We use cookies to distinguish you from other users and to provide you with a better experience on our websites. Close this message to accept cookies or find out how to manage your cookie settings.
To save content items to your account,
please confirm that you agree to abide by our usage policies.
If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account.
Find out more about saving content to .
To save content items to your Kindle, first ensure no-reply@cambridge.org
is added to your Approved Personal Document E-mail List under your Personal Document Settings
on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part
of your Kindle email address below.
Find out more about saving to your Kindle.
Note you can select to save to either the @free.kindle.com or @kindle.com variations.
‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi.
‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.
Chapter 3 focuses on the figure of the jihadist in the context of the Syrian Civil War. Outlawed as a terrorist by the Security Council and perceived as a security threat in home states, this latest version of the enemy of humanity seems to have nothing in common with previous foreign fighters. The aim of the chapter is to re-inscribe this actor within the longer history of foreign volunteering. It shifts from domestic debates to national courtrooms, showing how the jihadist combatant gets constantly split in two: idealist and fanatic, hero and villain, martyr and freedom fighter. Based on previous images of the foreign fighter, these dichotomies highlight different conceptions of freedom and hence problematize its current conflation with terrorism. The chapter ends with a digression on the laws of war, revealing the persisting cultural bias used against certain foreign combatants through the domestic application of IHL.
This article serves as the introduction to a Special Issue of the European Journal of International Security titled ‘What the War on Terror Leaves Behind’. In it, we seek to contextualise and summarise the diverse contributions of this collection, which is animated by four overarching questions: (i) More than 20 years after the attacks of 11 September 2001, is the War on Terror now, finally, over? (ii) What, if any, legacies remain from the post-9/11 way of thinking and doing counterterrorism? (iii) What is the significance of the War on Terror’s legacies or absence thereof? and, (iv) How do the War on Terror’s impacts and effects sit within other historical contexts and (dis)continuities? The article begins with a brief overview of some of the conceptual and political ambiguities of the War on Terror itself, before situating the issue in relation to issues of continuity and change anticipated by the four questions above. A second section then explores the urgency of these questions for academic debate, and in the ‘real world’ of international security as experienced by states, communities, and other subjects. A third section then summarises the argument and contributions of the articles in the issue –highlighting the lack of agreement on key issues within these debates.
Terrorist attacks on the aviation sector represent a significant security challenge due to the high-profile status of airports and aircraft. These attacks not only jeopardize global security but also have severe public health repercussions, leading to widespread casualties and psychological distress.
Methods
This study conducted a comprehensive retrospective analysis using data from the Global Terrorism Database to explore the patterns, frequencies, and impacts of terrorist attacks on the aviation sector worldwide. The analysis spanned incidents from 1970 to 2020, focusing on attack types, affected regions, and the direct and indirect health consequences arising from these incidents.
Results
Over the 50-year period, the study identified 1183 terrorist attacks targeting the aviation sector. Bombings and explosions emerged as the most common and deadliest forms of attack, responsible for the majority of fatalities and injuries. The data also highlighted significant regional disparities, with certain areas experiencing higher frequencies of attacks and more severe outcomes. Notably, North America bore a disproportionately high number of fatalities, primarily due to the events of September 11, 2001.
Conclusions
The findings emphasize the ongoing and evolving threat of terrorism in the aviation industry, underscoring the critical need for a proactive and comprehensive approach to security and public health preparedness. Future strategies should prioritize the integration of advanced technological solutions, enhanced international cooperation, and thorough public health planning to mitigate the impact of terrorist attacks on aviation effectively.
This article critically examines the major shortcomings in multi-country security investments in East Africa during the war on terror. It argues that these investments have not only failed to adequately recognise African contexts but also falls short of recognising the agency of local communities in counterterrorism efforts. Drawing on critical terrorism and security studies, as well as excerpts from interviews with practitioners in Kenya, the article identifies gaps in the prevailing approach that treats Africa as a unitary entity and critiques the notion of universality of knowledge ingrained in these interventions. By taking a decolonial perspective, the article challenges some prevailing constructions about Africa, linked to the war on terror, as the source of this notion of universality of knowledge. By highlighting the connection of counterterrorism strategies to coloniality and the systemic exclusion of subaltern voices, the discussion suggests that a more contextually informed approach is a precursor to envisioning Africa positioned beyond the war on terror.
An epilogue explores several topics regarding the future of modern air warfare. The first section offers recommendations for how the United States can better prepare for modern air warfare. The second considers air power in counterinsurgency and counterterrorism operations. The third anticipates the role of air power in extending deterrence to allies. The fourth demonstrates how TAP theory can assess the potential effectiveness of air power by analyzing the Russian Air Force in the Battle of Kyiv. The final section considers additional challenges facing the United States during an emerging era of great power competition.
This chapter first demonstrates the significance of counterterrorism for China and international society and then reviews different narratives of China’s counterterrorism. It investigates China’s domestic and international counterterrorism lawmaking at the domestic and international levels. After the late 1990s, and especially after the September 11 terrorist attacks in 2001, the UN Security Council emerged at the forefront of international counterterrorism and adopted a lot of resolutions that imposed demanding obligations on UN members.The chapter examines how these UN counterterrorism resolutions are enforced in China. While many countries’ counterterrorism activities have been strongly criticized, China has encountered particularly strong criticism, and especially for its operations in Xinjiang. Finally, this chapter tries to recalibrate the relationship between counterterrorism and human rights protection, and to evaluate the implications of counterterrorism measures for human rights in China.
The central argument set out in this Element is that the combination of a perceived radical change in the threat environment post 9/11, and the new capabilities afforded by the long silent reach of the drone, have put pressure on the previously accepted legal frameworks justifying the use of force. This has resulted in disagreements - both articulated and unarticulated - in how the Western allies should respond to both the legal and operational innovations in the use of force that drones have catalysed. The Element focuses on the responses of the UK, France, and Germany to these developments in the context of the changing US approach to the use of force. Locating itself at the interface of international law and politics, this is the first attempt to look at the interplay between technological innovations, legal justifications, and inter-alliance politics in the context of the use of armed drones.
Chapter 4 further explores the role of bureaucrats within the African Union Commission (AUC) and the influence of Algerian representatives on continental security policies. It opens by reconstructing the formation of the Nouakchott Process in 2013 that brought together eleven member states of the ‘Sahelo-Saharan Region’, from Senegal to Chad and Libya to Nigeria, in a political environment marked by long-standing distrust and suspicion that had already hampered previous attempts at security cooperation. Based on this, the chapter analyzes how the spatial semantic ‘Sahelo-Saharan Region’ allowed the initiators of the Nouakchott Process to create a ‘transregional’ space to overcome the spatial dissatisfaction with the African Standby Force (ASF) geography without undermining it. This allowed the AUC and Algerian representatives to regain influence over the conflict interventions in Mali and the Sahel to re-engage where they had felt sidelined after the French intervention and United Nations Mission’s take over. The chapter concludes with an examination of the proposed Nouakchott Process Intervention Force, which, while never deployed, reveals from its conception the growing desire for military-heavy, robust, counterterrorism engagement by African policymakers.
from
Part III
-
Intersections: National(ist) Synergies and Tensions with Other Social, Economic, Political, and Cultural Categories, Identities, and Practices
On 28 June 1914 in Sarajevo, a young Bosnian Serb, Gavrilo Princip, assassinated the Austrian heir presumptive, Franz Ferdinand. By killing the archduke (and his wife), Princip set in motion the well-oiled wheels that would, just a month later, lead to the outbreak of what George F. Kennan called “the great seminal catastrophe of [the twentieth] century,”1 the First World War. It resulted in the demise of most European monarchies and empires, and – by extension – triggered the next two global conflicts, the Second World War and the Cold War. Princip was a member of the secret Serbian society the “Black Hand,” which had grown in response to the illegal occupation of Bosnia and Herzegovina by the Habsburg Monarchy in 1908. He shot Franz Ferdinand to intimidate Austria-Hungary so that it would let go of Bosnia and Herzegovina.2 This assassination demonstrates how terrorism and nationalism can be intertwined and how potent and destructive this mix can be.
This Element explores the topics of terrorism, counterterrorism, and the US government's war on terror following the September 11, 2001 terror attacks. It draw on insights from Austrian and public choice economics. First, the foundations of the economics of terrorism are discussed emphasizing that the behaviors of terrorists and counter-terrorists are purposeful and goal-oriented. Then, the economics of counterterrorism policies and the importance of institutional change is considered. Next, the three dilemmas facing liberal societies as it relates to counterterrorism efforts is focused on. The Element then provides an assessment of the US government's war on terror. It discusses the origins of the war, discuss whether it can be judged a success or failure, and consider some of the main effects both abroad and within the United States. The final chapter concludes with a discussion of several areas for future research.
Before developing the argument of the book, this chapter gives an overview of the contexts where combat drones have been deployed as a basis for the study. The description of the contexts in which drone operations have been conducted extraterritorially against non-state actors by the US, the UK, and France follow a chronological sequence, and draw some general common and diverging features of the different legal rationales crafted by these states.
The study of terrorism represents one of the major turning points in criminology of the twenty-first century. In the space of just two decades, research on terrorism and political extremism went from a relatively uncommon niche to a widely recognized criminological specialization. Terrorism research now appears in nearly all mainstream criminology journals; college courses on terrorism and political violence have been added to the curricula of most criminology departments; and a growing number of criminology students are choosing terrorism as a suitable topic for class papers, research topics, theses and dissertations. The purpose of this book is to explore similarities and differences between terrorism and more ordinary forms of crime. This Element considers the ways that criminology has contributed to the study of terrorism and the impact the increasing interest in terrorism has had on criminology. This Element also provides empirical comparisons of terrorist attacks to more ordinary crimes and criminal offenders. This title is also available as Open Access on Cambridge Core.
Through an analysis of the use of drones, Rebecca Mignot-Mahdavi explores the ways in which, in the context of counterterrorism, war, technology and the law interact and reshape one another. She demonstrates that drone programs are techno-legal machineries that facilitate and accelerate the emergence of a new kind of warfare. This new model of warfare is individualized and de-materialized in the sense that it focuses on threat anticipation and thus consists in identifying dangerous figures (individualized warfare) rather than responding to acts of hostilities (material warfare). Revolving around threat anticipation, drone wars endure over an extensive timeframe and geographical area, to the extent that the use of drones may even be seen, as appears to be the case for the United States, as part of the normal functioning of the state, with profound consequences for the international legal order.
This article contributes to an ‘historical turn’ in security scholarship. It addresses imbalance in security studies’ attention to historical empirics, and argues against notions of temporal disjunct prevalent within the discipline. I employ a genealogical framework to clarify the interpellation of past and present; and I introduce the ‘conceptual archive’ as a lens for pursuing that interpellation in research. My thesis on the ‘conceptual archive’ represents a twofold contribution. Firstly, a conceptual contribution: I advance the ‘conceptual archive’ as a way of thinking about past-present interpellation (specifically, existing conceptual logics’ remodelling in arguments justifying new practice). Secondly, an analytical contribution: I propose the ‘conceptual archive’ as a tool for doing genealogy (a research programme with historicising promise, but one suffering nebulous operationalisation at present). I use the field of terrorism studies as an entry-point to these contributions: adopting a mixed-methods research design to trace British counterterrorism practices’ roots within an ‘archive’ of logics on Northern Ireland. I find 1970s British governments remodelled long-standing ‘archival’ vocabularies in their arguments for new security provisions: framing exceptional practices according to an accepted fabric of concepts.
Since 2001, the British state has increased its powers of surveillance for the purposes of countering terrorism. Much of this has been through expansions of the powers of police and security services to engage in covert surveillance and access the personal data of those suspected of involvement in terrorism. Alongside this, however, the last decade has also seen the development of more diffuse practices of monitoring and surveillance as part of efforts to identify and provide support to those deemed ‘vulnerable’ to being drawn into terrorism. Under Prevent, the UK government’s strategy for preventing violent extremism (PVE),1 much of the responsibility was initially placed on the police and on the communities identified as having particularly high levels of vulnerability, which in practice meant Britain’s Muslim communities.2 Subsequently, however, responsibility for PVE has increasingly been shifted onto a broad swathe of professionals engaged in the delivery of public services, including social workers, youth workers, health-care workers, prison staff, school teachers, and college and university lecturers.3
Chapter 5 offers the first systemic examination of the strategic considerations that underpin an emerging trend that has not yet gained enough attention in either academic or policy circles – the growing role of counterterrorism in China’s foreign policy. China needs to enhance its force’s counterterrorism capabilities, protect the growing number of Chinese nationals and assets abroad, and build an image as a responsible international stakeholder. However, these goals conflict with China’s desire to minimize grievances arising from its economic activities, which could lead to the country becoming a target for international terrorist groups. Empirical analyses of original data on the counterterrorism joint military exercises held by China and foreign forces indicate that China is highly cautious and selective when it comes to these exercises. Military counterterrorism cooperation tends to closely follow Chinese economic investments.
China's mistreatment of its Uyghur minority has drawn international condemnation and sanctions. The repression gripping Xinjiang is also hugely costly to China in Renminbi, personnel, and stifled economic productivity. Despite this, the Chinese Communist Party persists in its policies. Why? Drawing on extensive original data, Potter and Wang demonstrate insecurities about the stability of the regime and its claim to legitimacy motivate Chinese policies. These perceived threats to core interests drive the ferocity of the official response to Uyghur nationalism. The result is harsh repression, sophisticated media control, and selective international military cooperation. China's growing economic and military power means that the country's policies in Xinjiang and Central Asia have global implications. Zero Tolerance sheds light on this problem, informing policymakers, scholars, and students about an emerging global hotspot destined to play a central role in international politics in years to come.
The conflicts in Iraq and Syria have led to concerns in the West over ‘foreign fighters’. Although states are anxious about the role these individuals play in the conflicts they join, their primary concern relates to the perceived ‘terrorist’ threat they pose on their return. This fear has led to an evolution in the international policymaking arena, with foreign fighters now often referred to as ‘foreign terrorist fighters’ (FTFs). A Critical Theory-inspired immanent critique is offered to highlight various problems that exist with the FTF term and to argue policymakers should resist its use. The article demonstrates the importance of language by showing how the invocation of the FTF threat has strengthened the ongoing development of globally coordinated counterterrorism action. Specifically, it argues UN Security Council Resolution 2178, agreed in 2014, generates a legal obligation upon UN member states to implement new counterterrorism laws at national level to combat the perceived threat from FTFs. The article highlights the negative effect these laws have on human rights. It is argued institutions like the UN need to ensure new counterterrorism legal instruments are built from a human rights rather than security-first perspective if commitments to human rights in transnational counterterrorism are to be fully realised.
Endless armed conflicts against terrorist groups put civilian populations at risk. Since France has been involved in the Sahel from 2013 onwards, transnational non-international armed conflicts (NIACs) of extended geographical and temporal scope against groups designated as terrorists are not a US exception anymore. NIACs against terrorist groups, conducted not only by the United States but also by France, persist and have been reconfigured around threat anticipation. How can anticipatory warfare be best constrained? This article argues that it can be best done through more constraining rules regulating target selection in NIACs and, in particular, by redefining the notion of continuous combat function (CCF). Many elements explored in this article indicate that the United States and France select targets that they pre-designate as terrorists, before these targets are engaged in hostilities. Instead of responding to the observed participation of these individuals in hostilities, strikes are based on contextual and behavioural elements ahead or outside of such moments. This paper argues that when war consists of threat anticipation, it becomes very extensive and particularly risky for civilians. Furthermore, recent State practice in the counterterrorism context reveals the pitfalls of the notions of direct participation in hostilities and CCF as defined in the 2009 International Committee of the Red Cross Interpretive Guidance. Outside this context, the interpretations proposed in the Interpretive Guidance might seem sufficient to constrain target selection processes and to protect civilian populations. However, when applied to armed conflicts that are driven by threat anticipation, the pitfalls of these interpretations emerge. I formulate a critique of these interpretations as being partly responsible for anticipatory warfare and propose an alternative theory for the CCF test.
Studies of fake news have historically suffered from being primarily Western-centric and focusing on “news” emanating from formal media outlets. The Sahel has generated its own unique version of fake news, the authors refer to as Afrancaux News. Using nationwide public opinion surveys in Burkina Faso, Mali, and Niger, open-source online forum ethnographic research, and postcolonial epistemological predispositions, the authors suggest that although other historical instantiations exist, the most prominent contemporary example of Afrancaux News can be seen in the fake news stories related to the French counterterrorism presence in the Sahel.