A Critical Theory of Counterterrorism Ontology Epistemology and Normativity 1st Edition Sondre Lindahl Ebook File With All Chapters
A Critical Theory of Counterterrorism Ontology Epistemology and Normativity 1st Edition Sondre Lindahl Ebook File With All Chapters
https://ebookfinal.com/download/naturalizing-critical-realist-social-
ontology-1st-edition-tuukka-kaidesoja/
https://ebookfinal.com/download/credit-and-creed-a-critical-legal-
theory-of-money-1st-edition-andreas-rahmatian/
https://ebookfinal.com/download/justification-and-critique-towards-a-
critical-theory-of-politics-1st-edition-rainer-forst/
https://ebookfinal.com/download/foundations-of-social-theory-a-
critical-introduction-1st-edition-neal-harris/
Normativity and Control 1st Edition David Owens
https://ebookfinal.com/download/normativity-and-control-1st-edition-
david-owens/
https://ebookfinal.com/download/against-epistemology-a-
metacritque-1st-edition-adorno/
https://ebookfinal.com/download/theatre-theory-and-performance-a-
critical-interrogation-1st-edition-siddhartha-biswas/
https://ebookfinal.com/download/metaphysics-and-epistemology-a-guided-
anthology-1st-edition-stephen-hetherington/
https://ebookfinal.com/download/critical-theory-and-international-
relations-a-reader-1st-edition-steven-c-roach/
A Critical Theory of Counterterrorism Ontology
Epistemology and Normativity 1st Edition Sondre Lindahl
Digital Instant Download
Author(s): Sondre Lindahl
ISBN(s): 9780815359234, 0815359233
Edition: 1
File Details: PDF, 1.44 MB
Year: 2018
Language: english
A Critical Theory of
Counterterrorism
Sondre Lindahl holds a PhD in Peace and Conflict Studies from the National
Centre for Peace and Conflict Studies, University of Otago, New Zealand.
Series: Routledge Critical Terrorism Studies
Series Editor: Richard Jackson
University of Otago, New Zealand
This book series will publish rigorous and innovative studies on all aspects of ter-
rorism, counter-terrorism and state terror. It seeks to advance a new generation of
thinking on traditional subjects and investigate topics frequently overlooked in
orthodox accounts of terrorism. Books in this series will typically adopt approaches
informed by critical-normative theory, post-positivist methodologies and non-
Western perspectives, as well as rigorous and reflective orthodox terrorism studies.
Sondre Lindahl
First published 2018
by Routledge
2 Park Square, Milton Park, Abingdon, Oxon OX14 4RN
and by Routledge
711 Third Avenue, New York, NY 10017
Routledge is an imprint of the Taylor & Francis Group, an informa business
© 2018 Sondre Lindahl
The right of Sondre Lindahl to be identified as author of this work has
been asserted by him in accordance with sections 77 and 78 of the
Copyright, Designs and Patents Act 1988.
All rights reserved. No part of this book may be reprinted or reproduced or
utilised in any form or by any electronic, mechanical, or other means, now
known or hereafter invented, including photocopying and recording, or in
any information storage or retrieval system, without permission in writing
from the publishers.
Trademark notice: Product or corporate names may be trademarks or
registered trademarks, and are used only for identification and explanation
without intent to infringe.
British Library Cataloguing-in-Publication Data
A catalogue record for this book is available from the British Library
Library of Congress Cataloging-in-Publication Data
Names: Lindahl, Sondre, author.
Title: A critical theory of counterterrorism : ontology, epistemology and
normativity / Sondre Lindahl.
Description: Abingdon, Oxon ; New York, NY : Routledge, 2018. |
Series: Routledge critical terrorism studies | Includes bibliographical
references and index.
Identifiers: LCCN 2018009647| ISBN 9780815359234 (hardback : alk.
paper) | ISBN 9781351121279 (e-book : alk. paper)
Subjects: LCSH: Terrorism–Prevention–Philosophy. |
Terrorism–Philosophy.
Classification: LCC HV6431 .L558 2018 | DDC 363.325/17–dc23
LC record available at https://lccn.loc.gov/2018009647
    List of illustrations                                   vi
    Preface                                                vii
    Acknowledgements                                      viii
3 Normativity 50
4 Violence 67
5 A CTS model 87
8 Conclusion 164
Boxes
5.1 The CTS model of counterterrorism                       107
7.1 The Norwegian model of international counterterrorism   156
7.2 The Norwegian model of domestic counterterrorism        157
Table
6.1   Implementation of counterterrorism legislation        124
Figure
7.1   Guide for overall risk evaluation                     151
Preface
This book, however, would never have been written if I had not signed up for
Richard Jackson’s last course on Critical Terrorism Studies at Aberystwyth
University in 2011. It focused my scholarly attention on terrorism, and eventu-
ally led me to do a PhD at the National Centre for Peace and Conflict Studies, at
the University of Otago, New Zealand, with Richard as supervisor. Needless to
say, the long journey was worth it. Richard showed me what a real scholar
should be – meticulous, intellectually honest and politically responsible – and I
count myself incredibly privileged to have him as a mentor, colleague and friend.
Not least, he is an inspiration to keep fighting social injustice.
   None of this would have been possible, however, without the support of my
family. Interest in politics was always encouraged, and political discussions
were, and still are, daily occurrences. It is from them, and especially my mother,
that I developed a passionate dislike for social injustice. So much so that it is the
driving force in my academic work. My father and brother have an insatiable
appetite for history, in particular political history, and I have benefited greatly
from their discussions, knowledge and insight. Their unwavering support of my
academic career means the world. So did my uncle, who passed away in the final
months of my PhD. He is missed every day.
   As usual, all mistakes, misconceptions, omissions and opinions expressed in
this work are solely my own, and I apologise to anyone I may have forgotten to
thank.
Introduction
Terrorism, counterterrorism and war
on terror
We seem to be living in the age of terrorism. In the news, on TV, on the internet,
at the airport, in schools, in academia – terrorism seems omnipresent. Indeed,
since 9/11 2001 the threat of terrorism has come to be seen as the most serious
threat to international security, and vast resources have been invested into ways
of countering it. These efforts, in a broad sense, are most commonly known col-
lectively as the Global War on Terror, and it has been defined by overwhelming
and brutal violence. Central in this violence are the military campaigns in Afghan-
istan and Iraq, with images of torture and abuse of prisoners from Guantanamo
Bay and Abu Ghraib as stark examples of a failed counterterrorism paradigm.
The Abu Ghraib scandal in 2004 was central to the development of Critical Ter-
rorism Studies (CTS), and Richard Jackson wrote in his book from 2005 that the
threat of political violence in all its forms, be it terrorism, counterterrorism, war,
insurgency, revolution, ethnic cleansing, is real and pervasive. Therefore ‘we
need to discover genuine solutions that go beyond the reflexive application of
massive counter-violence’ (Jackson 2005, 4). Thus, terrorism and counterterror-
ism have never been just objects of academic study for CTS. Instead there is a
dose of activism involved, and the cause is to prevent avoidable human suffering
by producing knowledge that not only can lead to better understanding of how
come some people perpetrate acts of terrorism, but also why counterterrorism-
violence helps create and perpetuate the cycles of violence. This book is anchored
in this approach, and Jackson described it well when he wrote that:
A note on interviews
As part of my initial analysis of Norwegian counterterrorism in my doctoral
study, I went to Norway to interview four central figures in Norwegian people
diplomacy since the 1990s. Erik Solheim, Vidar Helgesen, Tore Hattrem and Jon
Hanssen-Bauer have experience in negotiating with so-called terrorists, and the
aim with the interviews was to gather primary accounts of (1) how Norwegian
counterterrorism has been shaped by its engagement in peace diplomacy, and
(2) experiences and opinions of the prospects of dialogue and negotiation with
terrorists. The interviews took place at the Ministry of Foreign Affairs in Oslo,
except for Erik Solheim who was interviewed in his office in Paris. The inter-
views were conducted between April and May 2015, and each lasted between 30
and 40 minutes. Naturally, they were recorded and transcribed in Norwegian,
made available to the interviewees, and will be retained at the University of
Otago for five years.
    The interviews were semi-structured, meaning that the interviewees were
asked the same core questions, but with several open-ended queries. This open-
ended approach allows both the researcher and respondent to explore topics
more freely, and avoids forcing answers into predefined templates (Brounéus
2011; Rubin and Rubin 2012). This approach was well-suited for the task,
because the goal of the interviews was to invite the interviewees to share their
experiences and knowledge of Norwegian peace diplomacy. That way, a broader
picture of how Norway has dealt with international terrorism could be drawn.
There were no ethical concerns related to the in-depth interviews; as the particip-
ants hold official positions, their participation was voluntary, and they were
invited to share their own experiences to complement knowledge that is already
existent. No aspect of the interviews thus required anonymity, and they were free
to include as much information as they saw fit.
References
Brounéus, K. 2011. ‘In-depth Interviewing: The Process, Skill and Ethics of Interviews in
  Peace Research’. In Understanding Peace Research: Methods and Challenges, edited
  by K. Höglund and M. Öberg, 130–145. New York: Routledge.
Horkheimer, M. 1972. Critical Theory: Selected Essays (M. J. O’Connell, Ed.). New
  York: Continuum.
Jackson, R. 2005. Writing the War on Terrorism. Manchester: Manchester University Press.
                                                                      Introduction    7
Jackson, R. (2016). ‘To Be or Not to Be Policy Relevant? Power, Emancipation and
  Resistance in CTS Research’. Critical Studies on Terrorism, 9(1), 120–125. ttps://doi.o
  rg/10.1080/17539153.2016.1147771
Lindahl, S. 2017. ‘A CTS Model of Counterterrorism’. Critical Studies on Terrorism,
  10(3), 523–541. https://doi.org/10.1080/17539153.2017.1336289
Marx, K. 2000. ‘Theses on Feuerbach’. In Selected Writings (2nd edn), edited by D.
  McLellan, 171–174. Oxford: Oxford University Press.
Rubin, H. J., and Rubin, I. S. 2012. Qualitative Interviewing: The Art of Hearing Data
  (3rd edn). London: SAGE Publications.
Stump, J. L., and Dixit, P. 2012. ‘Toward a Completely Constructivist Critical Terrorism
  Studies’. International Relations, 26(2), 199–217. https://doi.org/10.1177/00471178
  11404720
Toros, H. 2016. ‘Dialogue, Praxis and the State: A Response to Richard Jackson’. Critical
  Studies on Terrorism, 9(1), 126–130. https://doi.org/10.1080/17539153.2016.1147775
1      The Global War on Terror
The Global War on Terror (GWOT) is still the most extensive counterterrorism
campaign in history, and some might argue it is a counterterrorism paradigm. It
commands vast resources, and it has had a profound influence on people’s lives
since 2001. The most conspicuous aspects of the GWOT are the military cam-
paigns in Afghanistan and Iraq, institutionalised torture and abuse in Guantanamo
Bay and Abu Ghraib, the media’s insatiable appetite for all things related to ISIS,
and the Snowden revelations of widespread and pervasive government surveillance
and bulk data collection. In other words, the 17 years that have passed since the
9/11 attacks in 2001 have been saturated with violence and counter-violence, and
the trend is continuing. Jackson has described the war on terrorism as ‘simultan-
eously a set of actual practices ‒ wars, covert operations, agencies and institutions
– and an accompanying series of assumptions, beliefs, justifications and narratives
– it is an entire language or discourse’ (Jackson 2005, 8). In other words:
This quote from Crelinsten illustrates the relationship between the language and
practice of counterterrorism, and this chapter begins by describing how the threat
of terrorism was constructed as an existential evil that wiped the slate clean of
all that we thought we knew about terrorism. It marked a ‘ground zero’ for ter-
rorism research, and turned it into a growth industry. While it is, by no means,
meant to be an exhaustive account of the discourse on terrorism, it adds
important context to the second aspect of this chapter, which looks at the empiri-
cal consequences of the GWOT. Now, almost 17 years after the 9/11 attacks, we
are in a position where we can really observe and evaluate the consequences of
the GWOT. This discussion is particularly important because it delineates vast
avoidable human suffering due to the war on terrorism, and thus why a Critical
theory of counterterrorism is needed.
                                                     The Global War on Terror   9
   In this chapter, I establish the foundation for the overall study by first provid-
ing a brief overview of the primary narratives in the construction of terrorism as
a threat. Second, these narratives are connected with an empirical evaluation of
the consequences of the war on terrorism – the number of civilian casualties,
drone killings, torture, political instability, mass-surveillance – which all consti-
tute avoidable human suffering. This examination is crucial to later discussions
on normativity, and from where the theory obtains the necessary justificatory
force to assert its normative claim. Thus, the primary aim of this chapter is to
delineate the existence of avoidable human suffering as a consequence of violent
counterterrorism, why it is bad, and why it necessitates counter-action.
    there is extensive evidence that the war on terror has often led to oversim-
    plifications of challenges that were in fact much more complex and multi-
    faceted. This flawed analysis has repeatedly given way to inadequate,
    disproportionate, and ineffective policies, often supporting dictatorial and
    repressive regimes in the name of countering international terrorism.
                                                              (Gomis 2015, 116)
The 9/11 attacks were quickly construed by the Bush administration as an act of
war, an extraordinary attack on civilisation itself. It was understood as some-
thing ‘deeply evil’, which diabolical, a-political Islamists did in order to bring
down Western civilization (Johnson 2003, 225; Kegley 2003, 4). The Bush
administration was not alone in framing terrorism this way. The influential
magazine, The Economist, declared that:
Bruce Hoffman, one of the most prominent terrorism experts, claimed that, ‘on
9/11, of course, Bin Laden wiped the slate clean of the conventional wisdom on
terrorists and terrorism, and, by doing so, ushered in a new era of conflict – as
well as a new discourse about it’ (Hoffman 2004, xvii). While this is certainly
true to some extent, US officials, scholars and the media drew on past events to
help explain the attacks. In his analysis Writing the War on Terror Jackson iden-
tified four key narratives that were employed to explain the attacks: World
War II and the attack on Pearl Harbor, The Cold War, civilisation versus
barbarism, and globalisation (Jackson 2005, 40–58). Importantly, these meta-
narratives established an understanding of the attacks as part of a long and heroic
struggle by the US against totalitarian and murderous ideologies. Terrorists were
‘endlessly demonised and vilified as being evil, barbaric and inhuman’, and in
direct opposition to narratives of Americans as generous, kind, resourceful and
brave (ibid., 59).
    Ignatieff, a well-known international relations scholar, asserted that ‘what we
are up against is apocalyptic nihilism. The nihilism of their means – the indiffer-
ence to human costs – take their actions not only out of the realm of politics, but
even out of the realm of war itself ’ (Ignatieff 2001). Other scholars saw the 9/11
attacks as a new form of terrorism, namely, ‘superterrorism’ (Freedman 2002, 1;
Gearson 2002, 7). As such, 9/11 was narrated as an attack on the US because of
its values and success, by ruthless and sophisticated terrorists, hell-bent on
causing maximum casualties and chaos. Government officials, like former Sec-
retary of Defense William Cohen, claimed that it was only a question of when,
not if, terrorists would utilise weapons of mass destruction (Intriligator and
Toukan 2006, 75). Indeed, the ultimate representation of superterrorism, or
apocalyptic nihilism, is the use of WMDs. Graham Allison’s assessment of the
threat of WMD-terrorism was fairly straightforward:
Allison was not alone in this creative and extreme extrapolation. For example, in
2008 Defense Secretary Robert Gates informed a congressional committee that
the thought of a terrorist ending up with a WMD kept every senior government
leader awake at night (Mueller and Stewart 2016, 29). In the case of former head
                                                    The Global War on Terror   11
of CIA’s counterterrorism centre, Cofer Black, the alarm and fear of another ter-
rorist attack made him, according to his wife, ‘turn of the lights and sit in the
dark with a drink and a cigar, sunk in an apocalyptic gloom’ (Mayer 2008,
179–180). Fortunately, the world has not yet experienced any form of WMD-
terrorism, in part because it is very expensive, and difficult to maintain and use.
Furthermore, if the seizure of an Al-Qaeda computer in Afghanistan in 2001 is
any indication of how tempting WMDs are to a terrorist organisation, the group’s
budget for research on WMDs was between $2,000 and $4,000 (Mueller 2011).
That was at the apex of Al-Qaeda’s time as the number one security threat in the
world. Since then, an assessment of information that was obtained from bin
Laden’s computers in the raid that killed him in 2011 revealed that the group
was primarily engaged in dodging airstrikes, complaining about the lack of
resources, and apparently watching a fair bit of pornography.
   The example of WMD-terrorism illustrates what Mueller and Stewart identify
as an ‘institutional paranoia’ in counterterrorism (Mueller and Stewart 2016).
This paranoia, however, was not limited to ‘superterrorism’. In 2002, the Depart-
ment of Homeland Security welcomed every visitor to its website with a state-
ment that read: ‘Today’s terrorists can strike at any place, at any time, and with
virtually any weapon’ (Mueller 2006), and in his State of the Union speech in
2002, President Bush declared that
The post-9/11 understanding of terrorism, therefore, was shaped by the view that
it represented an unprecedented evil that could only be eradicated with force. As
such, the exceptional was adopted as a norm (Wolfendale 2016). Former general
and National Security Advisor to President Trump, Michael Flynn, argued in
2015 that the terrorist enemy was ‘committed to the destruction of freedom and
the American way of life’ and aiming at ‘world domination, achieved through
violence and bloodshed’ (Dozier 2015). Former Homeland Security Secretary,
Michael Chertoff, proclaimed the struggle against terrorism to be ‘a significant
existential’ one (Harris and Taylor 2008), in contrast to the various insignificant
existential struggles that the US has faced. As such, Zulaika’s description of
counterterrorism as a summary seems apt:
    It takes for granted that terrorist violence is unlike any other; that the immo-
    rality of its actions is an unredeemable atrocity; that it is a form of madness
    with no possible political legitimacy; that its methods defy rules and order;
12   The Global War on Terror
    that the only civilized responses to such aberration are total annihilation
    (war without quarter) and taboo.
                                                            (Zulaika 2009, 30)
In essence, 9/11 was seen to represent ‘new’ terrorism: ‘it changed everything’,
as it were (Townshend 2011, 122). The ‘new’ terrorism was marked by its reli-
gious and apocalyptic nature, and the view that this form of terrorism not only
had lethality as its ultimate goal, but it also eschewed political goals (Stohl 2012,
36). Indeed, the ‘new’ terrorism was perceived to be different from ‘old’ ter-
rorism, mostly because ‘new’ terrorists sought maximum destruction through
extreme violence, as opposed to ‘old’ terrorists, or the ‘mainstream’ terrorists,
who were more restrained in their efforts to reach a political goal (Chandler and
Gunaratna 2007; Davis and Jenkins 2002; Ganor 2012; Jenkins 2006b). Brian
Jenkins, who famously stated in the 1970s that ‘terrorists want a lot of people
watching not a lot of people dead’ (Jenkins 1974, 4) revised his statement in
2006, and wrote:
    They [‘old’ terrorists] were limited not only by access to weapons but by
    self-constraint. Mayhem as such was seldom an objective. Terrorists had a
    sense of morality, a self-image, operational codes, and practical concerns –
    they wanted to maintain group cohesion, avoid alienating perceived constit-
    uents, and avoid provoking public outrage, which could lead to crackdowns.
    But these constraints gave way to large-scale indiscriminate violence as ter-
    rorists engaged in protracted, brutal conflicts; as the more squeamish
    dropped out; as terrorism became commonplace and the need for headlines
    demanded higher body counts; and as ethnic hatred and religious fanaticism
    replaced political agendas.
                                                            (Jenkins 2006b, 118)
The good old terrorists had morality, whereas the ‘new’ terrorists represented an
apolitical form of violence. Thus, while US officials drew on specific meta-
narratives to explain the attacks, and to justify a militarised response, Hoffman
was certainly right that bin Laden wiped the slate clean of the conventional
wisdom on terrorism. Both experts and academia scrambled to produce know-
ledge on terrorism and how to counter it. This rather frantic situation was well
documented by Silke, who found that by the mid-2000s, a new book on terrorism
in English was published approximately every six hours (Silke 2009). The only
problem was that almost all of this literature were thought-pieces, and only a
handful could be considered to be methodologically rigorous (Lum, Kennedy,
and Sherley 2006, 3). As such, claims about the nihilistic and diabolical nature
of the new ‘superterrorists’ were not grounded in methodologically sound
research. Zulaika describes the same crisis of knowledge, which begins ‘with the
placement of the entire phenomenon in a context of taboo and the wilful igno-
rance of the political subjectivities of the terrorists’ (Zulaika 2009, 2). One con-
sequence of this crisis is that the counterterrorist becomes preoccupied with
                                                    The Global War on Terror   13
reacting against an utterly dangerous and sinister actor that she does not know.
In such a situation, what could happen weighs as much, if not more, than what is
actually the case.
    In this setting, governments are inclined to focus on worst-case scenarios, and
may very well find themselves looking for, and preparing for, the ‘unknown
unknowns’. Rumsfeld famously encapsulated this thinking in a NATO press
conference in 2002, when he was asked to follow up on a notion that the real
situation, regarding Saddam Hussein and WMDs, is worse than what is gener-
ally understood. Rumsfeld replied that in his experience over the years he had
come to realise that there are no ‘knowns’, but insisted that there are:
    things we know that we know. There are known unknowns. That is to say
    there are things that we now know we don’t know. But there are also
    unknown unknowns. There are things we don’t know we don’t know […]
    and each year we discover more and more of those unknowns.
Rumsfeld continued:
Counterterrorism as war
Conceptualising counterterrorism as war has been much discussed in the terrorism
literature, and the military, or the use of violence, enjoys prevalence in what is
known as the war model. As Rogers notes in regards to the use of military force in
responding to 9/11: ‘the strongest argument in favour of the use of military force
in responding to the 9/11 attacks is the requirement of a state to protect its own
people’ (Rogers 2012, 148). The main assumption is that eliminating a terrorist
group is first and foremost accomplished through the application of military force.
This assumption is illustrated by Fukuyama’s notion that: ‘German fascism didn’t
collapse because of internal moral contradictions; it died because Germany was
bombed to rubble and occupied by Allied armies’ (Fukuyama 2002, 34).
    Duyvesteyn points out six ways which the available literature suggests the
military can be used to combat or counter terrorism (Duyvesteyn 2010). First,
military force can be used to support the civilian authorities confronted with ter-
rorist violence, for instance, through helping to restore law and order or in
hostage rescue operations. Second, armed force can be used to pre-emptively
attack terrorists and their assets in order to curb subsequent terrorist campaigns.
Third, military force can deter future terrorists based on the assumption that
military force will be credibly used in case of a threat of, or an actual, attack.
Fourth, armed force can be used to retaliate after an attack. The war in Afghani-
stan is an obvious example of such a policy. Fifth, armed forces can be used to
take out the leadership of terrorist organisations through decapitation and
assassination. Sixth, armed forces can be used, if necessary, to fight a war in
order to eradicate the enemy (ibid., 78).
    Crelinsten notes as supposed benefits of a military approach that military
action against terrorism will, first, boost morale at home. Second, unilateral action
is possible without having to cooperate with other nations. Third, military action
signals a nation’s resolve to tackle the problem, and, in this, maintain a tough
                                                   The Global War on Terror   15
image in the international arena. Fourth, using military force is a good way of
utilising modern science and technology (Crelinsten 2009, 76–77). Thus, Crelin-
sten concludes: ‘the war model is considered quick, effective, and ideally suited
to the new kinds of threat posed by decentralised, ideologically driven terrorist
networks whose adherents are not deterred by traditional criminal justice or con-
tained by traditional military power’ (ibid., 77). Paul Wilkinson, a noted ter-
rorism expert, points out that the military warfare model offers some important
advantages: it answers inevitable public and media demands for action, and it
can deter terrorists from perpetrating future attacks by inflicting serious damage
on the terrorists, thus ‘raising the stakes’ (Wilkinson 2006, 91). Such an action
can be a psychologically damaging blow on the enemy leadership that might
undermine the group’s ability to strike, which could lead to the group disinte-
grating. Undermining a group’s ability to strike is regarded as an important area
where the use of military force is indispensable.
    Michael Rubin argues that the key to an effective counterterrorism strategy is
to raise the price of engaging in terrorism so that the costs to terrorists and their
sponsors outweigh the benefits. Targeted killings, or assassinations of terrorists,
are particularly important, as he claims that they erode terrorist capabilities and
simultaneously enhance counterterrorism in two ways: ‘First, elimination of
recruiters and trainers degrades effectiveness and, second, in their desire for
revenge terrorists accelerate the dispatch of bombers. The result is easier detec-
tion’ (Rubin 2010, 225). Rubin’s arguments for the utility of force in combatting
terrorism are based on how Israel dealt with the second intifada, noting that even
though the international community condemned the use of violence, terrorist
attacks inside Israel declined by over 90 per cent. In addition, Rubin adds how
military force has succeeded where soft power has failed in Peru, Sri Lanka,
Colombia and Turkey (ibid., 228–229).
    Gal Luft, another proponent of violent counterterrorism, argues for the value
of targeted assassinations:
    Fighting terror is like fighting car accidents: one can count the casualties but
    not those whose lives were spared by prevention. Hundreds, if not thou-
    sands, of Israelis go about their lives without knowing that they are unhurt
    because their murderers met their fate before they got the chance to carry
    out their diabolical missions. This silent multitude is the testament to the
    policy’s success.
                                                                        (Luft 2003)
Boaz Ganor, one of the most prevalent proponents of a hard-line approach to ter-
rorism argues that proactive offensive operations is a vital component in a coun-
terterrorism strategy, especially suited to deal with suicide attacks (Ganor 2005).
Similarly, Carvin argues that it is far too soon to say that the numbers on targeted
killing do not add up, and while it might be a strategy with flaws, it remains an
integral and legitimate tactic under the inherent right of self-defence which is
enshrined in international law (Carvin 2012, 172). The arguments for utilising
16   The Global War on Terror
military power to fight terrorism therefore can be summed up in the words of
Michael Rubin: ‘Police investigate crimes; militaries pre-empt and neutralize
threats’ (Rubin 2010, 231). The use of force as a response to terrorism is recog-
nised by most scholars as a possible trap for democratic states to use dispropor-
tionate force and thus risk breaching humanitarian laws. Indeed, Ganor notes
that although a state has a duty and a moral obligation to defend itself, it must do
so within the framework of humanitarian law and the Geneva Conventions
(Ganor 2012, 142–143). The concerns for how democracies can fight terrorism
while upholding liberal principles and without breaking human rights have led
some scholars to argue for the applicability of ‘just war theory’ and counterter-
rorism (Imre, Mooney, and Clarke 2008; Johnson 2003). Elshtain, an authority
on just war theory, states that for a war to be just it first needs to be:
The just war tradition is perceived by Elshtain to be a way for democratic gov-
ernments to exercise the responsibility to protect civilians and bring justice to
the perpetrators of terrorism. An act of terrorism necessarily disrupts civic peace,
and preventing further harm and restoring the preconditions for civic tranquillity
is a justifiable casus belli (ibid., 59). As alluded to earlier, it is argued that states
have a moral obligation to defend their citizens, and a terrorist attack that wil-
fully attacks civilians is perceived to be such a gross violation of human rights
that the state can respond to terrorism with hard force. The use of force therefore
serves a higher purpose than terrorist violence which only seeks maximum
destruction. A state’s use of violence in order to bring justice to terrorists is thus
not an instrument of terror for terror’s sake. The US-led invasion of Afghanistan
was set in motion to punish the wrongdoers and prevent them from doing further
harm. The war in Afghanistan thus met the just cause criterion, and the moment
both houses of the US Congress backed the war, the right authority criterion was
met. Responding morally to terrorism is thus perceived as possible, and Johnson
adds that with the new technologies of warfare it is much easier and straight-
forward to honour the moral requirements of a just war (Johnson 2003, 237).
Elshtain concludes that:
    Terror must never be answered with terror; but war can only be answered with
    war, and it is incumbent on us to devise a style of war more imaginative, more
    decisive, and yet more humane than anything terrorists can contrive.
                                                               (Elshtain 2003, 67)
                                                   The Global War on Terror   17
Terrorism as warfare pre-9/11
There have been scholars who for a long time have argued that terrorism should
be seen as a form of warfare (Clutterbuck 1990; Creveld 1991; Moss 1972; Silke
1996; Taber 1969). Robert Taber argued in 1969 that terrorism is urban guerrilla-
ism and thus a form of warfare. Furthermore, he argued that terrorism is one of
 the most humane ways to wage war. Indeed, compared to blockbusting a city or
 napalming a village, terrorism is far more humane than other forms of warfare
 (Taber 1969, 90–91). Richard Clutterbuck shares the notion of terrorism as urban
 guerrilla warfare. He traces the roots of terrorism to Che Guevara and the suc-
 cessful establishment of an aggressive Foco in Cuba in 1957–1958. The central
 idea of Focalism is that a small paramilitary group can provide a focus (in
 Spanish, foco) for people to spontaneously rise against a ruling regime. The ori-
 ginal approach was to mobilise and launch attacks from rural areas, but when
 Guevara tried to export the Foco theory to other Latin American countries, the
 rural guerrillas suffered defeat after defeat. The guerrillas therefore had to take
 their Foco into more fertile ground, to the intellectuals and the proletariat in the
 city. Thus Clutterbuck argues: ‘the urban guerrillas are simply the focos trans-
 ferred to the city’ (Clutterbuck 1990, 22). Furthermore, Clutterbuck argues that
 the cult of urban guerrilla warfare spread quickly to other parts of the world,
 most notably to the Middle East where the Palestinians, due to their lack of
 success against the Israelis with rural raids, started to emulate the Latin Amer
 ican urban guerrillas in the late 1960s (ibid., 23). Martin van Creveld, another
 often-quoted proponent of defining terrorism as a form of warfare, argues that
 low-intensity conflict (LIC) has the following characteristics:
    First, they tend to unfold in ‘less developed’ parts of the world; the small-
    scale armed conflicts which do take place in ‘developed’ countries are
    usually known under a variety of other names, such as ‘terrorism’, ‘police
    work’, or in the case of Northern Ireland – ‘troubles’. Second, very rarely
    do they involve regular armies on both sides, though often it is a question of
    regulars on one side fighting guerrillas, terrorists, and even civilians, includ-
    ing women and children on the other. Third, most LICs do not rely prim-
    arily on the high-technology collective weapons that are the pride and joy of
    any modern armed force. Excluded from them are the aircraft and the tanks,
    the missiles and the heavy artillery, as well as many other devices so com-
    plicated as to be known only by their acronyms.
                                                                 (Creveld 1991, 20)
Another argument for viewing terrorism as warfare comes from Silke, who
wonders why terrorism is seen as something so completely different and repul-
sive in comparison to other forms of warfare. Despite the fact that terrorism is
both less destructive and less indiscriminate than most other forms of warfare,
terrorism is viewed as breaking the rules and thus seen as a singularly pernicious
phenomenon. However, as Silke points out, the rules that are being broken are
those devised for Western conventional warfare, based on the medieval Euro-
pean code of chivalry. Facing adversaries who would fight in an unconventional
manner is something all colonial powers have faced in the past, and both Euro-
pean powers and the USA came to loathe this form of warfare. Echoing the
Romans who saw unconventional warfare as a form of banditry, guerrilla fighters
were seen to break the rules of war in the same way as terrorists are today (Silke
1996, 15). Nonetheless, Silke argues that terrorists are engaged in a form of
warfare and should thus be viewed as soldiers:
    Terrorist tactics are merely a subset within the larger domain of guerrilla
    tactics. Terrorism is not something distinctly separate. Severe limits in
    resources and manpower often preclude groups from using anything but ter-
    rorist tactics, thus leaving them isolated and identifiable.
                                                                    (Ibid., 26)
                                                   The Global War on Terror   19
   When terrorists do commit crimes, or break the rules, they should be seen as
war criminals and treated accordingly. This is not an all too radical argument,
given that we already treat people responsible for genocide as war criminals and
bring them to trial for their crimes. Terrorism then has become dirty business in
equally dirty drapings, whereas warfare is dirty business in respectable drapings.
Viewing terrorism as a form of warfare, therefore, is, according to Silke
important because we will finally see ‘the elephant for what it really is, and until
we reach an acceptance of this, we will all remain groping in the dark’ (ibid.,
27). Nevertheless, none of these authors offer any specific ways of countering
terrorism, however defined. Clutterbuck does argue that the terrorist threat can
always be defeated by force majeure, but it must be applied with restraint (Clut-
terbuck 1990, 149). Martin van Creveld made the prediction in 1991 that future
war will be fought by terrorists, guerrillas bandits, and that the regular armed
forces in Western countries will shrink and be replaced by the booming security
industry (Creveld 1991, 207). The arguments put forward in the previous section
were all made before 9/11, and terrorism was conceived of as just another form
of warfare enjoying increased prevalence.
As we shall see later, there are strong arguments for why violence creates more
violence, and interpolates subjects in a repetition of violence and counter-
violence from which they cannot free themselves.
                                                     The Global War on Terror   23
The consequences of violent counterterrorism
When describing the GWOT and its consequences, it is tempting to draw on
Machiavelli’s insight that ‘it is in the power of any man to begin a war, but he
cannot end it when he pleases’ (Machiavelli 1845, 138). For example, the wars
in Iraq and Afghanistan were easily started and initially won. However, they also
created the conditions that allowed ISIS to thrive and spread its misery (Fuller
2014; Milne 2015), and it set the scene for a vicious cycle of violence between
extreme Islamist groups and Western countries like the US, Britain and France.
The war in Iraq was supposed to overthrow Saddam Hussein, who allegedly
sponsored terrorism, and to cleanse Iraq of WMDs. The prevalent notion, as
described above, was that it was only a question of when a WMD-attack would
happen. A terrorist group could use such weapons in the future, supplied by
Saddam Hussein, and a preventive war was deemed necessary and justifiable. In
addition, the war would clear a path for democratic forces in Iraq to establish a
free-market, liberal democracy.
    It is of course difficult to ascertain the veracity of the provided numbers of total
casualties from the war in Iraq, given the chaos that the region is in. However, a
2016 report collected the available data from the available sources, and concluded
that the war had resulted in one million civilian casualties, and 4,800 coalition sol-
diers (‘Blood and Treasure: The Costs of the Iraq War’ 2016). Just as worrisome
and tragic is the displacement of approximately three million people as a result of
the war (Tirman 2017; UNHCR 2017). The wars in Iraq and Afghanistan could be
seen as attempts to increase the security of the US and its Western allies at the
expense of the security of the people in Afghanistan and Iraq. As such, Berki’s
conception of security seems to capture the essence of this line of thinking:
    Seeking after security for oneself and being a cause of insecurity for others
    are not just closely related; they are the same thing, with no chance of either
    logical or existential separation … when the chips are down, and to a certain
    degree, they are always down … it is my life, my freedom, my security
    versus the rest of the human race.
                                                               (Berki 1986, 32–33)
The use of violence in the GWOT did not stop at military campaigns, however.
The GWOT has involved targeted killings, rendition, indefinite detention without
trial, and torture. Targeted killings, through a rampant drone program, has only
increased in extent under President Obama. Micah Zenko, a leading American
expert on drones, contends that George Bush authorised around 50 drone strikes
that killed 296 alleged terrorists and 195 civilians. Obama has, as of 2016,
authorised 506 strikes that have killed 3,040 alleged terrorists and 391 civilians
(Zenko 2016a). We have to say ‘alleged’ when it comes to claims about how
many terrorists are killed, because as Becker and Shane have noted,
    Obama embraced a disputed method for counting civilian casualties that did
    little to box him in. It in effect counts all military-age males in a strike zone
24   The Global War on Terror
    as combatants, according to several administration officials, unless there is
    explicit intelligence posthumously proving them innocent.
                                                      (Becker and Shane 2012)
In July 2016, the White House published a report that drone and other airstrikes
had killed between 64 and 116 civilians. However, the report came under heavy
fire as it left out the civilian death toll from drone strikes in Afghanistan, Syria
and Iraq, it did not distinguish between CIA and US military operations, nor did
it mention drones or unmanned aircrafts (Ackerman 2016). In addition, the
numbers presented differed substantially from previous statements from US offi-
cials (Zenko 2016b) and The Bureau of Investigative Journalism, which has the
range of civilian casualties as between 380 and 801 (Serle 2016).
    The point here is that US officials are not quite sure how many civilians they
have killed with drone strikes. For example, Sen. Dianne Feinstein was asked in
2013, after she had stated that the number of civilian casualties each year was
typically in the single digits, how she could be so sure that the CIA did not
mislead officials and the public, as it had done regarding its rendition and torture
program. Feinstein’s reply was as simple as it was worrying: ‘that’s a good ques-
tion, actually. That’s a good question’ (Ackerman 2016). John Brennan, the
current CIA director, described in 2012 that targeted killings were to mitigate
threats to US persons’ lives, stating that ‘it is the option of last recourse’
(Brennan quoted in Becker and Shane 2012). With ever-increasing numbers of
drone strikes, it is difficult to comprehend how each of the over 500 strikes were
the option of last recourse. How normalised the use of drones has become was
perhaps best encapsulated by President Obama’s comments at the White House
Correspondents’ Dinner in 2010: ‘The Jonas Brothers are here. They’re out there
somewhere. Sasha and Malia are huge fans. But, boys, don’t get any ideas. I
have two words for you – predator drones. You will never see it coming. You
think I’m joking’ (‘Remarks by the President at White House Correspondents’
Association Dinner’ 2010).
    Torture and rendition have also been central components of the GWOT.
Under the label ‘enhanced interrogation’, at least 119 prisoners, between 2002
and 2007, were subjected to the most inhumane of conditions, for months and
even years (Senate Select Committee on Intelligence 2014). Blakely and
Raphael, responsible for the Rendition Project have also documented how Brit-
ain’s involvement in rendition and torture during the ‘war on terror’ was deep,
direct and multifaceted (Blakeley and Raphael 2016). Abu Ghraib in Iraq exem-
plified in the most horrifying way the inhuman treatment of war on terror
prisoners. Pictures emerged where prisoners were walked around like dogs, or
were forced to stand on a box for hours with the threat of being electrocuted if
they fell down. One soldier who partook in the abuse at Abu Ghraib, Chip Fred-
erick, wrote in a letter to his family:
    I questioned some of the things that I saw … such things as leaving inmates
    in their cell with no clothes or in female underpants, handcuffing them to
                                                  The Global War on Terror   25
    the door of their cell – and the answer I got was, ‘This is how military intel-
    ligence (MI) wants it done.’ … MI has also instructed us to place a prisoner
    in an isolation cell with little or no clothes, no toilet or running water, no
    ventilation or window, for as much as three days.
                                                                      (Hersh 2004)
Conclusion
Despite the enormous attention that terrorism has received, and the vast
resources allocated to counter it, there is reason to feel gloomy about con-
temporary counterterrorism. It has directly led, and still leads, to unnecessary
and avoidable massive human suffering for a vast number of people in Afghani-
stan and Iraq, but also in a score of other countries that have been affected by the
war on terror. As such, we return to Stump and Dixit’s remark earlier that
whether or not terrorism exits, is less important than how terrorism and terrorists
are constructed in practice. This chapter has traced both the construction of ter-
rorism as a security threat, and the consequences of the heavily militarised and
incredibly violent response to it. The point is that the GWOT, with its military
campaigns, torture and renditions, was not inevitable. Much of the suffering and
violence could have been avoided. For example, the Taliban was at one point in
2001 ready to hand bin Laden over to a third country (Guardian 2001), and the
war in Iraq was justified on false evidence pertaining to WMDs and the govern-
ment’s attachment to terrorist organisations. According to Ricks, a great many
high-ranking military personnel opposed the invasion of Iraq, and thought it
would be a potentially disastrous distraction from the fight against Al-Qaeda
(Ricks 2006). As such, no part of the GWOT was inevitable, and it is incumbent
on us to recognise that the human suffering it has brought about is a consequence
of how the threat of terrorism, and the response to it, was constructed and
operationalised.
28   The Global War on Terror
    In sum, it is possible to attribute a massive amount of avoidable human suf-
fering to a failed counterterrorism framework. The question then becomes what
can be done to address these failures? It is the aim of the following chapters to
construct a theory of counterterrorism that will radically challenge current coun-
terterrorism by reconceptualising the ontology, epistemology and agenda of
counterterrorism.
Note
1 The Five Eyes refer to an intelligence alliance comprising of Australia, Canada, New
  Zealand, the UK and the United States of America.
References
Aaron, D. 2005. Three Years On: Next Steps in the War in Terror. Santa Monica, CA:
  RAND Corporation.
Ackerman, S. 2016. ‘Obama Claims US Drones Strikes Have Killed up to 116 Civilians’.
  Guardian. www.theguardian.com/us-news/2016/jul/01/obama-drones-strikes-civilian-
  deaths.
Allison, G. 2004. ‘Nuclear Terrorism: The Ultimate Preventable Catastrophe’. Council
  on Foreign Relations. www.cfr.org/terrorism/nuclear-terrorism-ultimate-preventable-
  catastrophe/p7410.
Araj, B. 2008. ‘Harsh State Repression as a Cause of Suicide Bombing: The Case of the
  Palestinian–Israeli Conflict’. Studies in Conflict & Terrorism, 31(4), 284–303. doi:10.
  1080/10576100801925273.
Ball, J. 2014. ‘NSA Collects Millions of Text Messages Daily in “untargeted” Global
  Sweep’. Guardian, 16 January. doi:www.theguardian.com/world/2014/jan/16/nsa-
  collects-millions-text-messages-daily-untargeted-global-sweep.
Ball, J, Borger, J., and Greenwald, G. 2013. ‘Revealed: How US and UK Spy Agencies
  Defeat Internet Privacy and Security’. Guardian. www.theguardian.com/world/2013/
  sep/05/nsa-gchq-encryption-codes-security.
Becker, J., and Shane, S. 2012. ‘Secret ‘Kill List’ Proves a Test of Obama’s Principles
  and Will’. New York Times. www.nytimes.com/2012/05/29/world/obamas-leadership-
  in-war-on-al-qaeda.html?_r=0.
Bell, J. B. 1978. A Time of Terror. New York: Basic Books.
Berki, R. N. 1986. Security and Society: Reflections on Law, Order and Politics. London:
  J. M. Dent.
Blakeley, R., and Raphael, S. 2016. ‘British Torture in the War on Terror’. European
  Journal of International Relations, no. 1: 1–24. doi:10.1177/1354066116653455.
‘Blood and Treasure: The Costs of the Iraq War’. 2016. Middle East Eye. www.middle
  easteye.net/news/blood-and-treasure-costs-iraq-war-1660190585.
Bush, G. W. 2002. ‘The President’s State of the Union Address’. Washington, DC: The
  White House. https://georgewbush-whitehouse.archives.gov/news/releases/2002/01/
  20020129-11.html.
Carvin, S. 2012. ‘A Viable and Vital Policy Option’. In Contemporary Debates on
  Terrorism, edited by R. Jackson and S. J. Sinclair, 166–173. Abingdon: Routledge.
Chandler, M., and Gunaratna, R. 2007. Countering Terrorism: Can We Meet the Threat
  of Global Violence? London: Reaktion Books.
                                                      The Global War on Terror   29
Clutterbuck, R. 1990. Terrorism and Guerrilla Warfare. London: Routledge.
‘Constraints on Norway’s Middle East Role?’ 2009. WikiLeaks. http://wikileaks.org/
  cable/2009/02/09OSLO115.html.
Crelinsten, R. 2009. Counterterrorism. Cambridge: Polity Press.
Creveld, M. van. 1991. The Transformation of War. New York: The Free Press.
Davis, P. K, and Jenkins, B. M. 2002. Deterrence & Influence in Counterterrorism. Santa
  Monica, CA: RAND.
Dodd, V. 2017. ‘UK Facing Most Severe Terror Threat Ever, Warns MI5 Chief ’.
  Guardian, 17 October. www.theguardian.com/uk-news/2017/oct/17/uk-most-severe-
  terror-threat-ever-mi5-islamist.
Dozier, K. 2015. ‘Spy General Unloads on Obama’s ISIS War Plan’. The Daily Beast.
  www.thedailybeast.com/spy-general-unloads-on-obamas-isis-war-plan.
Duyvesteyn, I. 2010. ‘Great Expectations: The Use of Armed Force to Combat Ter-
  rorism’. In Modern War and the Utility of Force. Challenges, Methods and Strategy,
  edited by J. Angstrom and I. Duyvesteyn, 65–89. Abingdon: Routledge.
Elshtain, J. B. 2003. Just War Against Terror. New York: Basic Books.
English, R. 2009. Terrorism: How to Respond. Oxford: Oxford University Press.
Eppright, C. T. 1997. ‘Counterterrorism’ and Conventional Military Force: The Relationship
  between Political Effect and Utility’. Studies in Conflict & Terrorism, 20(4), 333–344.
Freedman, L. 2002. ‘Introduction’. In Superterrorism. Policy Responses, edited by Law-
  rence Freedman, 1–6. Oxford: Blackwell Publishing.
Fukuyama, F. 2002. ‘History and September 11’. In Worlds in Collision: Terror and the
  Future of Global Order, edited by K. Booth and T. Dunne, 27–36. Basingstoke:
  Palgrave Macmillan.
Fuller, G. 2014. ‘Former CIA Officer Says US Policies Helped Create IS’. Radikal. www.
  al-monitor.com/pulse/politics/2014/09/turkey-usa-iraq-syria-isis-fuller.html.
Ganor, B. 2005. The Counter-Terrorism Puzzle: A Guide for Decision Makers. New
  Brunswick, NJ: Transaction Publishers.
Ganor, B. 2012. ‘The Use of Force to Combat Terrorism’. In Contemporary Debates on
  Terrorism, edited by R. Jackson and S. J. Sinclair. Abingdon: Routledge.
Gearson, J. 2002. ‘The Nature of Modern Terrorism’. In Superterrorism: Policy
  Responses, edited by L. Freedman, 7–24. Oxford: Blackwell Publishing.
Giroux, H. A. 2004. ‘War on Terror’. Third Text, 18(4), 211–221. doi:10.1080/09528820
  42000229827.
Gomis, B. 2015. Counterterrorism: Reassessing the Policy Response. Boca Raton, FL:
  CRC Press.
‘Remarks by the President at White House Correspondents’ Association Dinner’. 2010.
  The White House. www.whitehouse.gov/the-press-office/remarks-president-white-
  house-correspondents-association-dinner.
‘Serial’. 2016. Serial Podcast. https://serialpodcast.org/.
‘Støre Har Hatt Hemmelige Samtaler Med Hamas’. 2011. TV2. www.tv2.no/nyheter/
  utenriks/midtosten/stoere-har-hatt-hemmelige-samtaler-med-hamas-3400055.html#.
  UwLYRrTqrsY.
‘Støre Snakket Direkte Med Hamas’ Leder’. 2011. NRK. www.nrk.no/nyheter/norge/
  1.7482430.
Greenwald, G. 2014. No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveil-
  lance State. New York: Metropolitan Books.
Guardian. 2001. ‘Bush Rejects Taliban Offer to Hand Bin Laden Over’. www.theguardian.
  com/world/2001/oct/14/afghanistan.terrorism5.
30   The Global War on Terror
Gunaratna, R. 2010. ‘Al-Qaeda is an Example of a “New Terrorism” ’. In Debating Ter-
   rorism and Counterterrorism. Conflicting Perspectives on Causes, Contexts, and
   Responses, edited by S. Gottlieb, 16–33. Washington, DC: CQ Press.
Harris, S., and Taylor, S. 2008. ‘Homeland Security Chief Looks Back, and Forward’.
   Government Executive. www.govexec.com/defense/2008/03/homeland-security-chief-
   looks-back-and-forward/26507/.
Hersh, S. M. 2004. ‘Torture at Abu Ghraib’. The New Yorker. www.newyorker.com/
   magazine/2004/05/10/torture-at-abu-ghraib.
Hoffman, B. 2004. ‘Foreword’. In Research on Terrorism. Trends, Achievements & Fail-
   ures, edited by A. Silke, xvii. Abingdon: Frank Cass.
Ignatieff, M. 2001. ‘It’s War, but It Doesn’t Have to Be Dirty’. Guardian, 1 October.
   www.theguardian.com/world/2001/oct/01/afghanistan.terrorism9.
Imre, R., Brian Mooney, T., and Clarke, B. 2008. Responding to Terrorism: Political,
   Philosophical and Legal Perspectives. Farnham: Ashgate.
Intriligator, M. D., and Toukan, A. 2006. ‘Terrorism and Weapons of Mass Destruction’.
   In Countering Terrorism and WMD: Creating a Global Counter-Terrorism Network,
   edited by P. Katona, M. D. Intriligator and J. P. Sullivan, 69–84. Abingdon:
   Routledge.
Jackson, R. 2005. Writing the War on Terrorism. Manchester: Manchester University
   Press.
Jackson, R., Jarvis, L. Gunning, J., and Breen-Smyth, M. 2011. Terrorism: A Critical
   Introduction. New York: Palgrave Macmillan.
Jenkins, B. M. 1974. ‘International Terrorism: A New Kind of Warfare’. RUSI Journal.
   Santa Monica, CA: RAND Corporation. doi:10.1080/03071848708522842.
Jenkins, B. M. 2006a. ‘From Combating Terrorism to the Global War on Terror’. In
   Countering Terrorism and WMD: Creating a Global Counter-Terrorism Network,
   edited by P. Katona, M. D. Intriligator and J. P. Sullivan, 181–198. Abingdon:
   Routledge.
Jenkins, B. M. 2006b. ‘The New Age of Terrorism’. McGraw-Hill Homeland Security
   Handbook, edited by D. Kamien, 117–130. New York: McGraw Hill Education.
Johnson, J. T. 2003. ‘Just War Theory: Responding Morally to Global Terrorism’. In The
   New Global Terrorism: Characteristics, Causes, Controls, edited by C. W. Kegley,
   223–238. Upper Saddle River, NJ: Prentice Hall.
Jones, S., and Libicki, M. 2008. ‘How Terrorist Groups End: Implications for Countering
   Al Qa’ida – RAND_RB9351.pdf ’. www.rand.org/content/dam/rand/pubs/research_
   briefs/2008/RAND_RB9351.pdf.
Kegley, Jr., C. 2003. ‘Introduction’. In The New Global Terrorism: Characteristics, Causes,
   Controls, edited by C. Kegley, Jr., 1–14. Upper Saddle River, NJ: Prentice Hall.
Luft, G. 2003. ‘The Logic of Israel’s Targeted Killing’. Middle East Quarterly, 10(1), 3–13.
Lum, C., Kennedy, L. W., and Sherley, A. 2006. ‘Are Counter-Terrorism Strategies
   Effective ? The Results of the Campbell Systematic Review on Counter-Terrorism
   Evaluation Research’. Journal of Experimental Criminology, 2, 489–516. doi:10.1007/
   s11292–006–9020-y.
Lustick, I. S. 2012. ‘Why Terrorism Is a Much Smaller Threat than You Think’. In Con-
   temporary Debates on Terrorism, edited by R. Jackson and S. J. Sinclair, 66–75.
   Abingdon: Routledge.
Machiavelli, N. 1845. The Florentines Histories. New York: Paine and Burgess.
Mayer, J. 2008. The Dark Side: The Inside Story on How the War on Terror Turned into
   a War on American Ideals. New York: Doubleday.
                                                        The Global War on Terror   31
McLaughlin, J. 2016. ‘FBI Won’t Explain Its Bizarre New Way of Measuring Its Success
   Fighting Terror’. The Intercept. https://theintercept.com/2016/02/18/fbi-wont-explain-
   its-bizarre-new-way-of-measuring-its-success-fighting-terror/.
Milne, S. 2015. ‘Now the Truth Emerges: How the US Fuelled the Rise of Isis in Syria
   and Iraq’. Guardian. www.theguardian.com/commentisfree/2015/jun/03/us-isis-syria-
   iraq.
Moss, R. 1972. Urban Guerrillas. London: Temple Smith.
Mueller, J. 2006. ‘Is There Still a Terrorist Threat? The Myth of the Omnipresent Enemy’.
   Foreign Affairs. www.foreignaffairs.com/articles/2006-09-01/there-still-terrorist-threat-
   myth-omnipresent-enemy.
Mueller, J. 2011. ‘The Truth About Al Qaeda’. Foreign Affairs, August. www.foreign
   affairs.com/articles/2011-08-02/truth-about-al-qaeda.
Mueller, J. 2016. ‘Terrorism Since 9/11: The American Cases’. Accessed 25 July. http://
   politicalscience.osu.edu/faculty/jmueller/since.html.
Mueller, J., and Stewart, M. G. 2011. Terror, Security, and Money. Balancing the Risks,
   Benefits, and Costs of Homeland Security. Oxford: Oxford University Press.
Mueller, J., and Stewart, M. G. 2015. ‘What Are the Risks of Terrorism?’ Libertarianism.
   org. www.libertarianism.org/media/free-thoughts/what-are-risks-terrorism.
Mueller, J., and Stewart, M. G. 2016. Chasing Ghosts: The Policing of Terrorism.
   Oxford: Oxford University Press.
Ricks, T. E. 2006. Fiasco: The American Military Adventure in Iraq. London:
   Allen Lane.
Rogers, P. 2012. ‘Wars of Terror – Learning the Lessons of Failure’. In Contemporary
   Debates on Terrorism, edited by R. Jackson and S. J. Sinclair, 143–151. Abingdon:
   Routledge.
Rubin, M. 2010. ‘More Creative Military Strategies Are Needed’. In Debating Terrorism
   and Counterterrorism. Conflicting Perspectives on Causes, Contexts, and Responses,
   edited by S. Gottlieb, 1st edn, 218–234. Washington, DC: CQ Press.
Rumsfeld, D. 2002. ‘Press Conference’. NATO. www.nato.int/docu/speech/2002/
   s020606g.htm.
Schneier, B. 2003. Beyond Fear: Thinking Sensibly about Security in an Uncertain
   World. New York: Copernicus.
Senate Select Committee on Intelligence. 2014. ‘Committee Study of the CIA’s Deten-
   tion and Interrogation Program. Executive Summary’. www.therenditionproject.org.uk/
   documents/RDI/141209-SSCI-Torture_Report_Executive_Summary.pdf.
Serle, J. 2016. ‘Obama Drone Casualty Numbers a Fraction of Those Recorded by the
   Bureau’. The Bureau of Investigative Journalism. www.thebureauinvestigates.com/
   2016/07/01/obama-drone-casualty-numbers-fraction-recorded-bureau/.
Shultz, R., and Vogt, A. 2003. ‘It’s War! Fighting Post-11 September Global Terrorism
   through a Doctrine of Preemption’. Terrorism and Political Violence, 15(1), 1–30. doi:
   10.1080/09546550312331292947.
Silke, A. 1996. ‘Terrorism and the Blind Men’s Elephant’. Terrorism and Political Viol-
   ence 8(3): 12–28. doi:10.1080/09546559608427361.
Silke, A. 2009. ‘Contemporary Terrorism Studies: Issues in Research’. In Critical Ter-
   rorism Studies: A New Research Agenda, edited by R. Jackson, M. Breen-Smyth and
   J. Gunning, 34–48. Abingdon: Routledge.
Stohl, M. 2012. ‘Don’t Confuse Me with the Facts : Knowledge Claims and Terrorism’.
   Critical Studies on Terrorism, 5(1), 31–49.
Taber, R. 1969. The War of the Flea. London: Paladin.
Exploring the Variety of Random
Documents with Different Content
   Sash chains are made in the form illustrated in Fig. 72, and may
be had either in steel, red metal, or bronze. The sash chains in the
market are usually made in four sizes, being numbered from 0 to 3.
The makers, however, have no agreement regarding these
standards, so that the numbering is not uniform; one manufacturer’s
No. 0 chain may be his heaviest make, while a chain of the same
number furnished by another maker may be the lightest chain that he
manufactures. In order to provide against this discrepancy when
specifying, it is well to name the maker of the chain. The lightest
sash chain will support sashes weighing from 40 to 75 pounds, while
the heaviest will carry sashes that weigh from 150 to 250 pounds.
Fig. 73
Fig. 72
Fig. 76
                                                 Fig. 78
              Fig. 77
                               Fig. 79
   The common type of sash lift illustrated in Fig. 77 is known as the
hook sash lift. This lift is extensively used, and can be procured in
any grade or weight, in either cast-iron, steel, or bronze metal, and in
any finish desired.
    The flush sash lift, the general type of which is shown in Fig. 78,
makes a better appearance than the hook lift, and is considerably
stronger, from the fact that the casing forming the grip is let into the
lower rail of the sash, and the strain is taken by this, rather than by
the screws. These lifts are made in either steel or bronze, and in all
finishes; they can also be had ornamented to correspond with the
lock trim.
     For heavy sashes, such as those in public and commercial
buildings, the bar sash lift illustrated in Fig. 79 is the best. This type
of lift should always be used for heavy sash. A sash lift similar to the
type shown at (a) is sometimes fastened to the under side of the
meeting rail of the upper sash for the purpose of lowering the sash.
Fig. 80
Fig. 81
                                Fig. 86
                              Fig. 87
                              Fig. 90
    73. Casement Trim.—The term casement applies properly to
any hinged sash. It is, however, usually limited to windows that have
a sill set some distance above the floor. Where the casement sash
extends to the floor, the term French window is generally applied,
although frequently the terms are confused. In designing casement
windows, the details of the hardware should be such that the
casements can be made weather-tight; and in laying out the full-
sized details for the mill work for a casement sash and frame, the
available hardware should be studied, so that the woodwork may be
arranged to conform to it.
    74. Casement Bolts and Fasts.—Casement sash may be
provided with any good form of top and bottom bolts or hinged sash
fasteners, but these should be supplemented by a good latch or
cupboard catch at the center. Special turnbuckles, or casement
fasts, constructed as shown in Fig. 91, are on the market. All of the
catches shown will securely fasten the sash, but the types shown at
(a) and (d), Fig. 91, will draw the sash tightly against the frame when
the buckle, or fast, is drawn in place. In countries where casement
sash are in general use, the necessary fastenings, including the top
and bottom bolts, are embodied in one structure, as described in the
following article.
                              Fig. 91
    75. Cremorne Bolts.—In the best work, the Cremorne bolt is
used for casement windows. This device consists of a vertical rod
divided at or about the middle of its length, thus making two pieces,
and is operated by a knob, or handle, at that point. Types of
ornamental Cremorne bolts are illustrated in Fig. 92. As shown, the
upper and lower ends of the rods, or bolts, slide vertically and in
opposite directions, being operated by the turning of the knob, or
handle. These bolts are furnished with suitable strikes, either of the
plate or the box form, which are attached to the window at the top or
the bottom. Since the ends of the bolts are beveled, they press the
two sashes tightly together and against the sash frame when they
are thrown in. A single movement of the knob, or lever handle, is
sufficient to release both bolts.
                               Fig. 92
     76. Espagnolette Bolts.—In Fig. 93 is shown the Espagnolette
bolt, which is similar in construction to the Cremorne bolt. This bolt
consists of a vertical rod, but instead of being in two pieces, as in the
Cremorne bolt, it is in one piece. This rod has hooks at each end,
and, by a rotary motion, engages pins, or plates, in the window
frame and thus draws the sashes together and against the frame.
These bolts are usually operated by a pendant handle, which, when
lifted to a horizontal position, will release the rod so that it may be
rotated to fasten or to release the sash. For very high sash, a
supplemental design may be used by providing a tapered hook on
the opposite sash for the pendant. The Espagnolette bolt is usually
heavier than the Cremorne and exerts more power in forcing the
sashes against the frame; it is also more expensive. Both bolts,
however, are available for use on doors as well as on windows, and
lend themselves admirably to decorative treatment, as shown in the
illustrations.
Welcome to our website – the ideal destination for book lovers and
knowledge seekers. With a mission to inspire endlessly, we offer a
vast collection of books, ranging from classic literary works to
specialized publications, self-development books, and children's
literature. Each book is a new journey of discovery, expanding
knowledge and enriching the soul of the reade
Our website is not just a platform for buying books, but a bridge
connecting readers to the timeless values of culture and wisdom. With
an elegant, user-friendly interface and an intelligent search system,
we are committed to providing a quick and convenient shopping
experience. Additionally, our special promotions and home delivery
services ensure that you save time and fully enjoy the joy of reading.
ebookfinal.com