We use cookies to distinguish you from other users and to provide you with a better experience on our websites. Close this message to accept cookies or find out how to manage your cookie settings.
To save content items to your account,
please confirm that you agree to abide by our usage policies.
If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account.
Find out more about saving content to .
To save content items to your Kindle, first ensure no-reply@cambridge.org
is added to your Approved Personal Document E-mail List under your Personal Document Settings
on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part
of your Kindle email address below.
Find out more about saving to your Kindle.
Note you can select to save to either the @free.kindle.com or @kindle.com variations.
‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi.
‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.
This chapter explores denationalization, focusing on Indonesian foreign terrorist fighters (FTFs). Post-9/11 and during the Arab Spring, Western democracies tightened border control to combat terrorism, enabling the stripping of citizenship from involved individuals. Denationalization, via law or public-authority decisions, emerged as a contentious counter-terrorism tool. Indonesia, as a Muslim-majority Southeast Asian nation, partially embraced denationalization, refusing to repatriate Indonesian FTFs. This aligns with global security concerns but raises statelessness questions. The chapter examines denationalization’s legal framework, international obligations, and the blurred line between de jure and de facto statelessness. Critics argue that disproportionately applying denationalization to Muslims undermines human rights, inter-state cooperation and international justice. Refusal to repatriate Indonesian FTFs raises concerns about long-term consequences and due process. Understanding denationalization nuances is vital, considering its impact on the citizenship rights of individuals involved in terrorism.
Deprivation of national citizenship is one of the strategies used to counter the phenomenon of foreign terrorist fighters, that is, individuals traveling abroad for the purpose of terrorism. This Article begins with a short overview of the case-law of the European Court of Human Rights on the deprivation of citizenship. In these cases, the contestation of the deprivation of citizenship was based on the infringement of the rights to private and family life. We then turn to the limits imposed by EU law on decisions made by national authorities of Member States concerning citizenship deprivation of foreign terrorist fighters. Focusing on recent cases of the Court of Justice of the European Union (CJEU) concerning the European citizenship, we address the evolving role that EU law plays in the assessment of the proportionality of Member States’ decisions to strip individuals of national citizenship. We also consider the national practice, focusing on a recent decision in Denmark. In addition, we consider legal issues arising from the repatriation of Foreign Terrorist Fighters and their children. We argue that EU citizenship thus offers a further layer of protection against the deprivation of citizenship and that Member States are under a positive obligation to repatriate EU citizens who are the children of Foreign Terrorist Fighters on account of the case-law stemming from the Ruiz-Zambrano and X (Thai national) cases. For the moment, no common approach to repatriation of foreign fighters, or their children, is taken by EU member States in the context of the EU.
Terrorism and trauma survivors often experience changes in biomarkers of autonomic, inflammatory and hypothalamic-pituitary-adrenal (HPA) axis assessed at various times. Research suggests interactions of these systems in chronic stress.
Study Objective:
This unprecedented retrospective study explores long-term stress biomarkers in three systems in terrorism survivors.
Methods:
Sixty healthy, direct terrorism survivors were compared to non-exposed community members for cardiovascular reactivity to a trauma script, morning salivary cortisol, interleukin 1-β (IL-1β), and interleukin 2-R (IL-2R). Survivors’ biomarkers were correlated with psychiatric symptoms and diagnoses and reported functioning and well-being seven years after the Oklahoma City (OKC) bombing.
Main outcome measures were the Diagnostic Interview Schedule (DIS) Disaster Supplement for Diagnostic and Statistical Manual of Mental Disorders, Fourth Edition, Text Revision (DSM-IV-TR) diagnoses, Impact of Events Scale-Revised (IES-R), Beck Depression Inventory-II (BDI-II), Distress and Functioning Scale (DAF), and General Physical Well-Being Scale.
Results:
Survivors had higher inflammatory IL-1β, lower anti-inflammatory IL-2R, lower cortisol, higher resting diastolic blood pressure (BP), and less cardiovascular reactivity to a trauma script than comparisons. Survivors’ mean posttraumatic stress (PTS) symptom levels did not differ from comparisons, but survivors reported worse well-being. None of survivors’ biomarkers correlated with PTS or depressive symptoms or diagnoses or reported functioning.
Conclusions:
Alterations of biological stress measures in cardiovascular, inflammatory, and cortisol systems coexisted as an apparent generalized long-term response to terrorism rather than related to specific gauges of mental health. Potential interactions of biomarkers long after trauma exposure is discussed considering relevant research. Longer-term follow-up could determine whether biomarkers continue to differ or correlate with subjective measures, or if they accompany health problems over time. Given recent international terrorism, understanding long-term sequelae among direct survivors is increasingly relevant.
Heroes and villains, idealists and mercenaries, freedom fighters and religious fanatics. Foreign fighters tend to defy easy classification. Good and bad images of the foreign combatant epitomize different conceptions of freedom and are used to characterize the rightness or wrongness of this actor in civil wars. The book traces the history of these figures and their afterlife. It does so through an interdisciplinary methodology employing law, history, and psychoanalytical theory, showing how different images of the foreign combatant are utilized to proscribe or endorse foreign fighters in different historical moments. By linking the Spanish, Angolan, and Syrian civil wars, the book demonstrates how these figures function as a precedent for later periods and how their heritage keeps haunting the imaginary of legal actors in the present.
The architecture of international counterterrorism law is the subject of Chapter 2. It is a branch of public international law that has emerged from an evolving special legal regime to regulate action to prevent and punish terrorism and to tackle terrorists. International counterterrorism law is a matrix of global terrorism treaties and dedicated United Nations Security Council resolutions that require the incorporation of offences into domestic law combined with the salient rules of international humanitarian law and the law of law enforcement. These rules, which regulate when and against whom force may be used in counterterrorism, are supplemented by (though are sometimes inconsistent with) the content of regional treaties and domestic legislation. The standards and laws are subject to the constraints and oversight of international human rights law. The chapter also describes the content and adherence of regional counterterrorism treaties.
Continuing the analysis in Chapter 9, this chapter considers how changing international security constellations have contributed to the remilitarization of democracy. It argues that international antiterror programmes have destabilized the foundations of constitutional law. On one hand, such policies have redefined national security objectives, such that the negotiated component of constitutional law is weakened. On the other hand, such policies have fundamentally altered the role of international human rights law in global society. As a result, states have been able to legitimate more directly militarized actions towards their own populations and towards the populations of other states.
Chapter 3 covers national criminal law on terrorism worldwide. A total of 188 States (of the total of 197 recognized by the Secretary-General of the United Nations in his capacity as treaty depositary) have domestic legislation in place specifically criminalizing acts of terrorism. Despite certain commonalities, the definitions of these crimes are unique to each individual State. At the time of writing, only one State, Micronesia, had no dedicated legislative provisions on terrorism of any form in its domestic law. A further seven States – the Republic of Congo, Dominica, Eritrea, Kuwait, Sierra Leone, Suriname, and Yemen – repress the financing of terrorism with criminal sanction but do not also establish the perpetration of an act of terrorism as a distinct criminal offence.
This study investigates the public health implications of terrorist attacks on telecommunications infrastructure globally, assessing the direct and indirect impacts on emergency response and medical services.
Methods
Utilizing retrospective analysis, this research delves into incidents recorded in the Global Terrorism Database (GTD) from 1970 to 2020. The study employs descriptive statistical methods to identify patterns and examine the regional distribution and frequency of these attacks, alongside the types of weaponry used and the direct casualties involved.
Results
The analysis underscores a significant focus on telecommunications by terrorist groups, revealing a frequent use of high-impact weapons like explosives and incendiary devices aimed at maximizing disruption. The study highlights considerable regional variations in the frequency and nature of attacks, emphasizing the strategic importance of these infrastructures to public safety and health systems.
Conclusions
The findings demonstrate the critical need for robust security enhancements tailored to regional threats and the integration of advanced technologies in public safety strategies. The research advocates for enhanced international cooperation and policymaking to mitigate the impacts of these attacks, ensuring telecommunications resilience in the face of global terrorism.
Open-source intelligence is readily available and inexpensive. Hamas collected a lot of information from open sources, mainly the Israeli press. In this case, Hamas exploited the fact that Israel is a democratic state with a relatively free press to get valuable information for its operations. This sort of collection activity became more organized after Hamas took control of the Gaza Strip and was Hamas’s main source for strategic analysis. This chapter describes the intelligence content Hamas gathered from open sources and that content’s contribution to its activities.
Since its founding in 1987, the political and ideological dimensions of the terror organization Hamas have been well discussed by scholars. In contrast, this innovative study takes a new approach by exploring the entire scope of Hamas’s intelligence activity against its state adversary, Israel. Using primary sources in Arabic, Hebrew, and English, the author analyzes the development of Hamas’s various methods for gathering information, its use of this information for operational needs and strategic analysis, and its counterintelligence activity against the Israeli intelligence apparatus. The Hamas Intelligence War against Israel explores how Hamas’s activity has gradually become more sophisticated as its institutions have become more established and the nature of the conflict has changed. As the first full-length study to analyze the intelligence efforts of a violent non-state actor, this book sheds new light on the activities and operations of Hamas, and opens new avenues for intelligence research in the wider field.
Since its founding in 1987, the political and ideological dimensions of the terror organization Hamas have been well discussed by scholars. In contrast, this innovative study takes a new approach by exploring the entire scope of Hamas’s intelligence activity against its state adversary, Israel. Using primary sources in Arabic, Hebrew, and English, the author analyzes the development of Hamas’s various methods for gathering information, its use of this information for operational needs and strategic analysis, and its counterintelligence activity against the Israeli intelligence apparatus. The Hamas Intelligence War against Israel explores how Hamas’s activity has gradually become more sophisticated as its institutions have become more established and the nature of the conflict has changed. As the first full-length study to analyze the intelligence efforts of a violent non-state actor, this book sheds new light on the activities and operations of Hamas, and opens new avenues for intelligence research in the wider field.
The conclusion chapter sums up the contribution of Hamas’s intelligence to the organization’s activities associated with its struggle against Israel. It details the strengths and weaknesses of the organization’s efforts to gather intelligence on Israel, counter Israeli intelligence activity, and assess Israel’s intentions and capabilities. This chapter also examines lessons from the case study of Hamas that may be applied to a general understanding of intelligence warfare by VNSAs.
The chapter analyzes Hamas’s use of intelligence to conduct successful operations against Israel. The combination of intelligence gathering and clandestine activities, as described in the previous chapters, led to several high-quality operations against Israel. For example, in an attack in 2006, Hamas successfully abducted IDF soldier Gilad Shalit and was able to keep him hidden for years, despite Israel’s efforts to find and rescue him in the tiny Gaza Strip. In addition, Hamas created a “bank” of targets through its intelligence-gathering efforts. This structured list of vulnerable quality targets was used to focus rocket attacks against Israel and find locations for suicide attacks.
The chapter explores Hamas’s strategic analysis and study of Israel and the IDF. As part of its intelligence warfare, Hamas strove to increase its knowledge of the enemy. This chapter describes Hamas’s accumulation of intelligence about Israeli weaponry, IDF units, Israeli battlefield tactics, operational training, and so on. The organization particularly sought information about the capabilities of Israeli armored vehicles in order to inform its use of anti-tank weaponry. The chapter also illustrates how Hamas disseminated this knowledge in its ranks. This chapter goes on to analyze Hamas’s operational preparations for war after Israel’s withdrawal from the Gaza Strip. Further, it examines Hamas’s ongoing assessment of the possibility and characteristics of a large-scale Israeli attack, and in particular the analysis of the Israeli political and social situation used by Hamas in order to form such an assessment. In this manner, the chapter discusses the influence of Hamas’s “enemy image” of Israel – an image based on the organization’s Palestinian Islamic ideology as well as its interpretation of events and social processes in Israel – on the organization’s assessment of its enemy. The chapter also sheds light on the organization’s difficulties in strategic analysis of Israel.
From the liberated zones of the adivasis in central India to the oil pirates of the Niger Delta to the successionist fighters of lower Burma and to the Frankenstein rebels of Iraq and Palestine, this chapter brings together various insurgent figures to examine the moral burden of using and abusing violence by nonstate actors in the name of self-defense and self-preservation. Drawing from the theoretical work of Eric Hobsbawm, James Scott, and Eric Wolf on peasantry, banditry, and the moral economy of the peasant, the chapter concludes that between killing and dying, the insurgents do everything to avoid fighting and to eke out a mere livelihood.
After addressing Hamas’s intelligence collection in previous chapters, this chapter focusses on Hamas’s efforts to counter Israeli intelligence efforts against it. To overcome Israel’s attempts to infiltrate its ranks, Hamas went to great lengths to screen those wishing to join it, while diligently acting to detect collaborators with Israel, both within its ranks and in the broader society in which they operate, while applying internal compartmentalization to the organization. To counter Israel’s SIGINT activity, Hamas tried to avoid the use of wireless communications, and also made use of encryption, both in telephone communication and in correspondence; over time, Hamas developed an internal communication system that is separate from the public system. To defeat Israel’s GEOINT efforts, Hamas tried to conceal its activities to the greatest extent possible. This included a range of strategies, including camouflage, the assimilation of military installations in civilian surroundings, and the use of subterranean spaces. Regarding open-source media publications, Hamas developed the awareness of the need to impose censorship to hide certain characteristic signs of its activity.
The chapter deals with Hamas’s human intelligence (HUMINT) activity. Hamas, of course, makes use of the most traditional method of intelligence gathering – information from human sources. This chapter details how Hamas first recruited local sources for short periods and specific missions. Gradually, sources were recruited who could operate outside of Israel; these sources were sent on longer-term and more advanced missions. Hamas also used the internet, i.e., social media and email, to contact and handle potential sources. This chapter also describes how Hamas turned collaborators with Israel into double agents and ran operations using these agents.
The chapter sheds light on Hamas’s signal intelligence (SIGINT) and cyber warfare. It describes how, in the first decade of the 2000s, Hamas gained SIGINT capabilities that made it possible for Hamas to intercept the camera broadcasts of IDF UAVs, as well as the IDF’s visible tactical communication traffic. In the 2010s, Hamas began to invest in cyber warfare. This chapter also surveys Hamas’s successful use of various hacking methods to penetrate the smartphones of IDF soldiers and officers, extracting information and installing spyware and using social engineering techniques; descriptions of several real-life cases are included for illustration.
This article serves as the introduction to a Special Issue of the European Journal of International Security titled ‘What the War on Terror Leaves Behind’. In it, we seek to contextualise and summarise the diverse contributions of this collection, which is animated by four overarching questions: (i) More than 20 years after the attacks of 11 September 2001, is the War on Terror now, finally, over? (ii) What, if any, legacies remain from the post-9/11 way of thinking and doing counterterrorism? (iii) What is the significance of the War on Terror’s legacies or absence thereof? and, (iv) How do the War on Terror’s impacts and effects sit within other historical contexts and (dis)continuities? The article begins with a brief overview of some of the conceptual and political ambiguities of the War on Terror itself, before situating the issue in relation to issues of continuity and change anticipated by the four questions above. A second section then explores the urgency of these questions for academic debate, and in the ‘real world’ of international security as experienced by states, communities, and other subjects. A third section then summarises the argument and contributions of the articles in the issue –highlighting the lack of agreement on key issues within these debates.
Since its founding in 1987, the political and ideological dimensions of the terror organisation Hamas have been well discussed by scholars. In contrast, this innovative study takes a new approach by exploring the entire scope of Hamas's intelligence activity against its state adversary, Israel. Using primary sources in Arabic, Hebrew and English, Netanel Flamer analyzes the development of Hamas's various methods for gathering information, its use of this information for operational needs and strategic analysis, and its counterintelligence activity against the Israeli intelligence apparatus. The Hamas Intelligence War against Israel explores how Hamas's activity has gradually become more sophisticated as its institutions have become more established and the nature of the conflict has changed. As the first full-length study to analyze the intelligence efforts of a violent non-state actor, this book sheds new light on the activities and operations of Hamas, and opens new avenues for intelligence research in the wider field.