Counterterrorism

Counterterrorism

Human Rights and Counterterrorism in 2011

United States views on international law (based on the document “Digest of U.S. Practice in International Law”): On March 7, 2011, the United States Delegation to the 16th Session of the Human Rights Council delivered a statement in the interactive dialogue with the special rapporteur for torture and the special rapporteur for the protection of human rights while countering terrorism. The excerpts below from the U.S. statement, which is available in full at (internet link) geneva.usmission.gov/2011/03/07/interactive-dialogue-on-torture-and-protection-of-human-rights-while-countering-terrorism/, address the “Best Practices” recommended by the special rapporteur for the protection of human rights while countering terrorism.

Developments

We would also like to thank Special Rapporteur Scheinin for his most recent and final report on the promotion and protection of human rights and fundamental freedoms while countering terrorism. We thank him for his tireless work to promote and protect human rights, not only in his tenure as the first Special Rapporteur to hold this post, but throughout his career as well.

As the Special Rapporteur’s work illustrates, countering terrorism is a global challenge, which calls for states to be vigilant and creative, receptive to new ideas, and diligent in ensuring that measures taken to prevent and combat terrorism comply with their obligations under applicable international law.

Details

The Special Rapporteur’s report suggests ten areas of best practice. As the Special Rapporteur notes, recommendations for best practices are not legal obligations and thus may go beyond what is required by international law or practiced by most states. Furthermore, in this most challenging of areas, no one approach or singular set of practices will necessarily apply in all situations. We agree with the Special Rapporteur’s assessment that Member States must consider best practices in a manner that is consonant with the fundamental principles of their various legal systems. As such, the practices suggested by the Special Rapporteur should not be considered as the sole means by which states can effectively counter terrorism while respecting human rights. We thank the Special Rapporteur for his devotion to upholding the human rights of all people, including victims of terrorism, and extend to him the U.S. best wishes as his particular mandate comes to a close.

Counterterrorism

In relation to the international law practice and counterterrorism in this world legal Encyclopedia, please see the following section:

Use of Force

About this subject:

Use of Force Issues Related to Counterterrorism Efforts

Note: there is detailed information and resources under these topics during the year 2013, covered by this entry on counterterrorism in this law Encyclopedia.

Global Counterterrorism Forum

In relation to the international law practice and Global Counterterrorism Forum in this world legal Encyclopedia, please see the following section:

International Criminal Law

About this subject:

International Crimes

Under this topic, in the Encyclopedia, find out information on Terrorism. Note: there is detailed information and resources, in relation with these topics during the year 2011, covered by the entry, in this law Encyclopedia, about Global Counterterrorism Forum

Human Rights and Counterterrorism

In relation to the international law practice and Human Rights and Counterterrorism in this world legal Encyclopedia, please see the following section:

International Human Rights

Resources

See Also

  • International Human Rights
  • Counterterrorism

Further Reading

  • Aid, M. M. (2003). All glory is fleeting: Sigint and the fight against international terrorism. Intelligence and National Security, 18(4), 72–120.
  • Aldrich, R. J. (2002). Dangerous liaisons: Post-September 11 intelligence alliances. Harvard International Review, 24(3), 50–54.
  • Anonymous [Scheuer, M.]. (2004). How not to catch a terrorist. Atlantic Monthly (December), 50.
  • Arce, D. G., & Sandler, T. (2007). Terrorist signalling and the value of intelligence. British Journal of Political Science, 37, 573–586.
  • Atran, S. (2006). Commentary: A failure of imagination (intelligence, WMDs, and “virtual jihad”). Studies in Conflict & Terrorism, 29(3), 285–300.
  • Baer, R. (2005). Wanted: Spies unlike us. Foreign Policy, 147, 66–70.
  • Bamford, B. W. C. (2005). The role and effectiveness of intelligence in Northern Ireland. Intelligence & National Security, 20(4), 581–607.
  • Bazerman, M. H., & Watkins, M. D. (2004). Predictable surprises: The disasters you should have seen coming, and how to prevent them. Boston: Harvard Business School Press.
  • Bergen, P. L. (2012). Manhunt: The ten-year search for Bin Laden from 9/11 to Abbottabad. New York: Crown.
  • Berkowitz, B. D. (2002b). Intelligence and the war on terrorism. Orbis, 46(2), 289–300.
  • Berkowitz, P. (Ed.). (2005). The future of American intelligence. Stanford, CA: Hoover Institution.
  • Betts, R. K. (1978). Analysis, war, and decision: Why intelligence failures are inevitable. World Politics, 31(1), 61–89.
  • Betts, R. K. (2006). How to think about terrorism. Wilson Quarterly, 30, 44–49.
  • Borch, F. L. (2003). Comparing Pearl Harbor and “9/11”: Intelligence failure? American unpreparedness? Military responsibility? Journal of Military History, 67(3), 845–860.
  • Bouzis, K. (2015). Countering the Islamic State: U.S. counterterrorism measures. Studies in Conflict & Terrorism, 38(10), 885–897.
  • Bryant, R., Hamre, J., Lawn, J., MacGaffin, J., Shapiro, H., Smith, J. (2003). America needs more spies. The Economist, (July 12), 30–31.
  • Byman, D. (2005). Strategic surprise and the September 11 attacks. Annual Review of Political Science, 8, 145–170.
  • Byman, D. (2017). US counterterrorism intelligence cooperation with the developing world and its limits. Intelligence & National Security, 32(2), 145–160.
  • Carter, D., Chermak, S., Carter, J., & Drew, J. (2014). Understanding law enforcement intelligence processes. National Consortium for the Study of Terrorism and Responses to Terrorism (START), July.
  • Clarke, R. A. (2004). Against all enemies: Inside America’s war on terror. New York: Free Press.
  • Cooper, H. H. A. (1978). Terrorism and the intelligence function. In M. H. Livingston, L. B. Kress, & M. G. Wanek (Eds.), International terrorism in the contemporary world (pp. 287–296). Westport, CT: Greenwood.
  • Copeland, T. E. (2007). Fool me twice: Intelligence failure and mass casualty terrorism. Leiden, The Netherlands: Martinus Nijhoff.
  • Crumpton, H. A. (2012). The art of intelligence: Lessons from a life in the CIA’s clandestine service. New York: Penguin.
  • Dahl, E. J. (2013). Intelligence and surprise attack: Failure and success from Pearl Harbor to 9/11 and beyond. Washington, DC: Georgetown University Press.
  • Dahl, E. J. (2014b). Local approaches to counterterrorism: The New York Police Department model. Journal of Policing, Intelligence & Counter Terrorism, 9(2), 81–97.
  • Davies, P. H. J. (2004). Intelligence culture and intelligence failure in Britain and the United States. Cambridge Review of International Affairs, 17(3), 495–520.
  • Deutch, J., & Smith, J. H. (2002). Smarter intelligence. Foreign Policy, 128, 64–69.
  • Ermarth, F. (2002). Signs and portents: The “I&W” paradigm post-9/11. [Electronic version]. In the National Interest. Available online.
  • Gerecht, R. M. (2001). The counterterrorist myth. Atlantic Monthly 288, 38–42.
  • Gerecht, R. M. (2006). Intelligence deficit disorder. Washington, DC: American Enterprise Institute on the Issues paper.
  • Handel, M. I. (1977). The Yom Kippur war and the inevitability of surprise. International Studies Quarterly, 21(3), 461–502.
  • Harris, J. W. (2002). Building leverage in the long war: Ensuring intelligence community creativity in the fight against terrorism. Cato Institute Policy Analysis, 439, 1–14.
  • Hayden, M. (2010 September 27). Protecting America and winning the intelligence war. The Heritage Foundation, Heritage Lectures, No. 1167.
  • Hedley, J. H. (2005). Learning from intelligence failures. International Journal of Intelligence & CounterIntelligence, 18(3), 435–450.
  • Herman, M. (2003). Counter-terrorism, information technology and intelligence change. Intelligence & National Security, 18(4), 40–58.
  • Heuer, R. J., Jr. (2005). Limits of intelligence analysis. Orbis, 49(1), 75–94.
  • Hof, F. C. (1985). The Beirut bombing of October 1983: An act of terrorism? Parameters, 15(2), 69–74.
  • Honig, O. (2008). Surprise attacks—Are they inevitable? Moving beyond the orthodox–revisionist dichotomy. Security Studies, 17(1), 72–106.
  • Irons, L. (2008). Recent patterns of terrorism prevention in the United Kingdom. Homeland Security Affairs, 4(1).
  • Jenkins, B. M. (2006a). Intelligence and homeland security. In A. Dalgaard-Nielsen & D.S. Hamilton (Eds.), Transatlantic homeland security: Protecting society in the age of catastrophic terrorism (pp. 126–146). London: Routledge.
  • Jenkins, B. M. (2006c). Unconquerable nation: Knowing our enemy, strengthening ourselves. Santa Monica, CA: RAND.
  • Johnston, R. (2005). Analytic culture in the U.S. intelligence community: An ethnographic study. Washington, DC: Central Intelligence Agency Center for the Study of Intelligence.
  • Jordan, J., Torres, M. R., & Horsburgh, N. (2004). The Intelligence Services’ struggle against al-Qaeda propaganda. International Journal of Intelligence & CounterIntelligence, 18(1), 31–49.
  • Kahn, D. (2006). The rise of intelligence. Foreign Affairs, 85(5), 125–134.
  • Kamarck, E. C. (2005). Transforming the intelligence community: Improving the collection and management of information. Washington, DC: IBM Center for the Business of Government.
  • Kennedy, D., & Brunetta, L. (1994). Lebanon and the intelligence community: A case study. Studies in Intelligence, 37(5), 37–51.
  • Khalsa, S. K. (2004). Forecasting terrorism: Indicators and proven analytic techniques. Lanham, MD: Scarecrow.
  • Lahneman, W. J. (2007). Is a revolution in intelligence affairs occurring? International Journal of Intelligence & CounterIntelligence, 20(1), 1–17.
  • Lansford, T. (2007). Multinational Intelligence Cooperation. In J. J. F. Forest (Ed.), Countering Terrorism and Insurgency in the 21st Century: International Perspectives. Strategic and Tactical Considerations (Vol. 1, pp. 420–39). Westport, CT: Praeger,
  • Lefebvre, S. J. (2003). The difficulties and dilemmas of international intelligence cooperation. International Journal of Intelligence & CounterIntelligence, 16(4), 527–542.
  • Lesser, I. O., Hoffman, B., Arquilla, J., Ronfeldt, D., Zanini, M., & Jenkins, B. M. (1999). Countering the new terrorism. Santa Monica, CA: RAND.
  • Lewis, R. C. (2004). Espionage and the war on terrorism: Investigating U.S. efforts. Brown Journal of World Affairs, 11(1), 175–182.
  • Mackmurdo, C. (2007). Intelligence and international security after 9/11. In C. Ankersen (Ed.), Understanding global terror (pp. 195–216). Cambridge, MA: Polity.
  • Marrin, S. (2003). Homeland security intelligence: Just the beginning. Journal of Homeland Security (November).
  • Marrin, S. (2011). The 9/11 terrorist attacks: A failure of policy not strategic intelligence analysis. Intelligence & National Security, 26(2–3), 182–202.
  • Mobley, B. W. (2012). Terrorism and counterintelligence: How terrorist groups elude detection. New York: Columbia University Press.
  • Motley, J. B. (1987). Coping with the terrorist threat: The U.S. intelligence dilemma. In S. J. Cimbala (Ed.), Intelligence and intelligence policy in a democratic society (pp. 165–175). Dobbs Ferry, NY: Transnational.
  • Mudd, P. (2013). Takedown: Inside the hunt for Al Qaeda. Philadelphia: University of Pennsylvania Press.
  • National Security Strategy of the United States of America. (2002). Washington, DC: The White House.
  • Nomikos, J. M. (2007). Terrorism, media, and intelligence in Greece: Capturing the 17 November group. International Journal of Intelligence & CounterIntelligence, 20(1), 65–78.
  • Ofri, A. (1984). Intelligence and counterterrorism. Orbis, 28(1), 41–52.
  • Parker, C. F., & Stern, E. K. (2002). Blindsided? September 11 and the origins of strategic surprise. Political Psychology, 23(3), 601–630.
  • Pedahzur, A., & Perliger, A. (2007). Coping with terrorism: Lessons learned from the Israeli intelligence community. In J. J. F. Forest (Ed.), Countering terrorism and insurgency in the 21st century: International perspectives. Strategic and tactical considerations (Vol. 1, pp. 465–486). Westport, CT: Praeger.
  • Pillar, P. R. (2003). Metaphors and mantras: A comment on Shultz and Vogt’s discussion of terrorism, intelligence, and war. Terrorism and Political Violence, 15(2), 139–151.
  • Pillar, P. R. (2014 October 3). ISIS and the politics of surprise. The National Interest.
  • Posner, R. A. (2005). Preventing surprise attacks: Intelligence reform in the wake of 9/11. Stanford, CA: Rowman and Littlefield.
  • Ranstorp, M. (2007). Introduction: Mapping terrorism research. In M. Ranstorp (Ed.), Mapping terrorism research: State of the art, gaps and future direction (pp. 1–28). London: Routledge.
  • Reveron, D. S. (2006). Old allies, new friends: Intelligence-sharing in the war on terror. Orbis, 50(3), 453–468.
  • Riley, K. J., Treverton, G. F., Wilson, J. M., & Davis, L. M. (2005). State and local intelligence in the war on terrorism. Santa Monica, CA: RAND.
  • Robertson, K. G. (1987). Intelligence, terrorism and civil liberties. Conflict Quarterly, 7(2), 43–62.
  • Rovner, J. (2005). Why intelligence isn’t to blame for 9/11. MIT Center for International Studies. Audit of the Conventional Wisdom, 5(13).
  • Rudner, M. (2005). Using financial intelligence against the funding of terrorism. International Journal of Intelligence & CounterIntelligence, 19(1), 32–58.
  • Russell, R. L. (2004). Spies like them. The National Interest, 77, 59–62.
  • Russell, R. L. (2007a). Sharpening strategic intelligence: Why the CIA gets it wrong, and what needs to be done to get it right. New York: Cambridge University Press.
  • Schmitt, E., & Shanker, T. (2011). Counterstrike: The untold story of America’s secret campaign against Al Qaeda. New York: Times Books.
  • Segell, G. M. (2005). Intelligence methodologies applicable to the Madrid train bombings, 2004. International Journal of Intelligence & CounterIntelligence, 18(2), 221–238.
  • Shultz, R. H., Jr., & Vogt, A. (2003). It’s war! Fighting post–11 September global terrorism through a doctrine of preemption. Terrorism & Political Violence, 15(1), 1–30.
  • Sims, J. E. (2006). Foreign intelligence liaison: Devils, deals, and details. International Journal of Intelligence & CounterIntelligence, 19(2), 195–217.
  • Sims, J. E. (2007b). The contemporary challenges of counterterrorism intelligence. In J. J. F. Forest (Ed.), Countering terrorism and insurgency in the 21st century: International perspectives. Strategic and tactical considerations (Vol. 1, pp. 397–419). Westport, CT: Praeger.
  • Skillicorn, D. B, & Vats, N. (2007). Novel information discovery for intelligence and counterterrorism. Decision Support Systems, 43, 1375–1382.
  • Steinberg, J. B., Graham, M., & Eggers, A. (2003). Building intelligence to fight terrorism, Brookings Institution Policy Brief 125. Washington, DC: Brookings Institution.
  • Stevenson, J. (2006). Law-enforcement and intelligence capabilities. Adelphi Papers, 44(367), 47–71.
  • Sullivan, J. P., & Wirtz, J. J. (2008). Terrorism early warning and counterterrorism intelligence. International Journal of Intelligence & CounterIntelligence, 21(1), 13–25.
  • Svendsen, A. D. M. (2012). The Federal Bureau of Investigation and change: Addressing US domestic counter-terrorism intelligence. Intelligence & National Security, 27(3), 371–397.
  • Treverton, G. F. (2003). Terrorism, intelligence and law enforcement: Learning the right lessons. Intelligence & National Security, 18(4), 121–140.
  • Treverton, G. F. (2010). Addressing “complexities” in homeland security. In L. Johnson (Ed.), The Oxford handbook of national security intelligence (pp. 343–348). New York: Oxford University Press.
  • Wannall, W. R. (2002). Undermining counterintelligence capability. International Journal of Intelligence & CounterIntelligence, 15(3), 321–329.
  • Weiner, T. (2007). How to make a spy. Foreign Policy, 162, 44–48.
  • Winston, T. (2007). Intelligence challenges in tracking terrorist internet fund transfer activities. International Journal of Intelligence & CounterIntelligence, 20(2), 327–343.
  • Wirtz, J. J. (2006). Responding to surprise. Annual Review of Political Science, 9, 45–65.
  • Wohlstetter, R. (1962). Pearl Harbor: Warning and decision. Stanford, CA: Stanford University Press.
  • Zegart, A. B. (2006 September 17). American intelligence—still stupid. Los Angeles Times, M2.
  • Zegart, A. B. (2007b). CNN with secrets: 9/11, the CIA, and the organizational roots of failure. International Journal of Intelligence & CounterIntelligence, 20(1), 18–49.
  • Zenko, M. (2006). Intelligence estimates of nuclear terrorism. Annals of the American Academy of Political & Social Science, 607(1), 87–102.
  • Comments

    Leave a Reply

    Your email address will not be published. Required fields are marked *