Top Banner

of 21

1815 vienna

Apr 06, 2018

Download

Documents

Naresh Kumar
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
  • 8/3/2019 1815 vienna

    1/21

    Introduction

    In terms of near-universal participation by sovereign States, the high degree of observance among States partiesand the influence it has had on the international legal order, the Vienna Convention on Diplomatic Relations mayclaim to be the most successful of the instruments drawn up under the United Nations framework for codification andprogressive development of international law. Its success is due not only to the excellence of the preparatory work bythe International Law Commission and the negotiating skills of State representatives at the Conference, but also to

    the long stability of the basic rules of diplomatic law and to the effectiveness of reciprocity as a sanction against non-compliance.

    Historical Context

    Among all peoples who wished to engage with each other on a basis other than that of conquest and subjugation, itwas practice from the earliest times that the person of the envoy or intermediary between them was sacrosanct. Untilit was accepted originally as a matter of religious scruple that the herald or emissary could pass safely in order tonegotiate terms of truce or agreements to settle quarrels, there could be no peaceful international relations or rules onquestions of substance. The personal inviolability accorded to envoys, for example among the ancient Greek cities andamong the states of ancient India, became of less importance with the rise of the Roman Empire and later ofByzantium both of these intent on subjugation rather than co-existence. Diplomacy in the modern sense revivedwith the Renaissance and during the sixteenth century a period of violent religious strife the special protectionand immunity from criminal jurisdiction even for ambassadors suspected of conspiracy against the sovereign to

    whom they were accredited became established in practice among sovereign rulers. By the time of the Congress ofWestphalia in 1648, permanent legations were accepted as the normal way of conducting international businessamong sovereign States, and over the next century detailed rules emerged in relation to the immunity of ambassadorsand their accompanying families and staff from civil as well as criminal proceedings, the inviolability of their embassypremises and their exemption from customs duties and from taxes. These rules of customary international law weredescribed in detail by early writers such as Grotius (1625), Bynkershoek (1721) and Vattel (1758).

    The first international instrument to codify any aspect of diplomatic law was the Regulation adopted by theCongress of Vienna in 1815 which simplified the complex rules on the classes of heads of diplomatic missions and laiddown that precedence among heads of missions should be determined by date of arrival at post. Until thenprecedence which guaranteed direct access to the receiving sovereign as well as ceremonial honours had causednumerous and bitter disputes. Codification among States of immunities and privileges of diplomatic agents did notbegin until the Havana Convention of 1928 drawn up among the States of the Pan-American Union but this did notwell reflect current practice either in its terminology or its rules. More influential was the Draft Convention drawn upin 1932 by the Harvard Research in International Law.

    The establishment within the United Nations framework of the International Law Commission opened the way tocomprehensive codification to confirm what were accepted as well-established if not universally respected rules ofinternational law. There remained areas on which State practice was divergent in particular the privileges andimmunities of junior staff, the position of a diplomat who was a national of the host State and the extent of exceptionsto the immunity from jurisdiction of a diplomat so that any convention would contain an element of progressivedevelopment as well as codification of the law.

    Negotiating History

    The preparatory work for the Vienna Conference followed the standard United Nations procedure for thecodification of international law applied in fields where there is already extensive State practice, precedent anddoctrine. In 1952, Yugoslavia proposed that the topic should be given priority, and after discussion in the Sixth (Legal)Committee, the General Assembly requested the International Law Commission to undertake as a priority topiccodification of the law of diplomatic intercourse and immunities. The Commission appointed Mr. Sandstrm ofSweden as Special Rapporteur and his report formed the basis for the draft articles adopted by the Commission in1957. These articles were debated in the Sixth Committee of the General Assembly and sent to all members of theUnited Nations or any of its specialized agencies with an invitation to submit comments. Comments from 21Governments were taken into account by the Commission who in 1958 prepared revised and extended articles andrecommended that they should form the basis for a Convention a decision endorsed by the General Assembly.Eighty-one States took part in the Conference held at Vienna from 2 March to 14 April 1961 and the Convention wassigned on 18 April.

  • 8/3/2019 1815 vienna

    2/21

    The success of the Conference and of the Convention which it drew up may be ascribed first to the fact that thecentral rules regulating diplomatic relations had been stable for over 200 years. Although the methods of setting upembassies and communicating with them had radically changed, their basic functions of representing the sendingState and protecting its interests and those of its nationals, negotiation with the receiving State, observing andreporting on conditions and developments there remained and still remain unaltered. Secondly, because theestablishment of diplomatic relations and of permanent missions takes place by mutual consent, every State is both asending and receiving State. Its own representatives abroad are in a sense hostages who may on a basis of reciprocity

    suffer if it violates the rules of diplomatic immunity, or may be penalized even for minor restrictions regardingprivileges or protocol. There was at the 1961 Vienna Conference no general underlying conflict of interest betweenopposing groups of States.

    The exception to this symmetry of interests lies in the matter of communications between the embassy and itssending State and this was apparent at the Vienna Conference where probably the most controversial issue waswhether sending States were entitled as of right to install and use a wireless transmitter. Although the right of freecommunication between the sending State and its missions abroad was long established in terms of the inviolability ofcouriers and the diplomatic despatches which they carried so that any interference was covert and denied ifdiscovered in 1961 only those States with advanced technological resources operated transmitters. Other Statesexpressed concern that these transmitters might be used for broadcasting local propaganda, and that because theywere situated in inviolable premises beyond the control of the receiving State they might lead to breaches of theInternational Telecommunication Convention. An amendment which would have expressly required not only theconsent of the receiving State for a wireless transmitter but also proper arrangements for its use in accordance withthe laws of the receiving State and international regulations was adopted by the Committee of the Whole Conference

    against the wishes of all major States. In plenary session, however, a compromise was reached, and the above wordswithin quotes which might have implied a right of inspection for the receiving State were withdrawn.

    This example illustrates the readiness of the delegates to the 1961 Vienna Conference to seek compromisesolutions which would make the final Convention text acceptable to the Governments and national parliaments whowould later decide on ratification rather than to press home the advantage of numbers. A similarly constructiveapproach was also shown over the controversial matter of the diplomatic bag. Under previous customary practice itwas permissible for a receiving State suspecting that a diplomatic bag contained material other than permitted officialdocuments and equipment to challenge the courier upon which the sending State could either return the suspectbag unopened or submit it to inspection supervised by the authorities of both States. There was prolongedcontroversy in the International Law Commission as to whether this possibility should be retained, but ultimately itwas decided that although there was a duty on the sending State to use the bag only for diplomatic documents orarticles for official use, the bag could not be opened or detained under any circumstances. Despite numerousamendments and arguments in the Conference, this was the rule ultimately adopted in article 27.

    A third question where previous State practice was inconsistent was the extent of immunities and privilegesaccorded to the administrative and technical staff of a mission junior employees without diplomatic rank such assecretaries, translators and senior security staff. In some States these had been given the same immunities andprivileges as diplomats while in others their immunity was limited to their official acts. The International LawCommission, after much argument, proposed that they should be given full diplomatic immunities and privileges andsome States at the Conference supported this approach, while others expressed concern in particular at possibleabuse of full customs privileges. The Conference limited exemption from customs duties for junior staff to articlesimported on first arrival at post and later after it seemed that there might be a total failure to agree on the immunityto be given to administrative and technical staff accepted a United Kingdom compromise under which they wouldenjoy full immunity from criminal proceedings, but would not enjoy immunity from civil and administrativeproceedings for acts performed outside the course of their duties. They can therefore be sued in respect of a roadtraffic accident occurring while they are off duty or for other matters unrelated to their work for the mission.

    Key Provisions

    The Vienna Convention provides a complete framework for the establishment, maintenance and termination ofdiplomatic relations on a basis of consent between independent sovereign States. It specifies the functions ofdiplomatic missions, the formal rules regulating appointments, declarations ofpersona non grata of a diplomat whohas in some way given offence, and precedence among heads of mission. It sets out the special rules privileges andimmunities which enable diplomatic missions to act without fear of coercion or harassment through enforcement oflocal laws and to communicate securely with their sending Governments. It makes provision for withdrawal of amission which may take place on grounds of economy or physical security and for breach of diplomatic relationswhich may occur in response to abuse of immunity or severe deterioration in relations between sending and receiving

  • 8/3/2019 1815 vienna

    3/21

    States. In either of these cases or where permanent missions have not been established a framework is providedfor the interests of each sending State to be protected in the receiving State by a third State.

    Article 22 confirms the inviolability of mission premises barring any right of entry by law enforcement officers ofthe receiving State and imposing on the receiving State a special duty to protect the premises against intrusion,damage, disturbance of the peace or infringement of dignity. Even in response to abuse of this inviolability oremergency, the premises may not be entered without the consent of the head of mission. Article 24 ensures the

    inviolability of mission archives and documents even outside mission premises so that the receiving State may notseize or inspect them or permit their use in legal proceedings.

    Article 27 guarantees free communication between a mission and its sending State by all appropriate means, andensures that the diplomatic bag carrying such communications may not be opened or detained even on suspicion ofabuse. Given the purposes of diplomatic missions, secure communication for information and instructions is probablythe most essential of all immunities.

    Article 29 provides inviolability for the person of diplomats and article 31 establishes their immunity from civiland criminal jurisdiction with precise exceptions to immunity from civil jurisdiction where previous State practicehad varied. Immunity from jurisdiction like other immunities and privileges may be waived by the sending State,and article 32 specifies the rules on waiver. Article 34 sets out the tax exemption accorded to diplomats along withdetailed exceptions in respect of matters unrelated to their official duties or to ordinary life in the receiving State.Article 36 provides for exemption from customs duties on diplomatic imports throughout a diplomats posting.

    Articles 37 sets out a complex code for the treatment of families and junior staff where as pointed out aboveprevious practice was varied and negotiation of a compromise difficult. Article 38 bars from all privileges andimmunities, except for immunity for their official acts, nationals and permanent residents of the receiving State.These two provisions in many States drastically reduced the numbers of those persons more likely to bring intodisrepute the system of privileges and immunities and were fully in accordance with the basic justification appliedthroughout the Convention of limiting immunities to what is essential to ensure the efficient performance of thefunctions of diplomatic missions as representing States.

    Influence of the Vienna Convention on Diplomatic Relations

    The Convention has established itself as a cornerstone of modern international relations. Despite the need forimplementing national legislation in a number of States, it came into force following 22 ratifications only three yearsfrom its adoption and almost all States in the world are now parties. The rgime it sets out for the conduct of

    diplomatic relations has become remarkably uniform as reservations made by ratifying States on a few points whichhad been controversial during the negotiations have in many cases been withdrawn or simply never applied. TheConvention has proved resilient to attack on its fundamental principles. This came during the 1980s from thosealarmed at the opportunities it provided for abuse as demonstrated in particular when following the murder of apolicewoman by shooting from the premises of the Libyan diplomatic mission in London the United Kingdom brokediplomatic relations and all those within the mission left England under the shield of immunity. More recently attackshave come from scholars concerned at the conflict between immunity and the human right of access to justice, or atimmunity for violators of international criminal law and in particular torturers. But in practice there has beenremarkably little erosion of the immunities of diplomats as it has been widely accepted that the Convention rules limitimmunities to what is essential for the functioning of diplomacy.

    The focus of public concern has instead shifted to the vulnerability of diplomats to terrorist attacks. These mighttake the form of kidnapping diplomats with demands for ransom or release of prisoners a serious problem in the1970s until brought somewhat under control by collective determination by Governments that taking all appropriatemeasures to protect diplomats did not mean capitulating to blackmail. Alternatively terrorism might involvebesieging or bombing embassies most horrifically the United States Embassies in Kenya and Tanzania in 1998. Forthe most part, parties to the Convention are in no way complicit in these attacks and have done their best to provideprotection sometimes helped by wealthier sending States. The striking exception was the detention for over a yearof the hostages in the United States Embassy in Tehran with the acquiescence of the relatively new revolutionaryGovernment of Iran. The United States brought proceedings against Iran before the International Court of Justicebasing itself mostly on the Vienna Convention on Diplomatic Relations including the Optional Protocol on theSettlement of Disputes to which both States were parties. Iran did not make serious efforts to justify its conduct inlegal terms before the Court and the Courts Judgment in the United States Diplomatic and Consular Staff in Tehrancase (I.C.J. Reports, 1980) contains important analysis of many of the principles in the Convention and greatlyassisted the United States in retaining the support of the international community and securing eventual release

  • 8/3/2019 1815 vienna

    4/21

    brokered by Algeria of the hostages. More recently, the International Court upheld a counter-claim by Uganda inthe Case concerning Armed Activities on the Territory of the Congo (Democratic Republic of the Congo v. Uganda)(I.C.J. Reports 2005) that Congolese soldiers had occupied the Ugandan diplomatic mission in Kinshasa and violatedarticle 29 of the Convention by threatening and maltreating staff on the premises.

    In national courts there have been hundreds of cases where the Vienna Convention has been applied, since manyof its most frequently invoked provisions concern whether a national court may assume jurisdiction over civil or

    criminal proceedings and what evidence may be admissible in national proceedings. Most of these cases concernambiguities in the text on such questions as the true meaning of the exceptions to immunity from civil jurisdiction,the construction of the term permanent resident, the protection of an embassys bank account from enforcementproceedings, or the balance to be struck between protecting the dignity of embassy premises and permitting effectiveexercise of human rights to demonstrate and to speak freely. Unlike the cases described in the previous paragraph,they did not involve fundamental breaches of the Convention.

    The Convention has also been extensively drawn on by later treaties regulating immunities and privileges. Itsprovisions were used as a starting point in drawing up the 1963 Vienna Convention on Consular Relations and the1969 New York Convention on Special Missions in the latter case with unfortunate results in that insufficientaccount was taken of the differences between permanent missions and most special missions so that the Conventionhas attracted only limited support. It is used as a point of reference for determining the treatment to be accorded tothe premises, archives and senior officers of a substantial number of international organizations. Sometimes it is usedon a similar basis for agreements with the host State regulating the status of military forces or civilian missionsdespatched either by international organizations or by States providing military or civilian assistance. The 2004United Nations Convention on Jurisdictional Immunities of States and Their Property contains references to itsprovisions, since in the nature of things the rules on state immunity and on diplomatic immunity, though different intheir origins and justification, are closely intertwined. As for the treatment given to heads of State, heads ofGovernment and foreign ministers in their personal capacity though practice is somewhat varied it is acceptedthat the rules in the Vienna Convention on Diplomatic Relations form a guide and perhaps a minimum standard.

    Distributive bargaining is the approach to bargaining or negotiation that is used when the partiesare trying to divide something up--distribute something. It contrasts with integrative bargainingin which the parties are trying to make more of something. This is most commonly explained in

    terms of a pie. Disputants can work together to make the pie bigger, so there is enough for both

    of them to have as much as they want, or they can focus on cutting the pie up, trying to get asmuch as they can for themselves. In general, integrative bargaining tends to be more

    cooperative, and distributive bargaining more competitive. Common tactics include trying to

    gain an advantage by insisting on negotiating on one's own home ground; having more

    negotiators than the other side, using tricks and deception to try to get the other side to concedemore than you concede; making threats or issuing ultimatums; generally trying to force the other

    side to give in by overpowering them or outsmarting them, not by discussing the problem as an

    equal (as is done in integrative bargaining). The goal in distributive bargaining is not to assureboth sides win, but rather that one side (your side) wins as much as it can, which generally means

    that the other side will lose, or at least get less than it had wanted. (Distributive bargaining tactics

    rarely assume the pie will divided in half.)

  • 8/3/2019 1815 vienna

    5/21

    Often these approaches to negotiation are framed as incompatible. Fisher, Ury, and Patton,

    authors of the negotiation best-sellerGetting to Yessay that integrative bargaining is superior todistributive bargaining in most, if not all, circumstances--even in situations in which something

    is to be divided up. By cooperating and focusing on interests rather than positions, they argue

    that the pie can almost always be enlarged or some other way can be found to provide gains for

    all sides. Other theorists suggest this is naive--that distributive situations requiring competitiveor hard bargaining often occur.

    Conflict theorists Lax and Sebenius have suggested that most negotiation actually involves both

    integrative and distributive bargaining which they refer to as "creating value" and "claiming

    value." Negotiators should do as much as they can to "create value;" once the pie is as big asthey can make it, they should claim as much of the value they can for themselves. Knowing

    which approach to take when is what they refer to as the "negotiators dilemma."

    Counter-terrorism (also spelled counterterrorism) is the practices,tactics, techniques, andstrategies thatgovernments,militaries,police departmentsandcorporationsadopt to prevent or

    in response to terrorist threats and/or acts, both real and imputed.

    The tactic ofterrorism(used byterrorists) is available toinsurgentsand governments. Not all

    insurgents useterroras a tactic, and some choose not to use it because other tactics work betterfor them in a particular context. Individuals, such asTimothy McVeigh, may also engage in

    terrorist acts such as theOklahoma City bombing.

    http://www.colorado.edu/conflict/peace/example/fish7513.htmhttp://www.colorado.edu/conflict/peace/example/fish7513.htmhttp://www.colorado.edu/conflict/peace/example/fish7513.htmhttp://en.wikipedia.org/wiki/Military_tacticshttp://en.wikipedia.org/wiki/Military_tacticshttp://en.wikipedia.org/wiki/Military_tacticshttp://en.wikipedia.org/wiki/Governmenthttp://en.wikipedia.org/wiki/Governmenthttp://en.wikipedia.org/wiki/Governmenthttp://en.wikipedia.org/wiki/Militaryhttp://en.wikipedia.org/wiki/Militaryhttp://en.wikipedia.org/wiki/Militaryhttp://en.wikipedia.org/wiki/Police_departmenthttp://en.wikipedia.org/wiki/Police_departmenthttp://en.wikipedia.org/wiki/Police_departmenthttp://en.wikipedia.org/wiki/Corporationhttp://en.wikipedia.org/wiki/Corporationhttp://en.wikipedia.org/wiki/Corporationhttp://en.wikipedia.org/wiki/Terrorismhttp://en.wikipedia.org/wiki/Terrorismhttp://en.wikipedia.org/wiki/Terrorismhttp://en.wikipedia.org/wiki/Terroristshttp://en.wikipedia.org/wiki/Terroristshttp://en.wikipedia.org/wiki/Terroristshttp://en.wikipedia.org/wiki/Insurgencyhttp://en.wikipedia.org/wiki/Insurgencyhttp://en.wikipedia.org/wiki/Insurgencyhttp://en.wikipedia.org/wiki/Fearhttp://en.wikipedia.org/wiki/Fearhttp://en.wikipedia.org/wiki/Fearhttp://en.wikipedia.org/wiki/Timothy_McVeighhttp://en.wikipedia.org/wiki/Timothy_McVeighhttp://en.wikipedia.org/wiki/Timothy_McVeighhttp://en.wikipedia.org/wiki/Oklahoma_City_bombinghttp://en.wikipedia.org/wiki/Oklahoma_City_bombinghttp://en.wikipedia.org/wiki/Oklahoma_City_bombinghttp://en.wikipedia.org/wiki/Oklahoma_City_bombinghttp://en.wikipedia.org/wiki/Timothy_McVeighhttp://en.wikipedia.org/wiki/Fearhttp://en.wikipedia.org/wiki/Insurgencyhttp://en.wikipedia.org/wiki/Terroristshttp://en.wikipedia.org/wiki/Terrorismhttp://en.wikipedia.org/wiki/Corporationhttp://en.wikipedia.org/wiki/Police_departmenthttp://en.wikipedia.org/wiki/Militaryhttp://en.wikipedia.org/wiki/Governmenthttp://en.wikipedia.org/wiki/Military_tacticshttp://www.colorado.edu/conflict/peace/example/fish7513.htm
  • 8/3/2019 1815 vienna

    6/21

    If the terrorism is part of a broader insurgency, counter-terrorism may also form a part of a

    counter-insurgencydoctrine, but political, economic, and other measures may focus more on theinsurgency than the specific acts of terror.Foreign internal defense(FID) is a term used by

    several countries[citation needed] for programs either to suppress insurgency, or reduce the conditions

    under which insurgency could develop.

    Anti-terrorism versus counter-terrorism

    Further information:Detentions following the September 11, 2001 Terrorist Attack

    The concept ofanti-terrorism emerges from a thorough examining of the concept ofterrorismas well as an attempt to understand and articulatewhat constitutes terrorisminWesternterms. In

    military contexts, terrorism is a tactic, not an ideology. Terrorism may be a tactic in a war

    betweennation-states, in acivil war, or in aninsurgency.

    Counter-terrorism refers to offensive strategies intended to prevent a belligerent, in a broader

    conflict, from successfully using the tactic of terrorism. TheUS militarydefinition, compatiblewith the definitions used by NATOand many other militaries, is "Operations that include theoffensive measures taken to prevent, deter, preempt, and respond to terrorism."[1]In other words,

    counter-terrorism is a set of techniques for denying an opponent the use of terrorism-based

    tactics, just as counter-air is a set of techniques for denying the opponent the use of attackaircraft.

    Anti-terrorism is defensive, intended to reduce the chance of an attack using terrorist tactics atspecific points, or to reduce the vulnerability of possible targets to such tactics. "Defensive

    measures used to reduce the vulnerability of individuals and property to terrorist acts, to include

    limited response and containment by local military and civilian forces."[1]

    United States Customs and Border Protectionofficers, fully armed and armored for a counter-

    terrorism operation

    To continue the analogy between air and terrorist capability, offensive anti-air missions attack

    the airfields of the opponent, while defensive anti-air uses anti-aircraft missiles to protect a pointon one's own territory. The ongoingIsraeli-Palestinian conflict,[2]Sri Lankan Civil War,[3]and

    Colombian Civil War[4]

    are examples of conflicts where terrorism is present, along with other

    http://en.wikipedia.org/wiki/Counter-insurgencyhttp://en.wikipedia.org/wiki/Counter-insurgencyhttp://en.wikipedia.org/wiki/Foreign_internal_defensehttp://en.wikipedia.org/wiki/Foreign_internal_defensehttp://en.wikipedia.org/wiki/Foreign_internal_defensehttp://en.wikipedia.org/wiki/Wikipedia:Citation_neededhttp://en.wikipedia.org/wiki/Wikipedia:Citation_neededhttp://en.wikipedia.org/wiki/Wikipedia:Citation_neededhttp://en.wikipedia.org/wiki/Detentions_following_the_September_11,_2001_Terrorist_Attackhttp://en.wikipedia.org/wiki/Detentions_following_the_September_11,_2001_Terrorist_Attackhttp://en.wikipedia.org/wiki/Detentions_following_the_September_11,_2001_Terrorist_Attackhttp://en.wikipedia.org/wiki/Terrorismhttp://en.wikipedia.org/wiki/Terrorismhttp://en.wikipedia.org/wiki/Terrorismhttp://en.wikipedia.org/wiki/Definition_of_terrorismhttp://en.wikipedia.org/wiki/Definition_of_terrorismhttp://en.wikipedia.org/wiki/Definition_of_terrorismhttp://en.wikipedia.org/wiki/Western_Worldhttp://en.wikipedia.org/wiki/Western_Worldhttp://en.wikipedia.org/wiki/Western_Worldhttp://en.wikipedia.org/wiki/Nation-statehttp://en.wikipedia.org/wiki/Nation-statehttp://en.wikipedia.org/wiki/Nation-statehttp://en.wikipedia.org/wiki/Civil_warhttp://en.wikipedia.org/wiki/Civil_warhttp://en.wikipedia.org/wiki/Civil_warhttp://en.wikipedia.org/wiki/Insurgencyhttp://en.wikipedia.org/wiki/Insurgencyhttp://en.wikipedia.org/wiki/Insurgencyhttp://en.wikipedia.org/wiki/US_militaryhttp://en.wikipedia.org/wiki/US_militaryhttp://en.wikipedia.org/wiki/US_militaryhttp://en.wikipedia.org/wiki/NATOhttp://en.wikipedia.org/wiki/NATOhttp://en.wikipedia.org/wiki/Counter-terrorism#cite_note-JP1-02-0http://en.wikipedia.org/wiki/Counter-terrorism#cite_note-JP1-02-0http://en.wikipedia.org/wiki/Counter-terrorism#cite_note-JP1-02-0http://en.wikipedia.org/wiki/Counter-terrorism#cite_note-JP1-02-0http://en.wikipedia.org/wiki/Counter-terrorism#cite_note-JP1-02-0http://en.wikipedia.org/wiki/United_States_Customs_and_Border_Protectionhttp://en.wikipedia.org/wiki/United_States_Customs_and_Border_Protectionhttp://en.wikipedia.org/wiki/Israeli-Palestinian_conflicthttp://en.wikipedia.org/wiki/Israeli-Palestinian_conflicthttp://en.wikipedia.org/wiki/Counter-terrorism#cite_note-CS-Israel-1http://en.wikipedia.org/wiki/Counter-terrorism#cite_note-CS-Israel-1http://en.wikipedia.org/wiki/Sri_Lankan_Civil_Warhttp://en.wikipedia.org/wiki/Sri_Lankan_Civil_Warhttp://en.wikipedia.org/wiki/Counter-terrorism#cite_note-WikiPedia-2http://en.wikipedia.org/wiki/Counter-terrorism#cite_note-WikiPedia-2http://en.wikipedia.org/wiki/Counter-terrorism#cite_note-WikiPedia-2http://en.wikipedia.org/wiki/Colombian_Civil_Warhttp://en.wikipedia.org/wiki/Colombian_Civil_Warhttp://en.wikipedia.org/wiki/Colombian_Civil_Warhttp://en.wikipedia.org/wiki/File:US_Customs_and_Border_Protection_officers.jpghttp://en.wikipedia.org/wiki/File:US_Customs_and_Border_Protection_officers.jpghttp://en.wikipedia.org/wiki/File:US_Customs_and_Border_Protection_officers.jpghttp://en.wikipedia.org/wiki/File:US_Customs_and_Border_Protection_officers.jpghttp://en.wikipedia.org/wiki/Colombian_Civil_Warhttp://en.wikipedia.org/wiki/Colombian_Civil_Warhttp://en.wikipedia.org/wiki/Counter-terrorism#cite_note-WikiPedia-2http://en.wikipedia.org/wiki/Sri_Lankan_Civil_Warhttp://en.wikipedia.org/wiki/Counter-terrorism#cite_note-CS-Israel-1http://en.wikipedia.org/wiki/Israeli-Palestinian_conflicthttp://en.wikipedia.org/wiki/United_States_Customs_and_Border_Protectionhttp://en.wikipedia.org/wiki/Counter-terrorism#cite_note-JP1-02-0http://en.wikipedia.org/wiki/Counter-terrorism#cite_note-JP1-02-0http://en.wikipedia.org/wiki/NATOhttp://en.wikipedia.org/wiki/US_militaryhttp://en.wikipedia.org/wiki/Insurgencyhttp://en.wikipedia.org/wiki/Civil_warhttp://en.wikipedia.org/wiki/Nation-statehttp://en.wikipedia.org/wiki/Western_Worldhttp://en.wikipedia.org/wiki/Definition_of_terrorismhttp://en.wikipedia.org/wiki/Terrorismhttp://en.wikipedia.org/wiki/Detentions_following_the_September_11,_2001_Terrorist_Attackhttp://en.wikipedia.org/wiki/Wikipedia:Citation_neededhttp://en.wikipedia.org/wiki/Foreign_internal_defensehttp://en.wikipedia.org/wiki/Counter-insurgency
  • 8/3/2019 1815 vienna

    7/21

    tactics, so that participants use counter- and anti-terrorism to limit the opponent's use of terror

    tactics. Units engaged in counter-terrorism include the US Navy Seals and Delta Force.

    [edit] Planning for, detecting and neutralizing potential

    terrorist actsBuilding a counter-terrorism plan involves all segments of a society or many government

    agencies. In dealing with foreign terrorists, the lead responsibility is usually at the national level.

    Becausepropagandaandindoctrinationlie at the core of terrorism, understanding their profile

    and functions increases the ability to counter terrorism more effectively.

    See the series of articles beginning withintelligence cycle management, and, in particular,

    intelligence analysis.HUMINTpresents techniques of describing the social networks that makeup terrorist groups. Also relevant are themotivations of the individual terroristand thestructure

    of cell systemsused by recent non-national terrorist groups.

    Most counter-terrorism strategies involve an increase in standard police and domestic

    intelligence. The central activities are traditional:interception of communications, and the

    tracing of persons. New technology has, however, expanded the range ofmilitaryandlawenforcementoperations.

    Domestic intelligence is often directed at specific groups, defined on the basis of origin orreligion, which is a source of political controversy.Mass surveillanceof an entire population

    raises objections oncivil libertiesgrounds.homegrown terrorists, especiallylone wolvesare

    often harder to detect because of their citizenship or legal alien status and better ability to stayunder the radar.

    To select the effective action when terrorism appears to be more of an isolated event, theappropriate government organizations need to understand the source, motivation, methods of

    preparation, and tactics of terrorist groups. Good intelligence is at the heart of such preparation,

    as well as political and social understanding of any grievances that might be solved. Ideally, onegets information from inside the group, a very difficult challenge forHUMINTbecause

    operational terrorist cellsare often small, with all members known to one another, perhaps even

    related.[5]

    Counterintelligenceis a great challenge with the security of cell-based systems, since the ideal,

    but nearly impossible, goal is to obtain aclandestine sourcewithin the cell. Financial tracking

    can play a role, as cancommunications intercept, but both of these approaches need to bebalanced against legitimate expectations of privacy.

    [edit] Legal contexts

    Main article:Anti-terrorism legislation

    In response to the growing legislation.

    http://en.wikipedia.org/w/index.php?title=Counter-terrorism&action=edit&section=2http://en.wikipedia.org/w/index.php?title=Counter-terrorism&action=edit&section=2http://en.wikipedia.org/wiki/Propagandahttp://en.wikipedia.org/wiki/Propagandahttp://en.wikipedia.org/wiki/Propagandahttp://en.wikipedia.org/wiki/Indoctrinationhttp://en.wikipedia.org/wiki/Indoctrinationhttp://en.wikipedia.org/wiki/Indoctrinationhttp://en.wikipedia.org/wiki/Intelligence_cycle_managementhttp://en.wikipedia.org/wiki/Intelligence_cycle_managementhttp://en.wikipedia.org/wiki/Intelligence_cycle_managementhttp://en.wikipedia.org/wiki/Intelligence_analysishttp://en.wikipedia.org/wiki/Intelligence_analysishttp://en.wikipedia.org/wiki/HUMINThttp://en.wikipedia.org/wiki/HUMINThttp://en.wikipedia.org/wiki/HUMINThttp://en.wikipedia.org/wiki/Counterintelligence#Counter-HUMINThttp://en.wikipedia.org/wiki/Counterintelligence#Counter-HUMINThttp://en.wikipedia.org/wiki/Counterintelligence#Counter-HUMINThttp://en.wikipedia.org/wiki/Clandestine_HUMINT_operational_techniques#Cellular_organizationhttp://en.wikipedia.org/wiki/Clandestine_HUMINT_operational_techniques#Cellular_organizationhttp://en.wikipedia.org/wiki/Clandestine_HUMINT_operational_techniques#Cellular_organizationhttp://en.wikipedia.org/wiki/Clandestine_HUMINT_operational_techniques#Cellular_organizationhttp://en.wikipedia.org/wiki/Telephone_tappinghttp://en.wikipedia.org/wiki/Telephone_tappinghttp://en.wikipedia.org/wiki/Telephone_tappinghttp://en.wikipedia.org/wiki/Manhunt_(military)http://en.wikipedia.org/wiki/Manhunt_(military)http://en.wikipedia.org/wiki/Manhunt_(military)http://en.wikipedia.org/wiki/Manhunt_(law_enforcement)http://en.wikipedia.org/wiki/Manhunt_(law_enforcement)http://en.wikipedia.org/wiki/Manhunt_(law_enforcement)http://en.wikipedia.org/wiki/Manhunt_(law_enforcement)http://en.wikipedia.org/wiki/Mass_surveillancehttp://en.wikipedia.org/wiki/Mass_surveillancehttp://en.wikipedia.org/wiki/Mass_surveillancehttp://en.wikipedia.org/wiki/Civil_libertieshttp://en.wikipedia.org/wiki/Civil_libertieshttp://en.wikipedia.org/wiki/Civil_libertieshttp://en.wikipedia.org/wiki/Homegrown_terrorismhttp://en.wikipedia.org/wiki/Homegrown_terrorismhttp://en.wikipedia.org/wiki/Homegrown_terrorismhttp://en.wikipedia.org/wiki/Lone-wolf_fighterhttp://en.wikipedia.org/wiki/Lone-wolf_fighterhttp://en.wikipedia.org/wiki/Lone-wolf_fighterhttp://en.wikipedia.org/wiki/HUMINThttp://en.wikipedia.org/wiki/HUMINThttp://en.wikipedia.org/wiki/HUMINThttp://en.wikipedia.org/wiki/Clandestine_cell_systemhttp://en.wikipedia.org/wiki/Clandestine_cell_systemhttp://en.wikipedia.org/wiki/Counter-terrorism#cite_note-Feiler2007-4http://en.wikipedia.org/wiki/Counter-terrorism#cite_note-Feiler2007-4http://en.wikipedia.org/wiki/Counter-terrorism#cite_note-Feiler2007-4http://en.wikipedia.org/wiki/Counterintelligencehttp://en.wikipedia.org/wiki/Counterintelligencehttp://en.wikipedia.org/wiki/Clandestine_HUMINThttp://en.wikipedia.org/wiki/Clandestine_HUMINThttp://en.wikipedia.org/wiki/Clandestine_HUMINThttp://en.wikipedia.org/wiki/SIGINThttp://en.wikipedia.org/wiki/SIGINThttp://en.wikipedia.org/wiki/SIGINThttp://en.wikipedia.org/w/index.php?title=Counter-terrorism&action=edit&section=3http://en.wikipedia.org/w/index.php?title=Counter-terrorism&action=edit&section=3http://en.wikipedia.org/w/index.php?title=Counter-terrorism&action=edit&section=3http://en.wikipedia.org/wiki/Anti-terrorism_legislationhttp://en.wikipedia.org/wiki/Anti-terrorism_legislationhttp://en.wikipedia.org/wiki/Anti-terrorism_legislationhttp://en.wikipedia.org/wiki/Anti-terrorism_legislationhttp://en.wikipedia.org/w/index.php?title=Counter-terrorism&action=edit&section=3http://en.wikipedia.org/wiki/SIGINThttp://en.wikipedia.org/wiki/Clandestine_HUMINThttp://en.wikipedia.org/wiki/Counterintelligencehttp://en.wikipedia.org/wiki/Counter-terrorism#cite_note-Feiler2007-4http://en.wikipedia.org/wiki/Clandestine_cell_systemhttp://en.wikipedia.org/wiki/HUMINThttp://en.wikipedia.org/wiki/Lone-wolf_fighterhttp://en.wikipedia.org/wiki/Homegrown_terrorismhttp://en.wikipedia.org/wiki/Civil_libertieshttp://en.wikipedia.org/wiki/Mass_surveillancehttp://en.wikipedia.org/wiki/Manhunt_(law_enforcement)http://en.wikipedia.org/wiki/Manhunt_(law_enforcement)http://en.wikipedia.org/wiki/Manhunt_(military)http://en.wikipedia.org/wiki/Telephone_tappinghttp://en.wikipedia.org/wiki/Clandestine_HUMINT_operational_techniques#Cellular_organizationhttp://en.wikipedia.org/wiki/Clandestine_HUMINT_operational_techniques#Cellular_organizationhttp://en.wikipedia.org/wiki/Counterintelligence#Counter-HUMINThttp://en.wikipedia.org/wiki/HUMINThttp://en.wikipedia.org/wiki/Intelligence_analysishttp://en.wikipedia.org/wiki/Intelligence_cycle_managementhttp://en.wikipedia.org/wiki/Indoctrinationhttp://en.wikipedia.org/wiki/Propagandahttp://en.wikipedia.org/w/index.php?title=Counter-terrorism&action=edit&section=2
  • 8/3/2019 1815 vienna

    8/21

    United Kingdomo TheUnited Kingdomhas had anti-terrorism legislation in place for more than thirty

    years. ThePrevention of Violence Act 1939was brought in response to an Irish

    Republican Army (IRA) campaign of violence under theS-Plan. This act had been

    allowed to expire in 1953 and was repealed in 1973 to be replaced by thePrevention of

    Terrorism Actsa response tothe TroublesinNorthern Ireland. From 1974 to 1989 thetemporary provisions of the act were renewed annually.

    o In 2000 the Acts were replaced with the more permanentTerrorism Act 2000, whichcontained many of their powers, and then thePrevention of Terrorism Act 2005.

    o TheAnti-terrorism, Crime and Security Act 2001was formally introduced into theParliament November 19, 2001 two months after theSeptember 11, 2001 attacksin

    America. It received royal assent and went into force on December 13, 2001. OnDecember 16, 2004 the Law Lords ruled that Part 4 was incompatible with the European

    Convention on Human Rights, but under the terms of theHuman Rights Act 1998it

    remained in force. ThePrevention of Terrorism Act 2005was drafted to answer the Law

    Lords ruling and theTerrorism Act 2006creates new offences related to terrorism, and

    amends existing ones. The Act was drafted in the aftermath of the7 July 2005 Londonbombings, and like its predecessors some of its terms have proven to be highly

    controversial.

    United Stateso U.S. legal issues surrounding this issue include rulings on the domestic employment of

    Deadly forceby law enforcement organizations.

    o Search and seizure is governed by theFourth Amendment to the United StatesConstitution.

    o The US passed theUSA PATRIOT Actafter the 9/11 attacks, as well as a range of otherlegislation andexecutive orders.

    o TheDepartment of Homeland Securitywas established to consolidate domestic securityagencies to coordinate anti-terrorism, as well as national response to major natural

    disasters and accidents.

    o ThePosse Comitatus Actlimits domestic employment of theUnited States Army,requiring Presidential approval prior to deploying the Army.Pentagonpolicy also

    applies this limitation to theUnited States Marine Corps,United States Navy, andUnited

    States Air Force. TheDepartment of Defensecan be employed domestically onPresidential order, as was done during theLos Angeles riots of 1992,Hurricane Katrina

    and theBeltway Sniperincidents.

    o External or international use of lethal force would require aPresidential finding. Australia

    o Australia has passed several anti-terrorism acts. In 2004, a bill comprising three actsAnti-terrorism Act, 2004, (No 2) and (No 3)was passed. Then Attorney-General,PhilipRuddock, introduced theAnti-terrorism bill, 2004 on March 31. He described it as "a billto strengthen Australia's counter-terrorismlaws in a number of respects a task made

    more urgent following the recent tragicterrorist bombings in Spain." He said thatAustralia's counter-terrorism laws "require review and, where necessary, updating if we

    are to have a legal framework capable of safeguarding all Australians from the scourge

    of terrorism." TheAustralian Anti-Terrorism Act 2005supplemented the powers of the

    http://en.wikipedia.org/wiki/United_Kingdomhttp://en.wikipedia.org/wiki/United_Kingdomhttp://en.wikipedia.org/wiki/United_Kingdomhttp://en.wikipedia.org/wiki/United_Kingdomhttp://en.wikipedia.org/wiki/United_Kingdomhttp://en.wikipedia.org/w/index.php?title=Prevention_of_Violence_Act_1939&action=edit&redlink=1http://en.wikipedia.org/w/index.php?title=Prevention_of_Violence_Act_1939&action=edit&redlink=1http://en.wikipedia.org/w/index.php?title=Prevention_of_Violence_Act_1939&action=edit&redlink=1http://en.wikipedia.org/wiki/S-Planhttp://en.wikipedia.org/wiki/S-Planhttp://en.wikipedia.org/wiki/S-Planhttp://en.wikipedia.org/wiki/Prevention_of_Terrorism_Actshttp://en.wikipedia.org/wiki/Prevention_of_Terrorism_Actshttp://en.wikipedia.org/wiki/Prevention_of_Terrorism_Actshttp://en.wikipedia.org/wiki/Prevention_of_Terrorism_Actshttp://en.wikipedia.org/wiki/The_Troubleshttp://en.wikipedia.org/wiki/The_Troubleshttp://en.wikipedia.org/wiki/The_Troubleshttp://en.wikipedia.org/wiki/Northern_Irelandhttp://en.wikipedia.org/wiki/Northern_Irelandhttp://en.wikipedia.org/wiki/Northern_Irelandhttp://en.wikipedia.org/wiki/Terrorism_Act_2000http://en.wikipedia.org/wiki/Terrorism_Act_2000http://en.wikipedia.org/wiki/Terrorism_Act_2000http://en.wikipedia.org/wiki/Prevention_of_Terrorism_Act_2005http://en.wikipedia.org/wiki/Prevention_of_Terrorism_Act_2005http://en.wikipedia.org/wiki/Prevention_of_Terrorism_Act_2005http://en.wikipedia.org/wiki/Anti-terrorism,_Crime_and_Security_Act_2001http://en.wikipedia.org/wiki/Anti-terrorism,_Crime_and_Security_Act_2001http://en.wikipedia.org/wiki/Anti-terrorism,_Crime_and_Security_Act_2001http://en.wikipedia.org/wiki/September_11,_2001_attackshttp://en.wikipedia.org/wiki/September_11,_2001_attackshttp://en.wikipedia.org/wiki/September_11,_2001_attackshttp://en.wikipedia.org/wiki/Human_Rights_Act_1998http://en.wikipedia.org/wiki/Human_Rights_Act_1998http://en.wikipedia.org/wiki/Human_Rights_Act_1998http://en.wikipedia.org/wiki/Prevention_of_Terrorism_Act_2005http://en.wikipedia.org/wiki/Prevention_of_Terrorism_Act_2005http://en.wikipedia.org/wiki/Prevention_of_Terrorism_Act_2005http://en.wikipedia.org/wiki/Terrorism_Act_2006http://en.wikipedia.org/wiki/Terrorism_Act_2006http://en.wikipedia.org/wiki/Terrorism_Act_2006http://en.wikipedia.org/wiki/7_July_2005_London_bombingshttp://en.wikipedia.org/wiki/7_July_2005_London_bombingshttp://en.wikipedia.org/wiki/7_July_2005_London_bombingshttp://en.wikipedia.org/wiki/7_July_2005_London_bombingshttp://en.wikipedia.org/wiki/United_Stateshttp://en.wikipedia.org/wiki/United_Stateshttp://en.wikipedia.org/wiki/Deadly_forcehttp://en.wikipedia.org/wiki/Deadly_forcehttp://en.wikipedia.org/wiki/Fourth_Amendment_to_the_United_States_Constitutionhttp://en.wikipedia.org/wiki/Fourth_Amendment_to_the_United_States_Constitutionhttp://en.wikipedia.org/wiki/Fourth_Amendment_to_the_United_States_Constitutionhttp://en.wikipedia.org/wiki/Fourth_Amendment_to_the_United_States_Constitutionhttp://en.wikipedia.org/wiki/USA_PATRIOT_Acthttp://en.wikipedia.org/wiki/USA_PATRIOT_Acthttp://en.wikipedia.org/wiki/USA_PATRIOT_Acthttp://en.wikipedia.org/wiki/Executive_ordershttp://en.wikipedia.org/wiki/Executive_ordershttp://en.wikipedia.org/wiki/Executive_ordershttp://en.wikipedia.org/wiki/Department_of_Homeland_Securityhttp://en.wikipedia.org/wiki/Department_of_Homeland_Securityhttp://en.wikipedia.org/wiki/Department_of_Homeland_Securityhttp://en.wikipedia.org/wiki/Posse_Comitatus_Acthttp://en.wikipedia.org/wiki/Posse_Comitatus_Acthttp://en.wikipedia.org/wiki/Posse_Comitatus_Acthttp://en.wikipedia.org/wiki/United_States_Armyhttp://en.wikipedia.org/wiki/United_States_Armyhttp://en.wikipedia.org/wiki/United_States_Armyhttp://en.wikipedia.org/wiki/The_Pentagonhttp://en.wikipedia.org/wiki/The_Pentagonhttp://en.wikipedia.org/wiki/The_Pentagonhttp://en.wikipedia.org/wiki/United_States_Marine_Corpshttp://en.wikipedia.org/wiki/United_States_Marine_Corpshttp://en.wikipedia.org/wiki/United_States_Marine_Corpshttp://en.wikipedia.org/wiki/United_States_Navyhttp://en.wikipedia.org/wiki/United_States_Navyhttp://en.wikipedia.org/wiki/United_States_Navyhttp://en.wikipedia.org/wiki/United_States_Air_Forcehttp://en.wikipedia.org/wiki/United_States_Air_Forcehttp://en.wikipedia.org/wiki/United_States_Air_Forcehttp://en.wikipedia.org/wiki/United_States_Air_Forcehttp://en.wikipedia.org/wiki/United_States_Department_of_Defensehttp://en.wikipedia.org/wiki/United_States_Department_of_Defensehttp://en.wikipedia.org/wiki/United_States_Department_of_Defensehttp://en.wikipedia.org/wiki/Los_Angeles_riots_of_1992http://en.wikipedia.org/wiki/Los_Angeles_riots_of_1992http://en.wikipedia.org/wiki/Los_Angeles_riots_of_1992http://en.wikipedia.org/wiki/Hurricane_Katrinahttp://en.wikipedia.org/wiki/Hurricane_Katrinahttp://en.wikipedia.org/wiki/Hurricane_Katrinahttp://en.wikipedia.org/wiki/Beltway_Sniperhttp://en.wikipedia.org/wiki/Beltway_Sniperhttp://en.wikipedia.org/wiki/Beltway_Sniperhttp://en.wikipedia.org/wiki/Presidential_findinghttp://en.wikipedia.org/wiki/Presidential_findinghttp://en.wikipedia.org/wiki/Presidential_findinghttp://en.wikipedia.org/wiki/Australiahttp://en.wikipedia.org/wiki/Australiahttp://en.wikipedia.org/wiki/Australian_anti-terrorism_legislation,_2004http://en.wikipedia.org/wiki/Australian_anti-terrorism_legislation,_2004http://en.wikipedia.org/wiki/Philip_Ruddockhttp://en.wikipedia.org/wiki/Philip_Ruddockhttp://en.wikipedia.org/wiki/Philip_Ruddockhttp://en.wikipedia.org/wiki/Philip_Ruddockhttp://en.wikipedia.org/wiki/Terrorismhttp://en.wikipedia.org/wiki/Terrorismhttp://en.wikipedia.org/wiki/Terrorismhttp://en.wikipedia.org/wiki/11_March_2004_Madrid_attackshttp://en.wikipedia.org/wiki/11_March_2004_Madrid_attackshttp://en.wikipedia.org/wiki/11_March_2004_Madrid_attackshttp://en.wikipedia.org/wiki/Australian_Anti-Terrorism_Act_2005http://en.wikipedia.org/wiki/Australian_Anti-Terrorism_Act_2005http://en.wikipedia.org/wiki/Australian_Anti-Terrorism_Act_2005http://en.wikipedia.org/wiki/Australian_Anti-Terrorism_Act_2005http://en.wikipedia.org/wiki/11_March_2004_Madrid_attackshttp://en.wikipedia.org/wiki/Terrorismhttp://en.wikipedia.org/wiki/Philip_Ruddockhttp://en.wikipedia.org/wiki/Philip_Ruddockhttp://en.wikipedia.org/wiki/Australian_anti-terrorism_legislation,_2004http://en.wikipedia.org/wiki/Australiahttp://en.wikipedia.org/wiki/Presidential_findinghttp://en.wikipedia.org/wiki/Beltway_Sniperhttp://en.wikipedia.org/wiki/Hurricane_Katrinahttp://en.wikipedia.org/wiki/Los_Angeles_riots_of_1992http://en.wikipedia.org/wiki/United_States_Department_of_Defensehttp://en.wikipedia.org/wiki/United_States_Air_Forcehttp://en.wikipedia.org/wiki/United_States_Air_Forcehttp://en.wikipedia.org/wiki/United_States_Navyhttp://en.wikipedia.org/wiki/United_States_Marine_Corpshttp://en.wikipedia.org/wiki/The_Pentagonhttp://en.wikipedia.org/wiki/United_States_Armyhttp://en.wikipedia.org/wiki/Posse_Comitatus_Acthttp://en.wikipedia.org/wiki/Department_of_Homeland_Securityhttp://en.wikipedia.org/wiki/Executive_ordershttp://en.wikipedia.org/wiki/USA_PATRIOT_Acthttp://en.wikipedia.org/wiki/Fourth_Amendment_to_the_United_States_Constitutionhttp://en.wikipedia.org/wiki/Fourth_Amendment_to_the_United_States_Constitutionhttp://en.wikipedia.org/wiki/Deadly_forcehttp://en.wikipedia.org/wiki/United_Stateshttp://en.wikipedia.org/wiki/7_July_2005_London_bombingshttp://en.wikipedia.org/wiki/7_July_2005_London_bombingshttp://en.wikipedia.org/wiki/Terrorism_Act_2006http://en.wikipedia.org/wiki/Prevention_of_Terrorism_Act_2005http://en.wikipedia.org/wiki/Human_Rights_Act_1998http://en.wikipedia.org/wiki/September_11,_2001_attackshttp://en.wikipedia.org/wiki/Anti-terrorism,_Crime_and_Security_Act_2001http://en.wikipedia.org/wiki/Prevention_of_Terrorism_Act_2005http://en.wikipedia.org/wiki/Terrorism_Act_2000http://en.wikipedia.org/wiki/Northern_Irelandhttp://en.wikipedia.org/wiki/The_Troubleshttp://en.wikipedia.org/wiki/Prevention_of_Terrorism_Actshttp://en.wikipedia.org/wiki/Prevention_of_Terrorism_Actshttp://en.wikipedia.org/wiki/S-Planhttp://en.wikipedia.org/w/index.php?title=Prevention_of_Violence_Act_1939&action=edit&redlink=1http://en.wikipedia.org/wiki/United_Kingdomhttp://en.wikipedia.org/wiki/United_Kingdom
  • 8/3/2019 1815 vienna

    9/21

    earlier acts. The Australian legislation allows police to detain suspects for up to two

    weeks without charge and to electronically track suspects for up to a year. The AustralianAnti-Terrorism Act of 2005included a "shoot-to-kill" clause. In a country with

    entrenchedliberal democratictraditions, the measures are controversial and have been

    criticized bycivil libertariansandIslamicgroups.

    Israelo On December 14, 2006 theIsraeli Supreme Courtruledtargeted killingswere a

    permitted form of self defense.[6]

    [edit] Terrorism and human rights

    One of the primary difficulties of implementing effective counter-terrorist measures is thewaning of civil liberties and individual privacy that such measures often entail, both for citizens

    of, and for those detained by states attempting to combat terror. At times, measures designed to

    tighten security have been seen asabuses of poweror even violations ofhuman rights.

    Examples of these problems can include prolonged, incommunicado detention without judicialreview; risk of subjecting to torture during the transfer, return and extradition of people between

    or within countries; and the adoption of security measures that restrain the rights or freedoms ofcitizens and breach principles of non-discrimination.[7]Examples include:

    In November 2003Malaysiapassed new counter-terrorism laws that were widely criticizedby localhuman rightsgroups for being vague and overbroad. Critics claim that the laws put

    the basic rights of free expression, association, and assembly at risk. Malaysia persisted inholding around 100 alleged militants without trial, including five Malaysian students

    detained for alleged terrorist activity while studying in Karachi, Pakistan.[7]

    In November 2003 a Canadian-Syrian national, Maher Arar, alleged publicly that he hadbeen tortured in a Syrian prison after being handed over to the Syrian authorities by U.S.

    [7]

    In December 2003 Colombia's congress approved legislation that would give the military the

    power to arrest, tap telephones and carry out searches without warrants or any previous

    judicial order.[7]

    Images of unpopular treatment of detainees in US custody in Iraq and other locations haveencouraged international scrutiny of US operations in the war on terror.[8]

    Hundreds of foreign nationals remain in prolonged indefinite detention without charge ortrial in Guantnamo Bay, despite international and US constitutional standards some groupsbelieve outlaw such practices.[8]

    Hundreds of people suspected of connections with theTalibanor al Qa'eda remain in long-term detention in Pakistan or in US-controlled centers in Afghanistan.

    [8]

    China has used the "war on terror" to justify its policies in the predominantly MuslimXinjiang Uighur Autonomous Region to stifle Uighur identity.[8]

    In Morocco, Saudi Arabia, Tunisia, Yemen and other countries, scores of people have beenarrested and arbitrarily detained in connection with suspected terrorist acts or links toopposition armed groups.[8]

    Until 2005 eleven men remained in high security detention in the UK under the Anti-Terrorism, Crime and Security Act 2001.

    [8]

    http://en.wikipedia.org/wiki/Australian_Anti-Terrorism_Act_2005#The_.22Shoot_to_Kill.22_Clausehttp://en.wikipedia.org/wiki/Australian_Anti-Terrorism_Act_2005#The_.22Shoot_to_Kill.22_Clausehttp://en.wikipedia.org/wiki/Australian_Anti-Terrorism_Act_2005#The_.22Shoot_to_Kill.22_Clausehttp://en.wikipedia.org/wiki/Australian_Anti-Terrorism_Act_2005#The_.22Shoot_to_Kill.22_Clausehttp://en.wikipedia.org/wiki/Liberal_democracyhttp://en.wikipedia.org/wiki/Liberal_democracyhttp://en.wikipedia.org/wiki/Liberal_democracyhttp://en.wikipedia.org/wiki/Civil_libertarianhttp://en.wikipedia.org/wiki/Civil_libertarianhttp://en.wikipedia.org/wiki/Civil_libertarianhttp://en.wikipedia.org/wiki/Islamhttp://en.wikipedia.org/wiki/Islamhttp://en.wikipedia.org/wiki/Islamhttp://en.wikipedia.org/wiki/Israelhttp://en.wikipedia.org/wiki/Israelhttp://en.wikipedia.org/wiki/Israeli_Supreme_Courthttp://en.wikipedia.org/wiki/Israeli_Supreme_Courthttp://en.wikipedia.org/wiki/Israeli_Supreme_Courthttp://en.wikipedia.org/wiki/Targeted_killinghttp://en.wikipedia.org/wiki/Targeted_killinghttp://en.wikipedia.org/wiki/Targeted_killinghttp://en.wikipedia.org/wiki/Counter-terrorism#cite_note-5http://en.wikipedia.org/wiki/Counter-terrorism#cite_note-5http://en.wikipedia.org/wiki/Counter-terrorism#cite_note-5http://en.wikipedia.org/w/index.php?title=Counter-terrorism&action=edit&section=4http://en.wikipedia.org/w/index.php?title=Counter-terrorism&action=edit&section=4http://en.wikipedia.org/w/index.php?title=Counter-terrorism&action=edit&section=4http://en.wikipedia.org/wiki/Abuses_of_powerhttp://en.wikipedia.org/wiki/Abuses_of_powerhttp://en.wikipedia.org/wiki/Abuses_of_powerhttp://en.wikipedia.org/wiki/Human_rightshttp://en.wikipedia.org/wiki/Human_rightshttp://en.wikipedia.org/wiki/Human_rightshttp://en.wikipedia.org/wiki/Counter-terrorism#cite_note-Human_Rights_News_2004-6http://en.wikipedia.org/wiki/Counter-terrorism#cite_note-Human_Rights_News_2004-6http://en.wikipedia.org/wiki/Counter-terrorism#cite_note-Human_Rights_News_2004-6http://en.wikipedia.org/wiki/Malaysiahttp://en.wikipedia.org/wiki/Malaysiahttp://en.wikipedia.org/wiki/Malaysiahttp://en.wikipedia.org/wiki/Human_rightshttp://en.wikipedia.org/wiki/Human_rightshttp://en.wikipedia.org/wiki/Human_rightshttp://en.wikipedia.org/wiki/Counter-terrorism#cite_note-Human_Rights_News_2004-6http://en.wikipedia.org/wiki/Counter-terrorism#cite_note-Human_Rights_News_2004-6http://en.wikipedia.org/wiki/Counter-terrorism#cite_note-Human_Rights_News_2004-6http://en.wikipedia.org/wiki/Counter-terrorism#cite_note-Human_Rights_News_2004-6http://en.wikipedia.org/wiki/Counter-terrorism#cite_note-Human_Rights_News_2004-6http://en.wikipedia.org/wiki/Counter-terrorism#cite_note-Human_Rights_News_2004-6http://en.wikipedia.org/wiki/Counter-terrorism#cite_note-Human_Rights_News_2004-6http://en.wikipedia.org/wiki/Counter-terrorism#cite_note-Human_Rights_News_2004-6http://en.wikipedia.org/wiki/Counter-terrorism#cite_note-Human_Rights_News_2004-6http://en.wikipedia.org/wiki/Counter-terrorism#cite_note-Amnesty_International_2005-7http://en.wikipedia.org/wiki/Counter-terrorism#cite_note-Amnesty_International_2005-7http://en.wikipedia.org/wiki/Counter-terrorism#cite_note-Amnesty_International_2005-7http://en.wikipedia.org/wiki/Counter-terrorism#cite_note-Amnesty_International_2005-7http://en.wikipedia.org/wiki/Counter-terrorism#cite_note-Amnesty_International_2005-7http://en.wikipedia.org/wiki/Counter-terrorism#cite_note-Amnesty_International_2005-7http://en.wikipedia.org/wiki/Talibanhttp://en.wikipedia.org/wiki/Talibanhttp://en.wikipedia.org/wiki/Talibanhttp://en.wikipedia.org/wiki/Counter-terrorism#cite_note-Amnesty_International_2005-7http://en.wikipedia.org/wiki/Counter-terrorism#cite_note-Amnesty_International_2005-7http://en.wikipedia.org/wiki/Counter-terrorism#cite_note-Amnesty_International_2005-7http://en.wikipedia.org/wiki/Counter-terrorism#cite_note-Amnesty_International_2005-7http://en.wikipedia.org/wiki/Counter-terrorism#cite_note-Amnesty_International_2005-7http://en.wikipedia.org/wiki/Counter-terrorism#cite_note-Amnesty_International_2005-7http://en.wikipedia.org/wiki/Counter-terrorism#cite_note-Amnesty_International_2005-7http://en.wikipedia.org/wiki/Counter-terrorism#cite_note-Amnesty_International_2005-7http://en.wikipedia.org/wiki/Counter-terrorism#cite_note-Amnesty_International_2005-7http://en.wikipedia.org/wiki/Counter-terrorism#cite_note-Amnesty_International_2005-7http://en.wikipedia.org/wiki/Counter-terrorism#cite_note-Amnesty_International_2005-7http://en.wikipedia.org/wiki/Counter-terrorism#cite_note-Amnesty_International_2005-7http://en.wikipedia.org/wiki/Counter-terrorism#cite_note-Amnesty_International_2005-7http://en.wikipedia.org/wiki/Counter-terrorism#cite_note-Amnesty_International_2005-7http://en.wikipedia.org/wiki/Counter-terrorism#cite_note-Amnesty_International_2005-7http://en.wikipedia.org/wiki/Counter-terrorism#cite_note-Amnesty_International_2005-7http://en.wikipedia.org/wiki/Talibanhttp://en.wikipedia.org/wiki/Counter-terrorism#cite_note-Amnesty_International_2005-7http://en.wikipedia.org/wiki/Counter-terrorism#cite_note-Amnesty_International_2005-7http://en.wikipedia.org/wiki/Counter-terrorism#cite_note-Human_Rights_News_2004-6http://en.wikipedia.org/wiki/Counter-terrorism#cite_note-Human_Rights_News_2004-6http://en.wikipedia.org/wiki/Counter-terrorism#cite_note-Human_Rights_News_2004-6http://en.wikipedia.org/wiki/Human_rightshttp://en.wikipedia.org/wiki/Malaysiahttp://en.wikipedia.org/wiki/Counter-terrorism#cite_note-Human_Rights_News_2004-6http://en.wikipedia.org/wiki/Human_rightshttp://en.wikipedia.org/wiki/Abuses_of_powerhttp://en.wikipedia.org/w/index.php?title=Counter-terrorism&action=edit&section=4http://en.wikipedia.org/wiki/Counter-terrorism#cite_note-5http://en.wikipedia.org/wiki/Targeted_killinghttp://en.wikipedia.org/wiki/Israeli_Supreme_Courthttp://en.wikipedia.org/wiki/Israelhttp://en.wikipedia.org/wiki/Islamhttp://en.wikipedia.org/wiki/Civil_libertarianhttp://en.wikipedia.org/wiki/Liberal_democracyhttp://en.wikipedia.org/wiki/Australian_Anti-Terrorism_Act_2005#The_.22Shoot_to_Kill.22_Clausehttp://en.wikipedia.org/wiki/Australian_Anti-Terrorism_Act_2005#The_.22Shoot_to_Kill.22_Clause
  • 8/3/2019 1815 vienna

    10/21

    Many would argue that such violations exacerbate rather than counter the terrorist threat.[7]

    Human rights advocates argue for the crucial role ofhuman rightsprotection as an intrinsic partto fight against terrorism.[8]This suggests, as proponents ofhuman securityhave long argued,

    that respectinghuman rightsmay indeed help us to incur security.Amnesty International

    included a section on confronting terrorism in the recommendations in the Madrid Agenda

    arising from the Madrid Summit on Democracy and Terrorism (Madrid 8

    11 March 2005):

    "Democratic principles and values are essential tools in the fight against terrorism. Anysuccessful strategy for dealing with terrorism requires terrorists to be isolated.

    Consequently, the preference must be to treat terrorism as criminal acts to be handled

    through existing systems of law enforcement and with full respect forhuman rightsandthe rule of law. We recommend: (1) taking effective measures to make impunity

    impossible either for acts of terrorism or for the abuse ofhuman rightsin counter-

    terrorism measures. (2) the incorporation ofhuman rightslaws in all anti-terrorism

    programmes and policies of national governments as well as international bodies."[8]

    While international efforts to combat terrorism have focused on the need to enhancecooperation between states, proponents of human rights (as well ashuman security) havesuggested that more effort needs to be given to the effective inclusion ofhuman rights

    protection as a crucial element in that cooperation. They argue that internationalhuman

    rightsobligations do not stop at borders and a failure to respecthuman rightsin one statemay undermine its effectiveness in the international effort to cooperate to combat

    terrorism.[7]

    [edit] Preemptive neutralization

    Some countries see preemptive attacks as a legitimate strategy. This includes capturing,

    killing, or disabling suspected terrorists before they can mount an attack.Israel, theUnitedKingdom, theUnited States, andRussiahave taken this approach, while Western European

    states generally do not.

    Another major method of preemptive neutralization isinterrogationof known or suspected

    terrorists to obtain information about specific plots, targets, the identity of other terrorists,

    whether or not the interrogation subjects himself is guilty of terrorist involvement.Sometimes more extreme methods are used to increasesuggestibility, such assleep

    deprivationor drugs. Such methods may lead captives to offer false information in an

    attempt to stop the treatment, or due to the confusion brought on by it. These methods are not

    tolerated by European powers. In 1978 theEuropean Court of Human Rightsruled in the

    Ireland v. United Kingdomcase thatsuch methodsamounted to a practice of inhuman anddegrading treatment, and that such practices were in breach of theEuropean Convention on

    Human RightsArticle 3 (art. 3).

    [edit] Non-military preventive actions

    Thehuman securityparadigm outlines a non-military approach which aims to address the

    enduring underlying inequalities which fuel terrorist activity. Causal factors need to be

    http://en.wikipedia.org/wiki/Counter-terrorism#cite_note-Human_Rights_News_2004-6http://en.wikipedia.org/wiki/Counter-terrorism#cite_note-Human_Rights_News_2004-6http://en.wikipedia.org/wiki/Counter-terrorism#cite_note-Human_Rights_News_2004-6http://en.wikipedia.org/wiki/Human_rightshttp://en.wikipedia.org/wiki/Human_rightshttp://en.wikipedia.org/wiki/Human_rightshttp://en.wikipedia.org/wiki/Counter-terrorism#cite_note-Amnesty_International_2005-7http://en.wikipedia.org/wiki/Counter-terrorism#cite_note-Amnesty_International_2005-7http://en.wikipedia.org/wiki/Counter-terrorism#cite_note-Amnesty_International_2005-7http://en.wikipedia.org/wiki/Human_securityhttp://en.wikipedia.org/wiki/Human_securityhttp://en.wikipedia.org/wiki/Human_securityhttp://en.wikipedia.org/wiki/Human_rightshttp://en.wikipedia.org/wiki/Human_rightshttp://en.wikipedia.org/wiki/Human_rightshttp://en.wikipedia.org/wiki/Amnesty_Internationalhttp://en.wikipedia.org/wiki/Amnesty_Internationalhttp://en.wikipedia.org/wiki/Amnesty_Internationalhttp://en.wikipedia.org/wiki/Human_rightshttp://en.wikipedia.org/wiki/Human_rightshttp://en.wikipedia.org/wiki/Human_rightshttp://en.wikipedia.org/wiki/Human_rightshttp://en.wikipedia.org/wiki/Human_rightshttp://en.wikipedia.org/wiki/Human_rightshttp://en.wikipedia.org/wiki/Human_rightshttp://en.wikipedia.org/wiki/Human_rightshttp://en.wikipedia.org/wiki/Human_rightshttp://en.wikipedia.org/wiki/Counter-terrorism#cite_note-Amnesty_International_2005-7http://en.wikipedia.org/wiki/Counter-terrorism#cite_note-Amnesty_International_2005-7http://en.wikipedia.org/wiki/Counter-terrorism#cite_note-Amnesty_International_2005-7http://en.wikipedia.org/wiki/Human_securityhttp://en.wikipedia.org/wiki/Human_securityhttp://en.wikipedia.org/wiki/Human_securityhttp://en.wikipedia.org/wiki/Human_rightshttp://en.wikipedia.org/wiki/Human_rightshttp://en.wikipedia.org/wiki/Human_rightshttp://en.wikipedia.org/wiki/Human_rightshttp://en.wikipedia.org/wiki/Human_rightshttp://en.wikipedia.org/wiki/Human_rightshttp://en.wikipedia.org/wiki/Human_rightshttp://en.wikipedia.org/wiki/Human_rightshttp://en.wikipedia.org/wiki/Human_rightshttp://en.wikipedia.org/wiki/Human_rightshttp://en.wikipedia.org/wiki/Counter-terrorism#cite_note-Human_Rights_News_2004-6http://en.wikipedia.org/wiki/Counter-terrorism#cite_note-Human_Rights_News_2004-6http://en.wikipedia.org/wiki/Counter-terrorism#cite_note-Human_Rights_News_2004-6http://en.wikipedia.org/w/index.php?title=Counter-terrorism&action=edit&section=5http://en.wikipedia.org/w/index.php?title=Counter-terrorism&action=edit&section=5http://en.wikipedia.org/w/index.php?title=Counter-terrorism&action=edit&section=5http://en.wikipedia.org/wiki/Israelhttp://en.wikipedia.org/wiki/Israelhttp://en.wikipedia.org/wiki/Israelhttp://en.wikipedia.org/wiki/United_Kingdomhttp://en.wikipedia.org/wiki/United_Kingdomhttp://en.wikipedia.org/wiki/United_Kingdomhttp://en.wikipedia.org/wiki/United_Kingdomhttp://en.wikipedia.org/wiki/United_Stateshttp://en.wikipedia.org/wiki/United_Stateshttp://en.wikipedia.org/wiki/United_Stateshttp://en.wikipedia.org/wiki/Russiahttp://en.wikipedia.org/wiki/Russiahttp://en.wikipedia.org/wiki/Russiahttp://en.wikipedia.org/wiki/Interrogationhttp://en.wikipedia.org/wiki/Interrogationhttp://en.wikipedia.org/wiki/Interrogationhttp://en.wikipedia.org/wiki/Suggestibilityhttp://en.wikipedia.org/wiki/Suggestibilityhttp://en.wikipedia.org/wiki/Suggestibilityhttp://en.wikipedia.org/wiki/Sleep_deprivationhttp://en.wikipedia.org/wiki/Sleep_deprivationhttp://en.wikipedia.org/wiki/Sleep_deprivationhttp://en.wikipedia.org/wiki/Sleep_deprivationhttp://en.wikipedia.org/wiki/European_Court_of_Human_Rightshttp://en.wikipedia.org/wiki/European_Court_of_Human_Rightshttp://en.wikipedia.org/wiki/European_Court_of_Human_Rightshttp://en.wikipedia.org/wiki/Ireland_v._United_Kingdom_(1978)http://en.wikipedia.org/wiki/Ireland_v._United_Kingdom_(1978)http://en.wikipedia.org/wiki/Five_techniqueshttp://en.wikipedia.org/wiki/Five_techniqueshttp://en.wikipedia.org/wiki/Five_techniqueshttp://en.wikipedia.org/wiki/European_Convention_on_Human_Rightshttp://en.wikipedia.org/wiki/European_Convention_on_Human_Rightshttp://en.wikipedia.org/wiki/European_Convention_on_Human_Rightshttp://en.wikipedia.org/wiki/European_Convention_on_Human_Rightshttp://en.wikipedia.org/w/index.php?title=Counter-terrorism&action=edit&section=6http://en.wikipedia.org/w/index.php?title=Counter-terrorism&action=edit&section=6http://en.wikipedia.org/w/index.php?title=Counter-terrorism&action=edit&section=6http://en.wikipedia.org/wiki/Human_securityhttp://en.wikipedia.org/wiki/Human_securityhttp://en.wikipedia.org/wiki/Human_securityhttp://en.wikipedia.org/wiki/Human_securityhttp://en.wikipedia.org/w/index.php?title=Counter-terrorism&action=edit&section=6http://en.wikipedia.org/wiki/European_Convention_on_Human_Rightshttp://en.wikipedia.org/wiki/European_Convention_on_Human_Rightshttp://en.wikipedia.org/wiki/Five_techniqueshttp://en.wikipedia.org/wiki/Ireland_v._United_Kingdom_(1978)http://en.wikipedia.org/wiki/European_Court_of_Human_Rightshttp://en.wikipedia.org/wiki/Sleep_deprivationhttp://en.wikipedia.org/wiki/Sleep_deprivationhttp://en.wikipedia.org/wiki/Suggestibilityhttp://en.wikipedia.org/wiki/Interrogationhttp://en.wikipedia.org/wiki/Russiahttp://en.wikipedia.org/wiki/United_Stateshttp://en.wikipedia.org/wiki/United_Kingdomhttp://en.wikipedia.org/wiki/United_Kingdomhttp://en.wikipedia.org/wiki/Israelhttp://en.wikipedia.org/w/index.php?title=Counter-terrorism&action=edit&section=5http://en.wikipedia.org/wiki/Counter-terrorism#cite_note-Human_Rights_News_2004-6http://en.wikipedia.org/wiki/Human_rightshttp://en.wikipedia.org/wiki/Human_rightshttp://en.wikipedia.org/wiki/Human_rightshttp://en.wikipedia.org/wiki/Human_rightshttp://en.wikipedia.org/wiki/Human_securityhttp://en.wikipedia.org/wiki/Counter-terrorism#cite_note-Amnesty_International_2005-7http://en.wikipedia.org/wiki/Human_rightshttp://en.wikipedia.org/wiki/Human_rightshttp://en.wikipedia.org/wiki/Human_rightshttp://en.wikipedia.org/wiki/Amnesty_Internationalhttp://en.wikipedia.org/wiki/Human_rightshttp://en.wikipedia.org/wiki/Human_securityhttp://en.wikipedia.org/wiki/Counter-terrorism#cite_note-Amnesty_International_2005-7http://en.wikipedia.org/wiki/Human_rightshttp://en.wikipedia.org/wiki/Counter-terrorism#cite_note-Human_Rights_News_2004-6
  • 8/3/2019 1815 vienna

    11/21

    delineated and measures implemented which allow equal access to resources and

    sustainabilityfor all people. Such activities empower citizens providing 'freedom from fear'and 'freedom from want'.

    This can take many forms including the provision of clean drinking water, education,

    vaccination programs, provision of food and shelter and protection from violence, military orotherwise. Successful human security campaigns have been characterized by the

    participation of a diverse group of actors including governments,NGOs, and citizens.

    Foreign internal defenseprograms provide outside expert assistance to a threatened

    government. FID can involve both non-military and military aspects of counter-terrorism.

    Another preventative action that has been used is the threat of and use of pork and pork

    products against radical religious groups that feel that contact with pork will render themunclean. The bodies of killed terrorists are daubed with lard and buried wrapped in pigskin .[9]

    [edit] Military intervention

    Terrorism has often been used to justify military intervention in countries like Pakistan andIran where terrorists are said to be based. That was the main stated justification for the U.S.

    invasion of Afghanistan. It was also a stated justification for thesecond Russian invasion of

    Chechnya.

    History has shown that military intervention has rarely been successful in stopping or

    preventing terrorism.[dubiousdiscuss] Although military action can disrupt a terrorist group's

    operations temporarily, it rarely ends the threat.[10]

    Thus repression by the military in itself (particularly if it is not accompanied by othermeasures) usually leads to short term victories, but tend to be unsuccessful in the long run(e.g. theFrench's doctrine described inRoger Trinquier's bookModern War

    [11]used in

    IndochinaandAlgeria). However, new methods (see the new Counterinsurgency Field

    Manual[12]

    ) such as those taken inIraqhave yet to be seen as beneficial or ineffectual.

    [edit] Mathematical Modeling of the Interaction Between

    Terrorism and Counter-Terrorism and Its Policy

    Implications

    Mathematical modeling is currently being used to manage security policy. Specifically,scholars and practitioners of security studies are tackling the new challenge of managing

    terrorism. This technology can only be used if correct predictions are made. Models are

    being built to test predictions of situations that have never happened before throughempirically validated theories. This allows the world to adapt at a quicker rate while being

    managed successfully. An essay in the September/October 2008 issue of Complexity[13]

    explains such a modeling system looking at terrorism, counter-terrorism and their effects.

    The most general policy conclusions drawn from the models are: the counter-terrorism forces

    http://en.wikipedia.org/wiki/Sustainabilityhttp://en.wikipedia.org/wiki/Sustainabilityhttp://en.wikipedia.org/wiki/NGOshttp://en.wikipedia.org/wiki/NGOshttp://en.wikipedia.org/wiki/NGOshttp://en.wikipedia.org/wiki/Foreign_internal_defensehttp://en.wikipedia.org/wiki/Foreign_internal_defensehttp://en.wikipedia.org/wiki/Counter-terrorism#cite_note-8http://en.wikipedia.org/wiki/Counter-terrorism#cite_note-8http://en.wikipedia.org/wiki/Counter-terrorism#cite_note-8http://en.wikipedia.org/w/index.php?title=Counter-terrorism&action=edit&section=7http://en.wikipedia.org/w/index.php?title=Counter-terrorism&action=edit&section=7http://en.wikipedia.org/w/index.php?title=Counter-terrorism&action=edit&section=7http://en.wikipedia.org/wiki/War_in_Afghanistan_(2001%E2%80%93present)http://en.wikipedia.org/wiki/War_in_Afghanistan_(2001%E2%80%93present)http://en.wikipedia.org/wiki/War_in_Afghanistan_(2001%E2%80%93present)http://en.wikipedia.org/wiki/War_in_Afghanistan_(2001%E2%80%93present)http://en.wikipedia.org/wiki/Second_Russian_invasion_of_Chechnyahttp://en.wikipedia.org/wiki/Second_Russian_invasion_of_Chechnyahttp://en.wikipedia.org/wiki/Second_Russian_invasion_of_Chechnyahttp://en.wikipedia.org/wiki/Second_Russian_invasion_of_Chechnyahttp://en.wikipedia.org/wiki/Wikipedia:Disputed_statementhttp://en.wikipedia.org/wiki/Wikipedia:Disputed_statementhttp://en.wikipedia.org/wiki/Wikipedia:Disputed_statementhttp://en.wikipedia.org/wiki/Talk:Counter-terrorism#Dubioushttp://en.wikipedia.org/wiki/Talk:Counter-terrorism#Dubioushttp://en.wikipedia.org/wiki/Talk:Counter-terrorism#Dubioushttp://en.wikipedia.org/wiki/Counter-terrorism#cite_note-9http://en.wikipedia.org/wiki/Counter-terrorism#cite_note-9http://en.wikipedia.org/wiki/Counter-terrorism#cite_note-9http://en.wikipedia.org/wiki/Francehttp://en.wikipedia.org/wiki/Francehttp://en.wikipedia.org/wiki/Francehttp://en.wikipedia.org/wiki/Roger_Trinquierhttp://en.wikipedia.org/wiki/Roger_Trinquierhttp://en.wikipedia.org/wiki/Roger_Trinquierhttp://en.wikipedia.org/wiki/Counter-terrorism#cite_note-Trinquier-10http://en.wikipedia.org/wiki/Counter-terrorism#cite_note-Trinquier-10http://en.wikipedia.org/wiki/Counter-terrorism#cite_note-Trinquier-10http://en.wikipedia.org/wiki/Indochinahttp://en.wikipedia.org/wiki/Indochinahttp://en.wikipedia.org/wiki/Algeriahttp://en.wikipedia.org/wiki/Algeriahttp://en.wikipedia.org/wiki/Algeriahttp://en.wikipedia.org/wiki/Counter-terrorism#cite_note-FM3-24-11http://en.wikipedia.org/wiki/Counter-terrorism#cite_note-FM3-24-11http://en.wikipedia.org/wiki/Counter-terrorism#cite_note-FM3-24-11http://en.wikipedia.org/wiki/Iraqhttp://en.wikipedia.org/wiki/Iraqhttp://en.wikipedia.org/wiki/Iraqhttp://en.wikipedia.org/w/index.php?title=Counter-terrorism&action=edit&section=8http://en.wikipedia.org/w/index.php?title=Counter-terrorism&action=edit&section=8http://en.wikipedia.org/wiki/Counter-terrorism#cite_note-12http://en.wikipedia.org/wiki/Counter-terrorism#cite_note-12http://en.wikipedia.org/wiki/Counter-terrorism#cite_note-12http://en.wikipedia.org/w/index.php?title=Counter-terrorism&action=edit&section=8http://en.wikipedia.org/wiki/Iraqhttp://en.wikipedia.org/wiki/Counter-terrorism#cite_note-FM3-24-11http://en.wikipedia.org/wiki/Algeriahttp://en.wikipedia.org/wiki/Indochinahttp://en.wikipedia.org/wiki/Counter-terrorism#cite_note-Trinquier-10http://en.wikipedia.org/wiki/Roger_Trinquierhttp://en.wikipedia.org/wiki/Francehttp://en.wikipedia.org/wiki/Counter-terrorism#cite_note-9http://en.wikipedia.org/wiki/Talk:Counter-terrorism#Dubioushttp://en.wikipedia.org/wiki/Wikipedia:Disputed_statementhttp://en.wikipedia.org/wiki/Second_Russian_invasion_of_Chechnyahttp://en.wikipedia.org/wiki/Second_Russian_invasion_of_Chechnyahttp://en.wikipedia.org/wiki/War_in_Afghanistan_(2001%E2%80%93present)http://en.wikipedia.org/wiki/War_in_Afghanistan_(2001%E2%80%93present)http://en.wikipedia.org/w/index.php?title=Counter-terrorism&action=edit&section=7http://en.wikipedia.org/wiki/Counter-terrorism#cite_note-8http://en.wikipedia.org/wiki/Foreign_internal_defensehttp://en.wikipedia.org/wiki/NGOshttp://en.wikipedia.org/wiki/Sustainability
  • 8/3/2019 1815 vienna

    12/21

    should close off the borders of any terrorist crossings; keep initial terrorist strength small and

    counter-terrorist effectiveness high; have large initial counter-terrorist forces; avoid anyincentives for bandwagoning or growing sympathy for the terrorists. To keep the sympathy

    factor small, policy should withhold the general public of information regarding the

    terrorists success or activities. The activities of terrorists and counter-terrorists take place

    within the general public from which members are recruited. As terrorist and counter-terrorist activity increases, so will the need for recruitment. The models created have not yet

    discovered the implications of recruitment and therefore are only useful for situations in

    which terrorism and counter-terrorism is kept small.

    [edit] Planning for response to terrorism

    Police, fire, and emergency medical response organizations have obvious roles. Local

    firefightersand emergency medical personnel (often called "first responders") have plans for

    mitigating the effects of terrorist attacks, although police may deal with threats of such

    attacks.

    [edit] Target-hardening

    Whatever the target of terrorists, there are multiple ways of hardening the targets to prevent

    the terrorists from hitting their mark, or reducing the damage of attacks. One method is to

    placeJersey barrieror other sturdy obstacles outside tall or politically sensitive buildings toprevent car andtruck bombing.

    Aircraft cockpits are kept locked during flights, and have reinforced doors, which only thepilots in the cabin are capable of opening.Englishtrain stationsremoved theirgarbage cans

    in response to theProvisional IRAthreat, as convenient locations for depositing bombs.

    Scottishstations removed theirs after the7th of July bombingof London as a precautionary

    measure. TheMassachusetts Bay Transportation Authoritypurchased bomb-resistant barriers

    after theSeptember 11 terrorist attacks.

    A more sophisticated target-hardening approach must consider industrial and other critical

    industrial infrastructure that could be attacked. Terrorists need not import chemical weaponsif they can cause a major industrial accident such as theBhopal disasteror theHalifax

    explosion. Industrial chemicals in manufacturing, shipping, and storage need greater

    protection, and some efforts are in progress.[14]

    To put this risk into perspective, the first

    major lethal chemical attack in WWIused 160 tons of chlorine. Industrial shipments of

    chlorine, widely used in water purification and the chemical industry, travel in 90 or 55 tontank cars.

    To give one more example, the North American electrical grid has already demonstrated, in

    theNortheast Blackout of 2003, its vulnerability to natural disasters coupled with inadequate,

    possibly insecure,SCADA(supervisory control and data acquisition) networks. Part of thevulnerability is due to deregulation leading to much more interconnection in a grid designed

    for only occasional power-selling between utilities. A very few terrorists, attacking key

    http://en.wikipedia.org/w/index.php?title=Counter-terrorism&action=edit&section=9http://en.wikipedia.org/w/index.php?title=Counter-terrorism&action=edit&section=9http://en.wikipedia.org/wiki/Firefighterhttp://en.wikipedia.org/wiki/Firefighterhttp://en.wikipedia.org/w/index.php?title=Counter-terrorism&action=edit&section=10http://en.wikipedia.org/w/index.php?title=Counter-terrorism&action=edit&section=10http://en.wikipedia.org/w/index.php?title=Counter-terrorism&action=edit&section=10http://en.wikipedia.org/wiki/Jersey_barrierhttp://en.wikipedia.org/wiki/Jersey_barrierhttp://en.wikipedia.org/wiki/Jersey_barrierhttp://en.wikipedia.org/wiki/Truck_bombhttp://en.wikipedia.org/wiki/Truck_bombhttp://en.wikipedia.org/wiki/Truck_bombhttp://en.wikipedia.org/wiki/Englandhttp://en.wikipedia.org/wiki/Englandhttp://en.wikipedia.org/wiki/Train_stationshttp://en.wikipedia.org/wiki/Train_stationshttp://en.wikipedia.org/wiki/Train_stationshttp://en.wikipedia.org/wiki/Garbage_canhttp://en.wikipedia.org/wiki/Garbage_canhttp://en.wikipedia.org/wiki/Garbage_canhttp://en.wikipedia.org/wiki/Provisional_Irish_Republican_Armyhttp://en.wikipedia.org/wiki/Provisional_Irish_Republican_Armyhttp://en.wikipedia.org/wiki/Provisional_Irish_Republican_Armyhttp://en.wikipedia.org/wiki/Scotlandhttp://en.wikipedia.org/wiki/Scotlandhttp://en.wikipedia.org/wiki/7_July_2005_London_Bombingshttp://en.wikipedia.org/wiki/7_July_2005_London_Bombingshttp://en.wikipedia.org/wiki/7_July_2005_London_Bombingshttp://en.wikipedia.org/wiki/Massachusetts_Bay_Transportation_Authorityhttp://en.wikipedia.org/wiki/Massachusetts_Bay_Transportation_Authorityhttp://en.wikipedia.org/wiki/Massachusetts_Bay_Transportation_Authorityhttp://en.wikipedia.org/wiki/September_11_terrorist_attackshttp://en.wikipedia.org/wiki/September_11_terrorist_attackshttp://en.wikipedia.org/wiki/September_11_terrorist_attackshttp://en.wikipedia.org/wiki/Bhopal_disasterhttp://en.wikipedia.org/wiki/Bhopal_disasterhttp://en.wikipedia.org/wiki/Bhopal_disasterhttp://en.wikipedia.org/wiki/Halifax_explosionhttp://en.wikipedia.org/wiki/Halifax_explosionhttp://en.wikipedia.org/wiki/Halifax_explosionhttp://en.wikipedia.org/wiki/Halifax_explosionhttp://en.wikipedia.org/wiki/Counter-terrorism#cite_note-13http://en.wikipedia.org/wiki/Counter-terrorism#cite_note-13http://en.wikipedia.org/wiki/Counter-terrorism#cite_note-13http://en.wikipedia.org/wiki/Poison_gas_in_World_War_I#1915:_large_scale_use_and_lethal_gaseshttp://en.wikipedia.org/wiki/Poison_gas_in_World_War_I#1915:_large_scale_use_and_lethal_gaseshttp://en.wikipedia.org/wiki/Northeast_Blackout_of_2003http://en.wikipedia.org/wiki/Northeast_Blackout_of_2003http://en.wikipedia.org/wiki/Northeast_Blackout_of_2003http://en.wikipedia.org/wiki/SCADAhttp://en.wikipedia.org/wiki/SCADAhttp://en.wikipedia.org/wiki/SCADAhttp://en.wikipedia.org/wiki/SCADAhttp://en.wikipedia.org/wiki/Northeast_Blackout_of_2003http://en.wikipedia.org/wiki/Poison_gas_in_World_War_I#1915:_large_scale_use_and_lethal_gaseshttp://en.wikipedia.org/wiki/Counter-terrorism#cite_note-13http://en.wikipedia.org/wiki/Halifax_explosionhttp://en.wikipedia.org/wiki/Halifax_explosionhttp://en.wikipedia.org/wiki/Bhopal_disasterhttp://en.wikipedia.org/wiki/September_11_terrorist_attackshttp://en.wikipedia.org/wiki/Massachusetts_Bay_Transportation_Authorityhttp://en.wikipedia.org/wiki/7_July_2005_London_Bombingshttp://en.wikipedia.org/wiki/Scotlandhttp://en.wikipedia.org/wiki/Provisional_Irish_Republican_Armyhttp://en.wikipedia.org/wiki/Garbage_canhttp://en.wikipedia.org/wiki/Train_stationshttp://en.wikipedia.org/wiki/Englandhttp://en.wikipedia.org/wiki/Truck_bombhttp://en.wikipedia.org/wiki/Jersey_barrierhttp://en.wikipedia.org/w/index.php?title=Counter-terrorism&action=edit&section=10http://en.wikipedia.org/wiki/Firefighterhttp://en.wikipedia.org/w/index.php?title=Counter-terrorism&action=edit&section=9
  • 8/3/2019 1815 vienna

    13/21

    power facilities when one or more engineers have infiltrated the power control centers, could

    wreak havoc.

    Equipping likely targets with containers (i.e., bags) of pig lard has been utilized to

    discourage attacks by Islamist suicide bombers. The technique was apparently used on a

    limited scale by British authorities in the 1940s.

    [15]

    The approach stems from the idea thatMuslims perpetrating the attack would not want to be "soiled" by the lard in the moment

    prior to dying. The idea has been suggested more recently as a deterrent to suicide bombingsin Israel.[16]However, the actual effectiveness of this tactic is probably limited as it is

    possible that a sympathetic Islamic scholar could issue afatwaproclaiming that a suicide

    bomber would not be polluted by the swine products.

    [edit] Command and control

    In North America and other continents, for a threatened or completed terrorist attack, theIncident Command System(ICS) is apt to be invoked to control the various services that

    may need to be involved in the response. ICS has varied levels of escalation, such as mightbe needed for multiple incidents in a given area (e.g.,the 2005 bombings in Londonor the

    2004 Madrid train bombings, or all the way to aNational Response Planinvocation ifnational-level resources are needed. National response, for example, might be needed for a

    nuclear, biological, radiological, or large chemical attack.

    [edit] Damage mitigation

    Fire departments, perhaps supplemented by public works agencies, utility providers (e.g.,gas, water, electricity), and heavy construction contractors, are most apt to deal with the

    physical consequences of an attack.

    [edit] Local security

    Again under an incident command model, localpolicecan isolate the incident area, reducing

    confusion, and specialized police units can conduct tactical operations against terrorists,often usingspecialized counter-terrorist tactical units. Bringing in such units will normally

    involve civil or military authority beyond the local level.

    [edit] Medical services

    Emergency medical services will bring the more seriously affected victims to hospitals,

    which will need to have mass casualty andtriageplans in place.

    Public health agencies, from local to national level, may be designated to deal with

    identification, and sometimes mitigation, of possible biological attacks, and sometimeschemical or radiologic contamination.

    [edit] Counter-terrorism tactical units

    http://en.wikipedia.org/wiki/Counter-terrorism#cite_note-14http://en.wikipedia.org/wiki/Counter-terrorism#cite_note-14http://en.wikipedia.org/wiki/Counter-terrorism#cite_note-14http://en.wikipedia.org/wiki/Counter-terrorism#cite_note-15http://en.wikipedia.org/wiki/Counter-terrorism#cite_note-15http://en.wikipedia.org/wiki/Counter-terrorism#cite_note-15http://en.wikipedia.org/wiki/Fatwahttp://en.wikipedia.org/wiki/Fatwahttp://en.wikipedia.org/wiki/Fatwahttp://en.wikipedia.org/w/index.php?title=Counter-terrorism&action=edit&section=11http://en.wikipedia.org/w/index.php?title=Counter-terrorism&action=edit&section=11http://en.wikipedia.org/w/index.php?title=Counter-terrorism&action=edit&section=11http://en.wikipedia.org/wiki/Incident_Command_Systemhttp://en.wikipedia.org/wiki/Incident_Command_Systemhttp://en.wikipedia.org/wiki/Attacks_on_the_London_Underground#2005_terrorist_bomb_attackshttp://en.wikipedia.org/wiki/Attacks_on_the_London_Underground#2005_terrorist_bomb_attackshttp://en.wikipedia.org/wiki/Attacks_on_the_London_Underground#2005_terrorist_bomb_attackshttp://en.wikipedia.org/wiki/2004_Madrid_train_bombingshttp://en.wikipedia.org/wiki/2004_Madrid_train_bombingshttp://en.wikipedia.org/wiki/National_Response_Planhttp://en.wikipedia.org/wiki/National_Response_Planhttp://en.wikipedia.org/wiki/National_Response_Planhttp://en.wikipedia.org/w/index.php?title=Counter-terrorism&action=edit&section=12http://en.wikipedia.org/w/index.php?title=Counter-terrorism&action=edit&section=12http://en.wikipedia.org/w/index.php?title=Counter-terrorism&action=edit&section=12http://en.wikipedia.org/wiki/Fire_departmenthttp://en.wikipedia.org/wiki/Fire_departmenthttp://en.wikipedia.org/w/index.php?title=Counter-terrorism&action=edit&section=13http://en.wikipedia.org/w/index.php?title=Counter-terrorism&action=edit&section=13http://en.wikipedia.org/w/index.php?title=Counter-terrorism&action=edit&section=13http://en.wikipedia.org/wiki/Policehttp://en.wikipedia.org/wiki/Policehttp://en.wikipedia.org/wiki/Policehttp://en.wikipedia.org/wiki/Counter-terrorism#Counter-terrorism_tactical_unitshttp://en.wikipedia.org/wiki/Counter-terrorism#Counter-