
Wallsh, David (2013, Summer): Syrian Alliance Strategy in the Post-Cold War Era: The Impact
of Unipolarity. The Fletcher Forum of World Affairs, 37 (2), 107-123. URL: http://
www.fletcherforum.org/wp-content/uploads/2013/05/Wallsh-37-2.pdf
Watenpaugh, Keith David; Fricke, Adrienne; Siegel, Tara (2013): Excerpt from: Uncounted
and Unacknowledged: Syria’s Refugee University Students and Academics in Jordan. Syrian
Studies Association Bulletin, 18 (1). URL: https://ojcs.siue.edu/ojs/index.php/ssa/article/view/
2874
Weiss, Max (2013): Who Laughs Last: Literary Transformations of Syrian Authoritarianism.
In: Steven Heydemann and Reinoud Leenders (Eds.): Middle East Authoritarianisms:
Governance, Contestation, and Regime Resilience in Syria and Iran. (Stanford Studies in Middle
Eastern and Islamic Societies and Cultures). Stanford: Stanford University Press, 143-168.
Wieland, Carsten (2013, February): Das politisch-ideologische System Syriens und dessen
Zerfall. Aus Politik und Zeitgeschichte, 63(8/2013), 55-62. URL: http://www.bpb.de/system/
files/dokument_pdf/APuZ_2013-08_online.pdf
Zambelis, Chris (2012, July): Information Wars: Assessing the Social Media Battlefield in
Syria. CTC Sentinel, 5(7), 19-21. URL: http://www.ctc.usma.edu/wp-content/uploads/2012/07/
CTCSentinel-Vol5Iss7.pdf
Zambelis, Chris (2012, November): Hizb Allah’s Role in the Syrian Uprising. CTC Sentinel, 5
(11-12), 14-17. URL: http://www.ctc.usma.edu/wp-content/uploads/2012/11/CTCSentinel-
Vol5Iss11-125.pdf
Zambelis, Chris (2013, April): Ahrar al-Sham: A Profile of Northern Syria’s al-Qaeda
Surrogate. Terrorism Monitor, 11(7), 4-5. URL: http://www.jamestown.org/uploads/media/
TM_011_Issue07_02.pdf
Zambelis, Chris (2013, May): Lebanese Salafist Cleric Organizes Militia Forays into Syria.
Terrorism Monitor, 11(10), 6-7. URL: http://www.jamestown.org/uploads/media/
TM_011_Issue10_01.pdf
Zambelis, Chris (2013, August): Royal Rivalry in the Levant: Saudi Arabia and Qatar Duel
over Syria. Terrorism Monitor, 11(16), 9-12. URL: http://www.jamestown.org/uploads/media/
TM_011_Issue16_02.pdf
Zein, Huda (2013, February): Identitäten und Interessen der syrischen Oppositionellen. Aus
Politik und Zeitgeschichte, 63 (8/2013), 17-23. URL: http://www.bpb.de/system/files/
dokument_pdf/APuZ_2013-08_online.pdf
Zelin, Aaron Y. (2013, February): Deciphering the Jihadist Presence in Syria: An Analysis of
Martyrdom Notices. CTC Sentinel, 6 (2), 7-10. URL: http://www.ctc.usma.edu/wp-content/
uploads/2013/02/CTCSentinel-Vol6Iss2.pdf
Ziadeh, Radwan (2012): The Remnants of the Assad Regime. Syrian Studies Association
Bulletin, 17 (2). URL: https://ojcs.siue.edu/ojs/index.php/ssa/article/view/2799
Ziadeh, Radwan et al. (2012, Fall): Crisis in Syria: What are the U.S. Options? Middle East
Policy, 19 (3), 1-24. DOI: http://dx.doi.org/10.1111/j.1475-4967.2012.00544.x
Zisser, Eyal (2013, Spring): Can Assad's Syria Survive Revolution? Middle East Quarterly, 20
(2), 65-71. URL: http://www.meforum.org/3529/assad-syria-revolution
Grey Literature
Abboud. Samer (2013, August): Syria's Business Elite: Between Political Alignment and Hedging
their Bets. (SWP Comments 2013/C 22). URL: http://www.swp-berlin.org/en/publications/
swp-comments-en/swp-aktuelle-details/article/syrias_business_elite.html
Abramowitz, Morton I.; Edelman, Eric S. (2013, April): U.S.-Turkish Cooperation toward a
Post-Assad Syria. (BPC’s Turkey Task Force Paper). URL: http://bipartisanpolicy.org/sites/
default/files/BPC%20US-Turkey-Syria.pdf
Abrams, Elliott (2013, July): The Security Situation in the Syrian Arab Republic: Implications for
U.S. National Security and U.S. Policy Options. Testimony presented before the House Armed
Services Committee, United States House of Representatives, 1st Session, 113th Congress.
URL: http://www.cfr.org/syria/security-situation-syrian-arab-republic-implications-us-
national-security-us-policy-options/p31115
Al-Saleh, Asaad; White, Loren (2013, June): Dissecting an Evolving Conflict: The Syrian
Uprising and the Future of the Country. (ISPU / NAF Report). URL: http://newamerica.net/
publications/policy/dissecting_an_evolving_conflict
Al-Zubaidi, Layla; Khoury, Doreen; Atassi, Mohammad Ali (Eds.) (2012, February): Syria's
Revolution: Society, Power, Ideology. (Heinrich Böll Stiftung Middle East Office, Perspectives,
No. 3). URL: http://www.lb.boell.org/web/52-705.html
Amnesty International (2012, August): Syria: All-Out Repression: Purging Dissent in Aleppo,
Syria. (Report MDE 24/061/2012). URL: http://www.amnesty.org/en/library/info/
MDE24/061/2012
Analysis Intelligence (2013, March 1): Guide to Syrian Rebel Media Spokespeople and PR. URL:
http://analysisintelligence.com/geopolitics/guide-to-syrian-rebel-leadership-and-pr/
Analysis Intelligence (2013, September 17): Update on Syrian Rebel Media Coordinators. URL:
http://analysisintelligence.com/intelligence-analysis/syrian-rebel-media-coordinators-update/
Arab Center for Research and Policy Studies (ACRPS) (2011, May): The General and the
Particular in the Ongoing Syrian Popular Uprising. (Policy Analysis). URL: http://
english.dohainstitute.org/release/2b204584-1b7d-4caa-9495-e6eb07a7c136
Arab Center for Research and Policy Studies (ACRPS) (2012, January): Effects of Sanctions on
Syria’s Macroeconomy in 2012. (Policy Analysis). URL: http://english.dohainstitute.org/release/
a1eeff9a-1022-4e09-aaaf-fb27e7c454a7
Arab Center for Research and Policy Studies (ACRPS) (2012, February): The Positions of the
Syrian Opposition. (Policy Analysis). URL: http://english.dohainstitute.org/release/
a26839b3-5f87-4757-8e5d-ce4576ebbd80
Arab Center for Research and Policy Studies (ACRPS) (2013, January): Deadly Neighbors:
Jdaidet al-Fadl: A Paradigm for Sectarian Genocide in the Damascus Region. (Case Analysis).
URL: http://english.dohainstitute.org/release/e0405347-d2fc-4b34-9b8a-7ad3d9abae0a
Asseburg, Muriel; Wimmen, Heiko (2012, December): Civil War in Syria: External Actors and
Interests as Drivers of Conflict. (SWP Comments 2012/C 43). URL: http://www.swp-berlin.org/
en/publications/swp-comments-en/swp-aktuelle-details/article/
civil_war_in_syria_external_drivers_of_conflict.html
Baczko, Adam; Dorronsoro, Gilles; Quesnay, Arthur (2013, April): Building a Syrian State in a
Time of Civil War. (The Carnegie Papers, CP 175). URL: http://carnegieendowment.org/
2013/04/16/building-syrian-state-in-time-of-civil-war/fzrk
Badran, Tony (2013, June): Washington’s Syria Policy. Testimony presented before the House
Committee on Foreign Affairs, Subcommittee on the Middle East and North Africa, on June 5,
2013. URL: http://www.defenddemocracy.org/media-hit/testimony-the-white-houses-syria-
policy/
Barfi, Barak (2013, May): n.t. Testimony presented before the House Homeland Security
Committee, Subcommittee on Counterterrorism and Intelligence, on May 22, 2013. URL:
http://docs.house.gov/meetings/HM/HM05/20130522/100901/HHRG-113-HM05-Wstate-
BarfiB-20130522.pdf
Becker, Petra (2013): Syrian Muslim Brotherhood Still a Crucial Actor: Inclusivity the Order of
the Day in Dealings with Syria’s Opposition. (SWP Comments 2013/C 34). URL: http://
www.swp-berlin.org/en/publications/swp-comments-en/swp-aktuelle-details/article/
syrian_muslim_brotherhood_still_a_crucial_actor.html
Benotman, Noman and Blake, Roisin (2013, January): Jabhat al-Nusra li-ahl al-Sham min
Mujahedi al-Sham fi Sahat al-Jihad: A Strategic Briefing. (Quilliam Strategic Briefing). URL:
http://www.quilliamfoundation.org/wp/wp-content/uploads/publications/free/jabhat-al-
nusra-a-strategic-briefing.pdf
Benotman, Noman and Naseraldin, Emad (2012, September): The Jihadist Network in the
Syrian Revolution: A Strategic Briefing. (Quilliam Concept Paper). URL: http://
www.quilliamfoundation.org/wp/wp-content/uploads/publications/free/the-jihadist-network-
in-the-syrian-revolution.pdf
Berman, Asher (2012, October): Syrian Rebel Use of Social Media. (FPRI E-Notes, Middle East
Media Monitor). URL: http://www.fpri.org/articles/2012/10/syrian-rebel-use-social-media
Borghard, Erica D. (2013, August): Arms and Influence in Syria: The Pitfalls of Greater U.S.
Involvement. (CATO Institute Policy Analysis No. 734). URL: http://www.cato.org/
publications/policy-analysis/arms-influence-syria-pitfalls-greater-us-involvement
Briscoe, Ivan; Janssen, Floor; Smits, Rosan (2012, November): Stability and Economic Recovery
after Assad: Key Steps for Syria’s Post-Conflict Transition. (Clingendael Institute Report No. 2).
URL: http://www.clingendael.nl/publication/stability-and-economic-recovery-after-assad-key-
steps-syrias-post-conflict-transition
Brookings Doha Center (BDC) (2013, June): The Challenge of Syrian Unity: Reassuring Local
Communities and Framing National Consensus. (Syria Workshop Series Paper). URL: http://
www.brookings.edu/research/papers/2013/06/06-challenge-syrian-unity
Brown, Kevin (2013, May): The Syrian Crisis of 1957: A Lesson for the 21st Century. (CPD
Perspectives on Public Diplomacy, Paper 4, 2013). URL: http://uscpublicdiplomacy.org/
publications/perspectives/CPDPerspectives_Paper42013_Syria.pdf
Byman, Daniel L. et al. (2012, March): Saving Syria: Assessing Options for Regime Change.
(Saban Center Middle East Memo #21). URL: http://www.brookings.edu/research/papers/
2012/03/15-syria-saban
Cardash, Sharon L.; Cilluffo, Frank J.; Marret, Jean-Luc (2013, August): Foreign Fighters in
Syria: Still Doing Battle, Still a Multidimensional Danger. (FRS note n°24/13). URL: http://
www.frstrategie.org/barreFRS/publications/notes/2013/201324.pdf
Chatham House (2012, August): Syria: Prospects for Intervention. (Meeting Summary). URL:
http://www.chathamhouse.org/publications/papers/view/185299
Cobankiat, Randolph (2012, August-September): Addressing the Syrian Crisis Stalemate: How
will it End? (RIEAS Research Paper No. 159). URL: http://www.rieas.gr/images/rieas159.pdf
Committeri, Camilla (2012, October): When Domestic Factors Prevail Upon Foreign Ambitions:
Russia’s Strategic Game in Syria. (IAI Working Papers, 12 | 26). URL: http://www.iai.it/pdf/
DocIAI/iaiwp1226.pdf
Dalton, Melissa G. (2012, September): Asad Under Fire: Five Scenarios for the Future of Syria.
(CNAS Policy Brief). URL: http://www.cnas.org/files/documents/publications/
CNAS_AsadUnderFire_Dalton.pdf
Djerejian, Edward P.; Bowen, Andrew (2013, March): Syria at the Crossroads: U.S. Policy and
Recommendations for the Way Forward. (James A. Baker III Institute for Public Policy Paper).
URL: http://www.bakerinstitute.org/publications/BI-pub-SyriaReport-031813.pdf
Droz-Vincent, Philippe (2012, April): The “Dark Side” of the Syrian Transition and its
Potentially Dire Regional Consequences. (NOREF Policy Brief). URL: http://
www.peacebuilding.no/var/ezflow_site/storage/original/application/
816eb6ee5fb3b2088cc405c9d6e5dec8.pdf
Eeckelaert, Rouba Al-Fattal (2012, June): Electoral System in Future Syria. (SRCC Policy
Paper). URL: http://www.strescom.org/research/policy-papers/item/106-electoral-system-in-
future-syria.html
Engle, Eric (2012, July): Humanitarian Intervention and Syria: Russia, the United States, and
International Law. (Working Paper). URL: http://papers.ssrn.com/sol3/papers.cfm?
abstract_id=2115191
Erkmen, Serhat (2012, August): Kurdish Movements in Syria. (ORSAM Report No. 127). URL:
http://www.orsam.org.tr/en/showReport.aspx?ID=1859
Fargues, Philippe; Fandrich, Christine (2012): The European Response to the Syrian Refugee
Crisis: What Next? (MPC Research Report 2012/14). URL: http://
www.migrationpolicycentre.eu/docs/MPC%202012%2014.pdf
Fontaine, Richard et al. (2013, August): The Way Forward in Syria. (CNAS Commentaries).
URL: http://mercury.ethz.ch/serviceengine/Files/ISN/169041/
ipublicationdocument_singledocument/9e224579-f184-4f32-aa1c-f5a502187cc5/en/
CNAS_Syria_Commentaries_0.pdf
Friberg Lyme, Rune (2012): Sanctioning Assad’s Syria: Mapping the Economic, Socioeconomic
and Political Repercussions of the International Sanctions Imposed on Syria since March 2011.
(DIIS Report 2012:13). URL: http://subweb.diis.dk/sw124424.asp
Gambill, Gary C. (2013, August): Arms for Peace in Syria? (FPRI E-Notes). URL: http://
www.fpri.org/articles/2013/08/arms-peace-syria
Ghani, Ashraf; Lockhart, Clare (2013, July): Preparing for a Syrian Transition: Trust Funds:
Lessons from the Past, Thinking for the Future. (Legatum Institute / Institute for State
Effectiveness Memo). URL: http://www.li.com/publications/preparing-for-a-syrian-transition-
trust-funds-%28memo%29
Günay, Cengiz (2012, October): Interdependenzen: Wie die Dynamiken des Syrienkonfliktes den
Demokratisierungsprozess in der Türkei gefährden. (oiip Policy Paper 10/2012). URL: http://
www.oiip.ac.at/publikationen/policy-paper/publikationen-detail/article/93/interdependenzen-
wie-die-dynamiken-des-syrienkonfliktes-den-demokratisierungsprozess-in-der-tuerkei.html
Hammoud, Tariq (2013, February): Palestinian Refugees and the Syrian Revolution. (ACRPS
Research Paper). URL: http://english.dohainstitute.org/release/14e232ac-6d57-4de7-
b38e-79c1f3287231
Hassan, Salah (2012, October): Palestinians in Syria and the Syrian Uprising. (ACRPS Case
Analysis). URL: http://english.dohainstitute.org/file/get/42bbd969-e593-45be-a4ff-
cc55113be56c.pdf
Helfont, Tally (2011, November): Jordan’s Quandary over Syria. (FPRI E-Notes, Middle East
Media Monitor). URL: http://www.fpri.org/articles/2011/11/jordans-quandary-over-syria
Heydemann, Steven (2013, May): Syria's Uprising: Sectarianism, Regionalisation, and State
Order in the Levant. (FRIDE Working Paper No. 119). URL: http://fride.org/publication/1127/
syria%27s-uprising:-sectarianism,-regionalisation,-and-state-order-in-the-levant
Human Rights Watch (2013, October): “You Can Still See their Blood”: Executions,
Indiscriminate Shootings, and Hostage Taking by Opposition Forces in Latakia Countryside.
(Report). URL: http://www.hrw.org/reports/2013/10/10/you-can-still-see-their-blood
IntelCenter (2013, February): Rebel Logo ID Guide for Syria. v1.0. (Analytical Report). URL:
http://www.intelcenter.com/reports/IntelCenter-SyrianRebel-LogoIDGuide-
v1-0-17Feb2013.pdf
International Crisis Group (ICG) (2012, March): Now or Never: A Negotiated Transition for
Syria. (Middle East Briefing N°32). URL: http://www.crisisgroup.org/en/regions/middle-east-
north-africa/egypt-syria-lebanon/syria/B032-now-or-never-a-negotiated-transition-for-
syria.aspx
International Crisis Group (ICG) (2012, April): Syria’s Phase of Radicalisation. (Middle East
Briefing N°33). URL: http://www.crisisgroup.org/en/regions/middle-east-north-africa/egypt-
syria-lebanon/syria/b033-syrias-phase-of-radicalisation.aspx
International Crisis Group (ICG) (2012, August): Syria’s Mutating Conflict. (Middle East
Report N°128). URL: http://www.crisisgroup.org/en/regions/middle-east-north-africa/egypt-
syria-lebanon/syria/128-syrias-mutating-conflict.aspx
International Crisis Group (ICG) (2012, October): Tentative Jihad: Syria’s Fundamentalist
Opposition. (Middle East Report N°131). URL: http://www.crisisgroup.org/en/regions/middle-
east-north-africa/egypt-syria-lebanon/syria/131-tentative-jihad-syrias-fundamentalist-
opposition.aspx
International Crisis Group (ICG) (2012, November): A Precarious Balancing Act: Lebanon and
the Syrian Conflict. (Middle East Report N°132). URL: http://www.crisisgroup.org/en/regions/
middle-east-north-africa/egypt-syria-lebanon/lebanon/132-a-precarious-balancing-act-
lebanon-and-the-syrian-conflict.aspx
International Crisis Group (ICG) (2013, January): Syria’s Kurds: A Struggle within a Struggle.
(Middle East Report N°136). URL: http://www.crisisgroup.org/en/regions/middle-east-north-
africa/egypt-syria-lebanon/syria/136-syrias-kurds-a-struggle-within-a-struggle.aspx
International Crisis Group (ICG) (2013, April): Blurring the Borders: Syrian Spillover Risks for
Turkey. (Europe Report N°225). URL: http://www.crisisgroup.org/en/regions/europe/turkey-
cyprus/turkey/225-blurring-the-borders-syrian-spillover-risks-for-turkey.aspx
International Crisis Group (ICG) (2013, May): Too Close for Comfort: Syrians in Lebanon.
(Middle East Report N°141). URL: http://www.crisisgroup.org/en/regions/middle-east-north-
africa/egypt-syria-lebanon/lebanon/141-too-close-for-comfort-syrians-in-lebanon.aspx
International Crisis Group (ICG) (2013, June): Syria’s Metastasising Conflicts. (Middle East
Report N°143). URL: http://www.crisisgroup.org/en/regions/middle-east-north-africa/egypt-
syria-lebanon/syria/143-syrias-metastasising-conflicts.aspx
International Crisis Group (ICG) (2013, October): Anything but Politics: The State of Syria’s
Political Opposition. (Middle East Report N°146). URL: http://www.crisisgroup.org/en/
regions/middle-east-north-africa/egypt-syria-lebanon/syria/146-anything-but-politics-the-
state-of-syria-s-political-opposition.aspx
Iyengar, Radha; Fishman, Brian (2013, March): The Conflict in Syria: An Assessment of US
Strategic Interests. (NAF Policy Paper). URL: http://newamerica.net/publications/policy/
the_conflict_in_syria
Jones, Seth G. (2013, May): The Terrorist Threat from Syria. Testimony presented before the
House Homeland Security Committee, Subcommittee on Counterterrorism and Intelligence,
on May 22, 2013. (RAND Testimonies, CT-388). URL: http://www.rand.org/pubs/testimonies/
CT388.html
Joscelyn, Thomas (2013, May): n.t. Testimony presented before the House Homeland Security
Committee, Subcommittee on Counterterrorism and Intelligence, on May 22, 2013. URL:
http://docs.house.gov/meetings/HM/HM05/20130522/100901/HHRG-113-HM05-Wstate-
JoscelynT-20130522.pdf
Joscelyn, Thomas (2013, September): n.t. Testimony presented before the House Committee
on Homeland Security, United States Congress, on September 10, 2013. URL: http://
docs.house.gov/meetings/HM/HM00/20130910/101297/HHRG-113-HM00-Wstate-
JoscelynT-20130910.pdf
Kemp, Richard et al. (2012, July): A Collision Course for Intervention. (RUSI Syria Crisis
Briefing). URL: http://www.rusi.org/analysis/commentary/ref:C500F639757A57/
#.Uklt2teZiOw
Khoury, Doreen (2013, February): Losing the Syrian Grassroots: Local Governance Structures
Urgently Need Support. (SWP Comments 2013/C 09). URL: http://www.swp-berlin.org/en/
publications/swp-comments-en/swp-aktuelle-details/article/
losing_the_syrian_grassroots.html
Lang, Tobias; Günay, Cengiz (2011, November): Regionale Auswirkungen der Entwicklungen in
Syrien am Beispiel des Libanon. (oiip Policy Paper 2011/3). URL: http://www.oiip.ac.at/
publikationen/policy-paper/publikationen-detail/browse/1/article/93/regionale-
auswirkungen-der-entwicklungen-in-syrien-am-beispiel-des-libanon.html
Laub, Zachary; Masters, Jonathan (2013, September): Syria's Crisis and the Global Response.
(CFR Backgrounder). URL: http://www.cfr.org/syria/syrias-crisis-global-response/p28402
Lefèvre, Raphaël (2013, May): The Muslim Brotherhood Prepares for a Comeback in Syria. (The
Carnegie Papers, CP 182). URL: http://carnegieendowment.org/2013/05/15/muslim-
brotherhood-prepares-for-comeback-in-syria/g3hz
Lund, Aron (2012, September): Syrian Jihadism. (UI Brief No. 13). URL: http://www.ui.se/upl/
files/77409.pdf
Lund, Aron (2013): Syria's Salafi Insurgents: The Rise of the Syrian Islamic Front. (UI
Occasional Paper #17). URL: http://www.ui.se/eng/upl/files/86861.pdf
Lund, Aron (2013, May): Struggling to Adapt: The Muslim Brotherhood in a New Syria. (The
Carnegie Papers, CP 181). URL: http://carnegieendowment.org/2013/05/07/struggling-to-
adapt-muslim-brotherhood-in-new-syria/g2qm
Lynch, Marc (2012, February): Pressure not War: A Pragmatic and Principled Policy towards
Syria. (CNAS Policy Brief). URL: http://www.cnas.org/files/documents/publications/
CNAS_PressureNotWar_Lynch.pdf
MacDonald, Norine et al. (2012, December): Syria: A Way Forward. (ICOS Report). URL:
http://www.icosgroup.net/2012/report/syria-a-way-forward/
Mahfudh, `Aqeel (2012, February): Syria and Turkey: A Turning Point or a Historical Bet?
(ACRPS Research Papers). URL: http://english.dohainstitute.org/release/76083ffb-37aa-4145-
b325-74888156a54d
Malmvig, Helle (2013, August): Ambiguous Endings: Middle East Regional Security in the Wake
of the Arab Uprisings and the Syrian Civil War. (DIIS Report 2013:23). URL: http://en.diis.dk/
home/news/2013/ambiguous+endings+arab+uprisings+syria
Martini, Jeffrey; York, Erin; Young, William (2013): Syria as an Arena of Strategic Competition.
(RAND Research Reports, RR-213). URL: http://www.rand.org/pubs/research_reports/
RR213.html
Masters, Jonathan; Laub, Zachary (2013, October): Al-Qaeda in Iraq (a.k.a. Islamic State in
Iraq and Greater Syria). (CFR Backgrounder). URL: http://www.cfr.org/iraq/al-qaeda-iraq-k-
islamic-state-iraq-greater-syria/p14811
McCants, William et al. (2013, September): Aiding Civilians in a Sectarian Conflict: Can
Assistance to Syria Heal without Harm? (The Brookings Institution Panel Discussion
Proceedings). URL: http://www.brookings.edu/~/media/events/2013/9/23%20syria
%20civilian%20aid/20130923_aiding%20civilians_transcript.pdf
Meier, Oliver (2013, June): Chemiewaffen in Syrien: Wie sich die Bedrohung verringern lässt.
(SWP-Aktuell 2013/A 36). URL: http://www.swp-berlin.org/de/publikationen/swp-aktuell-de/
swp-aktuell-detail/article/chemiewaffen_in_syrien.html
Mohamed, Saira (2012, March): The U.N. Security Council and the Crisis in Syria. (ASIL
Insights, Vol. 16, Iss. 11). URL: http://www.asil.org/insights/volume/16/issue/11/un-security-
council-and-crisis-syria
Naftalin, Mark; Harpviken, Kristian Berg (2012, September): Rebels and Refugees: Syrians in
Southern Turkey. (PRIO Policy Brief 10/2012). URL: http://www.prio.no/Publications/
Publication/?x=5200
Nahar, Hazem (2012, January): The Discourse and Performance of the Syrian Opposition: Since
the Beginning of the Revolution. (Heinrich Böll Stiftung Middle East Office Study). URL: http://
www.lb.boell.org/web/52-788.html
Naufal, Hala (2012): Syrian Refugees in Lebanon: The Humanitarian Approach under Political
Divisions. (MPC Research Report 2012/13). URL: http://www.migrationpolicycentre.eu/docs/
MPC%202012%2013.pdf
Nerguizian, Aram (2011, December): Assessing the Risks of Military Intervention. (CSIS
Working Draft). URL: http://csis.org/publication/instability-syria
Nikitin, Mary Beth D.; Kerr, Paul K.; Feickert, Andrew (2013, September): Syria’s Chemical
Weapons: Issues for Congress. (CRS Report for Congress R42848). URL: http://www.fas.org/
sgp/crs/nuke/R42848.pdf
Orhan, Oytun (2012, August): Syrian Christians in the Dilemma of Chaos and
Authoritarianism. (Orsam Foreign Policy Analysis). URL: http://www.orsam.org.tr/en/
showArticle.aspx?ID=1858
O’Sullivan, Niamh Maria (2012, August): The Moral Enigma of an Intervention in Syria: A Just
War Analysis. (IAI Working Papers, 12 | 22). URL: http://www.iai.it/pdf/DocIAI/
iaiwp1222.pdf
Popp, Roland (2012, November): The Syrian Civil War: Between Escalation and Intervention.
[Translated by Christopher Findlay]. (CSS Analysis in Security Policy No. 124). URL: http://
www.css.ethz.ch/publications/pdfs/CSS-Analysis-124-EN.pdf
Portela, Clara (2012, September): The EU’s Sanctions against Syria: Conflict Management by
Other Means. (Egmont Security Policy Brief No. 38). URL: http://www.egmontinstitute.be/
papers/12/sec-gov/SPB38.pdf
Prucha, Nico; and Ali Fisher (2013, April 27): Jihadi Twitter Activism: Introduction. Jihadica.
URL: http://www.jihadica.com/jihadi-twitter-activism-introduction/
Prucha, Nico and Ali Fisher (2013, May 13): Jihadi Twitter Activism Part 2: Jabhat al-Nusra on
the Twittersphere. Jihadica. URL: http://www.jihadica.com/jihadi-twitter-activism-part-2-
jabhat-al-nusra-on-the-twittersphere/#more-1746
Prucha, Nico and Ali Fisher (2013, August 20): The “Who’s Who” of the Most Important Jihadi
Accounts on Twitter? Jihadica. URL: http://www.jihadica.com/the-%E2%80%98who
%E2%80%99s-who%E2%80%99-of-the-most-important-jihadi-accounts-on-twitter/
Prucha, Nico and Ali Fisher (2013, September 4): 66 Important Jihadist Twitter Accounts (Part
2). Jihadica. URL: http://www.jihadica.com/66-important-jihadist-twitter-accounts-part-2/
Public International Law & Policy Group (PILPG) (2012, March): Planning for Syria’s “Day
After”: Security, Rule of Law & Democracy. (Policy Planning Paper). URL: http://
publicinternationallawandpolicygroup.org/wp-content/uploads/2012/03/PILPG-Report-
Planning-for-Syrias-Day-After.pdf
Qabalan, Marwan (2013, August): The Armed Syrian Opposition: Common Aim but no Vision.
(ACRPS Research Paper). URL: http://english.dohainstitute.org/release/
4bd15c98-978f-427c-9856-3cb727a56f5b
Rabinovich, Itamar (2012, November): Israel’s View of the Syrian Crisis. (Saban Center
Analysis Paper Series, No. 28). URL: http://www.brookings.edu/research/papers/2012/11/
israel-syria-rabinovich
Saleh, Layla (2013, May): Syrian Perceptions of U.S. Intervention in Syria. (FPRI E-Notes,
Middle East Media Monitor). URL: http://www.fpri.org/docs/MEMM_2013_05_Saleh_-
_Syria.pdf
Salem, Paul (2012, December): Can Lebanon Survive the Syrian Crisis? (The Carnegie Papers,
CMEC 35). URL: http://carnegieendowment.org/2012/12/11/can-lebanon-survive-syrian-
crisis/escs
Sayigh, Yezid (2013, April): The Syrian Opposition’s Leadership Problem. (The Carnegie Papers,
CMEC 39). URL: http://carnegie-mec.org/2013/04/03/syrian-opposition-s-leadership-
problem/fx6u
Schaller, Christian (2013, September): Der Bürgerkrieg in Syrien, der Giftgas-Einsatz und das
Völkerrecht. (SWP-Aktuell 2013/A 54). URL: http://www.swp-berlin.org/de/publikationen/
swp-aktuell-de/swp-aktuell-detail/article/
syrien_buergerkrieg_giftgas_einsatz_voelkerrecht.html
Shaikh, Salman (2012, October): Losing Syria (and how to Avoid it). (BDC Publications, No.
17). URL: http://www.brookings.edu/research/papers/2012/10/18-losing-syria-shaikh
Sharp, Jeremy M.; Blanchard, Christopher M. (2013, September): Armed Conflict in Syria:
Background and U.S. Response. (CRS Report RL33487). URL: http://www.fas.org/sgp/crs/
mideast/RL33487.pdf
Simcox, Robin (2013, May): n.t. Testimony presented before the House Homeland Security
Committee, Subcommittee on Counterterrorism and Intelligence, on May 22, 2013. URL:
http://docs.house.gov/meetings/HM/HM05/20130522/100901/HHRG-113-HM05-Wstate-
SimcoxR-20130522.pdf
Spath, Andrew (2012, January): Opposition Groups in Syria: Myths and Realities. (FPRI E-
Notes, Middle East Media Monitor). URL: http://www.fpri.org/articles/2012/01/opposition-
groups-syria-myths-and-realities
Stansfield, Gareth (2013, July): The Remaking of Syria, Iraq and the Wider Middle East: The End
of the Sykes-Picot State System? (RUSI Briefing Paper). URL: http://www.rusi.org/publications/
other/ref:O51E67CF061C2A/
Steinberg, Guido (2012, February): Katar und der Arabische Frühling: Unterstützung für
Islamisten und anti-syrische Neuausrichtung. (SWP-Aktuell 2012/A 07). URL: http://www.swp-
berlin.org/de/publikationen/swp-aktuell-de/swp-aktuell-detail/article/
katar_und_der_arabische_fruehling.html
Steinberg, Guido (2013, August): Der Irak und der syrische Bürgerkrieg: Syrien ist Anlass für die
Gewalteskalation im Irak, Ursache ist aber Malikis Autoritarismus. (SWP-Aktuell 2013/A 46).
URL: http://www.swp-berlin.org/de/publikationen/swp-aktuell-de/swp-aktuell-detail/article/
irak_und_der_syrische_buergerkrieg.html
The Day After Association (TDA): The Day After Project: Supporting a Democratic Transition
in Syria. URL: http://www.tda-sy.org/wp-content/uploads/2013/06/The-Day-After_EN.pdf
Trenin, Dmitri (2013, February): The Mythical Alliance: Russia’s Syria Policy. (The Carnegie
Papers, CP 173). URL: http://carnegie.ru/publications/?fa=50909
Ulph, Stephen (2006): Jihadi After Action Report: Syria. (CTC Report). URL: http://
www.dtic.mil/cgi-bin/GetTRDoc?AD=ADA458486
Varghese, Anand (2013, June): Social Media Reporting and the Syrian Civil War. (USIP Peace
Brief 151). URL: http://www.usip.org/publications/social-media-reporting-and-the-syrian-
civil-war
White, Jeffrey; Tabler, Andrew J.; Zelin, Aaron Y. (2013, September): Syria’s Military
Opposition: How Effective, United, or Extremist? (The Washington Institute Policy Focus 128).
URL: http://www.washingtoninstitute.org/uploads/Documents/pubs/
PolicyFocus128WhiteTablerZelin.pdf
Zelin, Aaron Y. (2013, April): European Foreign Fighters in Syria. (ICSR Insights). URL: http://
icsr.info/2013/04/icsr-insight-european-foreign-fighters-in-syria-2/
Zelin, Aaron Y. (2013, September): Al-Qaeda in Syria: A Closer Look at ISIS (Part I). (The
Washington Institute Policywatch 2137). URL: http://www.washingtoninstitute.org/policy-
analysis/view/al-qaeda-in-syria-a-closer-look-at-isis-part-i
Zelin, Aaron Y. (2013, September): Al-Qaeda in Syria: A Closer Look at ISIS (Part II). (The
Washington Institute Policywatch 2138). URL: http://www.washingtoninstitute.org/policy-
analysis/view/al-qaeda-in-syria-a-closer-look-at-isis-part-ii
Zelin, Aaron Y.; Kohlmann, Evan F.; al-Khouri, Laith (2013, June): Convoy of Martyrs in the
Levant: A Joint Study Charting the Evolving Role of Sunni Foreign Fighters in the Armed
Uprising against the Assad Regime in Syria. (Flashpoint Partners Joint Study). URL: https://
flashpoint-intel.com/upload/syria_martyrs/2013-06-02_Convoy_of_Martyrs_Report.pdf
About the Compiler: Judith Tinnes, Ph.D., studied Information Science and New German
Literature and Linguistics at the Saarland University (Germany). Her doctoral thesis dealt with
Internet usage of Islamist terrorists and insurgents. Currently she works in the research &
development department of the Leibniz Institute for Psychology Information (ZPID) (http://
www.zpid.de). She also serves as Editorial Assistant for ‘Perspectives on Terrorism’.
Ahmed, Shamila Kouser (2012) The impact of the 'war on terror' on Birmingham's Pakistani/
Kashmiri Muslims' perceptions of the state, the police and Islamic identities. University of
Birmingham, U.K.
[http://etheses.bham.ac.uk/3635/]
Ahrnens, Anette (2007) A Quest for legitimacy: Debating UN Security Council rules on
terrorism and non-proliferation. Lund University, Sweden.
[http://www.lunduniversity.lu.se/o.o.i.s?id=12683&postid=26860]
Al-Ajmi, Thaqal Saad (2003) Legal responses to terrorism with special reference to the position of
Kuwait. Aberystwyth University, U.K.
[http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.411353]
Albuquerque, Nazare Alves de (1993) The contemporary European response to political crime: a
study of the European Community, France and the United Kingdom. University of Reading, U.K.
[http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.336062]
Alexander, Deanna Wimmer (2001) How could this happen? A constructivist analysis of
reactive state terrorism at Ruby Ridge. Virginia Tech University, U.S.A.
[http://scholar.lib.vt.edu/theses/available/etd-04202001-163258/]
Al-Harbi, Adnam Noori (2005) A comparative study of Western and Middle Eastern newspaper
responses to 9/11 and the 'War on terror'. University of Ulster, U.K.
[http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.421767]
Ali, Murad (2012) The politics of development aid: the allocation and delivery of aid from the
United States of America to Pakistan. Massey University, New Zealand.
[http://hdl.handle.net/10179/3418]
Allan, Matthew W. (2010) The legal-military dilemma in the response to international terrorism.
Texas A&M University, U.S.A.
[http://hdl.handle.net/1969.1/ETD-TAMU-2009-12-7331]
Alon, Hanan (1980) Countering Palestinian terrorism in Israel: Toward a policy analysis of
countermeasures. The RAND Graduate School, U.S.A.
[http://www.rand.org/pubs/notes/N1567.html]
Alrahoomi, Juma (2011) The policing of money laundering: The role of the Dubai police.
Northumbria University, U.K.
[http://nrl.northumbria.ac.uk/4455/]
Altenbern, Mikaila Ellis Fethke (2013) Prospects for resolving conflicts involving religious
terrorists: Afghanistan, the Taliban, and strategic jihad. George Mason University, U.S.A.
[http://hdl.handle.net/1920/7991]
[https://hydra.hull.ac.uk/resources/hull:6064]
Alzubairi, Fatemah (2011) Kuwait and Bahrain’s anti-terrorism laws in comparative and
international perspective. University of Toronto, Canada.
[http://hdl.handle.net/1807/30158]
Anstee, Jodie (2008) Constructivism, contestation and the international detention regime.
University of Exeter, U.K.
[https://ore.exeter.ac.uk/repository/handle/10036/70953]
Asthappan, Jibey (2009) Stealing their thunder: The effectiveness of military force in deterring
terrorism. The American University, U.S.A.
[http://udini.proquest.com/view/stealing-their-thunder-the-pqid:1907691871/]
Avihai, Hillel (2006) Evolution and escalation of aviation terrorism: From bargaining chip
fashion to total destruction orientation. Anglia Ruskin University, U.K.
[http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.436461]
Ayer, Jennifer (2008) Global terrorism: What countries suffer most? Georgetown University,
U.S.A.
[http://hdl.handle.net/10822/555896]
Ayoughi, Sarah (2013) Mental health consequences of war, internal conflict and disrupting living
conditions: The case of Afghanistan. Universität Konstanz, Germany.
[http://kops.ub.uni-konstanz.de/bitstream/handle/urn:nbn:de:bsz:352-243990/
Dissertation_S.Ayoughi.pdf?sequence=3]
Bærentzen, Marc (2012) The dilution of terrorism: Internship report at the International Center
for Terrorism Studies. Roskilde University, Denmark.
[http://rudar.ruc.dk/handle/1800/8627]
[http://rudar.ruc.dk/handle/1800/12503]
Bagans, Laura (2011) Crises in the tourism industry and their effects on young travelers.
HAAGA-HELIA Ammattikorkeakoulu, Finland.
[http://publications.theseus.fi/handle/10024/32631]
Bakar, Ayhan (2011) Justice and home affairs: impact of the European Union on the internal
security of Turkey. University of Nottingham, U.K.
[http://etheses.nottingham.ac.uk/3103/]
Baker, Anthony (2009) Countering terrorism in the UK: A convert community perspective.
University of Exeter, U.K.
[http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.510929]
Barnidge, Robert Perry (2008) Non-state actors and terrorism: applying the Law of State
Responsibility and the due diligence principle. Queen's University Belfast, U.K.
[http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.446138]
Barley, Ruth (2013) An anthropological exploration of identity and social interaction in a multi-
ethnic classroom. Sheffield Hallam University, U.K.
[http://shura.shu.ac.uk/7040/]
Bartlett, Brian Christopher (2010) Do less-free countries produce more terrorism? Georgetown
University U.S.A.
[http://hdl.handle.net/10822/558156]
Battaglia, Adria (2011) The rhetoric of ‘free speech’ regulating dissent since 9/11. University of
Texas - Austin, U.S.A.
[http://hdl.handle.net/2152/ETD-UT-2010-05-877]
Bauhn, Per (1989) Ethical aspects of political terrorism: the sacrificing of the innocent. Lunds
Universitet, Sweden.
[http://catalog.crl.edu/record=b1849561~S1]
[http://eprints.soton.ac.uk/266401/]
[http://hdl.handle.net/10138/38235]
Berger, Michael Andrew (2010) How resisting democracies can defeat substate terrorism:
Formulating a theoretical framework for strategic coercion against nationalistic substate terrorist
organizations. St Andrews University, U.K.
[http://research-repository.st-andrews.ac.uk/handle/10023/889]
Berrebi, Claude (2004) The causes and consequences of terrorism. Princeton University, U.S.A.
[http://www.gbv.de/dms/zbw/546799698.pdf]
Beyer, Anna Cornelia (2009) Counter-terrorism and international power relations: the EU,
ASEAN and hegemonic global governance. University of Hull, U.K.
[https://hydra.hull.ac.uk/resources/hull:2394]
Biggio, Nancy Connors (2002) The rationality of the use of terrorism by secular and religious
groups. University of Alabama, U.S.A.
[http://classify.oclc.org/classify2/ClassifyDemo?swid=52615487]
Binodah, Abdullah M. (2006) U.S. foreign policy in the Middle East and the Bush War on
Terror: Elite opinion and the failure of U.S. strategy. University of Sheffield, U.K.
[http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.434613]
Blanc, J.H.C. le (2012) Political violence in Latin America. A cross-case comparison of the urban
insurgency campaigns of Montoneros, M-19, and FSLN in a historical perspective. Universiteit
Utrecht, the Netherlands.
[http://igitur-archive.library.uu.nl/dissertations/2012-0614-200540/UUindex.html]
Boukalas, Christos (2007) Empire and Reich: War on terrorism and the political metalaxis of the
U.S. Lancaster University, U.K.
[http://ethos.bl.uk/OrderDetails.do?did=1&uin=uk.bl.ethos.507088]
Bradshaw, Renee (2008) The public's view of terrorism in their communities as related to media-
viewing habit. University of Texas - Arlington, U.S.A.
[http://hdl.handle.net/10106/1061]
Brannan, David (2007) Violence, terrorism and the role of theology: Repentant and rebellious
Christian identity. St. Andrews University, U.K.
[http://research-repository.st-andrews.ac.uk/handle/10023/342]
Brown, David (2001) Aspects of the area of freedom, security and justice: Assessing the progress
made, commitment expressed and legitimacy of the implementation processes of European police
cooperation and counter terrorism. University of Aberdeen, U.K.
[http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.275033]
Buckle, Christopher (2011) The 'War on Terror' metaframe in film and television. University of
Glasgow, U.K.
[http://theses.gla.ac.uk/3014/]
Buis, Claire-Lise (2008) Démocratie(s) à l'épreuve; Discours sur l'ennemi intérieur et identité
démocratique dans les débats parlementaires français et allemands depuis la fin des années
soixante [in French and in German] Freie Universität Berlin, Germany.
[http://www.diss.fu-berlin.de/diss/receive/FUDISS_thesis_000000034796]
Bunn, Matthew (2007) Guardians at the Gates of Hell: Estimating the risk of nuclear theft and
terrorism, and identifying the highest-priority risks of nuclear theft. Massachusetts Institute of
Technology (MIT), U.S.A.
[http://hdl.handle.net/1721.1/39006]
Butram, Matthew (2008) The effect of increased customs scrutiny on legal entrance into the
United States. Georgetown University, U.S.A.
[http://hdl.handle.net/10822/555879]
Bzostek, Rachel Tamara (2005) Why not preempt? An analysis of the impact of legal and
normative constraints on the use of anticipatory military activities. Louisiana State University,
U.S.A.
[http://etd.lsu.edu/docs/available/etd-06302005-104805/]
Cale, Jesse L. (2004) Issue terrorism: An analysis of trends in North America. Simon Fraser
University, Canada.
[http://summit.sfu.ca/item/7053]
Capper, David (2003) The effects of terrorism on the decision-making process of tourists.
University of Surrey, U.K.
[http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.288643]
Carley, Stephen (2007) Testing the President's hypothesis: Are terrorist attacks the result of
freedom in the world? Georgetown University, U.S.A.
[http://hdl.handle.net/10822/555820]
[http://umu.diva-portal.org/smash/record.jsf?pid=diva2:217436]
Case, Erik S. (2009) State level causes of terrorism: Limits on political expression. University of
North Texas, U.S.A.
[http://digital.library.unt.edu/ark:/67531/metadc12092/]
[http://repository.uwa.edu.au:80/R/?func=dbin-jump-
full&object_id=12657&local_base=GEN01-INS01]
Celton, Julie (2007) Security over privacy: Who is to blame? Looking beyond U.S. influence for
the real drivers of European policy change. Georgetown University, U.S.A.
[http://hdl.handle.net/10822/551564]
Cetin, Hakan (2010) The effectiveness of the witness security program in the fight against
organized crime and terrorism a case study of the United States and Turkey. Rutgers University,
U.S.A.
[http://hdl.rutgers.edu/1782.2/rucore10002600001.ETD.000052832]
[http://etheses.nottingham.ac.uk/924/]
Chang, Chieh (2009) Global trade, 9/11 attacks, and customs organizations in comparative
perspectives. Rutgers University, U.S.A.
[http://hdl.rutgers.edu/1782.2/rucore10002600001.ETD.000051641]
Chang, Yih (2011) Comprehensive security and cooperative security in Southeast Asia: ASEAN's
and the ARF's responses to non-traditional security issues in the post-Cold War era. University
of New South Wales, Australia.
[http://handle.unsw.edu.au/1959.4/51770]
[http://hdl.handle.net/10023/2091]
[http://wrap.warwick.ac.uk/51358/]
Chehade, Ghada (2013) Anti-terrorism discourse and the war on dissent: A critical analysis.
McGill University, Canada.
[http://digitool.library.mcgill.ca/thesisfile117017.pdf]
Cheong, Marc (2013) Inferring social behavior and interaction on twitter by combining
metadata about users & messages. Monash University, Australia.
[http://arrow.monash.edu.au/hdl/1959.1/892714]
Cho, Harry Yeon (2010) Human rights and the war against international terrorism: A war
without rights? University of Toronto, Canada.
[http://hdl.handle.net/1807/18238]
Clapton, William (2010) Risk and hierarchy within international society: Liberal
interventionism in the post-Cold War era. Murdoch University, Australia.
[http://researchrepository.murdoch.edu.au/1694/]
Clarke, Colleen Margaret (2006) Police response to anti-terrorism policy. University of Toronto,
Canada.
[http://sbs.mnsu.edu/government/faculty/clarkevitae.doc]
[http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.247489]
Coaffee, Jon (2000) Risk, insurance and the making of the contemporary urban landscape, with
specific reference to the threat of terrorism in the City of London 1992-1997. Oxford Brookes
University, U.K.
[http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.325441]
Cockley, David (2009) The media spectacle of terrorism and response-able literature. Texas
A&M University, U.S.A.
[http://udini.proquest.com/view/the-media-spectacle-of-terrorism-pqid:1857351741/]
Cooper, Robyn (2011) Assessing the social contract equilibrium in a Post 9/11 world: An
Australian perspective. Murdoch University, Australia.
[http://researchrepository.murdoch.edu.au/6212/]
Cottle, Stephen J. (2013) The impact of U.S. foreign aid on international terrorism. Georgetown
University, U.S.A.
[http://hdl.handle.net/10822/558556]
Cox, Amy S. (2010) Self-fulfilling prophecies: The government's role in generating support for
ethnic terrorists. McGill University, Canada.
[http://digitool.library.mcgill.ca/thesisfile86592.pdf]
Cozine, Keith (2010) Transgovernmental networks as a tool to combat terrorism: How ICE
attachés operate overseas to combat terrorist travel. Rutgers University, U.S.A.
[http://hdl.rutgers.edu/1782.2/rucore10002600001.ETD.000052183]
Cunningham, William G. (2006) Terrorism and conflict resolution: Theory and practice George
Mason University, U.S.A.
[http://udini.proquest.com/view/terrorism-and-conflict-resolution-goid:304735438/]
Cuong, Pham Cao (2009) US security engagement with Southeast Asia during the Clinton and
Bush administrations. University of New South Wales, Australia.
[http://handle.unsw.edu.au/1959.4/44527]
Dahlin, Maria. Umeå (2008) Tal om terror: Säkerhetspolitisk retorik i Sverige och Ryssland
hösten [in Swedish] University, Sweden.
[http://umu.diva-portal.org/smash/record.jsf?pid=diva2:142327]
Dalby, Andrew Keith (2004) European integrationist influences on member states' counter-
terrorist co-operation and co-ordination. St Andrews University, U.K.
[http://library.st-andrews.ac.uk/record=b1446282~S5]
[http://handle.unsw.edu.au/1959.4/45144]
Davis, Danny Wayne (2004) Al-Qaeda and the Phinehas Priesthood: Terrorist groups with a
common enemy and similar justifications for terrorist tactics. Texas A&M University, U.S.A.
[http://hdl.handle.net/1969.1/574]
DeFoster, Ruth Maku (2010) Domestic terrorism on the Nightly News. University of Minnesota,
U.S.A.
[http://purl.umn.edu/93028]
Del Gaudio, Andrew (2012) Operational art and the Narva Front 1944, Sinimäed and campaign
planning. University of Liverpool, U.K.
[http://research-archive.liv.ac.uk/7593/]
Demir, Huseyin (2000) The role and treatment of political parties in liberal democracies with
reference to the United Kingdom, Turkey and the European Convention on Human Rights.
University of Leeds, U.K.
[http://etheses.whiterose.ac.uk/440/]
Dennis, Michael Patrick (2012) Chechen refugees and the politics of violence. University of
Texas – Austin, U.S.A.
[http://hdl.handle.net/2152/ETD-UT-2011-12-4703]
Derin Gure, Pinar (2009) Essays in public economics and economics of terrorism. Boston
University, U.S.A.
[http://sunzi.lib.hku.hk/ER/detail/cof/4740442]
Derkovic, Minja (2012) Game of Drones: A critical English School inquiry of U.S. drone policy,
transparency and responsibility. Roskilde University, Denmark.
[http://rudar.ruc.dk/handle/1800/9451]
DiPaolo, Peter Joseph (1995) Motivations for nuclear terrorism in the United States. Naval
Postgraduate School, Monterey, California, U.S.A.
[http://hdl.handle.net/10945/31432]
DiPetta, Joselyn (2007) Women's autonomy in India: The demographic and contextual
determinants of domestic violence. Georgetown University, U.S.A.
[http://hdl.handle.net/10822/555857]
Dompeling, A. (2009) School shootings and terrorism: Knowledge transfer and contagion.
Universiteit Utrecht, the Netherlands.
[http://igitur-archive.library.uu.nl/student-theses/2009-0910-200213/UUindex.html]
Douglas, Robert (2008) Being successfully nasty: The United States, Cuba and state-sponsored
terrorism, 1959-1976. University of Victoria, Canada.
[http://hdl.handle.net/1828/1058]
Drake, Charles J. M. (2007) The factors which influence the selection of physical targets by
terrorist groups. University of St Andrews, U.K.
[http://research-repository.st-andrews.ac.uk/handle/10023/2715]
[http://blogdev.isvg.org/wp-content/uploads/2010/12/
DEVELOPMENT_AS_COUNTERTERRORISM-
_An_Examination_of_the_Columbian_Conflict.pdf]
[http://dc.lib.unc.edu/u?/etd,1292]
Egner, Michae (2009) Between slogans and solutions: A frame-based assessment methodology for
public diplomacy. RAND Graduate School, U.S.A.
[http://www.rand.org/content/dam/rand/pubs/rgs_dissertations/2010/RAND_RGSD255.pdf]
[http://hdl.handle.net/1969.1/3076]
Elgamri, Elzain (2005) Islam in the British broadsheets: How historically-conditioned orientalist
discourses inform representations of Islam as a militant monolithic entity. University of
Westminster, U.K.
[http://westminsterresearch.wmin.ac.uk/8511/]
El-Khoury, Myriam (2011) Peripheral and central mechanisms involved in post-traumatic stress
disorder and its treatment by eye-movement desensitization & reprocessing. Université d'Aix-
Marseille, France.
[http://www.theses.fr/2011AIX20664/document]
El-Ibiary, Rasha (2006) Televisual representation of the 'War on Terror': Comparative analysis of
Al-Jazeera and CNN in covering the 2003 invasion of Iraq. University of Newcastle upon Tyne,
U.K.
[http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.432766]
Ellingsen, S. A. (2009) Nuclear terrorism and rational choice. King's College London, U.K.
[http://ethos.bl.uk/OrderDetails.do?did=45&uin=uk.bl.ethos.533823]
Elze, Erich Julian (2013) Toward a consensus on the nature of contemporary insurgency: An
analysis of counterinsurgency in the War on Terror 2001-2010. University of New South Wales,
Australia
[http://handle.unsw.edu.au/1959.4/52832]
Engene, Jan Oskar (1998) Patterns of terrorism in Western Europe, 1950-1995. University of
Bergen, Norway.
[http://www.fou.uib.no/drgrad/1998/707001/]
Eser, Tarik (2007) The impact of the Turkish policies toward the PKK terrorist organization.
ISVG; West Haven, CT, U.S.A.
[http://blogdev.isvg.org/wp-content/uploads/2010/12/
THE_IMPACT_OF_THE_TURKISH_POLICIES_TOWARD_THE_PKK_TERRORIST_ORG
ANIZATION.pdf]
Fiaz, Nazya (2010) A constructivist account of Pakistan's political practice in the aftermath of
9/11: The normalisation of Pakistan's participation in the 'war on terror'. University of Bradford,
U.K.
[http://bradscholars.brad.ac.uk/handle/10454/4477]
Fisher, Kathryn (2012) From 20th Century troubles to 21st Century international terrorism:
Identity, securitization, and British counterterrorism from 1968 to 2011. London School of
Economics and Political Science, U.K.
[http://etheses.lse.ac.uk/548/]
Fitzpatrick, Brian (1977) Catholic royalism in the department of the Gard, 1814-1851.
University of Warwick, U.K.
[http://wrap.warwick.ac.uk/4085/]
Franks, Jason (2005) Re-thinking the roots of terrorism: through the doors of perception
University of St. Andrews, U.K.
[http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.503702]
Fraser, John R. (2003) Terrorist groups are aligning to conduct global terrorism. Breyer State
University - Kamiah Idaho, U.S.A.
[http://www.bookpump.com/dps/pdf-b/1122098b.pdf]
Fraund, Philipp (2009) "The picture survives": Zur Geschichte der Kriegsberichterstattung ;
Korea, Vietnam, Afghanistan - globaler Krieg gegen den Terror [in German]. Universität
Konstanz, Germany.
[http://kops.ub.uni-konstanz.de/handle/urn:nbn:de:bsz:352-opus-80937]
Freh, Fuaad Mohammed (2013) In the shadow of terror: An exploration of post traumatic stress
disorder, attachment styles and coping strategies: Response to the experience of being in a
bombing attack among Iraqi people. University of Plymouth, U.K.
[http://pearl.plymouth.ac.uk:8080/pearl_xmlui/handle/10026.1/1488]
Fritsch-El Alaoui, Lalla Khadija (2005) Arab, Arab-American, American: Hegemonic and
contrapuntal representations. Technische Universität Dresden, Germany.
[http://nbn-resolving.de/urn:nbn:de:swb:14-1127973189644-22995]
Fuchs, Andreas (2012) Political determinants of foreign aid and international trade of emerging
economies. Universität Göttingen, Germany.
[http://d-nb.info/1043667113/34]
Gale, James Robert (2012) Is the machinery of local policing delivery seen as fit for purpose by
practitioners and community members to anticipate and mitigate the risk of harmful
radicalisation at street level? University of Exeter, U.K.
[https://ore.exeter.ac.uk/repository/handle/10036/3522]
Gamblin, Graham John (2000) Russian populism and its relations with anarchism 1870-1881.
University of Birmingham, U.K.
[http://etheses.bham.ac.uk/1401/]
Gantt, Jonathan Wes. (2005) Irish terrorism, British counter-terrorism and United States foreign
policy, 1865 -1922. University of South Carolina, U.S.A.
[http://www.researchgate.net/publication/35696544_Irish_terrorism_British_counter-
terrorism_and_United_States_foreign_policy_1865-1922_]
Gardner, Kathryn Lynn (2010) Constructing and deconstructing Islam in the Western state: A
comparative look at the politicization of religion in France, Great Britain, and the United States,
1945-2008. University of Notre Dame, U.S.A.
[http://etd.nd.edu/ETD-db/theses/available/etd-04162010-065826/]
Gatliff, Jason R. (2006) Terrorism and Just War tradition: Issues of compatibility. Bowling Green
State University, U.S.A.
[http://rave.ohiolink.edu/etdc/view?acc_num=bgsu1150154815]
[http://research-repository.st-andrews.ac.uk/handle/10023/2694]
Germann, Jan-Peter (2009) Terror und Anti-terror: Politische Gewalt, Sicherheitspolitik und die
strategische Kultur der Terrorismusbekämpfung in Deutschland [in German]. Philipps-
Universität Marburg, Germany
[http://archiv.ub.uni-marburg.de/diss/z2009/0709/]
Gillespie, Rebecca J. (2006) Exploring the impact of reminders of mortality and terrorist events
on intergroup relations: A terror management theory perspective. University of Sussex, U.K.
[http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.487937]
Ginbar, Yuval (2006) Torture, terrorists and ticking bombs: Moral, societal and legal aspects of
the 'ticking bomb' justification for torture in the struggle against terrorism. University of Essex,
U.K.
[http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.433596]
Ginkel, B.T. van (2010) The practice of the United Nations in combating terrorism from
1946-2008: Questions of legality and legitimacy. Universiteit Utrecht, the Netherlands
[http://igitur-archive.library.uu.nl/dissertations/2010-0603-200200/UUindex.html]
Gleeson, Kathleen (2012) Using the bully pulpit: The construction of the 'war on terror' discourse
in Australia. University of New South Wales, Australia
[http://handle.unsw.edu.au/1959.4/51905]
Goh, Hui Peng Constance (2008) The art of dissent from the rhetoric of silence: The terror and
promise of Dao and Khora. University of Nottingham, U.K.
[http://etheses.nottingham.ac.uk/524/]
Gok, Ozkan (2010) Structural disadvantage, terrorism, and non-terrorist violent crime in
Turkey. University of Cincinnati, U.S.A.
[http://rave.ohiolink.edu/etdc/view?acc_num=ucin1258729259]
Gonzales, Melody (2006) More foreigners, less crime: Examining the relationship between
immigrants inflow and country crime rates in 2000. Georgetown University, U.S.A.
[http://hdl.handle.net/10822/556005]
Gorka, Sebestyén (2008) Content and end-state-based alteration in the practice of political
violence since the end of cold war: The difference between the terrorism of the cold war and the
terrorism of al Qaeda: The rise of the "transcendental terrorist". Corvinus University of
Budapest, Hungary.
[http://phd.lib.uni-corvinus.hu/314/]
Gould, Julie E. (2013) A decision support system for intermodal logistics under considerations
for costs of security. Universität Bremen, Germany.
[http://elib.suub.uni-bremen.de/edocs/00103014-1.pdf]
Graaf, J.J. de (2008) Al-Jazeera English: the opinion and the other opinion - a comparison
between ideologies in CNN International and Al-Jazeera English. Universiteit Utrecht, the
Netherlands.
[http://igitur-archive.library.uu.nl/student-theses/2008-0429-201317/UUindex.html]
Graphia, Renee Dianne (2010) An exploratory study of the perceived utility and effectiveness of
state fusion center. Rutgers University, U.S.A.
[http://hdl.rutgers.edu/1782.2/rucore10002600001.ETD.000052951]
Gray, Simon Reece (2012) The national, regional & global phases of jihadism: The ideological
evolution & geopolitical transformation of Islamist militant terrorism in the Middle East &
Southeast Asia. University of Waikato, New Zealand.
[http://hdl.handle.net/10289/7178]
Gregg, Heather Selma (2004) The causes of religious wars: Holy nations, sacred spaces, and
religious revolutions. Massachusetts Institute of Technology (MIT), U.S.A.
[http://hdl.handle.net/1721.1/16639]
Green, Craig Anthony (2009) The khawaarij and the creed of takfeer: Declaring a Muslim to be
an apostate and its effects upon modern day Islamic movements. University of South Africa,
Pretoria, South Africa.
[http://hdl.handle.net/10500/2645]
Green, Jordan Darcy (2010) New Zealand's involvement in maritime Security in Southeast Asia
and the Pacific, from 1982 onwards. University of Waikato, New Zealand.
[http://hdl.handle.net/10289/4283]
Greenberg, Jeffrey H. (2007) Televised news media exposure, fear of terrorism, and social
problem-solving. Drexel University, U.S.A.
[http://hdl.handle.net/1860/1242]
Grevi, Giovanni (2007) The common foreign, security and defence policy of the European Union:
Ever-closer cooperation. Dynamics of regime deepening. Universite Libre de Bruxelles, Belgium.
[http://theses.ulb.ac.be/ETD-db/collection/submitted/ULBetd-11182008-174845/restricted/
fullversion_grevi.pdf]
[http://hdl.rutgers.edu/1782.1/rucore10002600001.ETD.000061058]
[http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.502174]
Haider, Mariam (2010) Emotional and behavioural problems among Pakistani children. McGill
University, Canada.
[http://digitool.library.mcgill.ca/thesisfile94914.pdf]
Hakakorpi, Niina (2008) Security, development and AUSAID: A critical examination of the
securitisation of the Australian government's overseas aid program. University of Helsinki,
Finland.
[http://hdl.handle.net/10138/12536]
Halafoff, Anna (2010) Netpeace: The multifaith movement and common security. Monash
University, Australia.
[http://arrow.monash.edu.au/hdl/1959.1/289595]
Hale, William Chris (2005) Twenty-First Century terrorism, Twenty-First Century answers: The
why and how of collection, analysis, and dissemination of open source intelligence. ISVG; West
Haven, CT, U.S.A.
[http://books.google.com/books/about/Twenty_first_Century_Terrorism_Twenty_fi.html?
id=zvKhNwAACAAJ&redir_esc=y]
Hamilton-Tweedale, Brian (1987) The British press and Northern Ireland: A case study in the
reporting of violent political conflict. University of Sheffield, U.K.
[http://etheses.whiterose.ac.uk/1839/]
Hammond, Andrew (2002) The debated lands: British travel writing and the construction of the
Balkans. University of Warwick, U.K.
[http://wrap.warwick.ac.uk/1284/]
Handley, Robert Lyle (2010) Palestine Media Watch and the U.S. news media: Strategies for
change and resistance. University of Texas – Austin, U.S.A.
[http://hdl.handle.net/2152/ETD-UT-2010-05-793]
Hansén, D.H. (2007) Crisis and perspectives on policy change: Swedish counter-terrorism
policymaking. Universiteit Utrecht, the Netherlands.
[http://igitur-archive.library.uu.nl/dissertations/2007-0403-200232/UUindex.html]
Hartmann, Sandra (2009) Systeme im Wandel der Zeit: Das konfliktbehaftete Verhältnis
zwischen Politik und Medien in sicherheitspolitisch unruhigen Zeiten;Eine Analyse der 'Cicero-
Affäre' (2005) und des BND-Skandals (2005) mit der seit dem 11. September 2001 verstärkten
Bekämpfung des internationalen Terrorismus als Krisenhintergrund [in German]. Friedrich-
Alexander-Universität Erlangen-Nürnberg (FAU), Germany.
[http://opus4.kobv.de/opus4-fau/frontdoor/index/index/docId/805]
Harvala, Anna (2006) Sanctions against international terrorism: States' cooperation and the
United Nation. University of Helsinki, Finland
[http://hdl.handle.net/10138/10277]
Hayes, Deirdre (2010) Framing the veil: From the familiar to the feared. University of South
Australia, Australia
[http://ura.unisa.edu.au:80/R/?func=dbin-jump-full&object_id=unisa46912]
Haynes, Michael Wilfred (1998) German cultural responses to the Red Army Faction (Rote
Armee Fraktion). University of Glasgow, U.K.
[http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.266540]
Heide, E.J. van der (2011) Individual terrorism: Indicators of lone operators. Universiteit
Utrecht, the Netherlands.
[http://igitur-archive.library.uu.nl/student-theses/2011-0902-202354/UUindex.html]
von der Heiden, Gregor (2009) Gespräche in einer Krise: Analyse von Telefonaten mit einem
RAF-Mitglied während der Okkupation der westdeutschen Botschaft in Stockholm 1975
[http://umu.diva-portal.org/smash/record.jsf?pid=diva2:274011]
Higgins, Vanessa de Macedo (2010) News media roles in bridging communities: Consensus
function of agenda-setting. University of Texas – Austin, U.S.A.
[http://hdl.handle.net/2152/7838]
[http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.512228]
Hirsch Ballin, M.F.H. (2012) Anticipative criminal investigation: Theory and counterterrorism
practice in the Netherlands and the United States. Universiteit Utrecht, the Netherlands.
[http://igitur-archive.library.uu.nl/dissertations/2012-0209-200349/UUindex.html]
Holbrook, Baldvin Donald (2012) Understanding the content and framing of Al-Qa'ida
leadership communiqués. University of St Andrews, U.K.
[http://research-repository.st-andrews.ac.uk/handle/10023/3083]
Homewood, Christopher James (2008) From Baader to Prada: The representation of Urban
terrorism in German-language film. University of Leeds, U.K.
[http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.490974]
Houghton, Brian (2004) Gearing up and getting there: Improving local response to chemical
terrorism. Pardee RAND Graduate School, U.S.A.
[http://www.rand.org/content/dam/rand/pubs/rgs_dissertations/2005/RAND_RGSD181.pdf]
[http://www.rand.org/content/dam/rand/pubs/rgs_dissertations/2009/RAND_RGSD247.pdf]
Hübner, Frank Philipp (2009) Terrorismusbekämpfung als Aufgabe der Europäischen Union [in
German]. Universität Regensburg, Germany.
[http://epub.uni-regensburg.de/13148]
Hughes, Jennifer S. (2009) Performance in a time of terror: Critical mimesis and the age of
uncertainty. The University of Manchester, U.K.
[http://ethos.bl.uk/OrderDetails.do?did=1&uin=uk.bl.ethos.516436]
Husain, Asma (2010) Fatal attractions: The pleasures of spectacular terror. Rice University,
U.S.A.
[http://hdl.handle.net/1911/62036]
Huseyin, Demir (2000) The role and treatment of political parties in liberal democracies with
reference to the United Kingdom, Turkey and the European Convention on Human Rights.
University of Leeds, U.K.
[http://ethos.bl.uk/OrderDetails.do?did=1&uin=uk.bl.ethos.514002]
Ilchmann, Kai-Bastian (2012) Biothreat and policy pathways: Influences upon current
bioterrorism policies in the UK. University of Sussex, U.K.
[http://sro.sussex.ac.uk/38596/]
Ja'afar, Sabirin Bin (2007) International law of the sea and national legislation on piracy and
terrorism in the straits of Malacca: A study in law and policy. University of Greenwich
[http://gala.gre.ac.uk/8211/]
Jarvis, Lee (2008) Times of terror: Discourse and the politics of temporality. The University of
Birmingham, U.K.
[http://ethos.bl.uk/OrderDetails.do?did=39&uin=uk.bl.ethos.521984]
Jones, Steven David (2009) Selfhood as instance of horror: Ontology, ideology, and narratives of
body-terror. University of Sussex, U.K.
[http://ethos.bl.uk/OrderDetails.do?did=1&uin=uk.bl.ethos.504325]
Kabatoff, Mathew(2010) Subject to predicate risk, governance and the event of terrorism within
post-9/11 U.S. border security. London School of Economics and Political Science, U.K
[http://etheses.lse.ac.uk/496/]
Kalidheen, Rufus (2008) Policing mechanisms to counter terrorist attacks in South Africa.
University of South Africa, South Africa.
[http://uir.unisa.ac.za/bitstream/handle/10500/1906/dissertation.pdf?sequence=1]
Kamandy, Jamal (2013) Islamicodes: The post 9/11 racialization of counter-terrorism. Colorado
State University, U.S.A.
[http://digitool.library.colostate.edu:80/R/?func=dbin-jump-full&object_id=247979]
Kang, Charanjit Singh (2005) Counterterrorism: Punjab a case study. Simon Fraser University,
Canada
[http://summit.sfu.ca/item/5063]
Karam, Aimee (2013) Terror and patriotism in the United States: A critical analysis of
governmental discourses surrounding the attacks of September 11, 2001 and the introduction of
the Patriot Act in the United States of America. University of Ottawa, Canada
[http://hdl.handle.net/10393/26939]
Karcher, K. (2009) Guns n’ Roses – A new approach to female participation in the leftist terrorist
groups “Red Army Faction” and “Movement of June 2” since the 1970s in Germany. Universiteit
Utrecht, the Netherlands.
[http://igitur-archive.library.uu.nl/student-theses/2009-1015-200123/UUindex.html]
Karim, Karim Haiderali, (1996) Constructions of the Islamic peril in English-language Canadian
print media: Discourses on power and violence. McGill University, Canada.
[http://digitool.library.mcgill.ca/thesisfile42064.pdf]
Karrar, Hasan H. (2006) The new silk road diplomacy: A regional analysis of China's Central
Asian foreign policy, 1991-2006 McGill University, Canada.
[http://digitool.library.mcgill.ca/thesisfile102514.pdf]
Kazemi, Mariam Fateme (2007) Muslim American perspectives on the Global War On
Terrorism. University of Texas – Arlington, U.S.A.
[http://hdl.handle.net/10106/187]
Keating, Vincent Charles (2011) The legitimacy of American human rights conduct in the 'war
on terror'. Aberystwyth University, U.K.
[http://cadair.aber.ac.uk/dspace/handle/2160/7014]
Kelly, Aaron James (2000) 'Utterly resigned terror': The thriller and Northern Ireland since 1969.
Queen's University Belfast, U.K.
[http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.343029]
Khan, Munawar (2012) Challenges affecting the tourist industry in Pakistan. Centria
ammattikorkeakoulu (Keski-Pohjanmaan ammattikorkeakoulu), Finland.
[http://publications.theseus.fi/handle/10024/52592]
King, Michael, (2008) Justice and identity: Psychological motives for terrorism. McGill
University, Canada.
[http://digitool.library.mcgill.ca/thesisfile112400.pdf]
Kinkle, Jeffrey (2010) Spectacular developments: Guy Debord's parapolitical turn. Goldsmiths
College (University of London) U.K.
[http://eprints.gold.ac.uk/3225/]
Kiser, Steve (2005) Financing terror: An analysis and simulation to affect Al Qaeda's financial
infrastructures. Pardee RAND Graduate School, U.S.A.
[http://www.rand.org/content/dam/rand/pubs/rgs_dissertations/2005/RAND_RGSD185.pdf]
[http://kups.ub.uni-koeln.de/3049/]
Koh, Jae-myong (2006) The suppression of the financing of terrorism: The evolution and
implementation of international standards. University of Edinburgh, U.K.
[http://ethos.bl.uk/OrderDetails.do?did=1&uin=uk.bl.ethos.508134]
[http://geb.uni-giessen.de/geb/volltexte/2010/7464]
Kola, F. (2011) Assessing and revising the absolute prohibition of torture: An examination of its
purpose, philosophical justification and structural elements. University College London, U.K.
[http://ethos.bl.uk/OrderDetails.do?did=214&uin=uk.bl.ethos.565245]
Korte, Raven Nicole (2005) Is counter terrorism counterproductive? The case of Northern
Ireland. University of Maryland, U.S.A.
[http://hdl.handle.net/1903/2932]
Kowalski, Jeremy (2006) The geographical and spatial imaginings of Islamist extremism/
terrorism. University of Waterloo, Canada.
[http://hdl.handle.net/10012/980]
Krause, Peter John Paul (2011) The political effectiveness of non-state violence: Paradox,
polarity, and the pursuit of power. Massachusetts Institute of Technology (MIT), U.S.A.
[http://hdl.handle.net/1721.1/68930]
[http://rudar.ruc.dk/handle/1800/7745]
Lambert, Joseph J. (1988) The response of the international community of states to terrorism as
exemplified in the International Convention against the Taking of Hostages 1979. University of
Cambridge, U.K.
[http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.279307]
[http://doku.b.tu-harburg.de/volltexte/2008/403/pdf/MASC.pdf]
[http://rudar.ruc.dk/handle/1800/8366]
Lee, Jennifer E. C. (2013) Terrorism risk perception and individual response in Canada: A
social-cognitive perspective. University of Ottawa, Canada
[http://hdl.handle.net/10393/29753]
Leong, Angela Veng Mei (2006) Serious organised crime and terror: An analysis of legal and
non-legal strategies in the context of criminal justice. University of London, U.K.
[http://ethos.bl.uk/OrderDetails.do?did=1&uin=uk.bl.ethos.428498]
Le Sage, André (2004) Somalia and the war on terrorism: Political Islamic movements & US
counter-terrorism efforts. University of Cambridge, U.K.
[http://ethos.bl.uk/OrderDetails.do?did=1&uin=uk.bl.ethos.421577]
Leurs, K. (2007) Framing Terrorism: Good versus Evil? Universiteit Utrecht, the Netherlands.
[http://igitur-archive.library.uu.nl/student-theses/2007-0911-200748/UUindex.html]
Levi, Michael Abraham (2006) Rethinking nuclear terrorism. King's College University of
London, U.K.
[http://ethos.bl.uk/OrderDetails.do?did=1&uin=uk.bl.ethos.427845]
Lindström, Frida (2012) Asymmetric warfare and challenges for international humanitarian
law. Uppsala University, Sweden.
[http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-187747]
Llobet Anglí (2009) Terrorismo y "guerra" contra el terror: Límites de su punición en un estado
democrático [in Spanish]. Mariona Universitat Pompeu Fabra, Spain.
[http://repositori.upf.edu/handle/10230/12168]
[https://openaccess.leidenuniv.nl/handle/1887/4467]
Looney, Mark Einer (2010) Representing terrorism: Aesthetic reflection and political action in
contemporary German novels (Goetz, Klein, Tellkamp). Vanderbilt University, U.S.A.
[http://etd.library.vanderbilt.edu/available/etd-04012010-212219/]
Lu, Wenwen (2011) Rethinking preventative detention from an international human rights
perspective: A comparative study of Australia, Malaysia and Singapore. University of New South
Wales, Australia.
[http://handle.unsw.edu.au/1959.4/51353]
Lugton, Alis Margaret (2008) Citizen UK 2000 and the European Convention for the Promotion
and Protection of Human Rights and Fundamental Freedoms. University of Leeds, U.K.
[http://ethos.bl.uk/OrderDetails.do?did=1&uin=uk.bl.ethos.490966]
Mack, Gregory. (2013) The modern muhtasib: Religious policing in the Kingdom of Saudi
Arabia. McGill University, Canada.
[http://digitool.library.mcgill.ca/thesisfile116908.pdf]
Magness, E. Shannon (2013) U know them by their fruit: Unfinalizing the 'extreme other self ' in
documentary filmmaking. University of Sussex, U.K.
[http://ethos.bl.uk/OrderDetails.do?did=167&uin=uk.bl.ethos.577334]
Mahdi, Ahmed Samir Sayed (2010) U.S. foreign policy and energy resources during the George
W. Bush administration. University of Birmingham
[http://etheses.bham.ac.uk/748/]
Makarenko, Tamara (2005) The crime-terror continuum: Modeling 21st century security
dynamics. University of Wales, Aberystwyth, U.K.
[http://ethos.bl.uk/OrderDetails.do?did=1&uin=uk.bl.ethos.434008]
Malcolm, James A. (2011) The securitisation of the United Kingdom's maritime infrastructure
during the 'war on terror'. University of Warwick, U.K.
[http://wrap.warwick.ac.uk/45468/]
Malik, Omar (1997) A strategic analysis of the origins of international terrorist attacks on
aviation and the British responses. University of St Andrews, U.K.
[http://research-repository.st-andrews.ac.uk/handle/10023/2916]
Manning, Brian Selwyn (2011) Security intelligence and the public interest. AUT University,
New Zealand.
[http://hdl.handle.net/10292/1238]
[http://hdl.handle.net/1920/8019]
[http://ethos.bl.uk/OrderDetails.do?did=67&uin=uk.bl.ethos.367658]
Marshalls, Maurice (2007) Country image and its effects in promoting a tourist destination.
Blekinge Institute of Technology, Sweden.
[http://www.bth.se/fou/cuppsats.nsf/
6753b78eb2944e0ac1256608004f0535/5cf5064f9fb0e3e6c12572bb00020a80?OpenDocument]
Martin, Nancy Susanne (2011) From parliamentarianism to terrorism and back again.
University of Texas – Austin, U.S.A.
[http://hdl.handle.net/2152/ETD-UT-2011-05-3416]
[http://hdl.handle.net/1721.1/33671]
Mavridis, Iakovos (2006) The practice of humanitarian intervention after the end of the Cold
War: emerging norm or just practice? Humanitarian intervention and international law.
University of Hull, U.K.
[https://hydra.hull.ac.uk/resources/hull:5858]
[http://etd.lsu.edu/docs/available/etd-10142004-144705/]
McDermott, Elizabeth (2010) The impact of war and outward male migration on female human
development in El Salvador. Georgetown University, U.S.A.
[http://hdl.handle.net/10822/551625]
McFarland, Michael E. (2005) Rethinking secular and sacred: On the role of secular thought in
religious conflicts. University of Bradford, U.K.
[http://bradscholars.brad.ac.uk/handle/10454/4260]
McGrath, Kevin Patrick (2012) Aid to education and terrorism: Exploring unintended
consequences. Georgetown University, U.S.A.
[http://hdl.handle.net/10822/557895]
[https://eprints.mdx.ac.uk/10746/]
Mendel, Jonathan Michael (2007) Virtual wars: A comparative analysis of the 1991 Gulf War
and the 'War on Terror'. University of Durham, U.K.
[http://ethos.bl.uk/OrderDetails.do?did=1&uin=uk.bl.ethos.478863]
Mendelson, Miriam E. (2008) A systems understanding of terrorism with implications for policy.
University of Akron, U.S.A.
[https://etd.ohiolink.edu/ap:10:0::NO:10:P10_ETD_SUBID:46960]
[http://udini.proquest.com/preview/is-terrorism-inevitable-the-goid:1355113820/http://
m.repository.library.georgetown.edu/handle/10822/558372]
Mickler, David (2009) Protecting civilians or preserving interests? Explaining the UN security
council's non-intervention in Darfur, Sudan, 2003-06. Murdoch University, Australia
[http://researchrepository.murdoch.edu.au/1301]
[http://igitur-archive.library.uu.nl/student-theses/2007-0315-200429/UUindex.html]
Millan Valencia, Daniel (2012) The status of Latin America in US foreign policy, 1946-2008: An
empirical analysis. University of Essex, U.K.
[http://ethos.bl.uk/OrderDetails.do?did=220&uin=uk.bl.ethos.572808]
Mirza, Muhammad Nadeem (2013) Determinants of American foreign policy towards Pakistan.
Université Toulouse, France.
[http://publications.univ-tlse1.fr/13912/]
Moeckli, Daniel (2006) Whose liberty? The 'War on Terrorism', human rights and non-
discrimination. University of Nottingham, U.K.
[http://ethos.bl.uk/OrderDetails.do?did=1&uin=uk.bl.ethos.435383]
Moore, Matthew Michael (2011) Sparks on kindling: Terrorism's role in civil war onset,
recurrence, and escalation. University of Missouri, U.S.A.
[http://hdl.handle.net/10355/14441]
Morakabati, Y. (2007) Tourism, travel risk and travel risk perceptions: A study of travel risk
perceptions and the effects of incidents on tourism. Bournemouth University, U.K.
[http://ethos.bl.uk/OrderDetails.do?did=1&uin=uk.bl.ethos.486294]
Morrow, Genevieve (2012) What was the nature of the security threat that WikiLeaks presented
to the United States in 2010? Murdoch University, Australia.
[http://researchrepository.murdoch.edu.au/12598/]
Mosher, Katrina N. (2009) The metrics of death: Emotions and the effects of casualties on public
opinion in militarized disputes and terrorism. Texas A&M University, U.S.A.
[http://hdl.handle.net/1969.1/ETD-TAMU-3232]
Muir, Angus (2001) Destruction and redemption: The conduct of revealed religious violence in
the contemporary era. University of St Andrews, U.K.
[http://research-repository.st-andrews.ac.uk/handle/10023/2799]
Mullin-Jackson, Angela (2009) Racial and cultural otherness: The lived experience of Americans
of Korean descent. Middle Tennessee State University, Murfreesboro, Tennessee, U.S.A.
[http://www.bookpump.com/dps/pdf-b/942343Xb.pdf]
Murphy, Martin N. (2007) Small boats, weak states and dirty money: Contemporary piracy and
maritime terrorism's threat to international security. University of Reading, U.K.
[http://ethos.bl.uk/OrderDetails.do?did=1&uin=uk.bl.ethos.493960]
Murphy, Patrick (2012) Securing the everyday city: The emerging geographies of counter-
terrorism. Durham University, U.K.
[http://etheses.dur.ac.uk/3506/]
Muro Ruiz, Diego (2004) Ethnicity and violence: The case of radical Basque nationalism.
University of London, U.K.
[http://ethos.bl.uk/OrderDetails.do?did=1&uin=uk.bl.ethos.408914]
[http://ethos.bl.uk/OrderDetails.do?did=1&uin=uk.bl.ethos.440012]
[http://doras.dcu.ie/16812/]
Nicholson, Megan (2011) More than just terrorists? Constructions of Canadian Muslim
identities in the Canadian daily press. University of Guelph, Canada.
[https://atrium.lib.uoguelph.ca/xmlui/handle/10214/3040]
Nishikawa, Akiko (2006) Issues and political preference: Presidential election 2004. Georgetown
University, U.S.A.
[http://hdl.handle.net/10822/555980]
Noble, Mark (2010) Testing the blowback thesis: American military presence and terrorism
against Americans. University of North Carolina – Chapel Hill, U.S.A.
[http://dc.lib.unc.edu/u?/etd,4847]
Noorloos, L.A. van (2011) Hate speech revisited: A comparative and historical perspective on
hate speech law in the Netherlands and England & Wales. Universiteit Utrecht, the Netherlands.
[http://igitur-archive.library.uu.nl/dissertations/2011-1130-200335/UUindex.html]
Oehmichen, Anna (2009) Terrorism and anti-terror legislation - the terrorised legislator? A
comparison of counter-terrorism legislation and its implications on human rights in the legal
systems of the United Kingdom, Spain, Germany, and France. Leiden University, The
Netherlands.
[https://openaccess.leidenuniv.nl/handle/1887/13852]
[http://hdl.handle.net/10138/10314]
O'Regan, Mary (2006) Framing the Israeli-Palestinian conflict: A case-study analysis of the Irish
national 'opinion leader' press - July 2000 to July 2004. University of Stirling, U.K.
[http://ethos.bl.uk/OrderDetails.do?did=1&uin=uk.bl.ethos.513860]
Ors, Huseyin (2011) What are the lessons that can be learned from Turkey's transnational
operational police cooperation experiences? Rutgers University, U.S.A.
[http://hdl.rutgers.edu/1782.1/rucore10002600001.ETD.000061088]
Othman, Abdullah (2013) Exploring the business benefits of regulatory compliance: The case of
AML/CFT systems for banking institutions in Malaysia. Loughborough University, U.K.
[https://dspace.lboro.ac.uk/dspace-jspui/handle/2134/12362]
Ozguler, Mustafa (2008) Comparing and assessing the preparedness of police organizations in
counter-terrorism (Netherlands and United Kingdom). Kent State University, U.S.A.
[http://alldissertations.com/full.php?id=3755]
Pahlavi, Pierre Cyril Cyrus Teymour (2004) Mass diplomacy: Foreign policy in the global
information age. McGill University, Canada
[http://digitool.library.mcgill.ca/thesisfile85196.pdf]
Patenaude, Marc A. (2011) Providing for the common defense: Internal security and the Cold
War, 1945-1975. Louisiana State University, U.S.A.
[http://etd.lsu.edu/docs/available/etd-04142011-210902/]
Payne, John David (2011) Fighting for control: State-sponsored terrorism as foreign policy in
Cuba and Libya, 1959-2010. Massachusetts Institute of Technology (MIT), U.S.A.
[http://hdl.handle.net/1721.1/68933]
Payne, Matthew Thomas (2013) Interactive pleasures of post-9/11 military video games.
University of Texas – Austin, U.S.A.
[http://hdl.handle.net/2152/ETD-UT-2011-08-3901]
Peddicord, Michael (2010) The effects of structural policies on terrorist incidents in democracies,
1975 to 1995. Georgetown University, U.S.A.
[http://hdl.handle.net/10822/555942]
[https://theses.ncl.ac.uk/dspace/handle/10443/1029]
Peter, Cyril Ravindran (2012) Implications and impacts of terrorism on sporting events: Is the
hospitality industry prepared and equipped to host mega events? AUT University, New Zealand.
[http://hdl.handle.net/10292/4217]
Pienaar, Lyle Eugene (2007) International terrorism in Africa 1990-2004: Extent and counter-
measures. University of Pretoria, South Africa.
[http://upetd.up.ac.za/thesis/available/etd-11192008-61454/unrestricted/dissertation.pdf]
Pineu, Daniel Filipe Dos Ramos (2009) The pedagogy of security: Police assistance and liberal
governmentality. The University of Wales, Aberystwyth, U.K.
[http://ethos.bl.uk/OrderDetails.do?did=1&uin=uk.bl.ethos.512234]
[http://hdl.handle.net/10280/205]
Pitcher, Ben (2007) Multicultural Nationalism, New Labour and the Politics of Race and State
University of East London, U.K.
[http://ethos.bl.uk/OrderDetails.do?did=1&uin=uk.bl.ethos.486967]
Plionis, Alexander Asterios (2008) Automated multi-radionuclide separation and analysis with
combined detection capability. University of Texas – Austin, U.S.A.
[http://hdl.handle.net/2152/3636]
Policante, Amedeo (2012) Hostis Humani Generis: Pirates and empires from antiquity until
today. Goldsmiths College (University of London) U.K.
[http://eprints.gold.ac.uk/8047/]
Potgieter, N. A. (2008) Terrorism as a threat to national security in South Africa since 1994.
University of Pretoria, South Africa
[http://upetd.up.ac.za/thesis/available/etd-11192008-161454/]
Prince, Troy Jason (2009) An assessment of the 2002 National Security Strategy of the United
States: Continuity and change. University of Bradford, U.K.
[http://bradscholars.brad.ac.uk/handle/10454/4312]
Rae, Norman G. D.(2007) Reinventing geopolitical codes in the post-Cold War world with special
reference to international terrorism. University of Glasgow, U.K.
[http://ethos.bl.uk/OrderDetails.do?did=1&uin=uk.bl.ethos.486795]
Rahman, Aspalella A. (2008) An analysis of the Malaysian anti-money laundering laws and
their impact on banking institutions. University of Western Australia, Australia
[http://repository.uwa.edu.au:80/R/?func=dbin-jump-
full&object_id=13039&local_base=GEN01-INS01]
Reilly, Paul (2008) Framing online communications of civil and uncivil groups in post-conflict
Northern Ireland. University of Glasgow, U.K.
[http://ethos.bl.uk/OrderDetails.do?did=1&uin=uk.bl.ethos.486923]
Rejali, Darius M. (1987) Discipline and torture, or how Iranians became moderns. McGill
University, Canada.
[http://digitool.library.mcgill.ca/thesisfile67424.pdf]
Rejman, Karl (2003) What puts the 'terror' in terrorism. University of Lethbridge, Canada
[http://hdl.handle.net/10133/232]
[http://hdl.handle.net/10179/1804]
Repo, Jemima Isabel (2006) Gendering the War on Terrorism: Discourses and representations of
masculinities and femininities. University of Helsinki, Finland
[http://hdl.handle.net/10138/12268]
Reshetar, Ganna (2008) Assessing and managing operational risk with a special emphasis on
terrorism risk. University of Zurich, Switzerland
[http://dx.doi.org/10.5167/uzh-11587]
Richardson, Alexia (2008) Traces of terror: Photography and memory of political violence in
Argentina and Peru. University of Durham, U.K.
[http://ethos.bl.uk/OrderDetails.do?did=1&uin=uk.bl.ethos.479180]
[https://etd.ohiolink.edu/ap:10:0::NO:10:P10_ACCESSION_NUM:osu1186675931]
[http://etheses.lse.ac.uk/149/]
Rubin, Gabriel (2008) Freedom and order: How democratic governments abridge civil liberties
after terrorist attacks - and why sometimes they don't. Massachusetts Institute of Technology,
U.S.A.
[http://hdl.handle.net/1721.1/49677]
Ruff, Adam Michael (2012) Countering money laundering and terrorism financing: Can the
resultant intrusion into the right of privacy by the law be justified? Monash University, Australia
[http://arrow.monash.edu.au/hdl/1959.1/574645]
Ryckman, Michael (2011) Civil war, terrorism, and the substitutability of violence. University of
Arizona, U.S.A.
[http://hdl.handle.net/10150/202533]
Ryder, Frances I. (2009) The relations of terror and immigration: Preventive solutions.
University of Kansas, U.S.A.
[http://hdl.handle.net/1808/5958]
Saksena, Ritu (2006) Mapping terrorism: Amorphous nations, transient loyalties. University of
Maryland, U.S.A.
[http://hdl.handle.net/1903/3525]
[http://summit.sfu.ca/item/9023]
Sands, Allison (2007) Terrorism in the 21st century: The relationship between terrorism and
globalization. Georgetown University, U.S.A.
[http://hdl.handle.net/10822/555810]
Sarafis, Evangelia (2006) Occupation, resistance and White Terror in two Greek villages: The
local origins of civil war. University of Sussex, U.K.
[http://ethos.bl.uk/OrderDetails.do?did=71&uin=uk.bl.ethos.421526]
Saul, Ben (2005) Defining 'terrorism' in international law. Oxford University, U.K.
[http://ethos.bl.uk/OrderDetails.do?did=1&uin=uk.bl.ethos.416768]
Saunders, Lucy (2010) Limiting democracy for the sake of itself: Fighting extremism with
extreme measures. University of Toronto, Canada.
[http://hdl.handle.net/1807/18872]
Schachter, Jonathan (2002) The eye of the believer: Psychological influences on counter-terrorism
policy-making. Pardee RAND Graduate School, U.S.A.
[http://www.rand.org/pubs/rgs_dissertations/RGSD166.html]
[http://scholar.lib.vt.edu/theses/available/etd-12212006-142205/]
Schulz, Jan-Hendrik (2010) Der Aufbau einer "Antiimperialistischen Front" gegen NATO und
Staat: Zum Entwicklungsprozess einer terroristischen Kommunikationsstrategie in der Roten
Armee Fraktion (RAF) und der Action Directe (AD), 1984–1987 [in German]. Universität
Bielefeld, Germany.
[http://pub.uni-bielefeld.de/publication/2305069]
Shah, Mohamed Shah bin Hussin (2006) Terrorism in Malaysia: An investigation into Jemaah
Islamiah. University of Exeter, U.K.
[http://ethos.bl.uk/OrderDetails.do?did=1&uin=uk.bl.ethos.426171]
[http://ethos.bl.uk/OrderDetails.do?did=1&uin=uk.bl.ethos.486487]
Sinkkonen, Teemu (2009) Political responses to terrorism: Case study on the Madrid terrorist
attack on March 11, 2004, and its aftermath. Tampere University, Finland.
[http://tampub.uta.fi/handle/10024/66534]
Siradag, Abdurrahim (2012) Causes, rationales and dynamics: Exploring the strategic security
partnership between the European Union and Africa. Leiden University, the Netherlands
[https://openaccess.leidenuniv.nl/handle/1887/20359]
Skuldt, Amanda C. (2013) State sponsored terrorism? Leader survival and the foreign policy of
fear. University of Texas – Austin, U.S.A.
[http://hdl.handle.net/2152/21811]
Smith, Clifford Keith (2007) Development of prototype guidelines for risk management against
terror attack in the tourism industry: A Delphi study. Texas A&M University, U.S.A.
[http://hdl.handle.net/1969.1/5807]
Smith, Una (2011) Globalisation and the spread of terrorism in Northern and sub-Saharan
Africa: Causes and consequences. Massey University, New Zealand.
[http://hdl.handle.net/10179/4243]
[http://ethos.bl.uk/OrderDetails.do?did=22&uin=uk.bl.ethos.558330]
Spiegel, Eric Baron (2005) Internal and environmental buffers of terrorism-related anxiety.
University of Maryland, U.S.A.
[http://drum.lib.umd.edu/handle/1903/2367]
Sproat, Peter Alan (1997) An investigation of the concept of state terrorism. University of
Newcastle upon Tyne, U.K.
[http://ethos.bl.uk/OrderDetails.do?did=1&uin=uk.bl.ethos.337190]
Sreedharan, C. (2009) Reporting Kashmir: An analysis of the conflict coverage in Indian and
Pakistani newspapers. Bournemouth University, U.K.
[http://eprints.bournemouth.ac.uk/17116/]
Stampnitzky, Lisa Rachel (2008) Disciplining an unruly field: Terrorism studies and the state,
1972-2001. University of California, Berkeley, U.S.A.
[http://iis-db.stanford.edu/pubs/23109/Stampnitzky.pdf]
Stanley, Wesley (2010) Examining the link between regime type and terrorism: An evaluation of
recent trends. Georgetown University, U.S.A.
[http://repository.library.georgetown.edu/handle/10822/553589]
Stefatos, Katherine (2011) Engendering the nation: Women, state oppression and political
violence in post-war Greece (1946-1974). Goldsmiths College (University of London) U.K.
[http://eprints.gold.ac.uk/8057/]
Steinel, Anna (2007) Power, structures, and norms: Determinants and patterns of NATO-Russia
relations since 1997. University of Berlin, Germany.
[http://edoc.hu-berlin.de/dissertationen/steinel-anna-2007-10-23/PDF/steinel.pdf]
Stolovitskaia, Anastassia (2008) The rise of Homo Islamicus: American collective identity
markers and terrorist identity markers as they reveal themselves in a discursive cohesion of
concepts ‘terrorism’ and ‘Islam’ in the Washington Post 2001-2008. Roskilde University,
Denmark.
[http://hdl.handle.net/1800/3307]
Strindberg, Nils Tage Anders (2011) From the river to the sea? Honour, identity and politics in
historical and contemporary Palestinian rejectionism. University of St Andrews, U.K.
[http://research-repository.st-andrews.ac.uk/handle/10023/2646]
Sun, Holly (2010) Military manpower quality: A victim of the Global War on Terror?
Georgetown University, U.S.A.
[http://hdl.handle.net/10822/556037]
Sun, Qiankun (2008) Statistical modeling and inference for multiple temporal or spatial cluster
detection. Rutgers University, U.S.A.
[http://hdl.rutgers.edu/1782.2/rucore10001600001.ETD.000050446]
Synnestvedt Jensen, Louise (2013) Terrorism or hacking? A law interpretation on the concept of
cyber terrorism. Linnæus University, Sweden.
[http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-25203]
Tamana, Aazar (2010) US-Pakistan cooperation and Pakistan's security post-9/11. Curtin
University of Technology, Australia.
[http://espace.library.curtin.edu.au:80/R/?func=dbin-jump-
full&object_id=151594&local_base=gen01-era02]
Teahen, Shannon Hope (2008) Nuisance to crisis: Conceptualizing terrorism during the Nixon
administration. University of Waterloo, U.S.A.
[http://hdl.handle.net/10012/3954]
Teemu, Sinkkonen (2009) Political responses to terrorism: Case study on the Madrid terrorist
attack on March 11, 2004, and its aftermath. University of Tampere, Finland.
[http://tampub.uta.fi/bitstream/handle/10024/66534/978-951-44-7872-7.pdf?sequence=1]
Tellidis, Ioannis (2008) Preventing terrorism? Conflict resolution and nationalist violence in the
Basque country. University of St Andrews, U.K.
[http://ethos.bl.uk/OrderDetails.do?did=4&uin=uk.bl.ethos.552086]
Tembo, Edgar B. (2011) Assessing British and American counter-terrorism: intelligence, law
enforcement and military force (2006-2009) University of Sheffield, U.K.
[http://ethos.bl.uk/OrderDetails.do?did=92&uin=uk.bl.ethos.544173]
Terzic, Ibrahim (2008) Terror discourse in British media 2005. University of Helsinki, Finland.
[http://hdl.handle.net/10138/12517]
[http://digital.library.unt.edu/ark:/67531/metadc4569/]
Thompson, Alexi (2008) Terrorism's effect on tourism: Developed vs. developing countries.
Auburn University, U.S.A.
[http://hdl.handle.net/10415/1178]
Thorne, Sara (2010) Failures of imagination: Terrorist incident response in the context of crisis
management. University of Portsmouth, U.K.
[http://eprints.port.ac.uk/2650/]
Thurmond, Angela (2006) Terrorism in the age of Just War thinking. Louisiana State University,
U.S.A.
[http://etd.lsu.edu/docs/available/etd-04012006-152300/]
Tijhuis, Antonius Johannes Gerhardus (2006) Transnational crime and the interface between
legal and illegal actors: The case of the illicit art and antiquities trade. Leiden University, the
Netherlands.
[https://openaccess.leidenuniv.nl/handle/1887/4551]
[http://www.dart-europe.eu/full.php?id=277593]
[http://www.bth.se/fou/cuppsats.nsf/6753b78eb2944e0ac1256608004f0535/
b0a92934ff185eadc125768f004d188e?OpenDocument]
Toros, Harmonie (2009) Terrorism, talking and transformation, Northern Ireland and
Mindanao. Aberystwyth: The University of Wales.
[http://ethos.bl.uk/OrderDetails.do?did=1&uin=uk.bl.ethos.512244]
Tripathi, Deepak (2012) A critical study of the Afghanistan and Iraq wars: Interests, motives,
actions and the makings of a culture of violence. Roehampton University, U.K.
[http://roehampton.openrepository.com/roehampton/handle/10142/279052]
Tullberg, Emily (2006) The outside on the inside: An analysis of European Union and Finnish
state discourses on borders, security and mobility. University of Helsinki, Finland.
[http://hdl.handle.net/10138/12503]
Turksen, Umut (2008) Protection seekers, states and the new security agenda. University of
West of England, Bristol, U.K.
[http://ethos.bl.uk/OrderDetails.do?did=1&uin=uk.bl.ethos.490448]
Valiyev, Anar (2007) Urban terrorism: Do terrorists target cities and why? University of
Louisville, U.S.A.
[http://sunzi.lib.hku.hk/ER/detail/hkul/4354448]
Van de Voorde, Cecile Valerie (2006) Freedom fighters, freedom haters, martyrs, and evildoers:
The social construction of suicide terrorism. University of South Florida, U.S.A.
[http://scholarcommons.usf.edu/etd/2734/]
Vasconcelosm Caeiro A. (2011) Fatwas for European Muslims: the minority fiqh project and the
integration of Islam in Europe. Universiteit Utrecht, the Netherlands.
[http://igitur-archive.library.uu.nl/dissertations/2011-0524-200308/UUindex.html]
Vasconcelos, Maria LuiÌsa Silva de (2003) Terrorism and the use of violence in Portugal: from
the establishment of the Estado Novo to democratic stability University of Aberdeen, U.K.
[http://ethos.bl.uk/OrderDetails.do?did=1&uin=uk.bl.ethos.401420]
Vidanage, Harinda Ranura (2009) Exploring the impact of online politics on political agents and
political strategies in the Sri Lankan Tamil diaspora. University of Edinburgh, U.K.
[https://www.era.lib.ed.ac.uk/handle/1842/5949]
Vishnevetsky, Michael (2009) A socio-historical study into the emergence and development of
terrorist networks in the post-Soviet Chechen Republic. Keele University
[http://ethos.bl.uk/OrderDetails.do?did=142&uin=uk.bl.ethos.499342]
Vollmer, Brianne (2006) Biometrics, RFID technology, and the ePassport: Are Americans risking
personal security in the face of terrorism? Georgetown University, U.S.A.
[http://hdl.handle.net/10822/551578]
Walker, Clive (1982) The prevention of terrorism in British law. The University of Manchester,
U.K.
[http://ethos.bl.uk/OrderDetails.do?did=37&uin=uk.bl.ethos.517803]
Wang, Tsai-Yeh (2010) British women’s travel writings in the era of the French Revolution.
University of Birmingham. U.K.
[http://etheses.bham.ac.uk/1029/]
Wicaksana, I Gede Wahyu (2012) Islam and Indonesia's foreign policy, with special focus on
Jakata-Islamabad relations. University of Western Australia, Australia.
[http://repository.uwa.edu.au:80/R/?func=dbin-jump-
full&object_id=34221&local_base=GEN01-INS01]
Williams, Zachary (2008) Supply chain security: An institutional approach to strategies and
outcomes. Mississippi State University, U.S.A.
[http://sun.library.msstate.edu/ETD-db/theses/available/etd-03312008-163918/]
Williamson, Jason Kirk (2012) Mutable terrorism: Gerhard Richter, Hans-Peter Feldmann, and
the cultural memory of Germany’s Red Army Faction. University of Texas – Austin, U.S.A.
[http://hdl.handle.net/2152/ETD-UT-2012-08-6070]
Williamson, Myra Elsie Jane Bell (2007) Terrorism, war and international law: The legality of
the use of force against Afghanistan in 2001. University of Waikato, New Zealand.
[http://hdl.handle.net/10289/2594]
[http://hdl.handle.net/1807/25515]
Wilson, John Tyler (2011) Emergence delirium subsequent to general anesthesia in service
members who served during the global war on terrorism. East Carolina University, U.S.A.
[http://hdl.handle.net/10342/3721]
Wittig, Timothy Simon (2009) Power, value, and the individual exchange: Towards an improved
conceptualization of terrorist finance. University of St Andrews, U.K.
[http://ethos.bl.uk/OrderDetails.do?did=1&uin=uk.bl.ethos.552308]
Wolny, Kerstin (2006) Die völkerrechtliche Kriminalisierung von modernen Akten des
internationalen Terrorismus: unter besonderer Berücksichtigung des IStGH-Statuts [in German].
Universität St.Gallen, Switzerland.
[http://www1.unisg.ch/www/edis.nsf/wwwDisplayIdentifier/3251/$FILE/dis3251.pdf]
Wong, Yuna Huh (2006) Ignoring the innocent: Non-combatants in urban operations and in
military models and simulations. Pardee RAND Graduate School, U.S.A.
[http://www.rand.org/content/dam/rand/pubs/rgs_dissertations/2006/RAND_RGSD201.pdf]
[http://digital.library.unt.edu/ark:/67531/metadc5107/]
Worysz, Michael W. (2011) Hamas suicide terrorism: A last resort. Georgetown University,
U.S.A.
[http://hdl.handle.net/10822/558118]
Wright, Timothy Gregory Arthur (2007) Education and conflict: Border schools in Western
Uganda. University of Warwick, U.K.
[http://wrap.warwick.ac.uk/1164/]
Yaakub, Ahmad Nizar (2009) Malaysia and Indonesia: A study of foreign policies with special
reference to bilaterial relations. University of Western Australia, Australia
[http://repository.uwa.edu.au:80/R/?func=dbin-jump-
full&object_id=26663&local_base=GEN01-INS01]
Yayla, Ahmet (2005) Terrorism as a social information entity: A model for early intervention.
University of North Texas, U.S.A.
[http://digital.library.unt.edu/ark:/67531/metadc4800/]
Yehia, Hanan (2010) I don't want to pay for that! Representation and the public opinion—
foreign policy dynamic: public opinion on U.S. foreign aid spending from 1973 to 2005.
Georgetown University, U.S.A.
[http://hdl.handle.net/10822/555957]
Ygot-Riikonen, Maria Sheila (2004) "Quest for peace": Terrorism and conflict resolution
amongst Muslims and Christians in Southern Philippines. University of Helsinki, Finland.
[http://hdl.handle.net/10138/13577]
Yoon, Joon Hyuk (2013) A critical overview of international law with regard to the problem of
terrorism in the aftermath of the September 11, 2001 terrorist attacks. University of Ottawa,
Canada.
[http://hdl.handle.net/10393/25540]
Zhirkov, K. (2010) The social dominance perspective on support of terrorism among Muslims: A
cross-national study. Universiteit Utrecht, the Netherlands.
[http://igitur-archive.library.uu.nl/student-theses/2010-0707-200205/UUindex.html]
Zilbershtein, Gali (2010) Architecture in the era of terror: Design and perception of security in
two societies. Texas A&M University, U.S.A.
[http://hdl.handle.net/1969.1/ETD-TAMU-2009-05-671]
http://www.dnb.de/EN/Wir/Kooperation/dissonline/dissonline.html
ProQuest http://disexpress.umi.com/dxweb
About the Compiler: Eric Price is a Professional Information Specialist who, after a career with
the International Atomic Energy Agency (IAEA), joined Perspectives of Terrorism as Editorial
Assistant.
V. Book Reviews
“Counterterrorism Bookshelf ” – 20 Important Books on Terrorism
& Counterterrorism Related Subjects
by Joshua Sinai
This review column is the first in a series of columns that will provide a selective listing of
important books by leading publishers on terrorism and counterterrorism-related subjects.
The listings of publishers and their books are arranged in alphabetical order by publishers’
names, with their imprints included in their particular section. Within each section, the books
are listed in alphabetical order, according to the lead author’s last name. Although most of the
reviewed books are current, a few were published within the last several years, but are still
considered to be important. Future columns will review books by publishers such as CRC
Press, Hurst, Oxford University Press, Routledge, Stanford University Press, Springer, and
University of Chicago Press.
ABC Clio/Praeger
James Dingley, The IRA: The Irish Republican Army. Santa Barbara, CA: Praeger, 2012. 242
pages, US$52.00 [Hardcover], ISBN: 978-0-313-38703-6.
Daniel E. Price, Sacred Terror: How Faith Becomes Lethal. Santa Barbara, CA: Praeger, 2012.
268 pages, US$48.00, [Hardcover], ISBN: 978-0-313-38638-1.
An examination of whether and under what circumstances the theology and ideology of
religion (whether Christian, Jewish, or Islamic) "causes" terrorism, when the same religious
texts and traditions may be utilized by different elements to promote peaceful or violent
objectives. To validate this hypothesis, the author examines how religion-based terrorism has
manifested itself throughout history, including how it compares with other forms of terrorism.
One of the book’s findings is that the “real causes” of religion-based terrorism are influenced
by other forces in society, such as uthoritarianism, global power imbalance, foreign invasion
and occupation, globalization of the world economy, rapid modernization, and group
psychology. The author is an assistant professor at Westfield State University, Massachusetts.
An examination of the origins and evolution of Hizballah’s ideology since its founding as a
Lebanese Shi’ite organization in 1978. The volume covers topics such as Hizballah’s history
from 1978 to 2005, changes in its religious and political ideology, and the implications of such
changes on its political program and militant activities. The book is based on the author’s
doctoral dissertation. The author is Associate Professor of Islamic Studies at Radboud
University Nijmegen, the Netherlands.
Joseph Alagha, Hizbullah’s Documents: From the 1985 Open Letter to the 2009 Manifesto.
Amsterdam, The Netherlands: Pallas Publications/Amsterdam University Press, 2011. 222
pages, US$24.95 [Paperback] ISBN-13: 978-9085550372.
Zoltan Pall, Lebanese Salafis Between the Gulf and Europe: Development, Fractionalization and
Transnational Networks of Salafism in Lebanon. Amsterdam, The Netherlands: Amsterdam
University Press, 2013. 120 pages, US$25.00 [Paperback], ISBN-13: 978-9089644510.
An innovative and interesting exploration of the dynamics of the Salafi movement worldwide
and how these dynamics are reflected in the actions of their networks in Lebanon. The author
is Ph.D. candidate at the Faculty of Humanities, Utrecht University, the Netherlands.
The Netherlands Scientific Council for Government Policy, Dynamism in Islamic Activism:
Reference Points for Democratization and Human Rights. Amsterdam, The Netherlands:
Amsterdam University Press, 2006. 238 pages, US$49.95 [Paperback], ISBN-13:
978-9053569184.
Ashgate
Imran Awan and Brian Blakemore, editors, Extremism, Counter-Terrorism and Policing.
Burlington, VT: Ashgate, 2013. 174 pages, US$99.95, [Hardcover], ISBN: 978-1-4094-5321-5
The contributors to this important volume examine how violent extremism proliferates in
society and the types of measures (including policing) required to counter extremism at the
international and community levels. Chapters cover topics such as the origins and psychology
of extremism, the nature of extremist groups and organizations, and the relationship between
extremism, counterterrorism, and policing.
Warren Chin, Britain and the War on Terror: Policy, Strategy and Operations. Burlington, VT:
Ashgate, 2013. 250 pages, US$99.95 [Hardcover], ISBN-978-0-7546-9528-8.
A critical examination of the nature of Britain’s role in the “war on terror” and how, according
to the author, the military component became the dominant theme of what is basically an
ideological and political conflict. To examine this thesis, the author discusses Britain’s strategic
framework for conducting the “war on terror”, al Qaida’s strategic framework for its political,
religious, and military warfare, the decision of the British government to intervene in Iraq in
2003 and its involvement in the country through 2009, British strategy and operations in
Afghanistan from 2006 to 2010, and British countermeasures against the terrorist warfare
waged by al Qaida and its affiliates in the United Kingdom. The author is Senior Lecturer in
the Defence Studies Department, King's College London, UK, and Visiting Scholar at the
International Centre for Muslim and non-Muslim Understanding, University of South
Australia.
Michael Freeman, editor. Financing Terrorism: Case Studies. Burlington, VT: Ashgate, 2012.
256 pages, US$99.95 [Hardcover], ISBN-13: 978-1409442615.
The contributors to this important volume examine issues involved in financing terrorism and
the countermeasures required in response. Chapters cover topics such as the theory and
typology of different sources of terrorist financing, as well as case studies of financing by
terrorist insurgents in Iraq, the Lebanese Hizballah, the Kurdish PKK, the Pakistani LeT, the
Taliban in Pakistan and Afghanistan, the Sri Lankan LTTE, terrorist groups in the Philippines,
the Loyalists in Northern Ireland, Islamist militants in Albania, and the FARC and ELN in
Colombia. The concluding chapter discusses how to “think critically” about terrorist
financing. Michael Freeman, the volume’s editor, is an Assistant Professor at the Naval
Postgraduate School.
Bloomsbury
Emma Leonard and Gilbert Ramsay, editors. Globalizing Somalia: Multilateral, International,
and Transnational Repercussions of Conflict. New York, NY: Bloomsbury, 2013. 304 pages, US
$34.95 [Paperback], ISBN-13: 978-1780935690.
The contributors to this volume examine the repercussions at the regional and international
levels of the inability of the international and multilateral community (such as the United
Nations) to resolve the conflict in Somalia, particularly the failure (also by local actors) to
establish a stable government in this war-torn country. Chapters cover topics such as the
effectiveness of international and regional peacekeeping forces in Somalia, the nature of the
“Jihadi” insurgency in Somalia and the involvement in foreign fighters in its warfare, the threat
posed by Somali piracy and its links to international crime, the nature of involvement by the
United States, Japan, China, and the European Union in Somalia, and recommendations for
new intervention measures that may be more effective at resolving the conflict in Somalia.
Gilbert Ramsay, Jihadi Culture on the World Wide Web. New York, NY: Bloomsbury, 2013. 272
pages, US$130.00 [Hardcover], ISBN-13: 978-1441175625.
An examination of the utilization of the Internet by militant Jihadis for objectives such as
propaganda, radicalization and recruitment of new adherents. Using both Arabic and English
primary source materials, the author examines the interaction between the “producers” of
such content and their “consumers” in order to demonstrate how Jihadism is practiced in
cyberspace. Also discussed are the measures used by those who are opposed to such extremist
activities. The author is Lecturer at The Handa Centre for the Study of Terrorism and Political
Violence, University of St Andrews.
Ucko is associate professor at the College of International Security Affairs, National Defense
University, and Robert Egnell is visiting associate professor and Director of Teaching in the
Security Studies Program at Georgetown University, both in Washington, DC.
Ahmed S. Hashim, Insurgency and Counter-Insurgency in Iraq. Ithaca, NY: Cornell University
Press, 2006. 512 pages, $25.12 [Hardcover], ISBN-13: 978-0801444524.
A well-informed account of the nature, motives, tactics and effectiveness of the many groups
that formed the insurgency in Iraq and the U.S.-led counterinsurgency campaign against it,
following the overthrow of Saddam Hussein’s regime in March 2003. The author is Associate
Professor in Security Studies at the Rajaratnam School of International Studies at Nanyang
Technological University in Singapore (but taught at the U.S. Naval War College when the
book was published).
Jennifer M. Hazen, What Rebels Want: Resources and Supply Networks in Wartime. Ithaca, NY:
Cornell University Press, 2013. 208 pages, US $45.00 [Hardcover], ISBN-13: 978-0801451669.
An innovative account of the methods and tactics used by rebel groups to finance their
activities in order to obtain weapons, ammunition, and other vital supplies, which is an
important factor in understanding the trajectory of their capabilities and options in
conducting their insurgencies. The author argues that rebel groups often fail to obtain what
they require, with this thesis examined in the cases of civil wars in Sierra Leone, Liberia, and
Côte d'Ivoire. The author has extensive experience working with NGOs in West Africa and is
currently a senior analyst with BAE Systems.
Helen M. Kinsella, The Image Before the Weapon: A Critical History of the Distinction Between
Combatant and Civilian. Ithaca, NY: Cornell University Press, 2011. 264 pages, US$39.95
[Hardcover], ISBN13: 9780801449031.
Zachariah Cherian Mampilly, Rebel Rulers: Insurgent Governance and Civilian Life During
War. Ithaca, NY: Cornell University Press, 2011. 320 pages, US$45.00 [Hardcover], ISBN-13:
978-0801449130.
Idean Salehyan, Rebels Without Borders: Transnational Insurgencies in World Politics. Ithaca,
NY: Cornell University Press, 2009. 216 pages, US$21.00 [Paperback], ISBN-13:
978-0801477546.
Claudia Verhoeven, The Odd Man Karakozov: Imperial Russia, Modernity and the Birth of
Terrorism. Ithaca, NY: Cornell University Press, 2009. 248 pages, US$42.50 [Hardcover], US
$23.95 [Paperback], ISBN-13: 978-0801477577.
A highly interesting account of the modern origins of the revolutionary political violence
known as terrorism through the persona of Dmitry Karakozov, a revolutionary anarchist, who
pulled out a pistol and shot at Czar Alexander II, on April 4, 1866. Although the shot missed,
this “unheard-of-act” of rebellion against authority served to change the course of Russian
history and inaugurated the first wave of terrorism’s modern era. The author is Assistant
Professor of Modern European History at George Mason University.
About the Reviewer: Dr. Joshua Sinai is the Book Reviews Editor of ‘Perspectives on Terrorism’.
He can be reached at: [email protected].
PT is published six times per year as a free peer-reviewed online journal available at
www.terrorismanalysts.com. It seeks to provide a platform for established scholars as well as
academics and professionals entering the interdisciplinary fields of Terrorism, Political
Violence and Conflict Studies. The editors invite readers to:
• present their perspectives on the prevention of, and response to, terrorism and
related forms of violent conflict;
• use the journal as a forum for debate and commentary on issues related to the
above.
The journal’s articles are peer-reviewed by members of the Editorial Board as well as outside
experts. While aiming to be policy-relevant, PT does not support any partisan policies
regarding (counter-) terrorism and conflict-waging. Impartiality, objectivity and accuracy are
guiding principles that we require contributors to adhere to.
Legal Note: Perspectives on Terrorism (PT) hosts articles that reflect a diversity of opinions.
The views expressed therein, and the empirical evidence cited in their support, remain the sole
responsibility of the contributing authors; they do not necessarily reflect positions and views
of the journal’s Editorial Team and Editorial Board or PT’s parent organizations, the Terrorism
Research Initiative (TRI) and the Center for Terrorism and Security Studies (CTSS).