We use cookies to distinguish you from other users and to provide you with a better experience on our websites. Close this message to accept cookies or find out how to manage your cookie settings.
To save content items to your account,
please confirm that you agree to abide by our usage policies.
If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account.
Find out more about saving content to .
To save content items to your Kindle, first ensure no-reply@cambridge.org
is added to your Approved Personal Document E-mail List under your Personal Document Settings
on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part
of your Kindle email address below.
Find out more about saving to your Kindle.
Note you can select to save to either the @free.kindle.com or @kindle.com variations.
‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi.
‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.
This chapter explores denationalization, focusing on Indonesian foreign terrorist fighters (FTFs). Post-9/11 and during the Arab Spring, Western democracies tightened border control to combat terrorism, enabling the stripping of citizenship from involved individuals. Denationalization, via law or public-authority decisions, emerged as a contentious counter-terrorism tool. Indonesia, as a Muslim-majority Southeast Asian nation, partially embraced denationalization, refusing to repatriate Indonesian FTFs. This aligns with global security concerns but raises statelessness questions. The chapter examines denationalization’s legal framework, international obligations, and the blurred line between de jure and de facto statelessness. Critics argue that disproportionately applying denationalization to Muslims undermines human rights, inter-state cooperation and international justice. Refusal to repatriate Indonesian FTFs raises concerns about long-term consequences and due process. Understanding denationalization nuances is vital, considering its impact on the citizenship rights of individuals involved in terrorism.
Heroes and villains, idealists and mercenaries, freedom fighters and religious fanatics. Foreign fighters tend to defy easy classification. Good and bad images of the foreign combatant epitomize different conceptions of freedom and are used to characterize the rightness or wrongness of this actor in civil wars. The book traces the history of these figures and their afterlife. It does so through an interdisciplinary methodology employing law, history, and psychoanalytical theory, showing how different images of the foreign combatant are utilized to proscribe or endorse foreign fighters in different historical moments. By linking the Spanish, Angolan, and Syrian civil wars, the book demonstrates how these figures function as a precedent for later periods and how their heritage keeps haunting the imaginary of legal actors in the present.
The architecture of international counterterrorism law is the subject of Chapter 2. It is a branch of public international law that has emerged from an evolving special legal regime to regulate action to prevent and punish terrorism and to tackle terrorists. International counterterrorism law is a matrix of global terrorism treaties and dedicated United Nations Security Council resolutions that require the incorporation of offences into domestic law combined with the salient rules of international humanitarian law and the law of law enforcement. These rules, which regulate when and against whom force may be used in counterterrorism, are supplemented by (though are sometimes inconsistent with) the content of regional treaties and domestic legislation. The standards and laws are subject to the constraints and oversight of international human rights law. The chapter also describes the content and adherence of regional counterterrorism treaties.
Continuing the analysis in Chapter 9, this chapter considers how changing international security constellations have contributed to the remilitarization of democracy. It argues that international antiterror programmes have destabilized the foundations of constitutional law. On one hand, such policies have redefined national security objectives, such that the negotiated component of constitutional law is weakened. On the other hand, such policies have fundamentally altered the role of international human rights law in global society. As a result, states have been able to legitimate more directly militarized actions towards their own populations and towards the populations of other states.
Chapter 3 covers national criminal law on terrorism worldwide. A total of 188 States (of the total of 197 recognized by the Secretary-General of the United Nations in his capacity as treaty depositary) have domestic legislation in place specifically criminalizing acts of terrorism. Despite certain commonalities, the definitions of these crimes are unique to each individual State. At the time of writing, only one State, Micronesia, had no dedicated legislative provisions on terrorism of any form in its domestic law. A further seven States – the Republic of Congo, Dominica, Eritrea, Kuwait, Sierra Leone, Suriname, and Yemen – repress the financing of terrorism with criminal sanction but do not also establish the perpetration of an act of terrorism as a distinct criminal offence.
This study investigates the public health implications of terrorist attacks on telecommunications infrastructure globally, assessing the direct and indirect impacts on emergency response and medical services.
Methods
Utilizing retrospective analysis, this research delves into incidents recorded in the Global Terrorism Database (GTD) from 1970 to 2020. The study employs descriptive statistical methods to identify patterns and examine the regional distribution and frequency of these attacks, alongside the types of weaponry used and the direct casualties involved.
Results
The analysis underscores a significant focus on telecommunications by terrorist groups, revealing a frequent use of high-impact weapons like explosives and incendiary devices aimed at maximizing disruption. The study highlights considerable regional variations in the frequency and nature of attacks, emphasizing the strategic importance of these infrastructures to public safety and health systems.
Conclusions
The findings demonstrate the critical need for robust security enhancements tailored to regional threats and the integration of advanced technologies in public safety strategies. The research advocates for enhanced international cooperation and policymaking to mitigate the impacts of these attacks, ensuring telecommunications resilience in the face of global terrorism.
Open-source intelligence is readily available and inexpensive. Hamas collected a lot of information from open sources, mainly the Israeli press. In this case, Hamas exploited the fact that Israel is a democratic state with a relatively free press to get valuable information for its operations. This sort of collection activity became more organized after Hamas took control of the Gaza Strip and was Hamas’s main source for strategic analysis. This chapter describes the intelligence content Hamas gathered from open sources and that content’s contribution to its activities.
Since its founding in 1987, the political and ideological dimensions of the terror organization Hamas have been well discussed by scholars. In contrast, this innovative study takes a new approach by exploring the entire scope of Hamas’s intelligence activity against its state adversary, Israel. Using primary sources in Arabic, Hebrew, and English, the author analyzes the development of Hamas’s various methods for gathering information, its use of this information for operational needs and strategic analysis, and its counterintelligence activity against the Israeli intelligence apparatus. The Hamas Intelligence War against Israel explores how Hamas’s activity has gradually become more sophisticated as its institutions have become more established and the nature of the conflict has changed. As the first full-length study to analyze the intelligence efforts of a violent non-state actor, this book sheds new light on the activities and operations of Hamas, and opens new avenues for intelligence research in the wider field.
Since its founding in 1987, the political and ideological dimensions of the terror organization Hamas have been well discussed by scholars. In contrast, this innovative study takes a new approach by exploring the entire scope of Hamas’s intelligence activity against its state adversary, Israel. Using primary sources in Arabic, Hebrew, and English, the author analyzes the development of Hamas’s various methods for gathering information, its use of this information for operational needs and strategic analysis, and its counterintelligence activity against the Israeli intelligence apparatus. The Hamas Intelligence War against Israel explores how Hamas’s activity has gradually become more sophisticated as its institutions have become more established and the nature of the conflict has changed. As the first full-length study to analyze the intelligence efforts of a violent non-state actor, this book sheds new light on the activities and operations of Hamas, and opens new avenues for intelligence research in the wider field.
The conclusion chapter sums up the contribution of Hamas’s intelligence to the organization’s activities associated with its struggle against Israel. It details the strengths and weaknesses of the organization’s efforts to gather intelligence on Israel, counter Israeli intelligence activity, and assess Israel’s intentions and capabilities. This chapter also examines lessons from the case study of Hamas that may be applied to a general understanding of intelligence warfare by VNSAs.
The chapter analyzes Hamas’s use of intelligence to conduct successful operations against Israel. The combination of intelligence gathering and clandestine activities, as described in the previous chapters, led to several high-quality operations against Israel. For example, in an attack in 2006, Hamas successfully abducted IDF soldier Gilad Shalit and was able to keep him hidden for years, despite Israel’s efforts to find and rescue him in the tiny Gaza Strip. In addition, Hamas created a “bank” of targets through its intelligence-gathering efforts. This structured list of vulnerable quality targets was used to focus rocket attacks against Israel and find locations for suicide attacks.
The chapter explores Hamas’s strategic analysis and study of Israel and the IDF. As part of its intelligence warfare, Hamas strove to increase its knowledge of the enemy. This chapter describes Hamas’s accumulation of intelligence about Israeli weaponry, IDF units, Israeli battlefield tactics, operational training, and so on. The organization particularly sought information about the capabilities of Israeli armored vehicles in order to inform its use of anti-tank weaponry. The chapter also illustrates how Hamas disseminated this knowledge in its ranks. This chapter goes on to analyze Hamas’s operational preparations for war after Israel’s withdrawal from the Gaza Strip. Further, it examines Hamas’s ongoing assessment of the possibility and characteristics of a large-scale Israeli attack, and in particular the analysis of the Israeli political and social situation used by Hamas in order to form such an assessment. In this manner, the chapter discusses the influence of Hamas’s “enemy image” of Israel – an image based on the organization’s Palestinian Islamic ideology as well as its interpretation of events and social processes in Israel – on the organization’s assessment of its enemy. The chapter also sheds light on the organization’s difficulties in strategic analysis of Israel.
From the liberated zones of the adivasis in central India to the oil pirates of the Niger Delta to the successionist fighters of lower Burma and to the Frankenstein rebels of Iraq and Palestine, this chapter brings together various insurgent figures to examine the moral burden of using and abusing violence by nonstate actors in the name of self-defense and self-preservation. Drawing from the theoretical work of Eric Hobsbawm, James Scott, and Eric Wolf on peasantry, banditry, and the moral economy of the peasant, the chapter concludes that between killing and dying, the insurgents do everything to avoid fighting and to eke out a mere livelihood.
After addressing Hamas’s intelligence collection in previous chapters, this chapter focusses on Hamas’s efforts to counter Israeli intelligence efforts against it. To overcome Israel’s attempts to infiltrate its ranks, Hamas went to great lengths to screen those wishing to join it, while diligently acting to detect collaborators with Israel, both within its ranks and in the broader society in which they operate, while applying internal compartmentalization to the organization. To counter Israel’s SIGINT activity, Hamas tried to avoid the use of wireless communications, and also made use of encryption, both in telephone communication and in correspondence; over time, Hamas developed an internal communication system that is separate from the public system. To defeat Israel’s GEOINT efforts, Hamas tried to conceal its activities to the greatest extent possible. This included a range of strategies, including camouflage, the assimilation of military installations in civilian surroundings, and the use of subterranean spaces. Regarding open-source media publications, Hamas developed the awareness of the need to impose censorship to hide certain characteristic signs of its activity.
The chapter deals with Hamas’s human intelligence (HUMINT) activity. Hamas, of course, makes use of the most traditional method of intelligence gathering – information from human sources. This chapter details how Hamas first recruited local sources for short periods and specific missions. Gradually, sources were recruited who could operate outside of Israel; these sources were sent on longer-term and more advanced missions. Hamas also used the internet, i.e., social media and email, to contact and handle potential sources. This chapter also describes how Hamas turned collaborators with Israel into double agents and ran operations using these agents.
The chapter sheds light on Hamas’s signal intelligence (SIGINT) and cyber warfare. It describes how, in the first decade of the 2000s, Hamas gained SIGINT capabilities that made it possible for Hamas to intercept the camera broadcasts of IDF UAVs, as well as the IDF’s visible tactical communication traffic. In the 2010s, Hamas began to invest in cyber warfare. This chapter also surveys Hamas’s successful use of various hacking methods to penetrate the smartphones of IDF soldiers and officers, extracting information and installing spyware and using social engineering techniques; descriptions of several real-life cases are included for illustration.
Governments and social scientists are increasingly developing machine learning methods to automate the process of identifying terrorists in real-time and predict future attacks. However, current operationalizations of ‘terrorist’ in artificial intelligence are difficult to justify given three issues that remain neglected: insufficient construct legitimacy, insufficient criterion validity, and insufficient construct validity. I conclude that machine learning methods should be at most used for the identification of singular individuals deemed terrorists and not for identifying possible terrorists from some more general class, nor to predict terrorist attacks more broadly, given intolerably high risks that result from such approaches.
This article serves as the introduction to a Special Issue of the European Journal of International Security titled ‘What the War on Terror Leaves Behind’. In it, we seek to contextualise and summarise the diverse contributions of this collection, which is animated by four overarching questions: (i) More than 20 years after the attacks of 11 September 2001, is the War on Terror now, finally, over? (ii) What, if any, legacies remain from the post-9/11 way of thinking and doing counterterrorism? (iii) What is the significance of the War on Terror’s legacies or absence thereof? and, (iv) How do the War on Terror’s impacts and effects sit within other historical contexts and (dis)continuities? The article begins with a brief overview of some of the conceptual and political ambiguities of the War on Terror itself, before situating the issue in relation to issues of continuity and change anticipated by the four questions above. A second section then explores the urgency of these questions for academic debate, and in the ‘real world’ of international security as experienced by states, communities, and other subjects. A third section then summarises the argument and contributions of the articles in the issue –highlighting the lack of agreement on key issues within these debates.
Since its founding in 1987, the political and ideological dimensions of the terror organisation Hamas have been well discussed by scholars. In contrast, this innovative study takes a new approach by exploring the entire scope of Hamas's intelligence activity against its state adversary, Israel. Using primary sources in Arabic, Hebrew and English, Netanel Flamer analyzes the development of Hamas's various methods for gathering information, its use of this information for operational needs and strategic analysis, and its counterintelligence activity against the Israeli intelligence apparatus. The Hamas Intelligence War against Israel explores how Hamas's activity has gradually become more sophisticated as its institutions have become more established and the nature of the conflict has changed. As the first full-length study to analyze the intelligence efforts of a violent non-state actor, this book sheds new light on the activities and operations of Hamas, and opens new avenues for intelligence research in the wider field.
Chapter 6 looks at political responses to the MENA migration to Europe from 2011, the most harshly exclusionary case in my study. The migration mixed asylum seekers fleeing wars in Syria, Iraq, and Afghanistan, with labor migrants from other MENA states. The chapter tracks Europe’s progression from initially cautious receptiveness of asylum seekers to policies of exclusion of MENA migrants from the continent. It shows that the growing numbers, migrant “mix,” and terrorist attacks by (mostly non-migrant) Islamic extremists in Europe combined to undermine need-based deservingness, empower populist parties and feed xenophobic media. The chapter focuses on the EU’s turn to militarized securitization of its land and sea borders and ‘externalization of borders’ to Turkey and Libya, policies that ended the migration surge by indiscriminate physical exclusion of migrants and asylum seekers. Case studies show the varied effects of and responses to the migration in the five European cases and in Russia, which received much smaller numbers. Responses to the MENA migration brought international migration to the core of Europe’s politics, entrenched populist parties, and showed the failure of the Geneva Convention asylum system in the 21st century.