For More Information

Size: px
Start display at page:

Download "For More Information"

Transcription

1 THE ARTS CHILD POLICY CIVIL JUSTICE EDUCATION ENERGY AND ENVIRONMENT HEALTH AND HEALTH CARE INTERNATIONAL AFFAIRS NATIONAL SECURITY POPULATION AND AGING PUBLIC SAFETY SCIENCE AND TECHNOLOGY SUBSTANCE ABUSE TERRORISM AND HOMELAND SECURITY TRANSPORTATION AND INFRASTRUCTURE WORKFORCE AND WORKPLACE This PDF document was made available from as a public service of the RAND Corporation. Jump down to document6 The RAND Corporation is a nonprofit research organization providing objective analysis and effective solutions that address the challenges facing the public and private sectors around the world. Support RAND Purchase this document Browse Books & Publications Make a charitable contribution For More Information Visit RAND at Explore the RAND Corporation View document details Limited Electronic Distribution Rights This document and trademark(s) contained herein are protected by law as indicated in a notice appearing later in this work. This electronic representation of RAND intellectual property is provided for non-commercial use only. Unauthorized posting of RAND PDFs to a non-rand Web site is prohibited. RAND PDFs are protected under copyright law. Permission is required from RAND to reproduce, or reuse in another form, any of our research documents for commercial use. For information on reprint and linking permissions, please see RAND Permissions.

2 This product is part of the RAND Corporation monograph series. RAND monographs present major research findings that address the challenges facing the public and private sectors. All RAND monographs undergo rigorous peer review to ensure high standards for research quality and objectivity.

3 HOW TERRORIST GROUPS END Lessons for Countering al Qa ida SETH G. JONES MARTIN C. LIBICKI C O R P O R A T I O N

4 This research in the public interest was supported by RAND, using discretionary funds made possible by the generosity of RAND's donors, the fees earned on client-funded research, and independent research and development (IR&D) funds provided by the Department of Defense. Library of Congress Cataloging-in-Publication Data Jones, Seth G., 1972 How terrorist groups end : lessons for countering Al Qa ida / Seth G. Jones, Martin C. Libicki. p. cm. Includes bibliographical references. ISBN (pbk. : alk. paper) 1. Terrorism. 2. Terrorism Prevention International cooperation. 3. Intelligence service. 4. Problem-oriented policing. 5. Qaida (Organization) I. Libicki, Martin C. II. Title. HV6431.J '16 dc The RAND Corporation is a nonprofit research organization providing objective analysis and effective solutions that address the challenges facing the public and private sectors around the world. RAND s publications do not necessarily reflect the opinions of its research clients and sponsors. is a registered trademark. R Cover design by Carol Earnest Copyright 2008 RAND Corporation All rights reserved. No part of this book may be reproduced in any form by any electronic or mechanical means (including photocopying, recording, or information storage and retrieval) without permission in writing from RAND. Published 2008 by the RAND Corporation 1776 Main Street, P.O. Box 2138, Santa Monica, CA South Hayes Street, Arlington, VA Fifth Avenue, Suite 600, Pittsburgh, PA RAND URL: To order RAND documents or to obtain additional information, contact Distribution Services: Telephone: (310) ; Fax: (310) ; order@rand.org

5 About the Authors Seth G. Jones is a political scientist at RAND and an adjunct professor at Georgetown University s Edmund A. Walsh School of Foreign Service and the U.S. Naval Postgraduate School. He specializes in stability operations and counterinsurgency. He is the author of In the Graveyard of Empires: America s War in Afghanistan (W. W. Norton, forthcoming) and The Rise of European Security Cooperation (Cambridge University Press, 2007). He has published articles in such journals as International Security, National Interest, Security Studies, Chicago Journal of International Law, International Affairs, and Survival, as well as such newspapers and magazines as the New York Times, Newsweek, Financial Times, and International Herald Tribune. His RAND publications include Counterinsurgency in Afghanistan: RAND Counterinsurgency Study, Volume 4 (2008); Establishing Law and Order after Conflict (2005); The UN s Role in Nation-Building: From the Congo to Iraq (2005); and America s Role in Nation-Building: From Germany to Iraq (2003). He received an M.A. and Ph.D. from the University of Chicago. Martin C. Libicki is a senior management scientist at RAND, focusing on the relationship between information technology and national security. This work is documented in commercially published books, Conquest in Cyberspace: National Security and Information Warfare (2007) and Information Technology Standards: Quest for the Common Byte (1995), as well as in numerous monographs, notably What Is Information Warfare (1995), The Mesh and the Net: Speculations on Armed Conflict in a Time of Free Silicon (1994), and Exploring Terrorist Targeting Preferences (2007). He was also an editor of the RAND iii

6 iv How Terrorist Groups End: Lessons for Countering al Qa ida textbook, New Challenges, New Tools for Defense Decisionmaking (2003). His most recent assignments were to create and analyze a database of post World War II insurgencies, devise a strategy to maximize the use of information and information technology in countering insurgency, explore terrorists targeting preferences, develop a post September 11 information technology strategy for U.S. Department of Justice and the Defense Advanced Research Projects Agency s Terrorist Information Awareness program, conduct an information-security analysis for the FBI, and assess CIA s R&D venture, In-Q-Tel. Other work has examined information warfare and the revolution in military affairs. Prior employment includes 12 years at the National Defense University, three years on the Navy staff as program sponsor for industrial preparedness, and three years as a policy analyst for the U.S. Government Accountability Office s Energy and Minerals Division. He received a Ph.D. from the University of California, Berkeley.

7 Preface By analyzing 648 groups that existed between 1968 and 2006, this monograph examines how terrorist groups end. Its purpose is to inform U.S. counterterrorist efforts by understanding how groups have ended in the past and to assess implications for countering al Qa ida. This monograph results from the RAND Corporation s continuing program of self-initiated independent research. Support for such research is provided, in part, by donors and by the independent research and development provisions of RAND s contracts for the operation of its U.S. Department of Defense federally funded research and development centers. This research was conducted within the RAND National Security Research Division (NSRD) of the RAND Corporation. NSRD conducts research and analysis for the Office of the Secretary of Defense, the Joint Staff, the Unified Commands, the defense agencies, the Department of the Navy, the U.S. Intelligence Community, allied foreign governments, and foundations. For more information on the RAND National Security Research Division, contact the Director of Operations, Nurith Berstein. She can be reached by at Nurith_Berstein@rand.org; by phone at , extension 5469; or by mail at RAND, 1200 South Hayes Street, Arlington VA More information about the RAND Corporation is available at v

8

9 Contents About the Authors... iii Preface... v Figures... ix Tables... xi Summary...xiii Acknowledgments... xix Abbreviations... xxi CHAPTER ONE Introduction... 1 CHAPTER TWO How Terrorist Groups End... 9 CHAPTER THREE Policing and Japan s Aum Shinrikyo...45 CHAPTER FOUR Politics and the FMLN in El Salvador...63 CHAPTER FIVE Military Force and al Qa ida in Iraq...83 CHAPTER SIX The Limits of America s al Qa ida Strategy vii

10 viii How Terrorist Groups End: Lessons for Countering al Qa ida CHAPTER SEVEN Ending the War on Terrorism APPENDIXES A. End-of-Terror Data Set B. Al Qa ida Attacks, C. Regression Analysis References Index

11 Figures 2.1. How Terrorist Groups End (N = 268) Politics and Group Goals Settlement Between States and Terrorist Groups Breakdown of the 648 Groups Survivability of Religious Groups Income Level of Groups Income Level and End of Groups Size and Income Level of Groups Size and Type of Groups Size and Goals of Groups Size and End of Groups FMLN Goals and Settlement Prospects Map of al Anbar Province and Vicinity Al Qa ida Attacks, (excluding Iraq and Afghanistan) Al Qa ida s Geographic Expanse Al Qa ida s Base of Support, ix

12

13 Tables 5.1. Insurgent Groups and Income Insurgent Groups and Size Insurgent Groups and Goals The End of Insurgent Groups A.1. Organizations in the Data Set B.1. Al Qa ida Attacks, C.1. Peak-Size Variable C.2. All Explanatory Variables C.3. Peak-Size and Is-Religious Variables C.4. Peak-Size and Is-Nationalist Variables xi

14

15 Summary All terrorist groups eventually end. But how do they end? Answers to this question have enormous implications for counterterrorism efforts. The evidence since 1968 indicates that most groups have ended because (1) they joined the political process or (2) local police and intelligence agencies arrested or killed key members. Military force has rarely been the primary reason for the end of terrorist groups, and few groups within this time frame achieved victory. This has significant implications for dealing with al Qa ida and suggests fundamentally rethinking post September 11 U.S. counterterrorism strategy. The ending of most terrorist groups requires a range of policy instruments, such as careful police and intelligence work, military force, political negotiations, and economic sanctions. Yet policy makers need to understand where to prioritize their efforts with limited resources and attention. Following an examination of 648 terrorist groups that existed between 1968 and 2006, we found that a transition to the political process is the most common way in which terrorist groups ended (43 percent). The possibility of a political solution is inversely linked to the breadth of terrorist goals. Most terrorist groups that end because of politics seek narrow policy goals. The narrower the goals of a terrorist organization, the more likely it can achieve them without violent action and the more likely the government and terrorist group may be able to reach a negotiated settlement. Against terrorist groups that cannot or will not make a transition to nonviolence, policing is likely to be the most effective strategy (40 percent). Police and intelligence services have better training and xiii

16 xiv How Terrorist Groups End: Lessons for Countering al Qa ida information to penetrate and disrupt terrorist organizations than do such institutions as the military. They are the primary arm of the government focused on internal security matters. Local police and intelligence agencies usually have a permanent presence in cities, towns, and villages; a better understanding of the threat environment in these areas; and better human intelligence. Other reasons are less common. For example, in 10 percent of the cases, terrorist groups ended because their goals were achieved, and military force led to the end of terrorist groups in 7 percent of the cases. Militaries tended to be most effective when used against terrorist groups engaged in an insurgency in which the groups were large, well armed, and well organized. Insurgent groups have been among the most capable and lethal terrorist groups, and military force has usually been a necessary component in such cases. Against most terrorist groups, however, military force is usually too blunt an instrument. Military tools have increased in precision and lethality, especially with the growing use of precision standoff weapons and imagery to monitor terrorist movement. But even precision weapons have been of limited use against terrorist groups. The use of substantial U.S. military power against terrorist groups also runs a significant risk of turning the local population against the government by killing civilians. Our quantitative analysis looked at groups that have ended since 1968 or are still active. It yielded several other interesting findings: Religious terrorist groups take longer to eliminate than other groups. Approximately 62 percent of all terrorist groups have ended since 1968, but only 32 percent of religious terrorist groups have ended. Religious groups rarely achieve their objectives. No religious group that has ended achieved victory since Size is a significant determinant of a group s fate. Big groups of more than 10,000 members have been victorious more than 25 percent of the time, while victory is rare when groups are smaller than 1,000 members. There is no statistical correlation between the duration of a terrorist group and ideological motivation, economic conditions,

17 Summary xv regime type, or the breadth of terrorist goals. But there appears to be some correlation between the size of a terrorist group and duration: Larger groups tend to last longer than smaller groups. When a terrorist group becomes involved in an insurgency, it does not end easily. Nearly 50 percent of the time, groups ended by negotiating a settlement with the government; 25 percent of the time, they achieved victory; and 19 percent of the time, military forces defeated them. Terrorist groups from upper-income countries are much more likely to be left-wing or nationalist and much less likely to be motivated by religion. Implications for al Qa ida What does this mean for counterterrorism efforts against al Qa ida? After September 11, 2001, the U.S. strategy against al Qa ida centered on the use of military force. Indeed, U.S. policymakers and key national-security documents referred to operations against al Qa ida as the war on terrorism. Other instruments were also used, such as cutting off terrorist financing, providing foreign assistance, engaging in diplomacy, and sharing information with foreign governments. But military force was the primary instrument. The evidence by 2008 suggested that the U.S. strategy was not successful in undermining al Qa ida s capabilities. Our assessment concludes that al Qa ida remained a strong and competent organization. Its goals were the same: uniting Muslims to fight the United States and its allies (the far enemy) and overthrowing western-friendly regimes in the Middle East (the near enemy) to establish a pan-islamic caliphate. Al Qa ida has been involved in more terrorist attacks since September 11, 2001, than it was during its prior history. These attacks spanned Europe, Asia, the Middle East, and Africa. Al Qa ida s modus operandi also evolved and included a repertoire of more-sophisticated improvised explosive devices (IEDs) and a growing use of suicide attacks. Its organizational structure evolved, making it a more dangerous enemy. This included a bottom-up approach (encouraging independent action

18 xvi How Terrorist Groups End: Lessons for Countering al Qa ida from low-level operatives) and a top-down one (issuing strategy and operations from a central hub in Pakistan). 1 Ending the War on Terror Al Qa ida s resurgence should trigger a fundamental rethinking of U.S. counterterrorism strategy. Based on our analysis of how terrorist groups end, a political solution is not possible. Since al Qa ida s goal remains the establishment of a pan-islamic caliphate, there is little reason to expect that a negotiated settlement with governments in the Middle East is possible. A more effective approach would be adopting a twofront strategy. First, policing and intelligence should be the backbone of U.S. efforts. In Europe, North America, North Africa, Asia, and the Middle East, al Qa ida consists of a network of individuals who need to be tracked and arrested. This would require careful work abroad from such organizations as the Central Intelligence Agency (CIA) and Federal Bureau of Investigation (FBI), as well as their cooperation with foreign police and intelligence agencies. Second, military force, though not necessarily U.S. soldiers, may be a necessary instrument when al Qa ida is involved in an insurgency. Local military forces frequently have more legitimacy to operate than the United States has, and they have a better understanding of the operating environment, even if they need to develop the capacity to deal with insurgent groups over the long run. This means a light U.S. military footprint or none at all. The U.S. military can play a critical role in building indigenous capacity but should generally resist being drawn into combat operations in Muslim societies, since its presence is likely to increase terrorist recruitment. A key part of this strategy should include ending the notion of a war on terrorism and replacing it with such concepts as counterterrorism, which most governments with significant terrorist threats use. The Brit- 1 Bruce Hoffman, Challenges for the U.S. Special Operations Command Posed by the Global Terrorist Threat: Al Qaeda on the Run or on the March? written testimony submitted to the U.S. House of Representatives Committee on Armed Services Subcommittee on Terrorism, Unconventional Threats, and Capabilities, February 14, 2007, p. 3.

19 Summary xvii ish government, among others, has already taken this step and abjured the phrase war on terror. The phrase raises public expectations both in the United States and elsewhere that there is a battlefield solution to the problem of terrorism. It also encourages others abroad to respond by conducting a jihad (or holy war) against the United States and elevates them to the status of holy warriors. Terrorists should be perceived and described as criminals, not holy warriors. Our analysis suggests that there is no battlefield solution to terrorism. Military force usually has the opposite effect from what is intended: It is often overused, alienates the local population by its heavy-handed nature, and provides a window of opportunity for terrorist-group recruitment. This strategy should also include rebalancing U.S. resources and attention on police and intelligence work. It also means increasing budgets at the CIA, U.S. Department of Justice, and U.S. Department of State and scaling back the U.S. Department of Defense s focus and resources on counterterrorism. U.S. special operations forces will remain critical, as will U.S. military operations to counter terrorist groups involved in insurgencies. There is reason to be hopeful. Our analysis concludes that al Qa ida s probability of success in actually overthrowing any government is close to zero. Out of all the religious groups that ended since 1968, none ended by achieving victory. Al Qa ida has virtually unachievable objectives in trying to overthrow multiple regimes in the Middle East. To make matters worse, virtually all governments across Europe, North America, South America, Asia, the Middle East, and Africa consider al Qa ida an enemy. As al Qa ida expert Peter Bergen has noted, Making a world of enemies is never a winning strategy. 2 2 Peter Bergen, Al Qaeda Status, written testimony submitted to the U.S. House of Representatives Permanent Select Committee on Intelligence, April 9, 2008.

20

21 Acknowledgments This book would not have been possible without the help of numerous individuals. Nathan Chandler provided key research support and was intimately involved in building and revising the data set. His role was fundamental, and his fingerprints are on virtually every page of the document. Daniel Byman and Lindsay Clutterbuck provided thorough reviews, which significantly improved the quality of the document. Bruce Hoffman, Gary Berntsen, and James Dobbins provided useful information and critiques. Audrey Kurth Cronin and Timothy Crawford offered excellent comments at the American Political Science Association conference in We owe a special debt of gratitude to those government officials from the United States, Afghanistan, Pakistan, Iraq, India, Canada, and European countries who took time out of their busy schedules to provide us critical information about al Qa ida and counterterrorism efforts. In the United States, these included individuals at the National Ground Intelligence Center, Defense Intelligence Agency, Central Intelligence Agency, White House, Office of the Secretary of Defense, U.S. Agency for International Development, and U.S. Department of State. Most did not want to be identified because of the sensitivity of the information they provided, so we cannot thank them by name. xix

22

23 Abbreviations ANC AQI ARENA ATAG BNP CI CIA COPAZ CPA EOKA ETA FBI African National Congress al Qa ida in Iraq Alianza Republicana Nacionalista [Nationalist Republican Alliance] Association Totalement Anti-Guerre [Totally Anti- War Group] Bangladesh Nationalist Party confidence interval Central Intelligence Agency Comisión Nacional para la Consolidación de la Paz [National Commission for the Consolidation of Peace] Coalition Provisional Authority Ethniki Organosis Kyprion Agoniston [National Organization of Cypriot Fighters] Euskadi Ta Askatasuna [Basque Fatherland and Freedom] Federal Bureau of Investigation xxi

24 xxii How Terrorist Groups End: Lessons for Countering al Qa ida FLN Front de Libération Nationale [National Liberation Front] FLQ Front de Libération du Québec [Liberation Front of Quebec] FMLN Frente Farabundo Martí para la Liberación Nacional [Farabundo Marti National Liberation Front] GIA Groupe Islamique Armé [Armed Islamic Group] GNI gross national income GSPC Groupe Salafiste pour la Prédication et le Combat [al-qa ida Organization in the Islamic Maghreb] Hamas Harakat al-muqawama al-islamiyya IAI Islamic Army in Iraq ICITAP International Criminal Investigative Training Assistance Program IED improvised explosive device IRA Irish Republican Army ISI Islamic State of Iraq JAMI Al-Jabhah al-islamiyah al-muqawamah al-iraqiyah [Islamic Front for Iraqi Resistance: Salah-Al-Din Al-Ayyubi Brigades] JeM Jaish-e-Mohammad JSDF Japan Self-Defense Forces Lehi Lohamei Herut Israel M-19 Movimiento 19 de Abril [April 19 Movement] MSC Mujahedeen Shura Council NSRD RAND National Security Research Division

25 Abbreviations xxiii ONUSAL OPEC PKK QPP RCMPSS RENAMO RUF UCLAT USAID United Nations Observer Mission in El Salvador Organization of the Petroleum Exporting Countries Partiya Karkerên Kurdistan [Kurdistan Workers Party] Quebec Provincial Police, a loose translation of Sûreté du Québec Royal Canadian Mounted Police Security Service Resistencia Nacional Mozambicana [Mozambique National Resistance Movement] Revolutionary United Front l Unité de Coordination de la Lutte Antiterroriste [Antiterrorist Coordination Unit] U.S. Agency for International Development

26

27 CHAPTER ONE Introduction There has been a great deal of work on why individuals or groups resort to terrorism. 1 There has also been a growing literature on whether terrorism works. 2 But there has been virtually no systematic analysis by policymakers or academics on how terrorism ends. 3 Methodological problems plague most of the works that have addressed the end of 1 Bruce Hoffman, Inside Terrorism, 2nd ed., New York: Columbia University Press, 2006; Walter Reich, ed., Origins of Terrorism: Psychologies, Ideologies, Theologies, States of Mind, Washington, D.C.: Woodrow Wilson Center Press, 1998; Marc Sageman, Understanding Terror Networks, Philadelphia, Pa.: University of Pennsylvania Press, 2004; Jessica Stern, Terror in the Name of God: Why Religious Militants Kill, New York: HarperCollins Publishers, 2003; Martha Crenshaw, The Causes of Terrorism, in Charles W. Kegley, ed., International Terrorism: Characteristics, Causes, Controls, New York: St. Martin s, 1990, pp On suicide terrorism, see, for example, Robert A. Pape, Dying to Win: The Strategic Logic of Suicide Terrorism, New York: Random House, 2005; and Mia Bloom, Dying to Kill: The Allure of Suicide Terror, New York: Columbia University Press, 2005, pp Ehud Sprinzak, Rational Fanatics, Foreign Policy, No. 120, September October 2000, pp ; Pape (2005); Alan M. Dershowitz, Why Terrorism Works: Understanding the Threat, Responding to the Challenge, New Haven, Conn.: Yale University Press, 2002; David A. Lake, Rational Extremism: Understanding Terrorism in the Twenty-First Century, Dialogue IO, Vol. 1, No. 1, January 2002, pp ; Andrew Kydd and Barbara F. Walter, The Strategies of Terrorism, International Security, Vol. 31, No. 1, Summer 2006, pp ; Robert Trager and Dessislava P. Zagorcheva, Deterring Terrorism: It Can Be Done, International Security, Vol. 30, No. 3, Winter , pp There has been some work. See, for example, Audrey Kurth Cronin, Ending Terrorism: Lessons for Defeating al-qaeda, Abingdon, Oxon: Routledge for International Institute for Strategic Studies, 2008; Martha Crenshaw, Why Violence Is Rejected or Renounced: A Case Study of Oppositional Terrorism, in Thomas Gregor, ed., A Natural History of Peace, Nashville, Tenn.: Vanderbilt University Press, 1996, pp ; U.S. Institute of Peace, How Terrorism Ends, Washington, D.C.,

28 2 How Terrorist Groups End: Lessons for Countering al Qa ida terrorist groups. They focus on one case, such as the Irish Republican Army (IRA), or perhaps a handful of cases in which a terrorist group abandons the use of terror. As with many case studies, a small number of observations can lead to indeterminate results. They do not control for random error, which can make it extremely difficult to determine which of several alternative explanations is the most viable. The value of this study is that it looks at all terrorist groups since It is more systematic than previous analyses. In our view, the United States cannot conduct an effective long-term counterterrorism campaign against al Qa ida or other terrorist groups without understanding how terrorist groups end. This research seeks to fill this gap. It asks, How have terrorist groups ended in the past? What are the implications for dealing with al Qa ida? As explained in more detail in Chapter Two, terrorist groups can end in several ways. Military or police forces defeat some; some splinter by joining existing terrorist groups or forming new ones; some calculate that they can better achieve their goals through nonviolence; and a few achieve victory. But sorting out how frequently and how groups end remains a puzzle. This research has significant implications for U.S. foreign policy. In a memo to senior U.S. Department of Defense officials, for instance, former secretary of defense Donald Rumsfeld asked, Are we winning or losing the Global War on Terror? It continued, Are we capturing, killing or deterring and dissuading more terrorists every day than the madrassas and the radical clerics are recruiting, training and deploying against us? Does the US need to fashion a broad, integrated plan to stop the next generation of terrorists? The US is putting relatively little effort into a longrange plan, but we are putting a great deal of effort into trying to stop terrorists. 4 4 Donald H. Rumsfeld, secretary of defense, Global War on Terrorism, memorandum to General Richard B. Myers, Paul Wolfowitz, General Peter Pace, and Douglas J. Feith, October 16, 2003.

29 Introduction 3 At the core of these concerns is confusion about which counterterrorism strategies are most likely to be effective. One major reason is that there has been little systematic analysis of how terrorist groups have ended in the past. Definitions While there is no broadly accepted definition of terrorism, this monograph argues that terrorism involves the use of politically motivated violence against noncombatants to cause intimidation or fear among a target audience. 5 There are several fundamental aspects of terrorism. Terrorism has a political nature and involves the perpetration of acts designed to encourage political change. It involves the targeting of civilians. And it is restricted to organizations other than a national government. Although one could broaden the definition of terrorism to include the actions of a national government against its own or another population, adopting such a broad definition would distract attention from what policymakers would most like to know: how to combat the threat that violent substate groups pose. Further, it could also create analytic confusion. Terrorist organizations and state governments have different levels of resources, face different kinds of incentives, and are susceptible to different types of pressures. Accordingly, the determinants of their behavior are not likely to be the same and, thus, require separate theoretical investigations. 6 A terrorist group is defined as a collection of individuals belonging to a nonstate entity that uses terrorism to achieve its objectives. Such an entity has at least some command and control apparatus that, no 5 There are many definitions of terrorism. See, for example, U.S. Department of State, Office of the Coordinator for Counterterrorism, Country Reports on Terrorism 2005, Washington, D.C., 2006, p. 9; Hoffman (2006, pp. 1 41); Pape (2005, p. 9); and Audrey Kurth Cronin, Behind the Curve: Globalization and International Terrorism, International Security, Vol. 27, No. 3, Winter , pp , p Robert A. Pape, The Strategic Logic of Suicide Terrorism, American Political Science Review, Vol. 97, No. 3, August 2003, pp

The Geography of International terrorism

The Geography of International terrorism SUB Hamburg A/596060 The Geography of International terrorism An Introduction to Spaces and Places of Violent Non-State Groups Richard M. Medina and George F. Hepner CRC Press Taylor & Francis Croup Boca

More information

AT A HEARING ENTITLED THREATS TO THE HOMELAND

AT A HEARING ENTITLED THREATS TO THE HOMELAND STATEMENT OF JAMES B. COMEY DIRECTOR FEDERAL BUREAU OF INVESTIGATION BEFORE THE COMMITTEE ON HOMELAND SECURITY AND GOVERNMENTAL AFFAIRS UNITED STATES SENATE AT A HEARING ENTITLED THREATS TO THE HOMELAND

More information

Terrorist or freedom fighter or..?

Terrorist or freedom fighter or..? Learning outcomes Students will practice arguing and understanding views which are not necessarily their own Students will gain an understanding of how history can judge events in a different way from

More information

The Iraq Study Group Report

The Iraq Study Group Report The Iraq Study Group Report James A. Baker, III, and Lee H. Hamilton, Co-Chairs Lawrence S. Eagleburger, Vernon E. Jordan, Jr., Edwin Meese III, Sandra Day O Connor, Leon E. Panetta, William J. Perry,

More information

National Security Agency

National Security Agency National Security Agency 9 August 2013 The National Security Agency: Missions, Authorities, Oversight and Partnerships That s why, in the years to come, we will have to keep working hard to strike the

More information

Policy Instruments & (Side)-Effects

Policy Instruments & (Side)-Effects Policy Instruments & (Side)-Effects EU Parl. LIBE Hearing on the fight against terrorism and the challenges for EU internal security Quirine Eijkman, Centre for Terrorism and Counter-Terrorism Faculty

More information

Law Enforcement Assessment of the Violent Extremism Threat. Charles Kurzman and David Schanzer June 25, 2015

Law Enforcement Assessment of the Violent Extremism Threat. Charles Kurzman and David Schanzer June 25, 2015 Law Enforcement Assessment of the Violent Extremism Threat Charles Kurzman and David Schanzer June 25, 2015 About the Authors Charles Kurzman is a professor of sociology at the University of North Carolina

More information

Espionage and Intelligence. Debra A. Miller, Book Editor

Espionage and Intelligence. Debra A. Miller, Book Editor Espionage and Intelligence Debra A. Miller, Book Editor Intelligence... has always been used by the United States to support U.S. military operations, but much of what forms today s intelligence system

More information

Name. September 11, 2001: A Turning Point

Name. September 11, 2001: A Turning Point Name Directions: For the following questions(s), use this passage adapted from Mark Kishlansky s, Patrick Geary s, and Patricia O Brien s text, Civilization in the West. September 11, 2001: A Turning Point

More information

For More Information

For More Information CHILDREN AND FAMILIES EDUCATION AND THE ARTS ENERGY AND ENVIRONMENT HEALTH AND HEALTH CARE INFRASTRUCTURE AND TRANSPORTATION INTERNATIONAL AFFAIRS LAW AND BUSINESS NATIONAL SECURITY POPULATION AND AGING

More information

Assessment of the Terror Threat to Denmark

Assessment of the Terror Threat to Denmark 19 March 2015 Assessment of the Terror Threat to Denmark Summary The terrorist attacks in Copenhagen on 14 and 15 February 2015 confirm that the terror threat to Denmark is significant. There are individuals

More information

Psychological Warfare and Terrorism

Psychological Warfare and Terrorism Psychological Warfare and Terrorism Robert D. Hanser This brief article demonstrates that there are common psychological principles that can be effectively and directly applied to illustrate the utility

More information

It is well known that drug prohibition has created a lucrative. War on two fronts. The global convergence of terrorism and narcotics trafficking

It is well known that drug prohibition has created a lucrative. War on two fronts. The global convergence of terrorism and narcotics trafficking War on two fronts The global convergence of terrorism and narcotics trafficking Nikesh Trecarten It is well known that drug prohibition has created a lucrative global black market and has not been effective

More information

For More Information

For More Information CHILDREN AND FAMILIES EDUCATION AND THE ARTS ENERGY AND ENVIRONMENT HEALTH AND HEALTH CARE INFRASTRUCTURE AND TRANSPORTATION The RAND Corporation is a nonprofit institution that helps improve policy and

More information

Background Report: 9/11, Ten Years Later

Background Report: 9/11, Ten Years Later Background Report: 9/11, Ten Years Later THE UNIQUE NATURE OF 9/11 Among terrorism incidents in the United States and around the world, al-qa ida s attacks on September 11, 21, are notably unique. FATALITIES

More information

JOHN DAVIDSON WOODWARD, JR.

JOHN DAVIDSON WOODWARD, JR. JOHN DAVIDSON WOODWARD, JR. Professor of the Practice of International Relations The Frederick S. Pardee School of Global Studies, Boston University 152 Bay State Road, Boston, MA 02215 E-mail: jdwjr@bu.edu

More information

Erbil Declaration. Regional Women s Security Forum on Resolution UNSCR 1325

Erbil Declaration. Regional Women s Security Forum on Resolution UNSCR 1325 Erbil Declaration Regional Women s Security Forum on Resolution UNSCR 1325 The Women s Security Forum on Resolution No 1325 for the Middle East and North Africa (MENA) region concluded its work in Erbil

More information

Theme: The Growing Role of Private Security Companies in Protecting the Homeland.

Theme: The Growing Role of Private Security Companies in Protecting the Homeland. Theme: The Growing Role of Private Security Companies in Protecting the Homeland. Background on terrorist organizations: A global threat, every object is a target, infinite number of targets. Terrorist

More information

GAO COMBATING TERRORISM. Observations on Options to Improve the Federal Response. Testimony

GAO COMBATING TERRORISM. Observations on Options to Improve the Federal Response. Testimony GAO For Release on Delivery Expected at 3:00 p.m. Tuesday, April 24, 2001 United States General Accounting Office Testimony Before the Subcommittee on Economic Development, Public Buildings, and Emergency

More information

148 Summaries Intelligence services in Europe and America; the reorientation since the collapse of the Berlin wall and September 11th 2001

148 Summaries Intelligence services in Europe and America; the reorientation since the collapse of the Berlin wall and September 11th 2001 148 Summaries Justitiële verkenningen (Judicial explorations) is published nine times a year by the Research and Documentation Centre of the Dutch Ministry of Justice in cooperation with Boom Juridische

More information

Foreign Affairs and National Security

Foreign Affairs and National Security Foreign Affairs and National Security Objectives: TLW understand and explain the following questions as it relates to the Foreign affairs of the American Government What is foreign policy? What is the

More information

Appendix A: Gap Analysis Spreadsheet. Competency and Skill List. Critical Thinking

Appendix A: Gap Analysis Spreadsheet. Competency and Skill List. Critical Thinking Appendix A: Gap Analysis Spreadsheet Competency and Skill List Competency Critical Thinking Data Collection & Examination Communication & Collaboration Technical Exploitation Information Security Computing

More information

Assessment of the terror threat to Denmark

Assessment of the terror threat to Denmark 28 April 2016 Assessment of the terror threat to Denmark Summary The terror threat to Denmark remains significant. This means that there are individuals with intent and capacity to commit terrorist attacks

More information

TESTIMONY. Analyzing Terrorism Risk HENRY WILLIS CT-252. November 2005

TESTIMONY. Analyzing Terrorism Risk HENRY WILLIS CT-252. November 2005 TESTIMONY Analyzing Terrorism Risk HENRY WILLIS CT-252 November 2005 Testimony presented before the House Homeland Security Committee, Subcommittee on Intelligence, Information Sharing, and Terrorism Risk

More information

Homeland Security and Terrorism COURSE SYLLABUS

Homeland Security and Terrorism COURSE SYLLABUS Homeland Security and COURSE SYLLABUS Course: CRJU 491T Section: 001 Semester: Spring 2015 UNIVERSITY OF SOUTH CAROLINA DEPARTMENT OF CRIMINOLOGY AND CRIMINAL JUSTICE Instructor: Leslie G. Wiser, Jr. Office:

More information

The Design of an Undergraduate Program In Homeland Security

The Design of an Undergraduate Program In Homeland Security VOLUME 6, NUMBER 1, 2012 The Design of an Undergraduate Program In Homeland Security Jon E. Travis Professor Director, Higher Ed Doctoral Program Director, Center for Community College Education Department

More information

MA PROGRAM IN MILITARY STRATEGIC STUDIES INTRODUCTION

MA PROGRAM IN MILITARY STRATEGIC STUDIES INTRODUCTION MA PROGRAM IN MILITARY STRATEGIC STUDIES INTRODUCTION WHAT IS MSS The interdisciplinary Military Strategic Studies program is concerned with understanding, analyzing and explaining the military dimension

More information

HUMAN RIGHTS AND INTERNATIONAL HUMANITARIAN LAW

HUMAN RIGHTS AND INTERNATIONAL HUMANITARIAN LAW UNITED STATES INSTITUTE OF PEACE Academy for International Conflict Management and Peacebuilding HUMAN RIGHTS AND INTERNATIONAL HUMANITARIAN LAW May 15 17, 2012 Tuesday Thursday Washington, DC Developed

More information

THE PREPARATION AND OPERATIONAL ACTIVITIES OF ALLIED AND HUNGARIAN MILITARY SECURITY FORCES AGAINST INTERNATIONAL TERRORISM

THE PREPARATION AND OPERATIONAL ACTIVITIES OF ALLIED AND HUNGARIAN MILITARY SECURITY FORCES AGAINST INTERNATIONAL TERRORISM ZRÍNYI MIKLÓS NATIONAL DEFENCE UNIVERSITY MILITARY SCIENCES PHD SCHOOL Colonel Antal Beraczkai THE PREPARATION AND OPERATIONAL ACTIVITIES OF ALLIED AND HUNGARIAN MILITARY SECURITY FORCES AGAINST INTERNATIONAL

More information

Overview: Terrorism in 2014

Overview: Terrorism in 2014 BACKGROUND REPORT Overview: Terrorism in In, more than 16,800 terrorist attacks took place worldwide, causing more than 43,500 deaths and more than 40,900 injuries, including perpetrator casualties. More

More information

Hearing before the House Permanent Select Committee on Intelligence. Homeland Security and Intelligence: Next Steps in Evolving the Mission

Hearing before the House Permanent Select Committee on Intelligence. Homeland Security and Intelligence: Next Steps in Evolving the Mission Hearing before the House Permanent Select Committee on Intelligence Homeland Security and Intelligence: Next Steps in Evolving the Mission 18 January 2012 American expectations of how their government

More information

FUNDING FOR DEFENSE, MILITARY OPERATIONS, HOMELAND SECURITY, AND RELATED ACTIVITIES SINCE

FUNDING FOR DEFENSE, MILITARY OPERATIONS, HOMELAND SECURITY, AND RELATED ACTIVITIES SINCE FUNDING FOR DEFENSE, MILITARY OPERATIONS, HOMELAND SECURITY, AND RELATED ACTIVITIES SINCE 9/11 Steven Kosiak, Director of Budget Studies, Center for Strategic & Budgetary Assessments Since the terrorist

More information

A COMPARATIVE ASSESSMENT OF SAUDI ARABIA

A COMPARATIVE ASSESSMENT OF SAUDI ARABIA A COMPARATIVE ASSESSMENT OF SAUDI ARABIA WITH OTHER COUNTRIES OF THE ISLAMIC WORLD Targeting Terrorist Finances Project * Watson Institute for International Studies Brown University June 2004 During the

More information

Confrontation or Collaboration?

Confrontation or Collaboration? Confrontation or Collaboration? Congress and the Intelligence Community Domestic Intelligence Eric Rosenbach and Aki J. Peritz Domestic Intelligence Unlike many nations, the United States does not have

More information

SUMMARY OF KEY SECTIONS OF THE USA PATRIOT ACT OF 2001 By Richard Horowitz, Esq.

SUMMARY OF KEY SECTIONS OF THE USA PATRIOT ACT OF 2001 By Richard Horowitz, Esq. . SUMMARY OF KEY SECTIONS OF THE USA PATRIOT ACT OF 2001 By Richard Horowitz, Esq. The Patriot Act was signed into law by President George W. Bush on October 26, 2001. It passed in the Senate by a vote

More information

How safe is the American homeland?

How safe is the American homeland? The Oxford Council on Good Governance OCGG Security Section Advice Program US Foreign, Security, and Defence Policy Governance Area US Security Policy You may not be interested in war, but war is interested

More information

Brief Biographical Sketch

Brief Biographical Sketch Department of Political Science University of California, Davis Davis, California 95616 (530) 752-2262 E-mail: mnincic@ucdavis.edu Present Position Brief Biographical Sketch Miroslav Nincic Professor of

More information

Option 1: Use the Might of the U.S. Military to End the Assad Regime

Option 1: Use the Might of the U.S. Military to End the Assad Regime 1 Option 1: Use the Might of the U.S. Military to End the Assad Regime The Syrian dictatorship s use of chemical weapons against its own people was terrible. But we must not let it overshadow the larger

More information

COURSE DESCRIPTION FOR THE BACHELOR DEGREE IN INTERNATIONAL RELATIONS

COURSE DESCRIPTION FOR THE BACHELOR DEGREE IN INTERNATIONAL RELATIONS COURSE DESCRIPTION FOR THE BACHELOR DEGREE IN INTERNATIONAL RELATIONS Course Code 2507205 Course Name International Relations of the Middle East In this course the student will learn an historical and

More information

Offensive capabilities

Offensive capabilities Chapter 5 5 Beyond signals intelligence: Offensive capabilities 5.1 Introduction Documents released by German magazine Der Spiegel provide a much richer picture of the offensive activities of the NSA and

More information

RESPONSE TO THE GOVERNMENT REVIEW OF THE MUSLIM BROTHERHOOD 22 DECEMBER 2015

RESPONSE TO THE GOVERNMENT REVIEW OF THE MUSLIM BROTHERHOOD 22 DECEMBER 2015 RESPONSE TO THE GOVERNMENT REVIEW OF THE MUSLIM BROTHERHOOD 22 DECEMBER 2015 PHOTO: ALLEGED MUSLIM BROTHERHOOD HEADQUARTERS IN LONDON CAMPAIGN AGAINST ANTISEMITISM PO Box 2647, London W1A 3RB Registered

More information

The Labor Market for Attorneys in the State of California

The Labor Market for Attorneys in the State of California R The Labor Market for Attorneys in the State of California Past, Present, and Future Tora Kay Bikson, Megan Beckett, Susan Gates, Cassandra Guarino, Karen Ross, Ron Zimmer Supported by the University

More information

Education PhD: Political Science, Department of International Studies Università degli Studi Roma Tre, Roma, Italy, 2010-2013

Education PhD: Political Science, Department of International Studies Università degli Studi Roma Tre, Roma, Italy, 2010-2013 Curriculum Vitae Niccolò Petrelli Center for International Security and Cooperation (CISAC) Encina Hall, 616 Serra Street 94305-6055 Stanford California, USA 001-415-490-7300 nicpetrelli@gmail.com; petrelli@stanford.edu

More information

Description of Homeland Security

Description of Homeland Security Majoring in.... Homeland Security Description of Homeland Security What is homeland security? Homeland security and emergency preparedness (the official name of the major) is the study of international

More information

Report on the Secretary s Application of the Discretionary Authority Contained in Section 212(d)(3)(B)(i) of the Immigration and Nationality Act

Report on the Secretary s Application of the Discretionary Authority Contained in Section 212(d)(3)(B)(i) of the Immigration and Nationality Act Report on the Secretary s Application of the Discretionary Authority Contained in Section 212(d)(3)(B)(i) of the Immigration and Nationality Act Annual Report to Congress Fiscal Year 2014 U.S. Citizenship

More information

Home Security: Russia s Challenges

Home Security: Russia s Challenges Home Security: Russia s Challenges A Russian Perspective Andrei Fedorov * Home security: Russia s challenges Home security and the struggle against terrorism is one of the most crucial issues for the Russian

More information

Results of Palestinian Public Opinion Poll No 25 22-24 January 2006

Results of Palestinian Public Opinion Poll No 25 22-24 January 2006 An-Najah National University Center for Opinion Polls and Survey Studies Tel: (972) (9) 2345113 Fax: (972)(9) 2345982 Nablus Palestinian: P.O.Box 7, 707 Email: Polls@najah.edu hussein596@yahoo.com Results

More information

Examples of International terrorist attacks since 9/11

Examples of International terrorist attacks since 9/11 PAPER ONE INTERNATIONAL TERRORISM: THE THREAT Any discussion of the Government s strategy to reduce the threat from international terrorism to the UK and its citizens must begin with the nature of the

More information

ANDREW M. BELL Department of Political Science, Duke University Durham, NC 27708 email: andrew.bell (at) duke.edu

ANDREW M. BELL Department of Political Science, Duke University Durham, NC 27708 email: andrew.bell (at) duke.edu ANDREW M. BELL, email: andrew.bell (at) duke.edu EDUCATION Ph.D. in Political Science, October 2015 (expected) M.A. in Political Science, May 2012, Preliminary Exams passed December 2011 Major fields:

More information

Contending Theories of International Relations

Contending Theories of International Relations A 362352 Contending Theories of International Relations A Comprehensive Survey Fifth Edition James E. Dougherty St. Joseph's University Robert L. Pfaltzgraff, Jr. The Fletcher School of Law and Diplomacy,

More information

The Meaning of Russia s Campaign in Syria

The Meaning of Russia s Campaign in Syria Defense and Intelligence The Meaning of Russia s Campaign in Syria By S.R. Covington Foreword by Kevin Ryan December 2015 Defense and Intelligence The Meaning of Russia s Campaign in Syria By S.R. Covington

More information

Comparison of the STEEPLE Strategy Methodology and the Department of Defense s PMESII-PT Methodology. Joseph Walden. Supply Chain Leadership Institute

Comparison of the STEEPLE Strategy Methodology and the Department of Defense s PMESII-PT Methodology. Joseph Walden. Supply Chain Leadership Institute Joe Walden, 2011 Comparison of the STEEPLE Strategy Methodology and the Department of Defense s PMESII-PT Methodology Joseph Walden Supply Chain Leadership Institute i Joe Walden, 2011 Abbreviations PMESII-PT:

More information

Drone Warfare: effective or counter-productive?

Drone Warfare: effective or counter-productive? Drone Warfare: effective or counter-productive? Stefan Wolff, University of Birmingham While there can be no doubt that the national and international legal regulation of the deployment of Unmanned Aerial

More information

Memorandum. Strengthening Professional Training for Diplomacy and International Relations

Memorandum. Strengthening Professional Training for Diplomacy and International Relations December 28, 2006 Memorandum To: Walter Anderson From: Lloyd Etheredge Re: Strengthening Professional Training for Diplomacy and International Relations I. Building International Capacity: A Historical

More information

Full Time JD/MA Int l Studies Recommended Degree Plan

Full Time JD/MA Int l Studies Recommended Degree Plan Full Time JD/MA Int l Studies Recommended Degree Plan 1st Year 2nd Year 3rd Year 4th Year Fall Semester (JD) Spring Semester (JD) Fall Quarter Winter Quarter Spring Quarter Fall Qtr/Fall Sem Winter Qtr/

More information

How To Study Political Science At Pcj.Edu

How To Study Political Science At Pcj.Edu Political Science Courses-1 American Politics POL 110/American Government Examines the strengths and weaknesses, problems and promise of representative democracy in the United States. Surveys the relationships

More information

Expert Seminar. Engagement with Non-State Armed Groups in Peace Processes

Expert Seminar. Engagement with Non-State Armed Groups in Peace Processes Expert Seminar Engagement with Non-State Armed Groups in Peace Processes Sept. 14 th and 15 th, 2010, Berlin Background: Non-state armed groups (NSAG) conflict regions. By exercising armed violence and

More information

This PDF document was made available from www.rand.org as a public service of the RAND Corporation.

This PDF document was made available from www.rand.org as a public service of the RAND Corporation. TESTIMONY THE ARTS CHILD POLICY CIVIL JUSTICE EDUCATION ENERGY AND ENVIRONMENT This PDF document was made available from www.rand.org as a public service of the RAND Corporation. Jump down to document6

More information

Graduate Certificate in Global Security Studies. Brandon Prins Political Science UTK

Graduate Certificate in Global Security Studies. Brandon Prins Political Science UTK Graduate Certificate in Global Security Studies Brandon Prins Political Science UTK Purpose of Certificate Program Training Increase understanding of salient security issues, such as the proliferation

More information

Une nouvelle gouvernance mondiale pour le développement durable. The Exhaustion of Sovereignty: International Shaping of Domestic Authority Structures

Une nouvelle gouvernance mondiale pour le développement durable. The Exhaustion of Sovereignty: International Shaping of Domestic Authority Structures Une nouvelle gouvernance mondiale pour le développement durable Taking the Initiative on Global Governance and Sustainable Development Paris, 13-14 avril 2003. The Exhaustion of Sovereignty: International

More information

CMJS/SOCI 4013 Homeland Security

CMJS/SOCI 4013 Homeland Security CMJS/SOCI 4013 Homeland Security Instructor Information: Professor: Dr. Gruenewald (jgruenew@uark.edu) TA: Kristin Kelley (kxk001@uark.edu) Office Location: Old Main 221 Office Phone: 479-575-2057 Office

More information

Danish lessons learned: The comprehensive/integrated approach after Iraq and Afghanistan

Danish lessons learned: The comprehensive/integrated approach after Iraq and Afghanistan Military Studies Magazine Danish lessons learned: The comprehensive/integrated approach after Iraq and Afghanistan by Peter Viggo Jakobsen Photo: Forsvaret ISSUE 01, VOLUME 02, 2014 1 Subcribe at fak.dk/eng/magazine

More information

Dear Delegates, It is a pleasure to welcome you to the 2014 Montessori Model United Nations Conference.

Dear Delegates, It is a pleasure to welcome you to the 2014 Montessori Model United Nations Conference. Dear Delegates, It is a pleasure to welcome you to the 2014 Montessori Model United Nations Conference. The following pages intend to guide you in the research of the topics that will be debated at MMUN

More information

The Senior Executive s Role in Cybersecurity. By: Andrew Serwin and Ron Plesco.

The Senior Executive s Role in Cybersecurity. By: Andrew Serwin and Ron Plesco. The Senior Executive s Role in Cybersecurity. By: Andrew Serwin and Ron Plesco. 1 Calling All CEOs Are You Ready to Defend the Battlefield of the 21st Century? It is not the norm for corporations to be

More information

FLORIDA STATE COLLEGE AT JACKSONVILLE COLLEGE CREDIT COURSE OUTLINE

FLORIDA STATE COLLEGE AT JACKSONVILLE COLLEGE CREDIT COURSE OUTLINE Form 2A, Page 1 FLORIDA STATE COLLEGE AT JACKSONVILLE COLLEGE CREDIT COURSE OUTLINE COURSE NUMBER: AMH 2047 COURSE TITLE: American Military History PREREQUISITE(S): None COREQUISITE(S): None CREDIT HOURS:

More information

The Plight of Christians in the Middle East. Supporting Religious Freedom, Pluralism, and Tolerance During a Time of Turmoil

The Plight of Christians in the Middle East. Supporting Religious Freedom, Pluralism, and Tolerance During a Time of Turmoil AP PHOTO/HUSSEIN MALLA The Plight of Christians in the Middle East Supporting Religious Freedom, Pluralism, and Tolerance During a Time of Turmoil By Brian Katulis, Rudy deleon, and John Craig March 2015

More information

Lesson Plan: Islamophobia in the Shadow of 9/11

Lesson Plan: Islamophobia in the Shadow of 9/11 Lesson Plan: Islamophobia in the Shadow of 9/11 Grades 10-12 Purpose In this lesson, students will critically analyze various media for manifestations of Islamophobia. They will also learn to recognize

More information

For More Information

For More Information C O R P O R A T I O N CHILDREN AND FAMILIES EDUCATION AND THE ARTS ENERGY AND ENVIRONMENT HEALTH AND HEALTH CARE INFRASTRUCTURE AND TRANSPORTATION INTERNATIONAL AFFAIRS LAW AND BUSINESS NATIONAL SECURITY

More information

Contents. Foreword Abbreviations. Chapter 1: Introduction. I. Statement of the Problem 1. II. Object of the Research 2. III. Purpose of the Research 2

Contents. Foreword Abbreviations. Chapter 1: Introduction. I. Statement of the Problem 1. II. Object of the Research 2. III. Purpose of the Research 2 Foreword Abbreviations V XXII Chapter 1: Introduction I. Statement of the Problem 1 II. Object of the Research 2 III. Purpose of the Research 2 IV. Methodology of the Research 3 V. Structure of the Research

More information

Intelligence Analysis for Homeland Security RPAD 557

Intelligence Analysis for Homeland Security RPAD 557 Intelligence Analysis for Homeland Security RPAD 557 Instructor: Dr. James E. Steiner Public Service Professor Rockefeller College SUNY Albany 518-708-4183 Office hours: by appointment 423 State Street

More information

OVERVIEW OF THE ADMINISTRATION S FY 2005 REQUEST FOR HOMELAND SECURITY By Steven M. Kosiak

OVERVIEW OF THE ADMINISTRATION S FY 2005 REQUEST FOR HOMELAND SECURITY By Steven M. Kosiak March 22, 2004 OVERVIEW OF THE ADMINISTRATION S FY 2005 REQUEST FOR HOMELAND SECURITY By Steven M. Kosiak The Bush Administration s fiscal year (FY) 2005 budget request includes $47.4 billion for homeland

More information

Methodological Approach: Typologies of Think Tanks

Methodological Approach: Typologies of Think Tanks Methodological Approach: Typologies of Think Tanks Unlike Stone, Donald Abelson applies a typology of think tanks by focusing on four distinctive periods of think tanks development to recognise the major

More information

2 Gabi Siboni, 1 Senior Research Fellow and Director,

2 Gabi Siboni, 1 Senior Research Fellow and Director, Cyber Security Build-up of India s National Force 2 Gabi Siboni, 1 Senior Research Fellow and Director, Military and Strategic Affairs and Cyber Security Programs, Institute for National Security Studies,

More information

An Interactive Planning Approach to Shaping U.S.-Russian Relations

An Interactive Planning Approach to Shaping U.S.-Russian Relations An Interactive Planning Approach to Shaping U.S.-Russian Relations PONARS Eurasia Policy Memo No. 172 September 2011 Dmitry Gorenburg Harvard University U.S. policy toward Russia, as toward the rest of

More information

The White House CVE Summit

The White House CVE Summit The White House CVE Summit February 17-20/2015 Washington DC 1. CVE Roundtable with Vice- President Biden + three American cities (17 th feb.) 2. Meeting with Homeland Security & IA (18 th feb.) Presentation:

More information

Computer and Network Security in Higher Education

Computer and Network Security in Higher Education Mark Luker and Rodney Petersen Computer and Network Security in Higher Education Mark Luker and Rodney Petersen, Editors A Publication of EDUCAUSE Copyright 2003 Jossey-Bass Inc. Published by Jossey-Bass,

More information

David H. Gray. 5 March, 2008

David H. Gray. 5 March, 2008 Educational Research and Review Vol. 3 (4), pp. 114-120, April, 2008 Available online at http://www.academicjournals.org/err ISSN 1990-3839 2008 Academic Journals Full Length Research Paper Needs assessment

More information

EU COOPERATION. The Madrid bombings have provided additional impetus for action. In an 18-page declaration on counter terrorism on

EU COOPERATION. The Madrid bombings have provided additional impetus for action. In an 18-page declaration on counter terrorism on TESTIMONY BY AMBASSADOR J. COFER BLACK COORDINATOR FOR COUNTERTERRORISM DEPARTMENT OF STATE BEFORE THE SENATE FOREIGN RELATIONS SUBCOMMITTEE ON EUROPE MARCH 31, 2004 Thank you Mr. Chairman and members

More information

CARVER+Shock Vulnerability Assessment Tool

CARVER+Shock Vulnerability Assessment Tool Published by: Government Training Inc. ISBN: 978-09832361-7-7 CARVER+Shock Vulnerability Assessment Tool A Six Step Approach to Conducting Security Vulnerability Assessments on Critical Infrastructure

More information

m a s t e r o f s c i e n c e i n

m a s t e r o f s c i e n c e i n m a s t e r o f s c i e n c e i n Global affairs The M.S. in Global Affairs is the flagship graduate program of the Center for Global Affairs (CGA), ranked by the Foreign Policy Association in 2010 and

More information

ECOWAS COUNTER-TERRORISM STRATEGY AND IMPLEMENTATION PLAN Draft Dr Deo Barakamfitiye

ECOWAS COUNTER-TERRORISM STRATEGY AND IMPLEMENTATION PLAN Draft Dr Deo Barakamfitiye ECOWAS COUNTER-TERRORISM STRATEGY AND IMPLEMENTATION PLAN Draft Dr Deo Barakamfitiye Director, ISS Regional Office for West Africa dbarakamfitiye@issafrica.org 0 www.issafrica.org OUTLINE Historical Overview

More information

Schusterman Visiting Israeli Assistant Professor of Government, Government Department, Claremont McKenna College

Schusterman Visiting Israeli Assistant Professor of Government, Government Department, Claremont McKenna College ILAI Z. SALTZMAN Government Department International Relations Program Claremont McKenna College Kravis Center 245 (909) 607 3798 ilai.saltzman@claremonmckenna.edu CURRENT POSITION Schusterman Visiting

More information

For More Information

For More Information CHILDREN AND FAMILIES EDUCATION AND THE ARTS ENERGY AND ENVIRONMENT HEALTH AND HEALTH CARE INFRASTRUCTURE AND TRANSPORTATION INTERNATIONAL AFFAIRS LAW AND BUSINESS NATIONAL SECURITY POPULATION AND AGING

More information

GEOGRAPHY 3320/5320 Geography of Terrorism and Homeland Security George F. Hepner 581-6021 george.hepner@geog.utah.edu

GEOGRAPHY 3320/5320 Geography of Terrorism and Homeland Security George F. Hepner 581-6021 george.hepner@geog.utah.edu GEOGRAPHY 3320/5320 Geography of Terrorism and Homeland Security George F. Hepner 581-6021 OSH 270 george.hepner@geog.utah.edu Course Description: Geography has traditions of 1) using the concepts of geographic

More information

Ohio Families First:

Ohio Families First: OHIO HEART AND SOUL www.tedstrickland.com Ohio Families First: Defeating Terrorism & Keeping Americans Safe On 9/11, our country was attacked on our home soil, and none of us who lived through that day

More information

Adewale Banjo, PhD. Adewale Banjo 2013 UNISA Schoolof Business Leadership 1

Adewale Banjo, PhD. Adewale Banjo 2013 UNISA Schoolof Business Leadership 1 Adewale Banjo, PhD Adewale Banjo 2013 UNISA Schoolof Business Leadership 1 Over 1.78 million private security officers are registered in South Africa ( SAnews.gov.za, 31 January 2013) Registered & unregistered

More information

The Need to Share: The U.S. Intelligence Community and Law Enforcement

The Need to Share: The U.S. Intelligence Community and Law Enforcement The Need to Share: The U.S. Intelligence Community and Law Enforcement A White Paper prepared by the AFCEA Intelligence Committee April 2007 Serving Intelligence Professionals and their Community The Need

More information

Mark Shaw MarkHughShaw@gmail.com

Mark Shaw MarkHughShaw@gmail.com Summary of expertise Mark Shaw MarkHughShaw@gmail.com Extensive international experience in the United Nations and as a senior international consultant in reviewing police, justice and prison systems in

More information

in Counseling A Guide to the Use of Psychological Assessment Procedures Danica G. Hays

in Counseling A Guide to the Use of Psychological Assessment Procedures Danica G. Hays Assessment in Counseling A Guide to the Use of Psychological Assessment Procedures Danica G. Hays AMERICAN COUNSELING ASSOCIATION 5999 Stevenson Avenue Alexandria, VA 22304 www.counseling.org Assessment

More information

UN Security Council Resolution 1540: Monitoring and Detecting Breaches in Biosecurity & Illicit Trafficking of BW-Related Materials

UN Security Council Resolution 1540: Monitoring and Detecting Breaches in Biosecurity & Illicit Trafficking of BW-Related Materials UN Security Council Resolution 1540: Monitoring and Detecting Breaches in Biosecurity & Illicit Trafficking of BW-Related Materials Dana Perkins, PhD 1540 Committee Expert Biological Weapons Convention

More information

(U) Appendix E: Case for Developing an International Cybersecurity Policy Framework

(U) Appendix E: Case for Developing an International Cybersecurity Policy Framework (U) Appendix E: Case for Developing an International Cybersecurity Policy Framework (U//FOUO) The United States lacks a comprehensive strategic international policy framework and coordinated engagement

More information

CATO HANDBOOK CONGRESS FOR POLICY RECOMMENDATIONS FOR THE 108TH CONGRESS. Washington, D.C.

CATO HANDBOOK CONGRESS FOR POLICY RECOMMENDATIONS FOR THE 108TH CONGRESS. Washington, D.C. CATO HANDBOOK FOR CONGRESS POLICY RECOMMENDATIONS FOR THE 108TH CONGRESS Washington, D.C. 6. Homeland Security Congress should monitor closely the implementation of the new Department of Homeland Security

More information

CHAPTER 13: International Law, Norms, and Human Rights

CHAPTER 13: International Law, Norms, and Human Rights CHAPTER 13: International Law, Norms, and Human Rights MULTIPLE CHOICE 1. Why did the former Secretary General of the United Nations, Kofi Annan, state that the US invasion of Iraq in 2003 was illegal?

More information

The Implication of TMD System in Japan to China s Security

The Implication of TMD System in Japan to China s Security The Sixth ISODARCO Beijing Seminar on Arms Control October 29-Novermber 1, 1998 Shanghai, China The Implication of TMD System in Japan to China s Security Institute of World Economics & Politics Chinese

More information

EDUCATION: EXPERIENCE: Ph.D. Iowa State University, Fall 1998 Fields: Public Economics, Environmental Economics, Microeconomic Theory

EDUCATION: EXPERIENCE: Ph.D. Iowa State University, Fall 1998 Fields: Public Economics, Environmental Economics, Microeconomic Theory Kevin Siqueira University of Texas at Dallas School of Economic, Political and Policy Sciences 800 W Campbell Rd, GR 31 Richardson, TX 75080-3021 (972) 883-6480 siqueira@utdallas.edu EDUCATION: Ph.D. Iowa

More information

Resolution 1244 (1999) Adopted by the Security Council at its 4011th meeting, on 10 June 1999

Resolution 1244 (1999) Adopted by the Security Council at its 4011th meeting, on 10 June 1999 Resolution 1244 (1999) Adopted by the Security Council at its 4011th meeting, on 10 June 1999 The Security Council, Bearing in mind the purposes and principles of the Charter of the United Nations, and

More information

M. Landon-Murray, Ph.D.

M. Landon-Murray, Ph.D. Michael Landon-Murray, Ph.D. School of Public Affairs, University of Colorado, Colorado Springs 1420 Austin Bluffs Parkway Colorado Springs, CO 80918 (719) 255-4185; mlandonm@uccs.edu Academic Positions

More information

Comparative Politics and International Relations. University of South Carolina, Columbia, SC. M.A., Political Science, 2015

Comparative Politics and International Relations. University of South Carolina, Columbia, SC. M.A., Political Science, 2015 Matthew L. Wagner Curriculum Vitae Contact Information Fields Education Phone:(619) 871-4084 Url: http://www.matthewlwagner.info Gambrell Hall 317 Email: wagnerm5@email.sc.edu 817 Henderson Street Email:

More information

The National Counterintelligence Strategy of the United States

The National Counterintelligence Strategy of the United States The National Counterintelligence Strategy of the United States Office of the National Counterintelligence Executive March 2005 National Counterintelligence Strategy of the United States PREFACE The Counterintelligence

More information

Statement for the Record by. Dr. Donald M. Kerr. Director, National Reconnaissance Office, Nominee for the Position of

Statement for the Record by. Dr. Donald M. Kerr. Director, National Reconnaissance Office, Nominee for the Position of Statement for the Record by Dr. Donald M. Kerr Director, National Reconnaissance Office, Nominee for the Position of Principal Deputy Director of National Intelligence, before the Senate Select Committee

More information