Serveur d'exploration SRAS

Attention, ce site est en cours de développement !
Attention, site généré par des moyens informatiques à partir de corpus bruts.
Les informations ne sont donc pas validées.

Security and the War on Terror

Identifieur interne : 001F66 ( Istex/Corpus ); précédent : 001F65; suivant : 001F67

Security and the War on Terror

Auteurs :

Source :

RBID : ISTEX:6DC88EF2BD07378714288E1CF248E10685AEA5B7

Abstract

The terrorist attacks of 11 September 2001 marked a turning point in international politics, representing a new type of threat that could not easily be anticipated or prevented through state-based structures of security alone. Opening up interdisciplinary conversations between strategic, economic, ethical and legal approaches to global terrorism, this edited book recognises a fundamental issue: while major crises initially tend to reinforce old thinking and behavioural patterns, they also allow societies to challenge and overcome entrenched habits, thereby creating the foundations for a new and perhaps more peaceful future. The objective of this volume is to address the issues that are at stake in this dual process of political closure, and to therefore rethink how states can respond to terrorist threats. The contributors offer a unique combination, being drawn from leading conceptual theorists to policy-oriented analysts, from senior academics to junior researchers. The book explores how terrorism has had a profound impact on how security is being understood and implemented, and uses a range of hitherto neglected sources of insight, such as those between political, economic, legal and ethical factors, to examine the nature and meaning of security in a rapidly changing world. This book will be of much interest to students of Terrorism Studies, Security Studies, International Law and International Relations in general.

Url:
DOI: 10.4324/9780203028094

Links to Exploration step

ISTEX:6DC88EF2BD07378714288E1CF248E10685AEA5B7

Le document en format XML

<record>
<TEI wicri:istexFullTextTei="biblStruct">
<teiHeader>
<fileDesc>
<titleStmt>
<title>Security and the War on Terror</title>
</titleStmt>
<publicationStmt>
<idno type="wicri:source">ISTEX</idno>
<idno type="RBID">ISTEX:6DC88EF2BD07378714288E1CF248E10685AEA5B7</idno>
<date when="2008" year="2008">2008</date>
<idno type="doi">10.4324/9780203028094</idno>
<idno type="url">https://api.istex.fr/ark:/67375/T1V-NRX7TW73-5/fulltext.pdf</idno>
<idno type="wicri:Area/Istex/Corpus">001F66</idno>
<idno type="wicri:explorRef" wicri:stream="Istex" wicri:step="Corpus" wicri:corpus="ISTEX">001F66</idno>
</publicationStmt>
<sourceDesc>
<biblStruct>
<analytic>
<title level="a" type="main">Security and the War on Terror</title>
</analytic>
<monogr></monogr>
<series>
<title level="s">Contemporary Security Studies</title>
</series>
</biblStruct>
</sourceDesc>
</fileDesc>
<profileDesc>
<textClass></textClass>
<langUsage>
<language ident="en">en</language>
</langUsage>
</profileDesc>
</teiHeader>
<front>
<div type="abstract">The terrorist attacks of 11 September 2001 marked a turning point in international politics, representing a new type of threat that could not easily be anticipated or prevented through state-based structures of security alone. Opening up interdisciplinary conversations between strategic, economic, ethical and legal approaches to global terrorism, this edited book recognises a fundamental issue: while major crises initially tend to reinforce old thinking and behavioural patterns, they also allow societies to challenge and overcome entrenched habits, thereby creating the foundations for a new and perhaps more peaceful future. The objective of this volume is to address the issues that are at stake in this dual process of political closure, and to therefore rethink how states can respond to terrorist threats. The contributors offer a unique combination, being drawn from leading conceptual theorists to policy-oriented analysts, from senior academics to junior researchers. The book explores how terrorism has had a profound impact on how security is being understood and implemented, and uses a range of hitherto neglected sources of insight, such as those between political, economic, legal and ethical factors, to examine the nature and meaning of security in a rapidly changing world. This book will be of much interest to students of Terrorism Studies, Security Studies, International Law and International Relations in general.</div>
</front>
</TEI>
<istex>
<corpusName>taylor-francis</corpusName>
<editor>
<json:item>
<name>Alex J. Bellamy</name>
</json:item>
<json:item>
<name>Roland Bleiker</name>
</json:item>
<json:item>
<name>Sara E. Davies</name>
</json:item>
<json:item>
<name>Richard Devetak</name>
</json:item>
</editor>
<arkIstex>ark:/67375/T1V-NRX7TW73-5</arkIstex>
<language>
<json:string>eng</json:string>
</language>
<originalGenre>
<json:string>N/A</json:string>
</originalGenre>
<abstract>The terrorist attacks of 11 September 2001 marked a turning point in international politics, representing a new type of threat that could not easily be anticipated or prevented through state-based structures of security alone. Opening up interdisciplinary conversations between strategic, economic, ethical and legal approaches to global terrorism, this edited book recognises a fundamental issue: while major crises initially tend to reinforce old thinking and behavioural patterns, they also allow societies to challenge and overcome entrenched habits, thereby creating the foundations for a new and perhaps more peaceful future. The objective of this volume is to address the issues that are at stake in this dual process of political closure, and to therefore rethink how states can respond to terrorist threats. The contributors offer a unique combination, being drawn from leading conceptual theorists to policy-oriented analysts, from senior academics to junior researchers. The book explores how terrorism has had a profound impact on how security is being understood and implemented, and uses a range of hitherto neglected sources of insight, such as those between political, economic, legal and ethical factors, to examine the nature and meaning of security in a rapidly changing world. This book will be of much interest to students of Terrorism Studies, Security Studies, International Law and International Relations in general.</abstract>
<qualityIndicators>
<score>8.901</score>
<pdfWordCount>102651</pdfWordCount>
<pdfCharCount>610523</pdfCharCount>
<pdfVersion>1.5</pdfVersion>
<pdfPageCount>246</pdfPageCount>
<pdfPageSize>432 x 648 pts</pdfPageSize>
<pdfWordsPerPage>417</pdfWordsPerPage>
<pdfText>true</pdfText>
<refBibsNative>true</refBibsNative>
<abstractWordCount>214</abstractWordCount>
<abstractCharCount>1441</abstractCharCount>
<keywordCount>0</keywordCount>
</qualityIndicators>
<title>Security and the War on Terror</title>
<genre>
<json:string>book</json:string>
</genre>
<host>
<title>Security and the War on Terror</title>
<language>
<json:string>unknown</json:string>
</language>
<publicationDate>2008</publicationDate>
<copyrightDate>2008</copyrightDate>
<eisbn>
<json:string>9780203028094</json:string>
</eisbn>
<isbn>
<json:string>9780415368445</json:string>
<json:string>9780415368452</json:string>
</isbn>
<pages>
<first>1</first>
<last>124</last>
<total>246</total>
</pages>
<genre>
<json:string>book</json:string>
</genre>
<editor>
<json:item>
<name>Alex J. Bellamy</name>
</json:item>
<json:item>
<name>Roland Bleiker</name>
</json:item>
<json:item>
<name>Sara E. Davies</name>
</json:item>
<json:item>
<name>Richard Devetak</name>
</json:item>
</editor>
<subject>
<json:item>
<value>Contemporary Security Studies</value>
</json:item>
</subject>
</host>
<ark>
<json:string>ark:/67375/T1V-NRX7TW73-5</json:string>
</ark>
<publicationDate>2008</publicationDate>
<copyrightDate>2008</copyrightDate>
<doi>
<json:string>10.4324/9780203028094</json:string>
</doi>
<id>6DC88EF2BD07378714288E1CF248E10685AEA5B7</id>
<score>1</score>
<fulltext>
<json:item>
<extension>pdf</extension>
<original>true</original>
<mimetype>application/pdf</mimetype>
<uri>https://api.istex.fr/ark:/67375/T1V-NRX7TW73-5/fulltext.pdf</uri>
</json:item>
<json:item>
<extension>zip</extension>
<original>false</original>
<mimetype>application/zip</mimetype>
<uri>https://api.istex.fr/ark:/67375/T1V-NRX7TW73-5/bundle.zip</uri>
</json:item>
<istex:fulltextTEI uri="https://api.istex.fr/ark:/67375/T1V-NRX7TW73-5/fulltext.tei">
<teiHeader>
<fileDesc>
<titleStmt>
<title level="a" type="main">Security and the War on Terror</title>
<respStmt>
<resp>Editor</resp>
<name>Bellamy, Alex J.</name>
</respStmt>
<respStmt>
<resp>Editor</resp>
<name>Bleiker, Roland</name>
</respStmt>
<respStmt>
<resp>Editor</resp>
<name>Davies, Sara E.</name>
</respStmt>
<respStmt>
<resp>Editor</resp>
<name>Devetak, Richard</name>
</respStmt>
</titleStmt>
<editionStmt>
<edition>1</edition>
</editionStmt>
<publicationStmt>
<authority>ISTEX</authority>
<publisher scheme="https://scientific-publisher.data.istex.fr/ark:/67375/H02-CR0WP21S-C">Taylor & Francis</publisher>
<publisher>Routledge - 2 Park Square, Milton Park, Abingdon, Oxon OX14 4RN</publisher>
<publisher>Routledge - 270 Madison Ave, New York, NY 10016</publisher>
<availability>
<licence>
<p>Taylor & Francis – ebooks</p>
</licence>
<p scheme="https://loaded-corpus.data.istex.fr/ark:/67375/XBH-QGNTS49S-T">taylor-francis</p>
<p>© Alex J. Bellamy, Roland Bleiker, Sara E. Davies, Richard Devetak for editorial selection; individual chapters, the contributors</p>
<p>2008</p>
<p>Alex J. Bellamy, Roland Bleiker, Sara E. Davies, Richard Devetak</p>
<p>First published 2008</p>
<p>Simultaneously published in the USA and Canada</p>
<p>This edition published in the Taylor & Francis e-Library, 2007.</p>
<p>“To purchase your own copy of this or any of Taylor & Francis or Routledge’s collection of thousands of eBooks please go to
<ptr type="url" target="www.eBookstore.tandf.co.uk"></ptr>
.”</p>
<p>Routledge is an imprint of the Taylor & Francis Group, an informa business</p>
<p>All rights reserved. No part of this book may be reprinted or reproduced or utilised in any form or by any electronic, mechanical, or other means, now known or hereafter invented, including photocopying and recording, or in any information storage or retrieval system, without permission in writing from the publishers.</p>
<p>A catalogue record for this book is available from the British Library</p>
<p>Security and the war on terror / edited by Alex J. Bellamy … [et al.].
<lb></lb>
  p. cm.
<lb></lb>
 Includes bibliographical references.
<lb></lb>
 1. Security, International. 2. War on Terrorism, 2001–
<lb></lb>
 I. Bellamy, Alex J., 1975
<lb></lb>
JZ5588.S4295 2007
<lb></lb>
909.83’1–dc22                    2007018593</p>
<p>ISBN 0-203-02809-0 Master e-book ISBN</p>
<p>ISBN10: 0-415-36844-8 (hbk)</p>
<p>ISBN10: 0-415-36845-6 (pbk)</p>
<p>ISBN10: 0-203-02809-0 (ebk)</p>
<p>ISBN13: 978-0-415-36844-5 (hbk)</p>
<p>ISBN13: 978-0-415-36845-2 (pbk)</p>
<p>ISBN13: 978-0-203-02809-4 (ebk)</p>
</availability>
<date>2008</date>
</publicationStmt>
<notesStmt>
<note type="book" scheme="https://publication-type.data.istex.fr/ark:/67375/JMC-5WTPMB5N-F">book</note>
<note type="supplier">
<p>codeMantra LLC</p>
</note>
</notesStmt>
<sourceDesc>
<biblStruct type="inbook">
<analytic>
<title level="a" type="main">Security and the War on Terror</title>
<author>
<persName>
<forename type="first">Alex J.</forename>
<surname>Bellamy</surname>
</persName>
<state type="biography">
<desc>
<hi rend="bold">Alex J. Bellamy</hi>
is Professor of International Relations at the University of Queensland, Australia.</desc>
</state>
</author>
<author>
<persName>
<forename type="first">Roland</forename>
<surname>Bleiker</surname>
</persName>
<state type="biography">
<desc>
<hi rend="bold">Roland Bleiker</hi>
is Professor of International Relations at the University of Queensland, Australia.</desc>
</state>
</author>
<author>
<persName>
<forename type="first">Sara E.</forename>
<surname>Davies</surname>
</persName>
<state type="biography">
<desc>
<hi rend="bold">Sara E. Davies</hi>
is Lecturer at the School of Justice, Queensland University of Technology, Australia.</desc>
</state>
</author>
<author>
<persName>
<forename type="first">Richard</forename>
<surname>Devetak</surname>
</persName>
<state type="biography">
<desc>
<hi rend="bold">Richard Devetak</hi>
is Senior Lecturer in International Relations and Director of the Rotary Centre for International Studies in Peace and Conflict Resolution at the University of Queensland, Australia.</desc>
</state>
</author>
<idno type="istex">6DC88EF2BD07378714288E1CF248E10685AEA5B7</idno>
<idno type="ark">ark:/67375/T1V-NRX7TW73-5</idno>
</analytic>
<monogr>
<title level="a" type="main">Security and the War on Terror</title>
<idno type="hISBN">9780415368445</idno>
<idno type="pISBN">9780415368452</idno>
<idno type="eISBN">9780203028094</idno>
<imprint>
<date>2008</date>
<biblScope unit="page" from="1">1</biblScope>
<biblScope unit="page" to="124">124</biblScope>
<biblScope unit="page-count">246</biblScope>
<biblScope unit="ref-count">563</biblScope>
<biblScope unit="table-count">0</biblScope>
<publisher>Routledge - 2 Park Square, Milton Park, Abingdon, Oxon OX14 4RN</publisher>
<publisher>Routledge - 270 Madison Ave, New York, NY 10016</publisher>
</imprint>
</monogr>
<series>
<title level="s">Contemporary Security Studies</title>
</series>
</biblStruct>
</sourceDesc>
</fileDesc>
<encodingDesc>
<schemaRef type="ODD" url="https://xml-schema.delivery.istex.fr/tei-istex.odd"></schemaRef>
<appInfo>
<application ident="pub2tei" version="1.0.37" when="2020-03-02">
<label>pub2TEI-ISTEX</label>
<desc>A set of style sheets for converting XML documents encoded in various scientific publisher formats into a common TEI format.
<ref target="http://www.tei-c.org/">We use TEI</ref>
</desc>
</application>
</appInfo>
</encodingDesc>
<profileDesc>
<langUsage>
<language ident="en">en</language>
</langUsage>
<abstract>
<p>The terrorist attacks of 11 September 2001 marked a turning point in international politics, representing a new type of threat that could not easily be anticipated or prevented through state-based structures of security alone. Opening up interdisciplinary conversations between strategic, economic, ethical and legal approaches to global terrorism, this edited book recognises a fundamental issue: while major crises initially tend to reinforce old thinking and behavioural patterns, they also allow societies to challenge and overcome entrenched habits, thereby creating the foundations for a new and perhaps more peaceful future.</p>
<p>The objective of this volume is to address the issues that are at stake in this dual process of political closure, and to therefore rethink how states can respond to terrorist threats. The contributors offer a unique combination, being drawn from leading conceptual theorists to policy-oriented analysts, from senior academics to junior researchers. The book explores how terrorism has had a profound impact on how security is being understood and implemented, and uses a range of hitherto neglected sources of insight, such as those between political, economic, legal and ethical factors, to examine the nature and meaning of security in a rapidly changing world.</p>
<p>This book will be of much interest to students of Terrorism Studies, Security Studies, International Law and International Relations in general.</p>
</abstract>
<textClass>
<keywords scheme="book-collection">
<term>Contemporary Security Studies</term>
</keywords>
</textClass>
</profileDesc>
<revisionDesc>
<change when="2020-03-02" who="#istex" xml:id="pub2tei">formatting</change>
</revisionDesc>
</teiHeader>
</istex:fulltextTEI>
<json:item>
<extension>txt</extension>
<original>false</original>
<mimetype>text/plain</mimetype>
<uri>https://api.istex.fr/ark:/67375/T1V-NRX7TW73-5/fulltext.txt</uri>
</json:item>
</fulltext>
<metadata>
<istex:metadataXml wicri:clean="corpus taylor-francis not found" wicri:toSee="no header">
<istex:xmlDeclaration>version="1.0" encoding="UTF-8"</istex:xmlDeclaration>
<istex:docType PUBLIC="-//Taylor and Francis//DTD Taylor and Francis Books//EN" URI="TF_Books.dtd" name="istex:docType"></istex:docType>
<istex:document>
<book dtd-version="3.0">
<book-meta>
<book-id pub-id-type="doi">10.4324/9780203028094</book-id>
<book-title-group>
<book-title>Security and the War on Terror</book-title>
</book-title-group>
<edition>1</edition>
<impression>1</impression>
<series>Contemporary Security Studies</series>
<contrib-group>
<contrib contrib-type="editor">
<name>
<given-names>Alex J.</given-names>
<surname>Bellamy</surname>
</name>
<bio>
<p>
<bold>Alex J. Bellamy</bold>
is Professor of International Relations at the University of Queensland, Australia.</p>
</bio>
</contrib>
<contrib contrib-type="editor">
<name>
<given-names>Roland</given-names>
<surname>Bleiker</surname>
</name>
<bio>
<p>
<bold>Roland Bleiker</bold>
is Professor of International Relations at the University of Queensland, Australia.</p>
</bio>
</contrib>
<contrib contrib-type="editor">
<name>
<given-names>Sara E.</given-names>
<surname>Davies</surname>
</name>
<bio>
<p>
<bold>Sara E. Davies</bold>
is Lecturer at the School of Justice, Queensland University of Technology, Australia.</p>
</bio>
</contrib>
<contrib contrib-type="editor">
<name>
<given-names>Richard</given-names>
<surname>Devetak</surname>
</name>
<bio>
<p>
<bold>Richard Devetak</bold>
is Senior Lecturer in International Relations and Director of the Rotary Centre for International Studies in Peace and Conflict Resolution at the University of Queensland, Australia.</p>
</bio>
</contrib>
</contrib-group>
<publisher>
<publisher-name>Routledge</publisher-name>
<publisher-loc>2 Park Square, Milton Park, Abingdon, Oxon OX14 4RN</publisher-loc>
</publisher>
<publisher>
<publisher-name>Routledge</publisher-name>
<publisher-loc>270 Madison Ave, New York, NY 10016</publisher-loc>
</publisher>
<isbn pub-type="hbk">978-0-415-36844-5</isbn>
<isbn pub-type="pbk">978-0-415-36845-2</isbn>
<isbn pub-type="ebk">978-0-203-02809-4</isbn>
<pub-date>
<year>2008</year>
</pub-date>
<permissions>
<copyright-statement>© Alex J. Bellamy, Roland Bleiker, Sara E. Davies, Richard Devetak for editorial selection; individual chapters, the contributors</copyright-statement>
<copyright-year>2008</copyright-year>
<copyright-holder>Alex J. Bellamy, Roland Bleiker, Sara E. Davies, Richard Devetak</copyright-holder>
</permissions>
<imprint-meta>
<imprint-text type="Other">First published 2008</imprint-text>
<imprint-text type="Other">Simultaneously published in the USA and Canada</imprint-text>
<imprint-text type="MoralRightsAssertion">This edition published in the Taylor & Francis e-Library, 2007.</imprint-text>
<imprint-text type="Other">“To purchase your own copy of this or any of Taylor & Francis or Routledge’s collection of thousands of eBooks please go to
<uri xlink:href="http://www.eBookstore.tandf.co.uk">www.eBookstore.tandf.co.uk</uri>
.”</imprint-text>
<imprint-text type="ImprintStatement">Routledge is an imprint of the Taylor & Francis Group, an informa business</imprint-text>
<imprint-text type="ReproductionStatement">All rights reserved. No part of this book may be reprinted or reproduced or utilised in any form or by any electronic, mechanical, or other means, now known or hereafter invented, including photocopying and recording, or in any information storage or retrieval system, without permission in writing from the publishers.</imprint-text>
<imprint-text type="BritishLibrary">A catalogue record for this book is available from the British Library</imprint-text>
<imprint-text type="CIP">Security and the war on terror / edited by Alex J. Bellamy … [et al.].
<break></break>
  p. cm.
<break></break>
 Includes bibliographical references.
<break></break>
 1. Security, International. 2. War on Terrorism, 2001–
<break></break>
 I. Bellamy, Alex J., 1975
<break></break>
JZ5588.S4295 2007
<break></break>
909.83’1–dc22                    2007018593</imprint-text>
<imprint-text type="Other">ISBN 0-203-02809-0 Master e-book ISBN</imprint-text>
<imprint-text type="Other">ISBN10: 0-415-36844-8 (hbk)</imprint-text>
<imprint-text type="Other">ISBN10: 0-415-36845-6 (pbk)</imprint-text>
<imprint-text type="Other">ISBN10: 0-203-02809-0 (ebk)</imprint-text>
<imprint-text type="Other">ISBN13: 978-0-415-36844-5 (hbk)</imprint-text>
<imprint-text type="Other">ISBN13: 978-0-415-36845-2 (pbk)</imprint-text>
<imprint-text type="Other">ISBN13: 978-0-203-02809-4 (ebk)</imprint-text>
</imprint-meta>
<abstract abstract-type="blurb">
<p>The terrorist attacks of 11 September 2001 marked a turning point in international politics, representing a new type of threat that could not easily be anticipated or prevented through state-based structures of security alone. Opening up interdisciplinary conversations between strategic, economic, ethical and legal approaches to global terrorism, this edited book recognises a fundamental issue: while major crises initially tend to reinforce old thinking and behavioural patterns, they also allow societies to challenge and overcome entrenched habits, thereby creating the foundations for a new and perhaps more peaceful future.</p>
<p>The objective of this volume is to address the issues that are at stake in this dual process of political closure, and to therefore rethink how states can respond to terrorist threats. The contributors offer a unique combination, being drawn from leading conceptual theorists to policy-oriented analysts, from senior academics to junior researchers. The book explores how terrorism has had a profound impact on how security is being understood and implemented, and uses a range of hitherto neglected sources of insight, such as those between political, economic, legal and ethical factors, to examine the nature and meaning of security in a rapidly changing world.</p>
<p>This book will be of much interest to students of Terrorism Studies, Security Studies, International Law and International Relations in general.</p>
</abstract>
<counts>
<fig-count count="0"></fig-count>
<table-count count="0"></table-count>
<equation-count count="0"></equation-count>
<ref-count count="563"></ref-count>
<page-count count="246"></page-count>
</counts>
<notes notes-type="supplier">
<p>codeMantra LLC</p>
</notes>
</book-meta>
<book-front>
<bio id="bio1">
<p>
<bold>Alex J. Bellamy</bold>
is Professor of International Relations at the University of Queensland, Australia. He has written, co-written or edited eight books, including
<italic>Just Wars: From Cicero to Iraq</italic>
(
<xref ref-type="bibr" rid="ref42">Polity, 2006</xref>
) and (with Paul D. Williams and Stuart Griffin),
<italic>Understanding Peacekeeping</italic>
(Polity, 2004).</p>
</bio>
<bio id="bio2">
<p>
<bold>Roland Bleiker</bold>
is Professor of International Relations at the University of Queensland, Australia. His books include
<italic>Divided Korea: Towards a Culture of Reconciliation</italic>
(University of Minnesota Press, 2005) and
<italic>Popular Dissent, Human Agency and Global Politics</italic>
(Cambridge University Press, 2000). He is currently working on aesthetics, emotions and world politics and has a forthcoming book on
<italic>Aesthetics and World Politics</italic>
(Palgrave).</p>
</bio>
<bio id="bio3">
<p>
<bold>Anthony Burke</bold>
is Senior Lecturer of Politics and International Relations at the University of New South Wales, Australia. His most recent books are
<italic>Beyond Security, Ethics and Violence: War Against The Other</italic>
(
<xref ref-type="bibr" rid="ref79">London and New York: Routledge, 2007</xref>
) and
<italic>Critical Security in the Asia-Pacific,</italic>
edited with Matt McDonald (Manchester University Press, 2007).</p>
</bio>
<bio id="bio4">
<p>
<bold>Sara E. Davies</bold>
is Lecturer in Justice Studies at the Queensland University of Technology, Australia. Her research is in the areas of international law, refugees, and global health. Her books include,
<italic>Legitimizing Rejection? International Refugee Law in Southeast Asia</italic>
(Martinus Nijhoff, 2007) and
<italic>Global Health Issues</italic>
(Polity, forthcoming), and her articles have been published in journals such as the
<italic>International Journal of Refugee Law.</italic>
</p>
</bio>
<bio id="bio5">
<p>
<bold>Richard Devetak</bold>
is Senior Lecturer in International Relations at the University of Queensland, Australia. He is co-author of
<italic>Theories of International Relations</italic>
(3rd edition,
<xref ref-type="bibr" rid="ref427">Palgrave, 2005</xref>
), co-editor of
<italic>Globalization’s Shadow: Globalization and Political Violence</italic>
(Routledge, forthcoming), and has published on contemporary theoretical debates in international relations, theories of the state, justice and globalisation, humanitarian intervention, terrorism and the war on terror, as well as foreign policy, refugees and national identity in the Australian context.</p>
</bio>
<bio id="bio6">
<p>
<xref id="page_x" ref-type="page"></xref>
<bold>Christian Enemark</bold>
is Lecturer in Security Studies at the Centre for International Security Studies, University of Sydney, Australia. He specialises in non-traditional, multidisciplinary approaches to international security. His particular interests include the security significance of health threats and the ethics of armed conflict. He is the author of
<italic>Disease and Security: Natural Plagues and Biological Weapons in East Asia</italic>
(Routledge, 2007).</p>
</bio>
<bio id="bio7">
<p>
<bold>Emma Hutchison</bold>
is a Doctoral Candidate and Tutor in International Relations at the University of Queensland, Australia. Her research focuses on photography and trauma in world politics.</p>
</bio>
<bio id="bio8">
<p>
<bold>Katrina Lee-Koo</bold>
is Lecturer in International Relations at the Australian National University. Her research interests include Critical Security Studies, Feminist International Politics and the Gendered Politics of War. She has published articles in the
<italic>International Feminist Journal of Politics</italic>
and
<italic>Australian Journal of Political Science.</italic>
</p>
</bio>
<bio id="bio9">
<p>
<bold>Cian O’Driscoll</bold>
is Lecturer in International Relations at the University of Glasgow, UK. His research focuses on the Just War tradition and the ethics of contemporary war and he has published articles in the
<italic>Cambridge Review of International Affairs</italic>
and
<italic>International Relations.</italic>
</p>
</bio>
<bio id="bio10">
<p>
<bold>J. C. Sharman</bold>
is an Associate Professor and QE2 Fellow at Griffith University, Australia, after earlier teaching at the University of Sydney, American University in Bulgaria and receiving his PhD from the University of Illinois at Urbana-Champaign. His research interests include the global financial regulation, tax havens and sovereignty, and his most recent book is
<italic>Havens in a Storm: The Struggle for Global Tax Regulation</italic>
(Cornell University Press).</p>
</bio>
<bio id="bio11">
<p>
<bold>Hugh Smith</bold>
is Professor of International Relations at the University of New South Wales/Australian Defence Academy. He is author of many books and articles on military affairs, from conscientious objection to nuclear strategy. His most recent book is
<italic>On Clausewitz: A Study of Military and Political Ideas</italic>
(Palgrave, 2005).</p>
</bio>
<bio id="bio12">
<p>
<bold>Paul D. Williams</bold>
is Associate Professor in International Security at the University of Warwick, UK and Visiting Associate Professor of International Affairs at the Elliott School of International Affairs, George Washington University, USA. He is the author of
<italic>British Foreign Policy under New Labour, 1997–2005</italic>
(Palgrave-Macmillan, 2005), co-author of
<italic>Understanding Peacekeeping</italic>
(Polity, 2004), and co-editor of
<italic>Africa in International Politics</italic>
(Routledge, 2004) and
<italic>Peace Operations and Global Order</italic>
(Routledge, 2005).</p>
</bio>
</book-front>
<body>
<book-part book-part-type="chapter" id="intro">
<book-part-meta>
<title-group>
<title>
<xref id="page_1" ref-type="page"></xref>
Introduction</title>
<alt-title alt-title-type="running-head-verso">Introduction</alt-title>
<alt-title alt-title-type="running-head-recto">Alex J. Bellamy and Roland Bleiker</alt-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<given-names>Alex J.</given-names>
<surname>Bellamy</surname>
</name>
</contrib>
<contrib contrib-type="author">
<name>
<given-names>Roland</given-names>
<surname>Bleiker</surname>
</name>
</contrib>
</contrib-group>
</book-part-meta>
<body>
<p>The purpose of this volume is to offer a critical but practically relevant engagement with security issues that are central to dealing with the threat of terrorism. We advance four propositions: that the September 11 attacks challenged core Western beliefs about the theory and practice of security, that America and its allies responded with a strategy underpinned by old and discredited ways of pursuing security, that this strategy has failed, but that alternatives are possible. These are not radical propositions. Indeed, they are propositions broadly shared by American and British voters, as demonstrated by the 2006 American elections and the dwindling support for Prime Minister Tony Blair. The chapters that follow examine these propositions in detail. All offer, in one way or another, viable alternatives to the present culture of insecurity.</p>
<p>The terrorist attacks of 11 September 2001 marked a key turning point in international politics. Arguing so has, of course, become somewhat of a truism. But it is nevertheless useful and important to investigate what exactly made 9/11 such an important event. The significance of 9/11 is not located in the immense loss of life that accompanied it. Catastrophic as it is, the 3,500 casualties are dwarfed when compared to the 2 million deaths caused by the civil war in the Democratic Republic of Congo (DRC), the 250,000 civilians killed by government backed militia in Darfur, and the approximately 40,000 children who die
<italic>every day</italic>
in the developing world as a result of poverty and preventable illness. Even as a single act of barbarity, 9/11 was not especially unique or devastating – its casualty rate is less than half the number of Europeans murdered after the fall of Srebrenica in 1995. Yet, it is 9/11, not ‘Srebrenica’, ‘Darfur’ or ‘Congo’ that is singled out as the epoch defining moment.</p>
<p>One could argue that the significance of 9/11 lies in its global dimension: that the attacks on New York and Washington highlight the emergence and rapid spread of a world-wide Islamist threat. This is certainly how both the Bush administration and many security analysts have presented the issues at stake. Indeed, the epithet
<italic>‘global</italic>
war on terror’ suggests that Islamic terrorism is a threat to us all. But to advance such an argument is to make the very mistake that E. H. Carr (
<xref ref-type="bibr" rid="ref104">1946</xref>
) identified with idealist approaches in the wake of First World War: assuming that what threatens ‘us’ also threatens the whole world.</p>
<p>
<xref id="page_2" ref-type="page"></xref>
The threat of terrorism is neither new nor inherently global. For the great majority of the world’s people, neither terrorism nor Islamism are major threats. When UN Secretary-General Kofi Annan toured Africa in 2004 he commented that not one African leader counted terrorism among the threats confronting that region, a perception certainly borne out by the casualty figures mentioned earlier. South America and Northeast Asia too stand out as regions of the globe in which Islamic terrorism poses no significant threat. In other regions, such as in Russia’s ‘near abroad’, the Middle East and Southeast Asia, the threat was manifest, evident and preoccupying governments and security analysts well before 9/11. Indeed, Russia, Israel, Thailand, the Philippines and Indonesia were all confronting various versions of Islamist terrorism prior to 9/11. The respective governments have been conducting their own wars on terror, but without presenting their policy objectives in global terms.</p>
<p>September 11 is significant, and of global importance, only because it fundamentally disrupted the sense of security that prevailed in Western states. The attacks cast doubt on the efficacy and legitimacy of both the actors responsible for providing security and the political institutions that had been established for this purpose. Individuals, living in seemingly stable and safe Western countries, all of a sudden found themselves confronted with the agonies of war and mass killing. This is why for a significant number of scholars, analysts and commentators of different political orientations, 9/11 stands out as a fundamental breach of security and, in turn, of the underlying ideas and strategies.</p>
<p>Terrorism today represents a different type of threat, one that cannot easily be anticipated or prevented through prevailing state-based structures of security alone. The danger stems not from another state, but from a non-state actor, and one that cannot be precisely defined and located. The surprise attack itself revealed a fundamental weakness in the state’s intelligence apparatus, as did the subsequent failure to accurately identify the status of Iraq’s alleged program for weapons of mass destruction. The same is the case with the inability to read the warnings that preceded the Bali bombing or to predict and prevent North Korea’s nuclear test.</p>
<p>The attacks of 9/11 were not only catastrophic and barbaric, but also unforeseen. They were perpetuated by enemies not readily connected with America’s strategic foes in Baghdad, Tehran, Pyongyang and Beijing. As it was with the end of the Cold War, leading security analysts failed catastrophically to predict or even understand the emerging threat. Box-cutters rather than conventional military equipment were the decisive instruments in turning civilian aircraft into weapons. The attack was asymmetrical insofar as it did not actually involve opposing armed forces. And the attack was not directed at a battlefield or military target: it struck at the very heart of America’s economic and civilian life. As such, 9/11 violated deeply held beliefs about the proper way to fight wars. The starting point for understanding the significance of 9/11 therefore lies in the dissonance it created in relation to the way that Western states think about and pursue security.</p>
<p>The events of 9/11 have created a fundamental paradox in the way we think about and pursue security. But while security threats have changed significantly, our means of understanding and responding to them have remained largely
<xref id="page_3" ref-type="page"></xref>
unchanged. America’s response to 9/11 was characterised by a return to dualistic and militaristic thinking patterns that dominated foreign policy during the Cold War. Once again the world is divided into ‘good’ and ‘evil’, forcing smaller states to take positions even if they are not affected by related threats. Once again, military means are seen as the best – if not only – way of protecting the West from an external threat. This has the unwelcome effect of representing the wars of response and the numerous other uses of force – from Afghanistan and Iraq, to Yemen and Somalia – as moral crusades, obscuring deeper understandings of the threat and evoking the atavistic logic of religious war. Such an approach may make sense in the context of the shock that followed 9/11, but it creates more difficulties than it solves. The rhetoric of ‘evil madmen’, one commentator stresses, ‘advances neither understanding of [terrorist] horror nor, for that matter, the capacity to combat or prevent it’ (
<xref ref-type="bibr" rid="ref179">Euben 2002</xref>
: 4). Even senior military commanders now question the usefulness of the wars of response, admitting that ‘defeating terrorism is more difficult and far-reaching than we have assumed’ (
<xref ref-type="bibr" rid="ref120">Clark 2004</xref>
).</p>
<p>There are a number of serious strategic and moral dangers associated with the prevailing realist response to 9/11, which relies primarily on military means and divides the world into ‘good and evil’. First, by disregarding standards of behaviour that have taken decades if not centuries to evolve, the US risks undermining the rule governed international order and the practical efficacy of moral and legal constraints on international behaviour. As the world’s sole remaining superpower, the US should have a vested interest in preserving at least some aspect of the prevailing international order. The power of constraints associated with rules derives from their incorporation into customary practice. But the restraints on war can only be effective if state leaders, military commanders and individual soldiers attempt to heed them as far as possible. Restraint evaporates when powerful actors choose to overlook them in the name of strategic necessity. The consequences can be fateful, as illustrated by several historical examples: in the fifth century BC, for instance, the Athenian decision to break the customs of war for strategic purposes led to the complete erosion of those customs to the long-term detriment of both the Athenian empire and Greek civilisation as a whole. War between the Greek city states became more violent. Military strategies aimed at undermining the enemy’s social cohesion. Eventually, Greek international society seriously eroded from within to the point that it was eventually destroyed by Persian and Roman forces (
<xref ref-type="bibr" rid="ref397">Ober 1994</xref>
).</p>
<p>The second problem with the realist response to terrorism, closely related to the first, is that rule-breaking and unjust behaviour in the name of strategic necessity will encourage adversaries to use similar tactics. This, in turn, leaves no common moral ground to evaluate the justness of delicate political actions, such as possible humanitarian interventions into the internal affairs of another state.</p>
<p>Using unjust means, even if it is to pursue just ends, not only erodes the moral fabric of a democratic society but also provides radical terrorist movements, whether they are based in Islamic, Christian or any other religion, with a welcome opportunity to recruit disenchanted individuals. As Paul Williams argues in his
<xref id="page_4" ref-type="page"></xref>
contribution to this book, the most likely way of defeating Al Qaeda is through policies designed to alienate it from its potential pools of support. Far from isolating Al Qaeda, the wars of response have encouraged a new wave of volunteers to the organisation. To put it bluntly, whatever the merits of the 2003 invasion, Iraq is today on the frontline in the war on terror because America and its allies put it there. Every time the US and its allies are seen to be acting illegitimately, they play into the hands of terrorist recruiters.</p>
<p>This brings us to the third objection: conducting ourselves in an unjust fashion will make it more difficult to negotiate a just end to the war and build a selfsustaining peace afterwards. As St Augustine argued in the fifth century, the principle of right intention demands that war may only be waged to serve the cause of peace, not for riches or glory. Thus, Augustine advised (
<xref ref-type="bibr" rid="ref25">2001</xref>
: 214–8): ‘be peaceful, therefore, in warring, so that you may vanquish those whom you war against, and bring them to the prosperity of peace’. So, as James Turner Johnson points out (
<xref ref-type="bibr" rid="ref284">1999</xref>
: 158), we should conduct ourselves justly in war because that is the only way we can secure a lasting and genuine peace. Violence, even if committed in a just cause, inevitably creates wounds which come to haunt a society for decades. Historical evidence also reveals that ‘terrorism’ cannot be defeated by killing all the terrorists. Consider how Germany’s ‘unconditional surrender’ in 1945 required extensive negotiation. And even at that point Germany still had two million men under arms and no shortage of tanks and equipment. Although beaten, the German army could have continued a protracted and deadly insurgency.</p>
<p>The final problem is that describing a variety of different violent actions as all comprising a ‘war against terror’ may undermine the initially just cause of punishing those responsible for 9/11 and of preventing further atrocities. The dangers are particularly evident when it comes to the type of abuses that had already troubled early international jurists, such as Vattel. Using the ‘war against terrorism’ to justify the invasion of Iraq, despite the lack of any clear link between the Iraqi regime and anti-American terrorism, is an example of the inherent danger of defining the war on terror too broadly. Whatever the merits and problems with America’s Iraq policy, it is reasonably clear that George W. Bush’s claim to Congress that this particular war comprised a further element of the fight against terrorism was flawed. There are two principal problems with this strategy of lumping many different policies together under the rubric of the ‘war on terror’. On the one hand, it undermines the legitimacy of perfectly reasonable measures against Islamist terrorism. If war is only justified when it is perpetrated against wrongdoers and intended to further the cause of peace, a ‘war on terrorism’ becomes less legitimate if it is directed against a state that has, despite its many other wrongs, not aided and abetted terrorist attacks on the US. Thus, justifying the war in Iraq as part of the war against terrorism casts doubt upon the legitimacy of the latter. It also erodes the international support and cooperation necessary for the successful establishment of a more secure and peaceful international order. On the other hand, waging war against terrorism presents an opportunity for a variety of actors to justify acts as legitimate and necessary which would
<xref id="page_5" ref-type="page"></xref>
otherwise be deemed unjust. The most explicit, but far from only, example here is the suspension of individual rights, even the use of torture, in the effort to collect information that is vital for the prosecution of the war against terror. As with the more general problem of rule-breaking mentioned above, such acts not only erode the very moral base of a democratic society but also offer opponents of such a society with a welcome opportunity to rally disenchanted individuals around radical terrorist motives.</p>
<p>In sum: the significance of 9/11 lies in the challenge it poses to prevailing ideas and practices of security. But rather than critically evaluating and rethinking those practices, the US government and its allies chose to revive the mentality of the Cold War through the shorthand of ‘us’ versus ‘them’ and the belief, supported by no concrete evidence, that the key to removing the threat sits with the military. More than five years on it is evident that this approach has failed in its headline goal: there is much more Islamist terrorism today than five years ago. To be sure, Al Qaeda has not attacked America since 9/11. We can draw little comfort from this however, because Al Qaeda has no need to attack America itself – there are enough American targets and Al Qaeda volunteers in Iraq.</p>
<p>To argue for a critical investigation into prevailing practices of security is not to say that Western policies
<italic>caused</italic>
Islamist terrorism. It is merely to observe an empirical fact: that since key Western states have initiated the war on terror the number of terror attacks have increased whilst the list of allies and friends has dwindled. We are also not saying that Western governments manufactured the threat of terrorism for their own purposes. Nor even are we saying that there is no place for the military in the suppression of terrorism, indeed there are arguments for pre-emptive self-defence and robust policing of terrorist financing in this volume. What we are saying is that 9/11 constituted a challenge to the way we think about and pursue security and that the way we respond to that challenge will partly determine whether the horror of 9/11 is repeated. Prevailing policy approaches have failed to recognise that the significance of 9/11 goes far beyond a mere breach of state-based security, which is dramatic but can still be understood through existing conceptual means. The terrorist attacks also engendered a more fundamental breach in human understanding, which remains largely ignored by security experts. September 11 displays all the features that Susan Neiman (
<xref ref-type="bibr" rid="ref385">2003</xref>
) identified as key elements of major socio-political turning points: moments in history when certain events defy ‘human capabilities for understanding’ and trigger a ‘collapse of the most basic trust in the world’.</p>
<p>The contributors to this volume open up important interdisciplinary conversations between hitherto underexploited strategic, economic, ethical and legal approaches. Linking these fields of inquiry offers crucial and practically relevant opportunities to rethink how states can best respond to terrorist threats. In so doing, we recognise a fundamental issue related to terrorism: while major crises initially tend to reinforce old ways of thinking and behaviour patterns, they also allow societies to confront and overcome entrenched habits, thereby creating the foundations for a new, perhaps more peaceful, future. Major traumas have indeed always played a major role in redefining political communities (
<xref ref-type="bibr" rid="ref170">Edkins 2003</xref>
).</p>
<p>
<xref id="page_6" ref-type="page"></xref>
Questioning the key assumptions that guide security thinking should therefore be an essential element of coming to terms with 9/11 and preventing repeats in the future. And it should entail fundamental discussions about the nature and meaning of security in a rapidly changing world – discussions that include the use of a range of hitherto neglected sources of insight, such as those between political, economic, legal and ethical factors that the present book explores.</p>
</body>
</book-part>
<book-part book-part-type="part" book-part-number="I" id="partI">
<book-part-meta>
<title-group>
<title>
<xref id="page_7" ref-type="page"></xref>
Security and terrorism
<xref id="page_8" ref-type="page"></xref>
</title>
</title-group>
</book-part-meta>
<body>
<book-part book-part-type="chapter" book-part-number="1" id="chapter1">
<book-part-meta>
<title-group>
<title>
<xref id="page_9" ref-type="page"></xref>
Security studies, 9/11 and the long war</title>
<alt-title alt-title-type="running-head-verso">Security studies, 9/11 and the long war</alt-title>
<alt-title alt-title-type="running-head-recto">Paul D. Williams</alt-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<given-names>Paul D.</given-names>
<surname>Williams</surname>
</name>
</contrib>
</contrib-group>
</book-part-meta>
<body>
<p>What is security and how should it be studied? For some analysts, security is an essentially contested concept (
<xref ref-type="bibr" rid="ref92">Buzan 1991</xref>
). Yet a majority adopt a working definition of security as the alleviation of threats to acquired values. Of course, different individuals and groups will hold different (perhaps conflicting) values, define threats in various ways, and argue about how those threats can best be alleviated. Thus while there is agreement that security is an important value, there is no agreement as to what it entails and how important it is relative to other values such as order or justice. In short, world politics contains many, often competing, security agendas (for useful overviews see
<xref ref-type="bibr" rid="ref467">Sheehan 2005</xref>
;
<xref ref-type="bibr" rid="ref485">S Smith 2005</xref>
;
<xref ref-type="bibr" rid="ref145">Dannreuther 2007</xref>
;
<xref ref-type="bibr" rid="ref186">Fierke 2007</xref>
).</p>
<p>That the members of international society conceive of multiple security agendas was made abundantly clear by the Report of the UN Secretary-General’s High Level Panel on Threats, Challenges, and Change,
<italic>A More Secure World.</italic>
This identified six clusters of threats exercising the world’s states (
<xref ref-type="bibr" rid="ref516">UN High Level Panel 2004</xref>
: 2):</p>
<list list-type="unorder">
<list-item>
<p>Economic and social threats, including poverty, infectious disease and environmental degradation.</p>
</list-item>
<list-item>
<p>Inter-State conflict.</p>
</list-item>
<list-item>
<p>Internal conflict, including civil war, genocide and other large-scale atrocities.</p>
</list-item>
<list-item>
<p>Nuclear, radiological, chemical and biological weapons.</p>
</list-item>
<list-item>
<p>Terrorism.</p>
</list-item>
<list-item>
<p>Transnational organized crime.</p>
</list-item>
</list>
<p>In terms of the number of human lives lost, the first three clusters of threats have accounted for the vast majority. And yet the members of the United Nations (UN) accord them very different levels of priority. As a result, the UN faces the impossible task of trying to devise collective security policies without collective agreement on either the priority of the threats or the most appropriate way to overcome them. The task for analysts of international security is thus to gain a clear understanding of these multiple security agendas, to figure out the
<xref id="page_10" ref-type="page"></xref>
interrelationships between them, and to help resolve disagreements in situations where they clash.</p>
<p>The task for this chapter, however, is much more limited: to analyse how the events now known simply as 9/11 have shaped the international security terrain. The short answer is that the subsequent US-led ‘global war on terrorism’ (GWoT) has dominated the international agenda. This has had two important, largely negative consequences. First, it has revitalized the fortunes of political realism as a philosophy for theorizing security and given the upper hand in policy debates to those who think of security as being based on the ability to exercise (usually military) power against and over one’s rivals (for a damning critique of the realist mentality and agenda see Booth forthcoming). Second, it has pushed to the sidelines a wide range of other important security challenges, notably the struggles to promote human rights, environmental sustainability, and humane governance. Fundamentally, security studies after 9/11 needs to grapple with roughly the same wide range of issues that were apparent well before 9/11 but it needs to do so without succumbing to realist dogma and naïve, Manichean narratives that see world politics in simplistic terms as a struggle between the good and the evil. In spite of all the hype, 9/11 did not fundamentally alter the primary structures or dynamics of world politics. In this sense, the assault on America was not akin to a political earthquake that fundamentally altered international tectonics. Rather, it was more like a bolt of lightning that emerged from an already stormy atmosphere and illuminated the contours of a political landscape that was previously shrouded in darkness. From that point on, Western, especially US, decision-makers saw world politics in a different, more sinister light. It is this mental shift in Western threat assessments that represents 9/11’s biggest impact. Its legacy will be the way in which this new mind-set shapes Western responses to the world’s major security challenges for some time to come.</p>
<p>Understood in this sense, the GWoT shares several characteristics with a black hole. First, it is difficult to see the inner-workings of a black hole because it is so dense that even light has difficulty escaping from it. Much the same can be said about the secretive mechanisms and directives driving the GWoT. This is a war that has been fought in the shadows and behind a veil of secrecy erected in the name of national security. Second, black holes absorb an enormous amount of energy. In both human and financial terms, the GWoT has also absorbed enormous quantities of resources; the final cost of US involvement in Iraq alone is estimated to be as high as $2 trillion, with Washington currently spending about $8 billion per month (
<xref ref-type="bibr" rid="ref267">Iraq Study Group 2006</xref>
: 32). More generally, since 9/11, the US government has consistently increased its military expenditure in order to fight its war on terror. By 2005 its military expenditure stood at $537 billion or 48 per cent of all global spending with no other single state accounting for more than 5 per cent (
<xref ref-type="bibr" rid="ref493">Stålenheim
<italic>et al.</italic>
2006</xref>
). This raises the crucial question of whether transferring some of this money to projects addressing non-military challenges and developing non-military solutions would not save more lives and enhance global security. Third, black holes exert a gravitational pull on anything that strays within their reach. By influencing the way in which a range of issues
<xref id="page_11" ref-type="page"></xref>
and challenges are approached, the GWoT has had precisely this distorting effect on international relations. Perhaps most notably, it has skewed Western aid budgets towards recipients on the frontlines of the war on terror (
<xref ref-type="bibr" rid="ref555">Woods 2005</xref>
) and provided a wide range of authoritarian governments with an excuse to curtail civil liberties and dismiss domestic opponents as terrorists. In the rest of this chapter I provide an overview of how this long war emerged, how it is being fought, and how at least one part of it might be brought to an end.</p>
<sec id="sec1_1">
<title>The Bush doctrine and the global war on terrorism</title>
<p>For the US government at least, 9/11 heralded the start of its GWoT. For America’s primary opponents, the clandestine al-Qa’ida network, the war against its ‘far enemy’ had started much earlier, as evidenced by earlier strikes against the World Trade Center (1993), the US embassies in Kenya and Tanzania (1998), and the USS
<italic>Cole</italic>
(2000).</p>
<p>As noted above, the main consequence of 9/11 for international relations was the change it induced in the mindset of the US government and its allies. In particular, 9/11 did three things. First, it significantly lowered the level of threat that Washington was prepared to accept without engaging in an active response. This, in turn, encouraged a more widespread preference among Western governments for pursuing policies involving (often military) action rather than restraint (see
<xref ref-type="bibr" rid="ref29">Bailes 2006</xref>
: 14–17). Second, 9/11 highlighted the vulnerability of Western cities to the nightmare scenario of an al-Qa’ida cell armed with weapons of mass destruction (WMD). As President George W. Bush put it in the preface to the 2002 National Security Strategy, ‘The gravest danger our Nation faces lies at the crossroads of radicalism and technology’ (
<xref ref-type="bibr" rid="ref380">NSC 2002</xref>
). Third, 9/11 reinforced the argument that the US and its allies were facing a new type of enemy: a globalized network of insurgents who ignored the laws of war and revelled in trying to cause as much fear and carnage as possible.</p>
<p>These effects led quickly to a rethinking of US grand strategy and the emergence of what became known as the Bush doctrine. This was codified in the 2002 US National Security Strategy. At its core were the three concepts of unilateralism (if necessary), pre-emption (when required) and pre-eminence (forever?). The first – the idea that the US did not need an international ‘permission slip’ to engage in action to protect its vital national security interests – was a familiar feature of US foreign policy. The second was more controversial. After 9/11, a right to engage in pre-emptive self-defence – a last-minute reaction to a threatening process already underway – had a strong if not uncontested basis in international law. The trouble was that especially after spring 2002, the Bush administration’s notion of pre-emption began to look far more like prevention – action taken to prevent a hypothetical future scenario from occurring – which was clearly illegal in international law (see
<xref ref-type="bibr" rid="ref95">Byers 2002</xref>
;
<xref ref-type="bibr" rid="ref224">Greenwood 2003</xref>
). The third concept of pre-eminence, especially with regard to US military power, was unremarkable as a statement of fact: the US was clearly the world’s pre-eminent actor. But as a political aspiration that the US would work to maintain this state of affairs
<xref id="page_12" ref-type="page"></xref>
indefinitely, employing military force as it saw fit, it was difficult to interpret this as anything other than an offensive stance. The net effect of the Bush doctrine was to signal to the rest of the world that America would not be bound by international norms, conventions and institutions that it perceived as being contrary to its best interests (
<xref ref-type="bibr" rid="ref138">Daalder and Lindsay 2003</xref>
). This even included the Bush administration declining NATO’s offer of military assistance to conduct Operation Enduring Freedom in Afghanistan.</p>
<p>The Bush doctrine was not concerned solely with the war on terrorism but it did receive pride of place as debates about other issues such as the growing power of states like China and India as well as the ‘responsibility to protect’ agenda were pushed out of the spotlight. The central debate revolved around whether the GWoT had the potential to become the Third World War (
<xref ref-type="bibr" rid="ref194">Freedman 2001/2</xref>
) or whether as an act of securitization it could become successfully embedded as the new Cold War (
<xref ref-type="bibr" rid="ref93">Buzan 2006</xref>
). Buzan concluded that this was unlikely to happen, not least because the GWoT is not representative of US grand strategy as a whole; al-Qa’ida does not pose a strategic challenge to Western states nor does it offer a viable political alternative to liberal democracy in the way that communism did; the means being used to pursue the GWoT are eroding the core things they are meant to be defending (liberal values and Western unity); and because the Bush administration has lost a good deal of its legitimacy to act as a securitization leader within international society. Finally, the strategy of presenting the invasion of Iraq as a crucial part of the GWoT has backfired inasmuch as it has convinced many people that the GWoT is doing more harm than good.</p>
<p>There were other reasons why the GWoT slogan was problematic. First and foremost, waging war is best done with a clear understanding of the enemy. In this case, however, the enemy was defined as ‘terrorism’, which effectively meant that war was being waged on a tactic. The implication that the use of terror tactics was indicative of some kind of political alliance between its proponents did not hold up to scrutiny (
<xref ref-type="bibr" rid="ref32">Barkawi 2006</xref>
: 154).</p>
<p>Many Westerners also considered the declaration of war unwise because it elevated the status of criminal activities (the 9/11 attacks were clearly illegal under both US and international law). This, in turn, gave their perpetrators an unwarranted degree of dignity and political status. Yet while many Westerners were uncomfortable thinking of 9/11 as an act of war, al-Qa’ida had clearly seen itself as being at war with its ‘far enemy’ for many years. Unsurprisingly, given America’s conventional military dominance it sought to exploit asymmetric methods of warfare by using the trappings of industrialized society – in this case jet airliners – as weapons of war (see
<xref ref-type="bibr" rid="ref31">Barkawi 2004</xref>
). Consequently, as Freedman (
<xref ref-type="bibr" rid="ref195">2002</xref>
: 45) suggested, ‘after an attack on such a scale, mounted by a political entity based in a distant country, war was not a matter of choice but a strategic imperative’. It was thus arguably necessary for Western governments to engage in a war against al-Qa’ida. It did not follow, however, that it was sensible to engage in a war against terrorism in general.</p>
<p>A third problem was that as a label, GWoT was inaccurate. Most obviously, the US and its allies were preoccupied with ending terrorism against their own
<xref id="page_13" ref-type="page"></xref>
interests rather than terrorism in general. Moreover, the terrorist label was applied selectively with most governments defining terrorism as synonymous with the activities of non-state actors. States became targets in the ‘war’ only when they harboured and/or supported (non-state, anti-Western) terrorists. This ignored the fact that terrorism by states continues to dwarf that conducted by non-state groups. Rather predictably, therefore, the GWoT quickly attracted some unsavoury allies who saw the instrumental value in signing up to the Bush administration’s discourse in order to criminalize their domestic opponents.</p>
<p>Another effect of declaring a ‘war on terrorism’ was that the objectives were often cast in terms of military victory rather than in terms of law enforcement and the successful prosecution of the perpetrators (
<xref ref-type="bibr" rid="ref252">Howard 2002</xref>
). Not only did this ignore the fact that most counter-terrorism is performed by the police and intelligence services rather than the military but it also glossed over the impossibility of determining when the last act of terrorism had taken place. A war on terrorism was thus a war without end since victory could never be permanently verified.</p>
<p>Finally, waging war has effects at home as well as abroad. In wartime the official gloves often come off and governments find it easier to engage in activities that are proscribed in times of peace. In this case, numerous governments have been embroiled in debates about curtailing civil liberties in the name of state security and several have looked for ways to bypass the rights of those they suspect of being implicated in terrorism. In addition, the GWoT has seen a centralization of power within many governments and a willingness to shelve diplomacy before it has been exhausted in favour of more militaristic policies. It has also seen emphasis placed on capturing and killing individual terrorists rather than addressing the political conditions that encourage them to join extremist movements in the first place.</p>
<p>For all these reasons, the GWoT slogan was unhelpful. Arguably a more sensible and accurate descriptor would have been to declare that the US and its allies were engaged in an ‘international campaign against al-Qa’ida’. Perhaps in recognition of some of these criticisms, by early 2006 it was clear that Washington had decided to shift its language: out went the GWoT and in came the notion that the US was engaged in the opening phases of a ‘long war’.</p>
</sec>
<sec id="sec1_2">
<title>Fighting the long war</title>
<p>By the time the Bush administration published its second Quadrennial Defense Review (QDR) in February 2006, it was clear the ‘long war’ analogy had become the slogan of choice. This war centred on combating al-Qa’ida and promoting liberal market democracy around the world. The QDR was presented as providing ‘a roadmap for change, leading to victory’ in the long war (
<xref ref-type="bibr" rid="ref520">United States Department of Defense 2006a</xref>
: ix). Yet it continued Rumsfeld’s project of transforming the US military in order to generate more combat capability with fewer numbers of weapons platforms and lower levels of manning. This was considered vital in the new strategic environment characterized by uncertainty and surprise, and where
<xref id="page_14" ref-type="page"></xref>
the US military needed ‘the ability to surge quickly to trouble spots across the globe’ (
<xref ref-type="bibr" rid="ref520">United States Department of Defense 2006a</xref>
: v).</p>
<p>The QDR identified four priorities in the long war: defeating terrorist networks; defending the homeland; shaping the choices of countries at strategic crossroads; and preventing hostile states and non-state actors from acquiring or using WMD. Here, I will focus on the central international dimensions of the long war, namely, the struggle against al-Qa’ida; reconstructing Afghanistan and Iraq; and preventing the proliferation of WMD.</p>
<sec id="sec1_2_1">
<title>Defeating al-Qa’ida</title>
<p>As the QDR made clear, ‘The enemies in this war are not traditional conventional military forces but rather dispersed, global terrorist networks that exploit Islam to advance radical political aims’ (
<xref ref-type="bibr" rid="ref520">United States Department of Defense 2006a</xref>
: 1). Public enemy No.1 was al-Qa’ida (The Foundation), which according to Washington operated in over 80 countries (
<xref ref-type="bibr" rid="ref520">United States Department of Defense 2006a</xref>
: 21). Al-Qa’ida had been forged in the crucible of Afghanistan’s wars but was first and foremost a movement that developed around Arab Sunni radicals with the primary purpose of assuming power in the Arab states, especially Saudi Arabia (
<xref ref-type="bibr" rid="ref231">Halliday 2005</xref>
: 154–5). In this sense, it is important to recall that despite much of the rhetoric (from Western governments and the movements themselves) describing international terrorism as a global phenomenon, in many respects ‘Islamist movements were primarily caused by, and directed at, conditions
<italic>within</italic>
their own societies’ (
<xref ref-type="bibr" rid="ref231">Halliday 2005</xref>
: 158). This is not to deny al-Qa’ida’s evident desire to kill infidels wherever they might be found, but merely to point out the regionally specific origins and primary goals of America’s principal enemy. This is important to bear in mind when searching for ways to bring the long war to an end.</p>
<p>In organizational terms, al-Qa’ida is distinct from most other terrorist organizations in four main respects (
<xref ref-type="bibr" rid="ref136">Cronin 2006</xref>
: 32–9). First, its organizational form is fluid. Since the 9/11 attacks it has come to be thought of as representing both a global jihadist movement consisting of
<italic>ad hoc</italic>
cells linked together via the virtual sanctuary of the internet as well as a label for a broader umbrella group of independent entities that share some ideological assumptions and are willing to cooperate over certain issues. Second, al-Qa’ida’s method of recruitment is distinct from its predecessors. In this respect it is more akin to a social movement than a terrorist organization, often attracting followers to join its ranks voluntarily rather than recruiting them into service. Nevertheless, as Cronin notes, exposure to al-Qa’ida’s ideology alone has not been sufficient to attract recruits – as its failure to attract many members in either Sudan or Afghanistan suggests. Rather, evidence from al-Qa’ida’s operatives suggests that links of friendship and kinship facilitated by a ‘bridging person’ have been crucial. This method of recruitment has worked particularly well in the Maghreb and Southeast Asia (
<xref ref-type="bibr" rid="ref136">Cronin 2006</xref>
: 35). Third, al-Qa’ida’s means of supporting its activities are novel in several respects. The relatively small amounts of money required to launch its attacks have come
<xref id="page_15" ref-type="page"></xref>
from diverse sources including charitable donations, petty crime and fraud. It has also extracted funds from a wide range of businesses related to the organization – at one point, Bin Laden was estimated to own around 80 companies world wide. Finally, al-Qa’ida has successfully harnessed the revolution in information technology to carry out its communication through such mechanisms as mobile phones, text messaging, instant messaging, e-mail, internet chat rooms and blogs. It has even managed to assemble its own virtual training manual; the so-called ‘The Encyclopedia of Jihad’.</p>
<p>To combat this enemy, the US government decided to increase its Special Operations Forces by 15 per cent and its Department of Psychological Operations and Civil Affairs by 33 per cent (
<xref ref-type="bibr" rid="ref520">United States Department of Defense 2006a</xref>
). It also stated that US forces would have to maintain a long-term, low-visibility presence in many areas of the world where the US does not traditionally operate (
<xref ref-type="bibr" rid="ref520">United States Department of Defense 2006a</xref>
: 23). Of particular concern was the potential for so-called ‘failed states’ to act as safe havens for this new type of enemy. This had been a central theme of US foreign policy since 9/11. For example, in its 2002 National Security Strategy, the US government stated it was ‘now threatened less by conquering states than … by failing ones’ (
<xref ref-type="bibr" rid="ref524">US 2002</xref>
: 1).</p>
<p>Beyond the obvious concern with Afghanistan, much of the focus fell upon Africa in general and its horn in particular. As a result, the US National Security Strategy published in March 2006 acknowledged that ‘our security depends upon partnering with Africans to strengthen fragile and failing states and bring ungoverned areas under the control of effective democracies’ (
<xref ref-type="bibr" rid="ref382">NSC 2006a</xref>
: 37). The problem with this approach is that there is not always a strong correlation between state failure and the proliferation of terrorist organizations, or indeed transnational security challenges more generally (see
<xref ref-type="bibr" rid="ref408">Patrick 2006</xref>
).</p>
<p>Arguably the archetypal case in point is Somalia: collapsed state par excellence and the focus of much US counter-terrorism activity since 9/11. However, Somalia has not become a major safe haven for terrorist organizations in spite of the ascendance of political Islam and the lack of effective government institutions. For one thing, until the middle of 2006, Islamic extremists struggled to gain ascendancy over more moderate Islamic voices within Somalia. For example, in 2005, US intelligence gathering in Somalia produced no evidence of al-Qa’ida bases or that Al Itihad Al Islamiya was operating as one of its subsidiaries (
<xref ref-type="bibr" rid="ref357">Menkhaus 2005</xref>
).</p>
<p>As Ken Menkhaus (
<xref ref-type="bibr" rid="ref357">2005</xref>
: 39–41) has persuasively argued, there are six main reasons that explain this state of affairs. First, terrorist cells and bases are much more exposed to international counter-terrorist action in zones of state collapse where US Special Forces could violate state sovereignty regularly and with impunity. The US airstrikes in January 2007 against al-Qa’ida suspects in Somalia are a case in point. Second, areas of state collapse tend to be inhospitable and dangerous, particularly for foreigners. Consequently, since few foreigners choose to reside in such environments, foreign terror cells will find it very difficult to blend into the local population and retain the degree of secrecy necessary to conduct their activities. A third factor is the double-edged nature of the lawlessness that accompanies
<xref id="page_16" ref-type="page"></xref>
situations of state collapse: while lawlessness reduces the risk of apprehension by law enforcement agencies, it increases the likelihood that terror cells will suffer from more common crimes such as kidnapping, extortion or assassination. As Menkhaus (
<xref ref-type="bibr" rid="ref357">2005</xref>
: 40) suggests, ‘it appears that lawlessness can inhibit rather than facilitate certain types of lawless behavior’. A fourth problem is that any terrorists would be susceptible to betrayal by Somalis looking to ingratiate themselves with the US authorities. Fifth, Somalia represents an environment in which it is very difficult to stay neutral and outside the inter-clan rivalries. Relatively mundane activities such as hiring personnel or renting buildings will inevitably be seen as evidence of taking sides and once this perception has been established the external actor in question becomes a legitimate target of reprisals by rival clans. Finally, the collapse of the Somali state has left it without the usual array of ‘soft’ Western targets such as embassies and businesses. As a result, Somalia is more likely to be used as a transit point for materiel than to act as a more permanent base for cells. Even terrorists, it would seem, require a degree of political order to conduct their activities. The ‘security paradox’ identified by Menkhaus (
<xref ref-type="bibr" rid="ref357">2005</xref>
: 45) is that at least in the short-term, attempts to resurrect effective state institutions in Somalia may create an environment that is more, not less, conducive to terrorist cells basing themselves in the country. It would appear that terrorist organizations prefer to operate out of weak states with corruptible personnel such as Kenya, Indonesia, Pakistan, the Philippines, and Yemen rather than collapsed states. The frontlines of the long war should be redrawn accordingly.</p>
</sec>
<sec id="sec1_2_2">
<title>Reconstructing Afghanistan and Iraq</title>
<p>As the opening battle in the long war, the failure of Operation Enduring Freedom and the International Security Assistance Force (ISAF) to stem the deterioration of the security environment in Afghanistan should be a major cause of concern for the US and its allies. In Afghanistan, the US opted to take the lead in defeating the Taliban and al-Qa’ida forces while leaving the task of nation-building to its allies. In both cases, a light footprint approach was chosen. In the former, what has become known as ‘the Afghan Model’ involved the US military and intelligence agencies relying upon local proxies (in this case the Northern Alliance) to topple the Taliban and its al-Qa’ida supporters without a large commitment of US ground troops (see
<xref ref-type="bibr" rid="ref15">Andres
<italic>et al.</italic>
2005/6</xref>
;
<xref ref-type="bibr" rid="ref53">Biddle 2005/6</xref>
). In the latter, a woefully small peace support operation was deployed to Kabul and its environs. Although nationbuilding was its ostensible aim, in reality ISAF was engaged in little more than city-building. Over time, it was incrementally extended into the rest of the country through the use of small Provincial Reconstruction Teams tasked with promoting local security sector reform and engaging in civic/humanitarian operations.</p>
<p>Not surprisingly, despite the holding of elections and the installation of Hamid Karzai’s government, by early 2006 the news coming out of Afghanistan was seldom good. As Seth Jones (
<xref ref-type="bibr" rid="ref290">2006</xref>
) observed, there were many indications that the security environment – the crucial precondition for effective nation-building – was deteriorating rapidly. First, insurgent attacks (by a combination of Taliban,
<xref id="page_17" ref-type="page"></xref>
Hezb-i-Islami, and foreign jihadists mainly from Pakistan, Uzbekistan and Tajikistan) had risen dramatically between 2002 and 2005. An additional trend was that more of these attacks were being targeted against Afghan civilians and NGO personnel rather than US and ISAF troops (a similar trend was also noticeable in Iraq, see
<xref ref-type="bibr" rid="ref295">Kaldor 2006</xref>
: 163). Second, local opinion polls suggested that although most Afghans considered the country to be heading in the right direction, they were deeply concerned about the security environment. Third, the international presence had failed to curb the power of warlords, despite some notable successes in ousting Herat Governor Ismail Khan and Kandahar Governor Gul Agha Shirzai. Fourth, the rising levels of opium production provided a huge source of revenue for a wide variety of non-state actors, all of which reduced the power of the central government. Finally, all efforts to build a viable criminal justice system had failed, not only because of the central government’s limited control over the hinterland but also because of endemic corruption within the officials that have been appointed.</p>
<p>As Jones (
<xref ref-type="bibr" rid="ref290">2006</xref>
: 119–23) pointed out, a winning formula for Afghanistan would need to be built on several pillars. First, the number and capability of international and Afghan troops and police needs increasing by some 80,000. Second, the outstanding insurgents and warlords need to be dealt with either by offering them incentives to participate in a genuinely national project of reconstruction or removing them by force. This task is greatly complicated by the absence of a peace agreement and Pakistan’s role as a staging post for the insurgents. Finally, a successful strategy of nation-building will require large amounts of time and money, at least US$3 billion per year, roughly double what the country has received in 2006. On the issue of time, the US decision to hand control of the volatile southern provinces to NATO, and the reluctance shown by many NATO members to contribute sufficient numbers of their troops to this operation have raised fears among Afghan leaders about the depth of international commitment to the country’s future. Afghanistan’s major problem in this regard was that since late 2002 it was overshadowed by events in the second major battlefield: Iraq.</p>
<p>In relation to Iraq, between April 2002 and November 2003 the Bush administration proposed four different solutions to the problem of how to reconstruct the country (
<xref ref-type="bibr" rid="ref158">Dodge 2006</xref>
). All of them revolved around different ways of encouraging Iraqis to rebuild their country in a liberal democratic mould. All of them were quickly jettisoned or failed to produce the desired results.</p>
<p>The first concerted plan, the
<italic>Future of Iraq Project,</italic>
was concocted by the State Department in conjunction with some 240 Iraqi exiles 11 months before the invasion. This was jettisoned even before the invasion got underway when in January 2003 Bush signed a National Security Directive which centralized responsibility for Iraq within the Pentagon. With the Pentagon running the invasion and its aftermath, the door was opened for the administration’s neo-conservatives, notably Donald Rumsfeld, Paul Wolfowitz and Douglas Feith to project what Dodge called ‘their own dogmatic dreams’ (2006: 160). They saw Iraq as a blank slate and a laboratory for the lightweight approach to state-building favoured by Rumsfeld and his transformed US military. At its core was the idea
<xref id="page_18" ref-type="page"></xref>
that a new exile-led Iraqi government could be installed and successfully grafted onto the remnants of the old regime within a matter of months. The Achilles heel of this vision was the tendency of its advocates to believe their own hype and to listen only to advice from their supporters, the most problematic of which turned out to be Ahmed Chalabi and Kanan Makiya. The fall guy was retired general Jay Garner, who Washington had summoned to direct operations in Iraq but was quickly sacked when things failed to turn out as planned.</p>
<p>The third approach unfolded under Paul Bremmer’s direction from mid-May 2003. After it had become clear that the Iraqi state had collapsed following a period of lawlessness and looting, Bremmer suggested that the US would have to engage in a longer-term project of nation building whether it liked it or not. While Bremmer’s diagnosis was more accurate than the previous neo-conservative version, he presided over several crucial mistakes. The first was the decision not to form an interim Iraqi administration but to instead retain power within the Coalition Provisional Authority. This alienated the Iraqi exiles upon whom Washington had pinned many of its hopes. Second, Bremmer purged the civil service of senior Ba’ath Party members, making between 20,000 and 120,000 people unemployed at a time when restoring government services and meeting the basic needs of the local population was arguably the key issue on which the whole state-building enterprise rested. It also left Bremmer with a major headache: where to find an alternative, non-Ba’athist Iraqi elite that could run the institutions of government efficiently. Finally, the decision was taken to disband the Iraqi army. Although the Bush administration argued that the army simply disbanded itself, this decision was at odds with the recommendations of the
<italic>Future of Iraq Project</italic>
and Garner’s earlier efforts. Whatever motives lay behind this decision it made redundant some 400,000 armed and trained men, many of whom had initially elected not to fight the invaders, and gave them yet another grievance against the US-led coalition. It is now clear that some of them vented their frustration by engaging in attacks against coalition troops. The occupying coalition paid a heavy price for these decisions throughout the rest of 2003.</p>
<p>The fourth shift in policy came with the ‘November 15 agreement’. This sought to end the occupation in seven months and co-opt the former Iraqi exiles the US had brought into the country rather than support an alternative indigenous administrative and ruling elite. Like the other approaches, it proved largely unworkable.</p>
<p>Each of these policies suffered from problems common to all grand experiments in social engineering: they were overly abstract, pushed through too hastily, and lacked a sophisticated understanding of the society in question. In addition, Washington’s attempt to pursue a light footprint approach to state-building was based on a problematic understanding of the nature of military power and its application in counter-insurgency operations. The limitations of the US approach were exemplified in the tragic case of Operation Vigilant Justice in the town of Falluja in April 2004.</p>
<p>As Alice Hills (
<xref ref-type="bibr" rid="ref241">2006</xref>
) has argued, US military operations in Falluja highlighted the Bush administration’s tendency to think of power in possessional rather than
<xref id="page_19" ref-type="page"></xref>
relational terms. The former sees military power as an instrument to coerce and destroy enemy targets. The latter sees power as part of a relationship between different institutions and actors that together form systems of governance. Understanding the role of military power in building such systems of governance is crucial to the success of counter-insurgency operations where the goal is to mould the conduct and identity of the social networks concerned. According to Hills, the inability of the US operations to defeat the insurgency in Falluja can be explained with reference to three interrelated factors: the culture of the White House under President Bush, which simplified complex security problems to Manichean narratives between good and evil and suggested the use of military force provided the quickest and surest route to victory; the US military’s preference for muscular operations and its willingness to fix the identities of Falluja’s inhabitants as unflappable, anti-American insurgents before the siege began; and the ongoing transformation of the US military which emphasized rapid-dominance war fighting, that is, its ability to impose technological solutions at a distance and without having to rely on the painstaking process of gathering human intelligence. The resulting operation left over 600 (mainly civilian) dead and yet failed to stop the insurgency, which required another much larger US military assault seven months later. In sum, ‘Falluja revealed the Bush administration’s inaccurate assessment of the limitations of US military power in a politicized struggle in which the primary objective is control’ (
<xref ref-type="bibr" rid="ref241">Hills 2006</xref>
: 636). Control was also the key word when it came to the place of WMD in the long war.</p>
</sec>
<sec id="sec1_2_3">
<title>Preventing the proliferation of WMD</title>
<p>According to the QDR, ‘The principal objective of the United States is to prevent hostile states or non-state actors from acquiring WMD’ (
<xref ref-type="bibr" rid="ref520">United States Department of Defense 2006a</xref>
: 33). In spite of this, the US has continued and even enhanced partnerships with states in possession of nuclear weapons but outside the Nuclear Non-Proliferation Treaty, notably India, Israel and Pakistan. Since 9/11, the Bush administration’s primary counter-proliferation instruments have been an aggressive form of export control enforcement known as the Proliferation Security Initiative (PSI) and various attempts at coercive diplomacy aimed primarily at the ‘axis of evil’ states of Iraq, Iran and North Korea. According to the QDR, if the preventative dimension of its policies fail, the US must be prepared to engage in ‘WMD elimination operations’ which may involve the use of force (
<xref ref-type="bibr" rid="ref520">United States Department of Defense 2006a</xref>
: 34). Indeed, officials within the Bush administration have even hinted that in the case of Iran, Israel may strike the country on Washington’s behalf (
<xref ref-type="bibr" rid="ref445">Sagan 2006</xref>
: 54).</p>
<p>The Bush administration has made two central arguments as the basis for its non-proliferation strategy (
<xref ref-type="bibr" rid="ref369">Montgomery 2005</xref>
: 154–5). First, it has suggested that dense networks among second-tier proliferators such as Iran, North Korea and Libya, as well as private agents, exemplified by the A.Q. Khan network, have facilitated proliferation. As a result of this diffusion of knowledge and capabilities, global measures rather than policies tailored for individual states
<xref id="page_20" ref-type="page"></xref>
are needed to slow these processes. Second, it has argued that certain ‘rogue states’ are dead set on obtaining nuclear weapons programmes and thus have no interest in bargaining; what Scott Sagan (
<xref ref-type="bibr" rid="ref445">2006</xref>
) has called ‘proliferation fatalism’. North Korea’s apparent explosion of a nuclear device in October 2006 and Iran’s unwillingness to abide by various demands made upon it by the UN Security Council and the International Atomic Energy Agency have only enhanced this line of thinking within Washington.</p>
<p>As Sagan (
<xref ref-type="bibr" rid="ref445">2006</xref>
) has persuasively argued, the history of counter-proliferation suggests that it succeeds when the US and other actors satisfied the concerns that drove a state to pursue nuclear weapons in the first place. In Iran’s case, the motive appears to be avoiding attack, first from a hostile Iraqi regime, and since at least 2002 from the US, which signalled its desire to promote regime change and let Iran know that it was a potential target under Washington’s 2002 Nuclear Posture Review. Yet since the US lacks a viable military option that could guarantee the elimination of any Iranian WMD, all that remains is for the US and its allies to give Tehran sufficient reasons to relinquish its pursuit of nuclear weapons. At a minimum, Sagan concluded, this must involve the US relinquishing its threat of forcible regime change, and perhaps engaging in the sort of framework agreement devised between the US and North Korea in 1994. The fact that this framework collapsed should not be taken as a reason to abandon all diplomatic efforts in favour of pursuing a more rigorous coercive policy. Rather, its failure should serve as a warning about what to avoid next time around.</p>
<p>Of course, the proliferation conundrum is more complicated when factoring in the role of non-state actors like al-Qa’ida. Nevertheless, it seems highly unlikely that such organizations could build nuclear weapons themselves. Consequently, international efforts to monitor and restrict the activities of second-tier proliferators and private networks would seem to offer the most prudent course of action.</p>
</sec>
</sec>
<sec id="sec1_3">
<title>Ending the long war</title>
<p>As noted above, while a war waged against the tactic of terrorism is likely to be a war without end, the international campaign against al-Qa’ida will eventually end. As Audrey Kurth Cronin (
<xref ref-type="bibr" rid="ref136">2006</xref>
) has shown, previous research indicates that there are at least seven broad (and often interrelated) explanations for how non-state organizations employing terrorism decline or end:</p>
<list list-type="order">
<list-item>
<p>Capture or killing of the leader (e.g. Shining Path, Kurdistan Workers’ Party, Real Irish Republican Army).</p>
</list-item>
<list-item>
<p>Failure to transition to the next generation (e.g. Red Brigades, Weather Underground, Baader-Meinhof group).</p>
</list-item>
<list-item>
<p>Achievement of the group’s aims (e.g. Irgun/Stern Gang, African National Congress).</p>
</list-item>
<list-item>
<p>Transition to a legitimate political process (e.g. Provisional Irish Republican Army, Palestine Liberation Organization).</p>
</list-item>
<list-item>
<p>
<xref id="page_21" ref-type="page"></xref>
Undermining of popular support (e.g. Real Irish Republican Army, Basque Homeland and Freedom, Shining Path).</p>
</list-item>
<list-item>
<p>Repression (e.g. Kurdistan Workers’ Party, Shining Path, People’s Will).</p>
</list-item>
<list-item>
<p>Transition from terrorism to other forms of violence, notably criminality and/ or insurgency (e.g. Abu Sayyaf, Revolutionary Armed Forces of Colombia, Khmer Rouge, Communist Party of Nepal-Maoists).</p>
</list-item>
</list>
<p>‘The pressing challenge’, as Cronin suggests, ‘is to determine which lessons from the decline of earlier terrorist groups are relevant to al-Qaida and which are not’ (
<xref ref-type="bibr" rid="ref136">2006</xref>
: 39).</p>
<p>Given al-Qa’ida’s organizational characteristics, it will clearly not end if Osama bin Laden is captured or killed, not least because he has ensured that the organization has not become a personality cult by downplaying his own importance and emphasizing the insignificance of his own fate. Nor will al-Qa’ida fail because of its inability to convince future generations of the importance of its struggle. It has already transitioned from the type of organization based in Sudan and Afghanistan in the 1990s, and it is clearly operating with a long-term strategy that sketches the outlines of a global jihad but keeps the fine print details hazy enough to allow for numerous flexible and pragmatic interpretations. In this way, it has continued to attract sufficient numbers of volunteers as well as cooperation and support from independent actors engaged in more locally focused struggles of their own, for example, in Algeria, Chechnya, the Philippines and Pakistan/ Kashmir. As a consequence, al-Qa’ida’s objectives are constantly evolving and now include assuming power in the Arab states, establishing a transnational caliphate, overthrowing non-Islamic regimes, expelling or killing infidels in Muslim lands, and supporting the Palestinian struggle. This means that the organization is unlikely to achieve its aims as envisaged in strategy 3. Nor is it likely to transition into an actor content to work within a legitimate political process. Indeed, many analysts have pointed to the fact that al-Qa’ida does not appear to be an actor with whom negotiation is possible. Strategy 6, repression, also has limited utility when faced with an organization based on such virtual and disparate foundations as al-Qa’ida. Capturing or killing individual operatives, even senior figures, will do little more than temporarily disorient certain cells and provide the organization with mild public relations headaches at the broader, strategic level. At worst, a repressive strategy that accidentally kills innocent bystanders may fuel the organization’s propaganda and enlarge its pool of potential recruits.</p>
<p>This leaves strategies 5 and 7. As Cronin points out, to some extent, al-Qa’ida is already engaged in forms of criminality, especially related to narcotics trafficking. In that sense, the struggle to erode al-Qa’ida’s resources through policing and financial activities will be of critical importance given that as much as ‘95% of the important action in any campaign against terrorism consists of intelligence and police work’ (
<xref ref-type="bibr" rid="ref432">Roberts 2005</xref>
: 109). Given the ease with which goods and people can be moved through parts of the world beyond the control of governments – what the Pentagon refers to as ‘ungoverned spaces’ – and the way in which information
<xref id="page_22" ref-type="page"></xref>
technology has facilitated the transfer of remittances at the touch of a button, this will be an incredibly difficult task.</p>
<p>Moreover, al-Qa’ida may also have transmuted into a full-blown insurgency in certain parts of the world, most notably through the alliance negotiated between bin Laden and Abu Musah al-Zarqawi in Iraq and through its association with the Taliban in Afghanistan/Pakistan. In this sense, Iraq and Afghanistan have become the new focal points and training grounds for al-Qa’ida’s vision of conducting an insurgency on a global scale (see also
<xref ref-type="bibr" rid="ref347">MacKinlay 2002</xref>
). Given al-Qa’ida’s intimate relationship with the Taliban it was unsurprising that it should assume insurgent form in Afghanistan. Until autumn 2003, however, it was not at all clear that al-Qa’ida would direct much of its efforts towards Iraq; its focus instead falling upon Afghanistan, Pakistan and Saudi Arabia. The fact that one of the longest running caliphates – the Abbasid Caliphate, which lasted some 500 years from 749 CE – was centred on the city of Baghdad provided further ammunition for al-Qa’ida’s propaganda machine. As Paul Rogers (
<xref ref-type="bibr" rid="ref435">2006</xref>
: 74) put it, for al-Qa’ida ‘the foreign occupation of Iraq, the seat of the most distinguished caliphate in early Islamic history, is an unexpected but quite remarkable bonus’. By early 2006, most estimates suggested that foreign fighters in the ‘al-Qa’ida brigades’ accounted for between 5 and 10 per cent of total insurgents, but a higher percentage of the suicide bombers (
<xref ref-type="bibr" rid="ref295">Kaldor 2006</xref>
: 161).</p>
<p>Since al-Qa’ida has assumed the form of an insurgency in certain parts of the world, putting an end to this struggle will require appropriate counter-insurgency techniques. As David Kilcullen (
<xref ref-type="bibr" rid="ref305">2006</xref>
) has argued, these must appreciate the transnational nature of al-Qa’ida; its urbanized quality; and its reliance upon the internet and other elements of the revolution in information technology that allows it to engage in real-time cross-pollination with insurgent groups across the globe. In this sense, insurgents must be engaged in different theatres, including in urban settings which reduce the comparative advantage of Western militaries (see
<xref ref-type="bibr" rid="ref240">Hills 2004</xref>
), and there must be a concerted effort to win the battle of ideas that is being fought within the world’s mass media outlets. Ultimately, although many of the insurgents’ strategies have modernized, people’s hearts and minds remain the prize. Of primary importance in Kilcullen’s analysis is the idea that counter-insurgency must displace the enemy’s influence over social networks in the context concerned. In the long war’s case, the ‘theatre of operations’ covers the entire globe. But arguably the most important social networks are those participating in the ongoing civil war within the Islamic world over how best to react to Western hegemony and the spread of liberal values. In sum, counter-insurgency is no longer about defeating a specific enemy but attempting to control an environment. This can be done in several ways but an important element of the struggle will involve the strengthening of liberal norms throughout the globe, particularly those against the killing of innocent civilians (see
<xref ref-type="bibr" rid="ref196">Freedman 2004a</xref>
;
<xref ref-type="bibr" rid="ref136">Cronin 2006</xref>
: 45).</p>
<p>The focus on strengthening liberal norms ties in with Cronin’s fifth strategy, eroding the popular support enjoyed by organizations like al-Qa’ida. In its insurgent form, al-Qa’ida and its affiliates require the support of at least some segments of
<xref id="page_23" ref-type="page"></xref>
the local populace in the theatre of operations. However, the situation is sometimes reversed from traditional situations where insurgents needed the locals to provide them with food or hide their weapons and other resources. In both Afghanistan and Iraq, for instance, the insurgents are well equipped (often by foreign donors) and can afford to buy the support of poverty-stricken locals. Indeed, they can even subcontract desperate locals to carry out attacks for them (
<xref ref-type="bibr" rid="ref305">Kilcullen 2006</xref>
: 119). Nevertheless, at a more general level al-Qa’ida’s amorphous and pragmatic nature provide an opening for the US and its allies to ‘emphasize the differences’ within its ‘agenda and to drive a wedge between the movement and its recent adherents’ (
<xref ref-type="bibr" rid="ref136">Cronin 2006</xref>
: 42).</p>
<p>The US and its allies have repeatedly suggested that the liberalization and democratization of the Islamic world represents the core of its strategy to reduce al-Qa’ida’s popular support. This is clearly a long-term strategy that even the most optimistic advocates would admit will take decades if not centuries. The problem is that the evidence from both Afghanistan and Iraq suggests that the opening phases of this strategy have not unfolded as planned. Indeed, Operations Enduring Freedom and Iraqi Freedom are generally acknowledged to have expanded rather than reduced al-Qa’ida’s support base. For Cronin (
<xref ref-type="bibr" rid="ref136">2006</xref>
: 42–5), the West should concentrate instead on al-Qa’ida’s means of funding and communication, that is, erode its ability to disseminate its message and challenge the content of those messages by every means and in every forum available. In this regard, it is important to recall that al-Qa’ida’s fundamentalist version of Islam has not succeeded in gaining enough adherents to pose as a realistic political alternative to either liberal market democracy or more reformist Islamic regimes. In this sense, its message is one that appeals to those alienated by modern societies (both Western and Islamic) and who think in extremes. Reducing the numbers of people who fit this description both at home and abroad will help erode al-Qa’ida’s support base. In the short-term this means taking a far more aggressive approach to exploiting the organization’s blunders and massacres of civilians and providing resources to reduce the prevalence of extremist ideologies and to enhance the reputation of liberal norms and values. It should also involve emphasizing the point that ultimately the most destructive effects of these terrorist movements tend to be suffered in the societies that produce them (
<xref ref-type="bibr" rid="ref432">Roberts 2005</xref>
: 108). As Roberts has concluded, ending extremist movements requires ‘not the capture of every last terrorist leader, but their relegation to a status of near-irrelevance as life moves on, long-standing grievances are addressed, and peoples can see that a grim terrorist war of attrition is achieving little and damaging their own societies’ (2005: 126).</p>
</sec>
<sec id="sec1_4">
<title>Conclusion</title>
<p>As the US government is well aware, the long war ‘is both a battle of arms and a battle of ideas … ultimately [it] will be won by enabling moderate Muslim leadership to prevail in their struggle against the violent extremists’ (
<xref ref-type="bibr" rid="ref520">United States Department of Defense 2006a</xref>
: 22). Unfortunately, the Bush administration has pursued policies that have made this outcome less, not more, likely. It has pursued
<xref id="page_24" ref-type="page"></xref>
a doctrine that has sought to articulate a different set of rules for itself than the rest of the world’s states, it has declared war on a tactic that should indeed be eradicated but has pursued that war selectively and often with blunt instruments, and it has engaged in botched state-building projects that have enhanced the popularity and strength of its primary enemy. It is too early to say what the long-term implications of these policies will be. Perhaps many of their negative consequences could be alleviated by a change of guard in the White House; perhaps not. The challenge for the field of security studies is to restore some balance to the study of international security by placing terrorism not on an analytical pedestal above other challenges but in its appropriate political, economic and geographical contexts. There are many realities of insecurity in world politics and it is unwise to let one vision dominate them all.</p>
</sec>
</body>
</book-part>
<book-part book-part-type="chapter" book-part-number="2" id="chapter2">
<book-part-meta>
<title-group>
<title>
<xref id="page_25" ref-type="page"></xref>
Cause and effect in the war on terror</title>
<alt-title alt-title-type="running-head-verso">Cause and effect in the war on terror</alt-title>
<alt-title alt-title-type="running-head-recto">Anthony Burke</alt-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<given-names>Anthony</given-names>
<surname>Burke</surname>
</name>
</contrib>
</contrib-group>
</book-part-meta>
<body>
<p>‘We have been fighting you because we are free men who cannot acquiesce in injustice. We want to restore security to our
<italic>umma.</italic>
Just as you violate our security, so we violate yours … You should remember that every action has a reaction’. With these words in October 2004 the terrorist financier and ideologue Osama Bin Laden admitted responsibility for the 9/11 attacks and explained why they were carried out. His words were contained in a longer statement – designed both as a message to the people of Europe and as an intervention in the US elections – which whilst certainly propaganda, was about as close to diplomacy as the movement now known as al Qaeda will ever come (
<xref ref-type="bibr" rid="ref321">Lawrence, 2005</xref>
: 146–9). If violence can be thought of as a form of
<italic>communication</italic>
as much as coercion, Bin Laden was trying to be heard: to communicate the purpose and meaning of the attacks, to speak of causes and effects, and ultimately to produce an effect.</p>
<p>Yet when it comes to violence and meaning, cause and effect so often fail to meet, like pieces of wreckage scattered over the charred landscape of an airliner crash. Only a reconstructive effort of logic and analysis can establish that the blackened and twisted fragments were once integral parts of a single vehicle and trajectory. US professor of religion Bruce Lawrence argues that Bin Laden’s objective was ‘to isolate the Bush administration, and beyond it the American political establishment as a whole, from American popular feeling – as well as European opinion’. Yet the result, according to Democratic presidential candidate John Kerry, was to turn the tide of US opinion against him and hand Bush another term (
<xref ref-type="bibr" rid="ref321">Lawrence, 2005</xref>
: 237). Under US pressure Al Jazeera broadcast only an edited five minute extract and, within the US its content was drowned out by a chorus of anger and outrage. Bush’s reaction was typical: in a short statement seizing on Bin Laden’s veiled threat that ‘there are still motives for a repeat [of 9/11]’ he said that ‘Americans will not be intimidated or influenced by an enemy of our country’ (
<xref ref-type="bibr" rid="ref35">BBC News Online, 2004</xref>
). What was supremely ironic was that Bin Laden’s threat was spurred by frustration about the meanings given to al Qaeda’s campaign. Early in the statement he said:</p>
<disp-quote>
<p>When disasters happen, intelligent people look for the reasons behind them, so that they can avoid them in the future. But I am amazed at you. Although
<xref id="page_26" ref-type="page"></xref>
we are into the fourth year since the events of September 11, Bush is still practising his deception, misleading you about the real reason behind it.</p>
<attrib>(
<xref ref-type="bibr" rid="ref321">Lawrence, 2005</xref>
: 238–9)</attrib>
</disp-quote>
<p>What is the significance of statements like this? Given our abhorrence of their author, why should we listen to them or grant them any status or credibility? There are many registers upon which we can analyse them, but this chapter proposes to consider them, and al Qaeda’s campaign and ideology more broadly, in terms of their strategic importance and of their meaning for strategy. Their importance lies in their
<italic>meaning:</italic>
in the light they cast, however perversely and unwelcomely, on cause and effect in the war on terror. The chapter argues that while a ‘strategic’ analysis that rationally analyses the use of force and other means of policy is certainly necessary, the phenomenon of mass casualty terrorism directed against the US and its allies puts many of the fundamental tenets of strategy into question. If this is true, a ‘war on terror’ may simply not be possible.</p>
<p>Tracking and predicting relations between cause and effect in global politics is both tremendously difficult, and utterly essential. There are simply too many actors, variables and processes, each complicated by a clash and proliferation of meanings, for this to be a simple and unproblematic task. Yet traditional strategic thought either rejects this complexity or professes to be able to control and manage it: it holds to a linear causal model that sees war as ‘an act of force to compel our enemy to do our will’ (
<xref ref-type="bibr" rid="ref122">Clausewitz, 1976</xref>
: 75). Yet in a ‘war on terror’ where the adversary’s most potent weapons are their will and ingenuity, and beliefs and interpretations are often more important than capabilities, such a model no longer holds. By paying close attention to the writings and statements of terrorist leaders, and through a critical analysis of strategic and counter-terrorist doctrines, this chapter seeks to develop a historical model of cause and effect based on language, meaning and (mis)interpretation. In such a model, acts either of state or terrorist violence cannot be assumed to have predictable effects, and traditional modes of strategic power and geopolitical hegemony are rendered less and less sustainable because of the uncontrolled and dangerous proliferation of meanings, and subsequent acts, they produce.</p>
<p>In this light, this chapter takes up Christian Reus-Smit’s call for constructivist analysis to grapple with the ‘normative politics of transnational terrorism … [because such] organizations operate in the social space transcending state borders and … use forms of moral suasion and symbolic politics to redefine the terms of political discourse affecting state interests and actions’ (
<xref ref-type="bibr" rid="ref426">Reus-Smit, 2005</xref>
: 210). Taking Osama Bin Laden’s writings seriously, the chapter traces a number of crucial decisions in US and Israeli policy which had causal importance for 9/11 and later atrocities. This causal importance lies in the inspiration and ideas al Qaeda took for future attacks, and in the meanings they ascribed to western policy and actions. Against this background the continuation of Israel’s occupation of the West Bank and Gaza strip (including its brutal 2002 offensive and its post-withdrawal strangulation of Gaza) and its 2006 war on Lebanon, along with the
<xref id="page_27" ref-type="page"></xref>
containment, invasion and occupation of Iraq, are examples of the fundamental disutility of military action as a counter-terrorist strategy. Some Israelis and their western supporters may argue that force can be an effective and manageable way of controlling Palestinians and avoiding diplomatic pressure for a two-state solution; but even if this were arguably true, it has been both deeply unjust and come at an enormous cost to the security both of Israel and the West. As the retired Israeli general Shlomo Gazit remarked ironically to this author in 2004, Israel’s use of force against the Palestinians had been
<italic>too</italic>
successful and hence sent ‘the wrong message to the political echelon – that there is no need for a political agreement’ (
<xref ref-type="bibr" rid="ref206">Gazit, 2004</xref>
).</p>
<p>My argument is not that military action in some cases may be both justified and viable, but that a purely instrumental strategic analysis, and dominant currents of strategic thought, provide an imperfect guide to the kind of action that may be worth taking. For example, while it is arguable that a military effort to destroy al Qaeda camps and sanctuaries in Afghanistan was at least justifiable as one of many measures that could be taken to reduce the threat they posed, this is not the same as arguing that the kind of war actually waged made sense as part of a counter-terrorist strategy, or that its further causal and human consequences were acceptable, predictable and controllable. The civil war, and the terrible economic and humanitarian crisis faced by Afghanistan in 2001, further compounded the complexities raised by military intervention, which gave al Qaeda further fuel for its anti-Western propaganda and directly contributed to events such as the October 2002 Bali bombings.</p>
<sec id="sec2_1">
<title>Concepts: force, war, terror</title>
<p>The phenomenon of a networked, cell-based, religiously and ideologically motivated terrorism, not linked to territorial struggles and overwhelmingly directed against civilian targets, puts existing paradigms of strategic security into crisis. In response, we are seeing broad counter-terrorist strategies seeking to incorporate the use of force in ways that remain wedded to existing strategic paradigms whilst also seeking to overcome their limitations. However, this rarely extends to a fundamental rethinking of the strategic paradigm
<italic>as such.</italic>
</p>
<p>In its modern, instrumental, Clausewitzian form, strategy assumes a linear transition between violent means and political ends – ends whose scope, legitimacy and priority are defined solely by the user of violence, not by the enemy or their community. Even if this transition is not always smooth – Clausewitz cautions that battle and logistics are difficult, information is partial, and the enemy may be unpredictable – it is seen as achievable. After all, the concept Clausewitz uses to express these problems,
<italic>friction,</italic>
is a metaphor taken from natural science that refers to physical forces that impede a moving body (1976: 100–19). This idea of
<italic>force</italic>
as a purposively violent transition between means and ends is central to Clausewitzian strategy, expressed in his influential formulation that ‘war is an act of force to compel our enemy to do our will’:</p>
<disp-quote>
<p>
<xref id="page_28" ref-type="page"></xref>
Force, to counter opposing force, equips itself with the inventions of art and science … Force – that is physical force, for moral force has no existence save as expressed in the state and the law – is thus the
<italic>means</italic>
of war; to impose our will on the enemy is its
<italic>object.</italic>
To secure that object we must render the enemy powerless; and that, in theory, is the true aim of warfare.</p>
<attrib>(
<xref ref-type="bibr" rid="ref122">Clausewitz, 1976</xref>
: 75)</attrib>
</disp-quote>
<p>To impose our will on the enemy is the
<italic>object</italic>
of force, which can only be secured by rendering the enemy powerless. These are important formulations that are worth considering in the case of a war on terrorists and terrorist organizations, one that has the objective of securing society against their attacks. What is clear in Clausewitz’s reasoning is that military violence is the chosen means for imposing one’s will and exercising power, and that this is thought of immediately in Newtonian terms
<italic>as</italic>
force: as something that moves things, according to physical laws, in the face of opposing force and the friction of the effort. The concept of force, then, assumes that if the means is deployed the end will almost automatically result, and the contest is thus too often thought of in merely physical terms: a clash of quantities and firepower that ingenuity and technology can make more effective. In short, like the related notion of ‘military power’, the idea of force assumes the outcome it seeks, and the human is reduced to a physical effect, merely an intelligent and sometimes recalcitrant element in a machinery of violence.</p>
<p>These are the deterministic assumptions underpinning a model of what former NATO deputy commander General Rupert Smith argues is an outdated concept of ‘industrial war’, He argues that we are in a new paradigm of ‘war amongst the people’ in which ‘there is a continuous criss-crossing between confrontation and conflict’ and war ‘is no longer a single massive event of military decision that delivers a conclusive political result’. The new strategic context is complex, protean and confusing: war is fought amongst civilians and all kinds of regular and irregular forces in conflict zones; it is fought via the media in living rooms around the world; its ends shift ‘from the hard absolute objectives of interstate industrial war to more malleable objectives to do with the individuals and societies that are not states’; new uses are found for old weapons; loose coalitions not states fight against non-state adversaries; and the strategic end is not victory but to create the conditions for politics, aid delivery or diplomacy (
<xref ref-type="bibr" rid="ref426">R. Smith, 2005</xref>
: 16, 1–17). Smith was not writing specifically of the war on terror but his general argument, derived from experience in Ireland, Bosnia and Kosovo, and through keen observation of interventions in Africa, Afghanistan and Iraq, is a telling one.</p>
<p>To be true, many mainstream strategists and policy makers are painfully aware of the new paradigm, even if they are resistant to the conceptual revolution that Smith and others – like Martin van Creveld (
<xref ref-type="bibr" rid="ref528">1991</xref>
), Mary Kaldor (
<xref ref-type="bibr" rid="ref293">1999</xref>
,
<xref ref-type="bibr" rid="ref294">2003</xref>
) and Chris Hables Gray (
<xref ref-type="bibr" rid="ref220">2005</xref>
) – argue must occur. What we instead see are efforts to preserve the basic integrity of the Clausewitzian system, and to overcome operational friction and the disruptive elements of the new paradigm, with new technology and concepts. In such efforts neo-Clausewitzian doctrines of limited war and coercive diplomacy are updated with new force concepts
<xref id="page_29" ref-type="page"></xref>
such as asymmetric warfare, the revolution in military affairs (RMA), defence transformation, or effects-based warfare.</p>
<p>Limited war doctrines emerged in the 1950s in the United States as scholars grappled with the apparent dilemma of the need to wage limited war against communist aggression in a context where the existence of nuclear weapons made the dangers of escalation to total war too great. Robert Osgood described limited war as ‘part of a general strategy of conflict in which adversaries would bargain with each other through the medium of graduated military responses, within the boundaries of contrived mutual restraints … in order to exert the desired effect on an adversary’s will’ (
<xref ref-type="bibr" rid="ref405">Osgood, 1979</xref>
: 10–11). Osgood and the RAND Corporation scholar Thomas Schelling also emphasized the value of force for ‘coercive diplomacy’: Osgood said that ‘the art of coercion short of war has never been as finely developed or deliberately applied’ and Schelling portrayed limited wars and threats as ‘a power to hurt’ which, while ‘it can usually achieve nothing directly, is potentially more versatile than a straightforward capacity for forcible accomplishment’ (
<xref ref-type="bibr" rid="ref405">Osgood and Tucker, 1967</xref>
: 26;
<xref ref-type="bibr" rid="ref453">Schelling
<italic>et al.</italic>
1966</xref>
: 8–9). In a 1979 book revisiting the limited war doctrine, Osgood admitted that its utility had been tarnished by the loss in Vietnam but nevertheless insisted that ‘the rationale of limited-war strategy and the strategic theories derived from it … have become more widely accepted’. If there was a problem, it is that ‘there has been a gap between strategic doctrine and the operational plans and capabilities for carrying it out’ and that the US Army’s preference for using overwhelming force and attrition may not be as effective as ‘wars of maneuver and mobility’ (
<xref ref-type="bibr" rid="ref405">Osgood, 1979</xref>
: 11–12).</p>
<p>Most of the new western strategic concepts developed since then have arguably been efforts to square this circle. Of most importance has been the so-called ‘revolution in military affairs’, a set of ideas which emerged from the Pentagon’s Office of Net Assessment and were re-badged by US Defense Secretary Rumsfeld as ‘military transformation’ (
<xref ref-type="bibr" rid="ref401">Office of Force Transformation, 2003</xref>
). This updated the US combined forces (AirLand Battle) doctrine with innovations in satellites, computing, telecommunications, real-time video and precision weapons technology to increase the invulnerability, speed and destructive power of US and allied forces. In a recent analysis Alan Stephens and David Connery claim that: ‘The concept promises an unrivalled degree of battlespace awareness … as well as the ability to apply force with discrimination, which together present a war-winning capability of the first order’. They suggest that transformation could be relevant to the kind of non-state conflicts and threats (which include ‘groups such as al Qaeda and their ideological affiliates [which] are deliberately eschewing any attempt to tackle modern joint forces head on’) that Rupert Smith sees as more profound disruptions of the paradigm. ‘The ability to operate across the spectrum of conflict [is] essential for a modern military force’, they write, and in such contexts ‘many forces will attempt to use the technological advantages conferred by the information and communications technology revolution’ (
<xref ref-type="bibr" rid="ref494">Stephens and Connery, 2006</xref>
: 57–8). The US Defense Department suggests something similar, when it defines transformation as ‘new combinations of concepts, capabilities,
<xref id="page_30" ref-type="page"></xref>
people and organizations that exploit our nation’s advantages and protect against our asymmetric vulnerabilities to sustain our strategic position’ (
<xref ref-type="bibr" rid="ref401">Office of Force Transformation, 2003</xref>
: 2).</p>
<p>Stephens and Connery also discuss how a new concept – Effects-Based Operations (EBO) – is ‘emerging as the philosophy’ for transformation and promises to ‘reduce the fog, friction and uncertainty that Clausewitz properly identified as being characteristics of war’. They define EBO as ‘a methodology in which the desired effect/outcome of any action, regardless of its scale, should be identified before that action is initiated, and which ideally should be complemented by its associated ways (the form through which a strategy is pursued, including military power, diplomacy and economic sanctions) and means (the resources available, including people, weapons, international influence and money)’ (2006: 60–1).</p>
<p>What is most striking about their EBO concept, which appears to be far more nuanced than current practice, is how it is framed as a direct response to the complexity of cause and effects that I am examining here:</p>
<disp-quote>
<p>A critical component of [EBO] will be a constant, iterative process of comparing the effects actually caused by our actions to the effects we wish to cause, noting that almost inevitably the two will not coincide perfectly. In addition to unintended or unforeseen first-order effects for both sides, there will be second and third order effects which will have to be identified and assessed – and managed.</p>
<attrib>(
<xref ref-type="bibr" rid="ref494">Stephens and Connery, 2006</xref>
: 61)</attrib>
</disp-quote>
<p>With this last phrase Stephens and Connery betray a confidence in the ability of transformed military forces to cope with the complexities of using force amid unpredictability, even if they acknowledge that they can never do so perfectly and that ‘managing chaos will remain the fundamental preoccupation of military leaders, even where they adopt an effects-based approach’ (2006: 61). The Pentagon’s report is even more bullish. Even as it admits the strategic paradox that ‘today’s winner is tomorrow’s target’ and that ‘surprise is the norm’, there is confidence in the ability of new concepts and technology to grapple with any problem: ‘the emerging way of war will result in US forces conducting powerful effects-based operations to achieve strategic, operational and tactical objectives across the full range of military operations. Transformation is yielding new sources of power’ (
<xref ref-type="bibr" rid="ref401">Office of Force Transformation, 2003</xref>
: 12, 3).</p>
<p>The Pentagon’s drive for transformation is integral to a new strategic posture and ‘global war on terror’ that is extraordinarily ambitious and expansive, based on a desire to strengthen and entrench US primacy, confront and defeat a range of threats including rogue states, WMD proliferators, peer competitors and ‘terrorism’ as such, and stimulate widespread political and geostrategic change through regime change and democracy promotion. This represents, as Jeffrey Record remarks, ‘an endless and hopeless search for absolute security’ (2003: 46). It also represents a hubristic and in many cases deeply unjust desire for hegemonic dominance that
<xref id="page_31" ref-type="page"></xref>
includes radical and destabilizing new norms about the use of force (preventive war and nuclear use) and seeks to militarize and control ‘global commons’ such as space (
<xref ref-type="bibr" rid="ref298">Kaufman, 2006</xref>
). There is no hint of retrenchment or caution: the Office of Force Transformation in fact states that its work seeks options to help the US military implement ‘an enhanced forward deterrent posture … for a new strategic environment in which U.S. interests are global and new challenges, particularly anti-access and area-denial threats, are emerging’ (2003: 6).</p>
<p>Hence the US and its allies envisage using force in the war on terror in a range of ways and contexts: directly against terrorist sanctuaries, personnel and infrastructure, such as in Afghanistan, the Philippines, Palestine and Lebanon; against the regimes that are perceived to support, harbour or tolerate them, as with the Taliban, the Baathist government of Iraq and the Palestinian authority (and potentially Iran and Syria), using operations ranging from small assassination and special forces operations to the full force of airpower or combined forces against both military and civilian targets. Small operations include Israeli raids and bombings in the occupied territories and special forces operations in Afghanistan, and the latter the invasion of Iraq, Operation Enduring Freedom in Afghanistan, and Israeli operations in 2002 against the Palestinian authority in the West Bank (2002), against Hamas and other factions in Gaza (2006), and the war against Lebanon (2006). To conservative western and Israeli policymakers these are all seen as combined parts of the war on terror, even if they are in fact related to other objectives such as perpetuating control over the Palestinian territories or regime-change in Iraq. And while the US and British forces in particular can plausibly claim to have worthwhile policies in place to limit collateral damage, all these operations involved either considerable collateral civilian casualties and damage to civilian housing and infrastructure, or direct attacks on civilians.</p>
<p>Barring the more nuanced conceptualization of the effect-based operations, these tactics are all seen in instrumental terms as either the direct degradation of terrorist capabilities or as a deterrent message, a form of coercive bargaining. They express the Clausewitzian idea of force as a ‘means’ to ‘impose our will on the enemy’. In this context it is worth returning to the claim Clausewitz makes directly after: ‘to secure that object we must render the enemy powerless; and that, in theory, is the true aim of warfare’ (
<xref ref-type="bibr" rid="ref122">Clausewitz, 1976</xref>
: 75). The ultimate strategic question then is: can either the terrorists, or terror
<italic>ism,</italic>
be rendered powerless? Can force be the means?</p>
<p>Analysts like Clive Williams, Louise Richardson and Jeffrey Record have understandably questioned the idea of a war on terror
<italic>ism,</italic>
saying that ‘it is not an ideology’ but ‘is a strategy: a form of conflict used for political purposes’; it is ‘a tactic and will continue to be deployed by those seeking change’ and ‘a method of violence, a way of waging war’ that has an ‘inherent attraction to the militarily powerless’ (
<xref ref-type="bibr" rid="ref550">Williams, 2006</xref>
: 71;
<xref ref-type="bibr" rid="ref429">Richardson, 2006</xref>
: 247;
<xref ref-type="bibr" rid="ref422">Record, 2003</xref>
: 25, 8). Record still sees counter-terrorist operations against particular organizations in instrumental terms (‘intelligence-based arrests and assassinations, not divisions destroyed or ships sunk, are the cutting edge of successful counter-terrorism’) and sees the war against al Qaeda, as opposed to terrorism as such, to be ‘a
<xref id="page_32" ref-type="page"></xref>
war of necessity’. But this does not mean it is simple to fight: ‘the very nature, modus operandi and recruiting base of al Qaeda make it a very difficult enemy to subdue decisively through counter-terrorism operations’ (
<xref ref-type="bibr" rid="ref422">Record, 2003</xref>
: 22). They are right in identifying the definition of the enemy, and of terrorism, to be a major policy problem – with current versions generating an imprudent escalation of military conflict beyond what is absolutely necessary or viable. However they are perhaps too quick to dismiss the value of attacking terrorism as such. Record scoffs at the idea of waging war on a
<italic>method,</italic>
which would ‘create unnecessary enemies at a time when the United States has more than enough to go around’, and his answer seems to be to focus on its capabilities. Yet even this can be self-defeating: as the International Institute of Strategic Studies’ 2002–3
<italic>Strategic Survey</italic>
speculated that the war in Afghanistan ‘perversely impelled an already highly decentralised and elusive transnational terrorist network to become even harder to identify and neutralise’ (cited in
<xref ref-type="bibr" rid="ref422">Record, 2003</xref>
: 5). Attacks in Bali, Madrid and London, among others, underpinned this assessment with a lethal truth.</p>
</sec>
<sec id="sec2_2">
<title>From Lebanon to 9/11 and back</title>
<p>If the capabilities of terrorists are hard to attack with armed force, and doing so can have serious unanticipated consequences, what can be done? Obviously legal routes are promising: police and intelligence work can and has prevented a number of serious attacks, but they have sometimes failed. If, as in the London case, nascent terrorist cells are difficult to identify, wherefore counter-terrorism?</p>
<p>In this light, I suggest that is it exactly the
<italic>methods</italic>
of terrorism, along with the desires, grievances and motivation of terrorists, which needs to come into renewed analytical focus. The phenomenon of the ‘home grown’ bomber suggests that it is three important processes that we need to understand and tackle: first, the development of grievances against an undifferentiated ‘West’ as such; second, the movement from grievance to the use of violence; and, third, the exercise of a form of moral reasoning that can justify the murder of innocent civilians. All of these processes are carried on a wave of narrative, information and meaning, and it is at those levels they can be analysed and ameliorated. In short, what is most important in fighting terrorism is an understanding of – and ability to interrupt – the social and psychological process by which grievance is created and turned into violence.</p>
<p>What this means is that terrorism cannot be treated as merely a matter of capabilities or intentions, and it cannot be seen as isolated from either the actions we take to deal with it or the state of our political culture – including past and present international policy – more generally (
<xref ref-type="bibr" rid="ref477">Silke, 2005</xref>
). Yet policymakers and especially neo-conservative analysts refuse to treat terrorist motivations or statements with seriousness. In an interview with PBS just after 9/11 former US Deputy Secretary of State Richard Armitage responded to a question about Islamist grievances and ‘root causes’ of terrorism by saying ‘I suggest you don’t play on his court’ (
<xref ref-type="bibr" rid="ref409">PBS, 2001</xref>
). Writing in
<italic>The Jerusalem Post,</italic>
Israeli Likud
<xref id="page_33" ref-type="page"></xref>
politician Benjamin Netanyahu praised Bush’s moral clarity in stating that ‘terrorism, like Nazism, must be seen as an unmitigated evil … [we must not be] duped into believing that there is some justice behind terrorist demands and therefore these demands must be partially met’ (
<xref ref-type="bibr" rid="ref388">Netanyahu, 2002</xref>
). Similarly the
<italic>9/11 Commission Report,</italic>
even as it acknowledged that al Qaeda was motivated by ‘grievances stressed by bin Laden and widely felt throughout the Muslim world … including support of Israel’, argued that ‘it is not a position with which Americans can bargain or negotiate. With it there is not common ground – not even respect for life – on which to begin a dialogue. It can only be destroyed or utterly isolated’ (
<xref ref-type="bibr" rid="ref379">National Commission, 2004</xref>
: 362). The once neo-conservative intellectual Francis Fukuyama argued soon after 9/11 that the real issue was ‘not American foreign policy in Palestine or towards Iraq … the basic conflict we face is much broader, and concerns not just a small group of terrorists, but a much larger group of radical Islamists and Muslims for whom religious identity overrides all other political values’. These movements (which he describes in somewhat misleading and inflammatory terms as ‘Islamofascist’) reject ‘the most basic principle of modernity itself, that of religious tolerance’ (
<xref ref-type="bibr" rid="ref202">Fukuyama, 2002</xref>
: 22, 31).</p>
<p>All of these writers may have had salient points to make, but what is common to all is a view that violence as such cannot be placed under critical scrutiny. This myopia we share with our enemies. Hence I would not choose, as Record does, between rendering terror
<italic>ists</italic>
and terror
<italic>ism</italic>
powerless. If we define terrorism as the large scale use of political violence against the innocent – the form in which it is currently most threatening and destabilizing – it becomes crucial to find ways to render terrorism
<italic>as</italic>
a method fundamentally illegitimate and eventually powerless. In this light, war will be the last means we should want to choose.</p>
<p>We are thus moving in the realm of
<italic>norms,</italic>
which by their protean nature, can be either a force for terror or hope. Bin Laden explained how they became a force for terror when he was interviewed by US ABC television in 1998. The journalist, Jon Miller, asked him if the ‘fatwa’ he had recently declared extended to all Americans:</p>
<disp-quote>
<p>American history does not distinguish between civilians and military, and not even women and children. They are ones who used the bombs against Nagasaki. Can these bombs distinguish between infants and military? … The only way for us to fend off these assaults is to use similar means …We do not differentiate between those dressed in military uniforms and civilians; they are all targets in this fatwa.</p>
<attrib>(
<xref ref-type="bibr" rid="ref363">Miller, 1998</xref>
)</attrib>
</disp-quote>
<p>An even more chilling justification was asserted by another al Qaeda figure, Sukeiman Abu Ghaith, who claimed in an essay on the organization’s website that in Iraq and Palestine the US and Israel had killed 1.2 million Muslims (sic) ‘in the past decade’:</p>
<disp-quote>
<p>
<xref id="page_34" ref-type="page"></xref>
According to the numbers, we are still at the beginning of the way. The Americans still have not tasted from our hands what we have tasted from theirs…We have not reached parity with them. We have the right to kill four million Americans – two million of them children – and to exile twice as many and cripple hundreds of thousands. Furthermore, it is our right to fight them with chemical and biological weapons … America knows only the language of force.</p>
<attrib>(
<xref ref-type="bibr" rid="ref49">Bergen, 2006</xref>
: 347)</attrib>
</disp-quote>
<p>These Islamist arguments for the killing of civilians – even with weapons of mass destruction – are grossly immoral and dangerous. However we must face two sobering facts: al Qaeda has been inspired to strike by Muslim and Palestinian suffering at the hands of the US and its allies, and they draw
<italic>normative legitimation</italic>
from it. However misguided or repugnant their logic, there is a cause and effect relation here that we dismiss at our peril.</p>
<p>What we are witness to here is the dynamic relation between semiosis, violence and chaos, a process that is the antithesis of strategy. When violence is involved both action and the simultaneous production and dissemination of meaning resists our intentions. Violence turns into meaning, and thence into further violence, in a way that thwarts any linear translation of strategic means into political ends. A simple thought exercise is helpful here. Were the 9/11 attacks the objective of US policy towards Iraq and Israel during the 1980s and 1990s? Was the possibility even contemplated?</p>
<p>We could similarly ask if Israeli Defence minister Ariel Sharon thought of the possibility of 9/11 when he planned and oversaw the massive 1982 invasion of Lebanon – which involved some 45,000 IDF troops, a naval blockade and massive airstrikes on infrastructure and homes, and resulted in Israeli troops occupying half of Beirut and the expulsion of the leadership and armed militias of the Palestinian Liberation Organization (PLO). The death of at least a thousand Palestinians in massacres by Christian militias allied to Israel is well known; less well known are the Israeli air strikes on civilian areas, including the destruction of residential apartment blocks, which took the lives of thousands. These attacks, however, had a striking impact on Osama bin Laden. In his October 2004 statement, he said:</p>
<disp-quote>
<p>The events that made a direct impression on me were during and after 1982, when America allowed the Israelis to invade Lebanon with the help of its third fleet … It was like a crocodile devouring a child, who could do nothing but scream…As I looked at those destroyed towers in Lebanon, it occurred to me to punish the oppressor in kind by destroying towers in America …</p>
<attrib>(
<xref ref-type="bibr" rid="ref321">Lawrence, 2005</xref>
: 239)</attrib>
</disp-quote>
<p>Lebanon was crucial in other respects. The war stimulated the emergence of two determined Islamist political movements, Hezbollah (party of God) and Islamic Jihad, the first of which has become a major political force within Lebanon and
<xref id="page_35" ref-type="page"></xref>
fought a successful guerrilla war against Israel in the south, and the second of which has become active in Palestine (
<xref ref-type="bibr" rid="ref468">Shehadi, 2004</xref>
). These organizations were believed to be responsible for terrorist bombings of the French and US embassies in Beirut, the US marine barracks, and Israeli military headquarters in Sidon (twice). They were the first Islamic suicide bombings performed by
<italic>shahid</italic>
(martyrs), attacks notable both for the religious commitment of their perpetrators and their tactical efficacy as a technique, in which human beings dressed as civilians could become devastating but cleverly disguised weapons, evading existing military and border control security measures. This technique has since taken an enormous number of lives.</p>
<p>Sharon launched the 1982 invasion of Lebanon in the hope of smashing the PLO and entrenching Israeli control over the occupied West bank and Gaza Strip; instead it saw Israel bogged down in a draining war in southern Lebanon, stimulated the creation of a new Palestinian leadership in the West Bank, and contributed to the emergence of the Islamist Palestinian movement Hamas. In 1987 the Palestinian civil uprising (Intifada) began in Gaza, which attracted a brutal response from the Israeli armed forces but convinced the administration of George H.W. Bush to place pressure on Israel to negotiate a two-state solution with the PLO (
<xref ref-type="bibr" rid="ref471">Shlaim, 2000</xref>
: 400–24, 593). In August 1988 al Qaeda was founded, and in 1990 Saddam Hussein launched the invasion of Iraq, which stimulated the imposition of UN sanctions and basing of US troops in Saudi Arabia, an event which deeply angered bin Laden (
<xref ref-type="bibr" rid="ref49">Bergin, 2006</xref>
: 78).</p>
<p>In 1993 Ramsi Yousef – who trained at an al Qaeda camp in Afghanistan and was the nephew of Khaled Sheikh Mohammed, the director of the 9/11 operation – bombed the World Trade Center with $20,000 worth of explosives. He told FBI interrogators that ‘the reason for the bombings was because of the US military, financial and political support of Israel’. In April 1996 Israel launched a new offensive against Lebanon, Operation Grapes of Wrath – which included the apparently deliberate shelling of a UN base where civilians had sought shelter, killing 106 – and in August the same year bin Laden issued a declaration of war against the United States, citing the Qana attack, the Iraqi sanctions, and the presence of Jews in Palestine and Americans near Mecca and Medina as a
<italic>casus belli.</italic>
‘The walls of oppression and humiliation’, he stated, ‘cannot be demolished except in a rain of bullets’. In May 1998 bin Laden, Mohammed Atef and Egyptian Jihad leader Ayman Al Zawahiri held a press conference to announce the creation of the World Islamic Front for Jihad against Crusaders and Jews. There they publicized a February 1998 statement issued by bin Laden which included the controversial
<italic>fatwa,</italic>
‘the ruling that to kill the Americans and their allies – civilians and military – is an individual duty for every Muslim’. A CIA memorandum analysing the statement said that ‘these
<italic>fatwas</italic>
are the first from these groups that explicitly justify attacks on American civilians anywhere in the world...this is the first religious ruling sanctifying such attacks’ (
<xref ref-type="bibr" rid="ref49">Bergin, 2006</xref>
: 144–5, 164–5, 196). The bombings of the embassies in Nairobi and Dar es Salaam, the attack on the USS
<italic>Cole</italic>
in Aden, and the 9/11 attacks followed in rapid succession.</p>
<p>
<xref id="page_36" ref-type="page"></xref>
The 9/11 attacks, which were so shocking and terrible, and which brought the threat posed by bin Laden’s movement to world attention, could have potentially been a profound turning point, a great historical hinge around which US strategy and foreign policy should have been rethought. Many voices were indeed raised in favour of renewed efforts to end the Israeli occupation of Palestine and to rethink the containment of Iraq. However the Bush administration chose to rapidly militarize the conflict and prepare for war against Iraq, to declare that established norms relating to the treatment of suspects were outdated, and to give blanket support to (now Prime Minister) Ariel Sharon’s government in Israel, who cleverly painted his struggle against the second Palestinian
<italic>Intifada</italic>
as part of the global war on terror and PLO leader Arafat as a second bin Laden. In 2002, under cover of the war in Afghanistan, he launched a massive military operation into Palestinian autonomous areas in a new effort to destroy the (PLO dominated) Palestinian authority, with distressing scenes of Palestinian suffering beamed around the Muslim and Arab world. It did little to prevent Palestinian suicide attacks against Israeli civilians, which were only slowed by the construction of a vast wire and concrete barrier throughout the West Bank.</p>
<p>Settlement growth and other forms of dispossession continued, and under cover of the Quartet-sponsored ‘road map’ Israeli strategy now focused on heading off international pressure to dismantle the wall and return to negotiations with the Palestinians (
<xref ref-type="bibr" rid="ref79">Burke, 2007</xref>
: 71;
<xref ref-type="bibr" rid="ref423">Reinhart, 2006</xref>
). In what should have been recognized as a major public relations disaster (and security threat) US endorsement of Sharon’s plans for a unilateral ‘disengagement’ from Gaza and declaration of final borders was widely interpreted throughout the Arab world as a new ‘Balfour declaration’ (
<xref ref-type="bibr" rid="ref254">Howeidy, 2004</xref>
). If one important index of western vulnerability to al Qaeda is measured by the level of global anger provoked by their foreign policies, by the time the US, Britain and Australia had launched the invasion of Iraq in March 2003 – again to widespread if simplistic perceptions they did so at the behest of Israel – things were a great deal worse than they were prior to September 2001. A little over a year later, in October 2004, the Australian embassy in Jakarta was bombed by the Islamist group Jemaah Islamiyah, with the bomber later telling police he did so because ‘the Australian Government is the American lackey most active in supporting American policies to slaughter Muslims in Iraq’ (
<xref ref-type="bibr" rid="ref557">Wroe, 2005</xref>
: 1). By the time Osama bin Laden made his statement during the US election campaign, in the same month as the Jakarta attack, it seemed no one of importance was listening:</p>
<disp-quote>
<p>Security is one of the pillars of human life. Free men do not underestimate the value of their own security, despite Bush’s claim that we hate freedom … We have been fighting you because we are free men who cannot acquiesce in injustice. We want to restore security to our
<italic>umma.</italic>
</p>
<attrib>(
<xref ref-type="bibr" rid="ref321">Lawrence, 2005</xref>
: 238)</attrib>
</disp-quote>
</sec>
<sec id="sec2_3">
<title>
<xref id="page_37" ref-type="page"></xref>
The power of the example: rethinking cause, strategy, and effect</title>
<p>In March 2006 US Vice-President Richard Cheney said in a media interview that the Democratic Party has a ‘a pre-9/11 mind-set. They’ve got a tendency to look at the terrorist attacks, for example, in terms of law enforcement and only law enforcement. But it was only … the President’s aggressive determination to go after these guys … that I think have protected the US from another attack’ (
<xref ref-type="bibr" rid="ref486">Snow, 2006</xref>
). Such braggadocio is cold comfort for the residents of Madrid, Bali, Jakarta, Sharm El Sheikh or London, but it remains an article of faith for the Bush administration and a number of strategists. This was affirmed in the US Government’s 2006 revision of the
<italic>National Strategy for Combating Terrorism,</italic>
which states that ‘America is at war with a transnational terrorist movement fueled by a radical ideology of hatred, oppression and murder’:</p>
<disp-quote>
<p>The paradigm for combating terrorism now involves the application of all elements of our national power and influence. Not only do we employ military power (sic), we use diplomatic, financial, intelligence and law enforcement activities … we have broken old orthodoxies that once confined our counter-terrorism efforts primarily to the criminal justice domain.</p>
<attrib>(
<xref ref-type="bibr" rid="ref380">NSC, 2006</xref>
: 1)</attrib>
</disp-quote>
<p>Despite this generally sensible list of multifaceted options, and a list of unexceptional objectives (among them to prevent attacks against the US, deny WMD to terrorists, and deny terrorists the sanctuary of rogue states) what is striking is that they are also simplistically instrumental and reactive, embodying a linear and largely mechanical (capabilities-based) model of causation. The strategy assumes that terrorists want to attack the United States and its allies, which is portrayed as a timeless ontological fact. However illegitimate, their
<italic>desire</italic>
to do so, and the process by which this desire was formed, is apparently of no moral, historical or strategic importance. This is especially ironic given the Strategy’s claim that this ‘has been a battle both of arms and a battle of ideas’, and its obtuse complaint that ‘the ongoing fight for freedom in Iraq has been twisted by terrorist propaganda as a rallying cry’ (
<xref ref-type="bibr" rid="ref380">NSC, 2006</xref>
: 1, 4). Instead, as the 2003 Strategy set out, the major objective is to ‘compress the scope and capability of terrorist organizations’ (
<xref ref-type="bibr" rid="ref381">NSC, 2003</xref>
: 12–13).</p>
<p>Yet if the 2003 Strategy’s goal is to ‘diminish the underlying conditions that terrorists seek to exploit’, the socio-historical process of terrorists’ motivation and justification must be treated as of crucial strategic importance. Yet whereas the 2003 Strategy acknowledged that ‘finding a solution to the Israeli-Palestinian conflict is a critical component of winning the war of ideas’ and that ‘we must use the full influence of the United States to delegitimize terrorism’, the mantra in 2006 is that ‘terrorism is not simply a result of hostility to US policy in Iraq’, ‘Israeli-Palestinian issues’ or ‘a response to our efforts to prevent terror attacks’ (
<xref ref-type="bibr" rid="ref381">NSC, 2003</xref>
: 23–4,
<xref ref-type="bibr" rid="ref382">2006</xref>
: 9).</p>
<p>
<xref id="page_38" ref-type="page"></xref>
Indeed when Israel chose to attack Lebanon again in July 2006 with a massive campaign of air strikes, killing over a thousand Lebanese, wounding thousands more and causing $4 billion in damage to homes and infrastructure, the US and British governments gave them vocal support and used their diplomatic weight to buy the Israelis time to prosecute the campaign. As if to underline the terrible sense that history was repeating itself, Qana was again bombed in an attack on an apartment building that killed 28 civilians and wounded many more. Following this attack, al Qaeda second in command Ayman al-Zawahiri issued a video statement declaring that Israel’s attacks on Lebanon and Palestinians in Gaza would not be allowed to stand:</p>
<disp-quote>
<p>As they attack us everywhere, we will attack them everywhere. As they have joined forces to fight us, our nation will unite to fight them … The shells and rockets which are tearing the bodies of Muslims in Gaza and Lebanon are not purely Israeli. They are produced and financed by all the countries of the Crusader alliance … We cannot just watch these shells as they pour wrath on our brothers in Gaza and Lebanon and sit back in submission.</p>
<attrib>(BBC News Online, 27 July 2006)</attrib>
</disp-quote>
<p>The best mainstream strategists are now becoming painfully aware of the strategic price being paid for a failure to think more creatively and self-critically about western foreign policy, war-fighting and geopolitical power. During the 2006 Lebanon war Professor Anthony Cordesman, of Washington’s Center for Strategic and International Studies, published an important commentary. ‘Qana’, he wrote, ‘is more than a horrifying human tragedy; it is a brutal lesson in the changing nature of modern war … a lesson that applies just as much to Iraq, Afghanistan, and the war on terrorism as it does to the fighting in Lebanon. The lesson is simple: limited wars must be fought in ways that give avoiding collateral damage and civilian casualties at least as much priority as destroying the enemy’ (
<xref ref-type="bibr" rid="ref130">Cordesman, 2006</xref>
).</p>
<p>Cordesman’s short analysis amounts to what ought to be a major revision of limited war doctrine, one that supports the arguments I have been seeking to make here. Citing the civilian deaths and damage to infrastructure in Lebanon, Afghanistan and Iraq, he excoriated traditional strategic doctrines which ‘carelessly seek immediate tactical advantage at the cost of major strategic risks and penalties’. This, he said bluntly, ‘is stupid and dangerous. Creating more enemies than you kill is self defeating; making it politically and ideologically impossible to end a war and so is spreading new levels of anger and hatred to other countries and/or factions’. Victory against terrorists and insurgents ‘will ultimately occur at the political and ideological level, and in the tactics of shaping the psychological, perceptual, and media dimensions of the conflict’ (
<xref ref-type="bibr" rid="ref130">Cordesman, 2006</xref>
). This, he concludes, is of great relevance for doctrines of defence transformation, net-centric warfare and effects-based operations:</p>
<disp-quote>
<p>All of these concepts have tended to downplay the ideological and political dimensions of war, and the dangers of civilian casualties and collateral
<xref id="page_39" ref-type="page"></xref>
damage. They call for impossible levels of near real-time intelligence and situational awareness even in narrow tactical terms in dealing with the enemy. Until recently, they have given far too limited priority to the ability to know the political sensitivities of the operations they are meant to conduct and civilian casualties and collateral damage, and even today the efforts to modernize and adapt them are generally crude.</p>
<attrib>(
<xref ref-type="bibr" rid="ref130">Cordesman, 2006</xref>
)</attrib>
</disp-quote>
<p>Cordesman’s concerns speak strongly to the practice of choosing and using military force; but what is just as important is the larger normative and geopolitical framework that is global in scope, that extends widely and unpredictably across time and space. In this space questions of meaning, legitimacy, and belief are of much greater moment than material measures of power. So how to make better meanings? How to render terrorism powerless?</p>
<p>What bin Laden’s speeches demonstrate is
<italic>the power of the example.</italic>
While the US was exercising its geopolitical and military power over the past half-century, according to the instrumental strategic theories of the day, their actions were being observed, interpreted and then signified in a very different way – as an imperative, licence and justification to attack American civilians in a systematic campaign. What may have been seen as an exercise in rational war making, containment or coercive diplomacy was in fact also a process of making meaning that
<italic>its authors could never control.</italic>
Who would have thought that the tragedies of Hiroshima and Nagasaki, which stimulated a profoundly pacifistic disposition amongst many Japanese, would come to form part of the normative apparatus of legitimation with which an Islamist insurgency would, 40 years later, launch a campaign of terror against the West? In turn the war in Vietnam, the containment of Iraq and Israel’s wars against the Arabs were interpreted to the same ends – as more in a long list of
<italic>examples</italic>
that justified a commensurate violence. It does not matter that Islamist interpretations of western actions are often selective, erroneous and self-regarding, concerned only with the safety of Muslims and scornful of the lives of other peoples and faiths. Once they are folded into an ideology of violence such interpretations become
<italic>strategic facts</italic>
that no amount of political ‘spin’ or argument can dislodge; they become crucial components of a strategic process that is only marginally susceptible to our influence or control.</p>
<p>Hence even thoughtful arguments for efforts ‘to shape’ the ‘perceptual and media elements’ of a conflict, as Cordesman suggests, may still betray too much instrumental confidence. It is always another actor and community that will ‘shape’ and determine the meaning of our actions, and the best we can do is to act with integrity and understand the background discourse that will guide this process of interpretation. We may rightly dislike or fear Islamist ideology, but it all too often forms such a discourse, and hence the Bush Administration’s arguments for promoting democracy in the Middle-East as ‘the antithesis of terrorist tyranny’ will dangerously backfire (
<xref ref-type="bibr" rid="ref380">NSC, 2006</xref>
). Indeed the Chatham House scholar Nadim Shehadi argues that ‘talk about spreading liberalism is a spontaneous knee-jerk reaction but the real policy that is developing is that of promoting Islam’ (2004).
<xref id="page_40" ref-type="page"></xref>
Viewed against the background of Palestine, Iraq, Qutb’s critique of western reason as ‘a conscious arrogation of God’s authority’ (
<xref ref-type="bibr" rid="ref179">Euben, 2002</xref>
: 15), and the long-standing Islamist critique of Arab elites’ co-operation with western powers, ‘democracy’ takes on a very different meaning: as dangerously threatening to Arab and Muslim communities. Even if we accept that the motives for overthrowing Saddam Hussein were many, and that some genuine goodwill was involved, the key strategic question is what kind of
<italic>example</italic>
contemporary Iraq is.</p>
<p>The
<italic>example</italic>
is a particularly powerful form of meaning: the exemplar, the exemplary, the event transformed into a normative principle that can be disseminated and used until it takes up the entire space of the possible. Abu Ghraib and Camp X-ray then are not merely prisons; they are examples, and their meaning, as Richard Jackson suggests, is that we are involved not in a war against terrorism but a ‘war of terrorisms’ (
<xref ref-type="bibr" rid="ref272">Jackson, 2005</xref>
: 183). Such a war cannot be won; terror will be its only victor, steadily taking up more and more of the space of the possible.</p>
<p>My view is that the best hope of delegitimating and eventually eliminating terrorism lies in attention to the power of the example. The hope lies in developing genuinely multilateral frameworks, at the level of both governments and international civil society, and in building and implementing genuinely consistent and morally defensible normative frameworks about the use of violence – of all kinds and from all sources – against innocents. What might now be the case if the United Nations’ Security Council had created an international tribunal, which included Islamic judges, to try bin Laden and his accomplices for the 9/11 and similar atrocities? What might now be the case if the US had planned its war in Afghanistan more thoroughly, involved NATO and other allies as equal partners, been far more careful of the impact of military operations on civilians and the humanitarian crisis, and in turn been committed to rehabilitating its economy and ensuring long-term stability? What might now be the case if the US had treated terrorist suspects according to US law and the Geneva conventions, and rejected the practice of extraordinary rendition? What might now be the case if Israel had not conducted Operation Defensive Shield or invaded Lebanon, but instead returned to negotiations with the PLO and concluded a final agreement based on the Clinton parameters and the Palestinian position at Taba in 2001? What might now be the case if Iraq had been left untouched, and pressure for a final UN accounting of its WMD capabilities been exchanged for a lifting of sanctions? If western politicians had avoided passing legislation that undermined civil rights, and actions that could be perceived as demonizing Muslims and Arabs? True, none of this would have been simple or easy, and what remains of Hamas, Hezbollah, Islamic Jihad and al Qaeda might still be preaching hatred and seeking to stage attacks. However I venture that their organizations and their ideologies – their material
<italic>and</italic>
moral force – would be weaker than they are today, and we would all be a great deal safer. In the last resort, direct forms of action against terrorists may remain necessary, but by themselves they will fail unless we succeed in building a new global normative architecture that resonates deeply with Islamic communities.</p>
<p>
<xref id="page_41" ref-type="page"></xref>
Hence, in the search for security against terrorism the widely held view that security can be sought through force – that force is force at all – must be rethought, along with many of the fundamental Clausewitzian assumptions of strategic doctrine. But Clausewitz also cautioned that ‘the first of all strategic questions’ was ‘the kind of war upon which [we] are embarking’ (1976: 88), and if we reject the ontological presumption for violence inherent in his thought, he still has something to teach us. Think of the future terrorists, currently unknown to us
<italic>or</italic>
themselves. We could rewrite the famous Clausewitzian formula thus: in a time of terror, security is many acts of
<italic>non-force</italic>
that change the enemy’s will, that may prevent them becoming an enemy at all.</p>
</sec>
</body>
</book-part>
<book-part book-part-type="chapter" book-part-number="3" id="chapter3">
<book-part-meta>
<title-group>
<title>
<xref id="page_42" ref-type="page"></xref>
‘War on terror’/‘war on women’</title>
<subtitle>Critical feminist perspectives</subtitle>
<alt-title alt-title-type="running-head-verso">‘War on terror’/’war on women’</alt-title>
<alt-title alt-title-type="running-head-recto">Katrina Lee-Koo</alt-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<given-names>Katrina</given-names>
<surname>Lee-Koo</surname>
</name>
</contrib>
</contrib-group>
</book-part-meta>
<body>
<disp-quote>
<p>The fight against terrorism is also a fight for the rights and the dignity of women</p>
</disp-quote>
<p>This claim was made by the First Lady of the United States, Laura Bush, in a radio address to the nation two months after the September 11 terrorist attacks. It was designed to ‘kick off a world-wide effort to focus on the brutality against women and children by the al-Qaida terrorist network and the regime it supports in Afghanistan, the Taliban’ (
<xref ref-type="bibr" rid="ref82">Bush, 2001</xref>
). Fulfilling a long-held feminist ambition, the world’s most powerful leaders (and their wives) turned their focus and resources to the abuses suffered by Afghan women at the hands of the brutal Taliban regime. After decades of neglect, complicity, and perhaps even tacit involvement in the terror facing Afghan women, the United States government now claimed to be taking the lead in addressing gendered oppression. While most feminists applauded the attention that this issue was now receiving, many did so with caution. And they were right to be cautious.</p>
<p>It has been over half a decade since Laura Bush’s proclamation. Yet, in this ongoing and bloody ‘War on Terror’, now fought in both Afghanistan and Iraq, security still eludes women. If anything, the situation for women has dramatically worsened. Unfulfilled promises of economic, personal and political security linger in Afghanistan while increasing, deliberate, and chaotic violence rages against women in Iraq. The ‘War on Terror’ has distanced many women in these battle zones from any sense of basic physical security. Consequently, when examined from a critical feminist security studies perspective, the ‘War on Terror’ has in many ways become a ‘War on Women’ as multiple terrors infiltrate their lives.</p>
<p>Critical feminist intervention has sought to reveal and analyse these new terrors burgeoning out of the ‘War on Terror’ project. Overwhelmingly this research points to a security project which is driven by a western hyper-masculinity, relies upon the use of force, and attempts to enforce a singular, hegemonic notion of political security. All three of these designs disparage characteristics assigned to the feminine. Feminist analysis reveals how the ‘War on Terror’ project sometimes relies upon this denigration, while at other times carelessly causes and disregards it. This analysis reveals, embedded in the ‘War on Terror’s’ design, the potential for a plethora of human security threats to women. For example, US servicewomen fighting the war in Iraq have reported some of the worst sexual harassment the
<xref id="page_43" ref-type="page"></xref>
US military has seen. Since the 2003 invasion there have been over 500 filed complaints of sexual harassment in the US military (
<xref ref-type="bibr" rid="ref214">Goldenberg, 2006b</xref>
) while cases of domestic violence in military families in the US have risen dramatically since the US deployment to Afghanistan (
<xref ref-type="bibr" rid="ref309">Komp, 2006</xref>
). Furthermore, gendered identities are tightly patrolled and the ‘War on Terror’ is played out on women’s bodies. In Australia and the UK, the debates surrounding Muslim women’s wearing of the veil in workplaces and public spaces (
<xref ref-type="bibr" rid="ref37">BBC, 2006</xref>
) see the use of women’s bodies to patrol and discipline identity and belonging in this time of terror.</p>
<p>Elsewhere, the perceived emasculation of Afghan and Iraqi men by the presence and power of occupying Coalition troops is considered a contributing factor to the rise in domestic violence in those countries (see
<xref ref-type="bibr" rid="ref268">IRIN, 2006a</xref>
and
<xref ref-type="bibr" rid="ref234">Hammer, 2003</xref>
). Approximately 90 Iraqi women become widows every day (
<xref ref-type="bibr" rid="ref270">IRIN, 2006c</xref>
) and women in both Iraq and Afghanistan are now more likely to become victims of honour crimes, trafficking, poverty and spontaneous violence than they were prior to the invasions of their countries (
<xref ref-type="bibr" rid="ref40">Beaumont, 2006</xref>
). While this is only a snapshot, critical feminist analysis carefully traces, reveals and documents these consequences of the ‘War on Terror’ for women.</p>
<p>This chapter applies a critical feminist security studies analysis to better account for these crises facing women’s lives. In doing so it peels away the layers of misrepresentation that suggest this ‘War on Terror’ is a ‘War for Security’. Instead, it points to the terror that bedevils women’s lives to argue that the current course of action will not address terrorism, in any of its forms, or bring security to people’s lives in a way that encourages peace to geminate. By investigating examples from both the Afghanistan and Iraq campaigns of the ‘War on Terror’, this chapter suggests that a critical feminist approach offers three useful insights into the study of security and the ‘War on Terror’. First, it offers a new way of theorising key decisions, issues and events by highlighting the gendered dynamics implicit in them, as well as the gendered effects of them. Here, the manipulation of the identities of the ‘Afghan women’ during the bombing of Afghanistan, the rescue of Pfc Jessica Lynch in Iraq, and Lynndie England’s role in the Abu Ghraib scandal is revealed. These examples demonstrate the deep seated gendered assumptions that the ‘War on Terror’s’ claim to moral justification, ethical behaviour, and an emotional/political sense of ‘right’, relies upon. Second, this chapter offers a hitherto unexamined range of gendered issues which are clearly embedded either as integral to, or a product of, the ongoing conflict. It looks particularly at the appalling raft of insecurities facing women in central and southern Iraq in the current phase of the ‘War on Terror’ campaign. In doing so, it does not claim that women are the only victims of the ‘War on Terror’ or that their suffering is necessarily more drastic than other members of their community. Rather, this analysis demonstrates the utility of feminist methodologies in reflecting gendered experiences and therefore constructing and revealing more honest narratives of the ‘War on Terror’.</p>
<sec id="sec3_1">
<title>
<xref id="page_44" ref-type="page"></xref>
Unveiling gendered wars</title>
<p>The dramatic opening of the ‘War on Terror’ reads like an old-fashioned rescue romance drama. Smarting from an attack on its homeland, the strong and brave hero/protector seeks out those supposedly responsible and not only exacts revenge but rescues oppressed and vulnerable damsels in the process. Far from being facetious, this underlying tale of powerful masculinity and feeble femininity motivated the moral, political and ethical justification for the US attack upon Afghanistan in the wake of the September 11 tragedies. In doing so it relied upon a widespread acceptance of what feminists refer to as the ‘protection myth’. The ‘protection myth’ simply identifies uncivilised ‘bad’ men torturing or threatening vulnerable and powerless women who require rescuing by enlightened and heroic ‘good’ men. Stiehm (
<xref ref-type="bibr" rid="ref499">1982</xref>
) articulates this as being a triangular relationship between the protected/victim, the threat/villain, and the protector/hero. However, despite its simplicity, the ‘protection myth’ only functions if each party conforms to their gendered roles. For the protector, his gendered identity reveals a parallel masculinity in operation. On the one side his masculinity is embodied in the aggressive and militaristic characteristics required to launch war, but attending that is also a chivalrous and gallant attitude towards the vulnerable feminine (
<xref ref-type="bibr" rid="ref561">Young 2003</xref>
: 224). On the other hand, the threat/villain identity embodies masculinity’s dark side: uncivilised, barbarous and cruel, while the victim/protected remains helpless and often voiceless. The ‘protection myth’ is a powerful narrative that has a long association with wars and colonial and frontier projects. It directs and disciplines gendered identities in ways that serve the state project. Men who refuse to defend women’s honours in war are labelled cowards and unpatriotic; women who refuse to accept help or support their men are considered similarly treacherous or ignorant of their own good.</p>
<p>It was within this framework of a ‘protection myth’ that the US drew much of its moral and political justification for launching the ‘War on Terror’. The US drew upon the very real barbarism exacted upon Afghan women by the Taliban regime to assuage any doubt that the enemy they were facing was indeed ‘evil’, or that the US wanted more than revenge. In order to establish an emotional and moral grounding for this campaign, Afghan women were cast into the role of the feminine victim in need of rescue. Promoted by war leaders and the media, the plight of Afghan women became one of the main international news stories after September 11. Coverage of Afghan women in print and broadcast media across the US increased dramatically in the weeks after September 11 (
<xref ref-type="bibr" rid="ref492">Stabile and Kumar, 2005</xref>
: 772). Images of Afghan women in burqas were splashed across front pages and in the period between September 11, 2001 and January 1, 2002 US mainstream newspapers published six times as many articles on the plight of Afghan women than they had in the previous 18 months (
<xref ref-type="bibr" rid="ref492">Stabile and Kumar, 2005</xref>
: 772). Behind their burqas these women remained largely silent but were nonetheless the dividing line between the ‘evil’ Taliban and ‘good’ Coalition forces. Furthermore, suggestion of the women’s overwhelming gratitude for their liberation was a focal point of the ‘success’ of Operation Enduring Freedom.
<xref id="page_45" ref-type="page"></xref>
For instance, as US ground troops forced their way into Afghanistan
<italic>USA Today</italic>
described a scene where ‘six (Afghan women) shed the enveloping burqas that the Taliban forces all women to wear, threw them on the fire and lit the way for their rescuers’ (quoted in
<xref ref-type="bibr" rid="ref492">Stabile and Kumar, 2005</xref>
: 773).</p>
<p>While the role of Afghan women was more visual than vocal, the wives of both the US and UK’s leaders provided the moral, feminine legitimacy to the bombing campaign. In what were unique interventions into politics by both Laura Bush and Cherie Blair, each made a major address to their respective nations on the issue of women’s rights in Afghanistan. Bush’s address from her family’s Texas ranch on 17 November 2001 was the first time that a First Lady had given the weekly radio presidential address. She used her on-air time to describe the oppression of the ‘Taliban and its terrorist allies’ and claimed that ‘civilized people throughout the world are speaking out in horror – not only because our hearts break for the women and children in Afghanistan, but also because in Afghanistan we see the world the terrorists would like to impose on the rest of us’ (
<xref ref-type="bibr" rid="ref82">Bush, 2001</xref>
). Two days after Mrs Bush’s speech, Cherie Blair, along with women Cabinet ministers, made a similar plea on behalf of Afghan women. Mrs Blair claimed that ‘the women in Afghanistan are as entitled as the women in any country are to have the same hopes and aspirations for ourselves and for our daughters – a good education and career outside the home if they want one, the right to healthcare and, of course, most importantly, a right for their voices to be heard’ (
<xref ref-type="bibr" rid="ref34">BBC, 2001</xref>
). References by Bush to ‘civilised people’ and Blair to the universalising of women’s rights alludes to both an orientalism as well as a universalism of liberal feminist views on women’s rights. Furthermore, the use of the ‘wives’ to speak of ‘women’s issues’ suggests a maternal or feminine knowledge which legitimises only women to speak with authority and empathy of these issues as if they weren’t human rights concerns. In this sense, it neatly demarcates the gendered roles and responsibilities of the issue. In her address Laura Bush spoke as a mother, a wife and a woman from her home in Texas while her husband directed a military campaign from his office in Washington. For Laura Bush, the abuse in Afghanistan was not a political or a politicised issue but one of morality and common humanity. After all, what civilised person would stand idly by while innocent and defenceless women were tortured?</p>
<p>Reminiscent of the ‘white feathers campaign’ of the First World War where British women goaded young men to join the Army, Laura Bush linked the ‘War on Terror’ and the violence against women in a way that suggested that to
<italic>not</italic>
support the war was tantamount to complicity and cowardice. As a strong and powerful feminine (but not feminist) character, Laura Bush played an important role in legitimating the protection scenario and disciplining gendered identities. She was aptly suited to her role as feminine mother of the nation sending her sons to war in a just cause. Less prominent, however, were those whose behaviour did not conform to the dominant narrative. For example, the US and UK media and political establishments had a short-lived alliance with RAWA (Revolutionary Association of the Women of Afghanistan). RAWA, a women’s rights NGO founded in 1977, used the opportunity provided by the media interest to expose
<xref id="page_46" ref-type="page"></xref>
the treatment of women in Afghanistan. In return, their stories and resources were used by the war leaders to demonstrate the demonic nature of the enemy. However this became politically inconvenient for the war leaders as RAWA behaved less as vulnerable and grateful damsels in distress and more as active, self-determining feminists. With a long tradition of political activism, RAWA independently stepped out of the feminised private realm and into public sphere politics unchaperoned by a male protector. When it became clear that RAWA’s emancipatory ambitions diverged from those of liberal feminists in the US and, particularly, when they opposed the US-led bombing of their homeland (
<xref ref-type="bibr" rid="ref411">Pettman, 2004</xref>
: 90) the alliance came to an abrupt end. On the fifth anniversary of the US bombing of Afghanistan, RAWA member Zoya (
<xref ref-type="bibr" rid="ref562">2006</xref>
) proclaimed: ‘No doubt the war on terror toppled the misogynist and barbaric regime of Taliban. But it did not remove Islamic fundamentalism, which is the root cause of misery for all Afghan people; it just replaced one fundamentalist regime with another’. Such conclusions, contrary to those of the architects of the ‘War on Terror’, meant that RAWA lost its legitimacy and alliance with the US war leaders.</p>
<p>During the Iraq campaign, the political manipulation of gendered identities as a means of encouraging an emotional and moral response to the war was best seen during the dramatic rescue of US Private Jessica Lynch by US Navy Seals and Army Rangers in April 2003. The rescue of Jessica Lynch ‘was one of the most extensively covered events [by media in the US] of the 2003 US-led invasion of Iraq’ (
<xref ref-type="bibr" rid="ref315">Kumar, 2004</xref>
: 297). Lynch was a 19 year old woman from West Virginia who had been deployed to Iraq as a supply clerk with the US Army. During a transport mission in Nassiriya her convoy had taken a wrong turn and was ambushed by Iraqi soldiers. A gun battle ensued in which 11 US soldiers were killed. Lynch was taken by Iraqi soldiers to a nearby hospital where she was held for eight days and given medical attention before her comrades, in spectacular fashion, burst through the doors of the civilian medical facility and whisked Lynch to nearby transport. The rescue was filmed and edited into a five minute tape which was released to media networks. When Lynch returned to the US she arrived home to a mass of media and public interest who lauded her heroism and bravery in the face of the enemy. She was the subject of a mass of print and broadcast media. The documentary
<italic>Saving Private Lynch</italic>
and the drama
<italic>Saving Jessica Lynch</italic>
were both aired in November 2003. This coincided with Veterans’ Day in the US and the publication of her book
<italic>I am a Soldier, Too</italic>
written by journalist Rick Bragg. She was interviewed in the US by Diane Sawyer, Katy Couric and David Letterman, and was the feature story in many news magazines. Yet, while this simple narrative remains largely uncontested, the rest of her story has been a complex matrix of competing interests and intrigues most of which have been motivated and mobilised in pursuit of a particular political vision about the war, and the roles of gendered identities within it.</p>
<p>Read in its simplest terms, the rescue of Lynch was a rare, yet spectacular, good news story from a war zone that was degenerating for the United States. The narrative of brave, heroic and self-sacrificing hyper-masculine identities who stormed in to save a weaker, captive, distressed feminine identity from a brutal and
<xref id="page_47" ref-type="page"></xref>
calculating enemy provided a number of simple moral metaphors for which the US, as a nation, could once more feel good about the war. In each of these metaphors Lynch plays the identities which have been feminised by September 11. She plays the feminine nation of the United States, aggressively and violently attacked and violated on September 11: a simple, kind-hearted, home-grown all-American girl. She loves her family and is from a small, close-knit community where she once won Miss Congeniality in a beauty pageant. References to her homeland, her femininity and her vulnerability all play into the broader representations of the US nation and its innocence. For Takacs (
<xref ref-type="bibr" rid="ref506">2005</xref>
: 302), ‘this exclusive yet reassuring image of national identity conforms to the Bush administration’s own conception of the homeland as a vulnerable community in need of militarised protection’. In this case the military protection of the feminine nation is provided by the masculine state. Yet, in Iraq, Lynch provided a clear juxtaposition of American identity against that of the alien Iraqi Other. Against the backdrop of the Iraq desert, Lynch was both familiar and modern. Her blue eyes and blonde hair, her Army fatigues and big smile dramatically contrasts those of war weary Iraqi women who are largely covered up, denied many liberal rights, and lack the familiarity that Lynch inspires. Here Lynch embodies freedom, equality and modern entitlements, the very qualities which the US proposed to defend in the ‘War on Terror’.</p>
<p>This representation of Lynch, as soldier (yet feminine), and hero (yet in need of rescue) served a number of agendas within the US. On the one hand, the Lynch drama reveals the US to be a liberal, and indeed liberal feminist state. Initial reports, which later proved to be false, that Lynch ‘fought fiercely and shot several enemy soldiers … firing her weapons until she ran out of ammunition’ (
<xref ref-type="bibr" rid="ref457">Schmidt and Leob, 2003</xref>
) during the dramatic gun battle in Iraq reminded the nation of its liberal equality in allowing women to be heroes. On the other hand, while the ‘fact’ that Lynch is a hero is unquestioned, ‘her heroism is tempered by sexist notions of women’s bravery’ (
<xref ref-type="bibr" rid="ref315">Kumar, 2004</xref>
: 301). After all, at the end of the day, she was still in need of masculine protectors. Either way, the narrative served as a sound and rational justification for the need for a hyper-masculine foreign policy, one which acts chivalrously and with aggressive determination, but is nonetheless in service of the moral good. While it superficially raised feminist issues relating to the role of women in fighting the ‘War on Terror’, the manipulation of Lynch as a gendered identity was ultimately undertaken in the service of a patriarchal foreign policy designed to use gender to generate ‘good spin’ on a war going badly. It encouraged an emotional, rather than strategic, response to a situation by manipulating the perceived vulnerability of femininity in international politics. This femininity was literally embodied in Jessica Lynch but metaphorically graphed onto the nation of the United States and to an extent, the nation of a feminised Iraq, brutally raped by Saddam Hussein and rescued by American soldiers. The public acceptance of the multiple metaphors of Lynch’s rescue relied upon, and needed to be unsuspicious of, deep-seated gendered politics manipulated by the Pentagon and the Bush Administration. These gendered politics promoted and privileged a powerful and hegemonic hyper-masculinity and reinforced its obligation to do whatever it takes to protect the weak, the powerless and the vulnerable: in other words, the
<xref id="page_48" ref-type="page"></xref>
feminine. In Jessica Lynch’s own words, ‘they used me as a way to symbolize all this stuff’ (quoted in
<xref ref-type="bibr" rid="ref315">Kumar 2004</xref>
: 308).</p>
<p>The use of gendered identities becomes more complex when we include those of another young woman who, like Jessica Lynch, hailed from West Virginia and became an emotional, gendered symbol of the ‘War on Terror’. Lynndie England represented Jessica Lynch’s antithesis: England was not attractive, bright, bubbly, pure or adored by the nation. Yet, like Jessica Lynch, she prompted an emotional reaction to the ‘War on Terror’ and fuelled a particular public understanding of its role as a security project. Lynndie England was one of the seven reservists (three of whom were women) who were initially charged with prisoner abuses at the US run Abu Ghraib prison in Iraq. Images of England and her colleagues torturing and sexually abusing Iraqi prisoners became infamous around the world. Most recognisable of these photographs was one depicting England, only 20 years old when the photograph was taken, holding a naked Iraqi prisoner on a dog’s leash. While the raft of photographs included a number of England’s colleagues, with 13 eventually charged in relation to the abuses, it was England who became the poster-girl of Abu Ghraib.</p>
<p>Like Lynch, the representations of England’s femininity are both complex and, at times, carefully choreographed. Her gendered identity, within the context of Abu Ghraib, enabled her to be both powerful (though not in a feminist sense) and powerless. Her power derived from her ability, as a woman, to exact torture upon Iraqi prisoners. Her use of torture upon Iraqi prisoners elevated her to a position of masculine power while simultaneously serving to further feminise her victims. In addition to this, England’s position as American, part of an occupying force, in command of the prisoners, and being white all encouraged a masculine image of England. In the context of the Abu Ghraib prison these were all powerful identity markers in comparison with being Iraqi, brown-skinned, Muslim and captive. Juxtaposed to England, the Iraqi captives were stripped of their masculinity, and thereby their power. This also accounts for the sexualised nature of the violence. Now infamous pictures of naked men being forced to lie on top of each other, to masturbate in a line, to wear women’s underwear, and simulate homosexual acts can all be read as a manipulation of power dynamics designed to feminise the captives and masculinise the captors in a powerless/powerful dynamic. With her short hair and tomboy appearance England was assimilated into this role with comparative ease. The same could not be said, however, of her colleague Sabrina Harman, also convicted in the Abu Ghraib scandal, whose her blond hair and blue eyes made her seem, perhaps, uncomfortably like Jessica Lynch.</p>
<p>However, England’s relative position of power, obscene though it was, should not be read as a successful project of women’s empowerment. Lynndie England may have had the power to ‘hold the leash’ but she was still, as a woman, in an extremely vulnerable position. Perhaps she ‘chose’ to engage in torture but she did so within a military culture whose foundation lies in a commitment to hegemonic masculinity. While England admits thinking that the prisoner abuse was ‘weird’ (quoted in
<xref ref-type="bibr" rid="ref345">McKelvey, 2005</xref>
), she claims that she was ordered to be involved. This was heightened by her personal involvement with Charles Graner, 15 years her
<xref id="page_49" ref-type="page"></xref>
senior, with whom she later had a child. Graner, when he first sent the photograph of England holding the prisoner’s leash to his family annotated the photo with ‘Look what I made Lynndie do’ (quoted in
<xref ref-type="bibr" rid="ref345">McKelvey, 2005</xref>
). A more sympathetic reading of England’s femininity, then, sees her beholden to Graner, and to the military. Colonel Janis Karprinski, who was in charge of the Abu Ghraib facility, suggested that England saw a protector in Graner and was powerless against his whims and the orders from above (
<xref ref-type="bibr" rid="ref345">McKelvey, 2005</xref>
). One commentator notes ‘England was a small-town girl, not even of legal drinking age, when she found herself halfway around the world, in an amoral place, surrounded by violence and infatuated with a volatile, manipulative man’ (
<xref ref-type="bibr" rid="ref345">McKelvey, 2005</xref>
). Yet, the fact that Charles Graner, who had a history of violence against women, orchestrated much of the prisoner abuse did not offend the nation as much as the possibility that a young woman should have stepped so far out of her traditional gender role.</p>
<p>Attempts by the Bush Administration to explain away England and her colleague’s actions as those of a few ‘bad apples’ (
<xref ref-type="bibr" rid="ref105">Carter, 2004</xref>
) also saw her complex gender identity used against her. Her masculine actions (and even appearance) were particularly deplorable to mainstream America. Yet there was the sense that because England’s behaviour was so abnormal to her gender, then her actions could be explained away as being an isolated aberration rather than a systemic problem within the military culture. Consequently, the Abu-Ghraib scandal could be dealt with by scapegoating an unprotected, junior ranked woman. In doing so, however, it does not address the possibility of systemic problems within the military’s culture that may have enabled the torture in the first place. Furthermore, it reinforces, rather than critically examines, the deployment of gender in this ‘War on Terror’. Currently serving a three-year sentence, England’s military attorney has advised her before she appears before the parole board to grow her hair long, in order to look more feminine (
<xref ref-type="bibr" rid="ref345">McKelvey, 2005</xref>
).</p>
</sec>
<sec id="sec3_2">
<title>‘War on terror’/‘war on women’</title>
<p>From American servicewomen to civilian women, the subordination of the feminine remains a constant feature of the ‘War on Terror’. In particular, the invasion of Iraq in March 2003, designed to lift the Iraqi people from ‘insecurity and tyranny’ (
<xref ref-type="bibr" rid="ref546">White House, 2003</xref>
) has caused widespread insecurity for Iraqi women. Of course women have not been alone in their suffering, nor do they suffer necessarily to a greater extent than other members of the community. Feminist research however, has been important in highlighting specific violences against women, and analysing the specifically gendered impacts arising from the broader humanitarian tragedy currently engulfing Iraq. With international preoccupation focusing upon the broader, public issues of terrorism, state integrity, governance, sustainability of the occupation, and the general humanitarian crisis, often little attention is given to the effects of the war on women.</p>
<p>Claims that the ‘War on Terror’ is a ‘War for Security’ resonates little across Iraq. Institutional and effective security is not uniformly or consistently available to individuals, communities or the state itself. Personal or physical security,
<xref id="page_50" ref-type="page"></xref>
security in the form of access to clean water, healthcare, electricity or stable employment is similarly not widespread (
<xref ref-type="bibr" rid="ref320">Lasky, 2006</xref>
: 2). Within this environment of general chaos, women are finding their personal security particularly targeted. While the experiences of women across Iraq vary, and can depend upon class and geographic region, women in southern and central Iraq are finding their lives particularly threatened in the post-invasion period. The increase of kidnapping, rapes and murder of women has been documented by a number of human rights organisations and NGOs working in the conflict zone (see, for example,
<xref ref-type="bibr" rid="ref13">Amnesty International, 2005</xref>
). Women have been targeted by individual Coalition troops and contractors (
<xref ref-type="bibr" rid="ref213">Goldenberg, 2006a</xref>
;
<xref ref-type="bibr" rid="ref235">Harding 2004a</xref>
and
<xref ref-type="bibr" rid="ref236">b</xref>
), the Iraqi police, local criminal gangs and religious extremists (
<xref ref-type="bibr" rid="ref40">Beaumont, 2006</xref>
). They are targeted for a number of reasons: to send a political message to their male ‘protectors’; to intimidate and discipline women’s beshaviour and activities; for criminal and illegal profit; and as a violent opportunity arising from the state’s lawlessness. A number of women professionals and activists have been targeted for assassination by religious militia groups who are trying to redesign the rights and opportunities available to women through violent intimidation (
<xref ref-type="bibr" rid="ref474">Shumway, 2005</xref>
). For example, in 2005 the body of well-known pharmacist and women’s rights activist Zeena al-Qushtaini was discovered on a Baghdad highway ten days after her abduction. She had two bullet holes close to her eyes, had been dressed by her captors in the Islamic
<italic>abaya,</italic>
which she rarely wore, and had attached to it a message that read: ‘She was a collaborator against Islam’ (quoted in
<xref ref-type="bibr" rid="ref474">Shumway, 2005</xref>
). She is one of dozens of women targeted because of their visible public profile.</p>
<p>The assassination of professionals constitutes only a small number of women who have been murdered or ‘disappeared’ in the new Iraq. The ‘Organisation for Women’s Freedom in Iraq’ has estimated that more than 2,000 Iraqi women have disappeared since the fall of Saddam (
<xref ref-type="bibr" rid="ref45">Bennett, 2006</xref>
) while ‘Women’s Freedom’ has estimated nearly 3,500 (
<xref ref-type="bibr" rid="ref271">IRIN, 2006d</xref>
). Many of these women have been stolen (or sold) into sexual slavery. Despite the new constitution explicitly prohibiting the trafficking of women and children (under Article 35), the chaos engulfing Iraq has made it easy for traffickers to force women out of Iraq and into prostitution industries and sexual slavery in Yemen, Syria, Jordan, and the Gulf countries (
<xref ref-type="bibr" rid="ref525">US State Department, 2005</xref>
: 232). In a June 2005 report on trafficking the US State Department claimed that the extent of the problem in Iraq is ‘difficult to appropriately gauge’ but quoted evidence suggesting that ‘in Syria and Yemen, there are thousands of Iraqi women working in prostitution in the two countries under conditions that constitute severe forms of trafficking in persons’ (
<xref ref-type="bibr" rid="ref525">US State Department, 2005</xref>
: 232). Taking advantage of women’s vulnerability and families’ desperateness, traffickers have lied, coerced and forced their way into a booming market where women and young girls are the commodity. Research indicates that women are abducted by organised criminal groups, sold by family members or tricked into believing that they will be working abroad for real wages (
<xref ref-type="bibr" rid="ref271">IRINd, 2006d</xref>
). Attempts to stem the tide of trafficking by Iraqi police have been minimal. The State Department reports that efforts to train police on issues regarding trafficking have been ‘substituted with
<xref id="page_51" ref-type="page"></xref>
additional security training in order to address ongoing insurgent activities’ (
<xref ref-type="bibr" rid="ref525">US State Department, 2005</xref>
: 233).</p>
<p>The rise of Islamic fundamentalism that has become evident in post-invasion Iraq has had mixed responses and mixed effects on the lives of Iraqi women. In central and southern Iraq particularly, radical clerics, conservative Shi’a political parties, and paramilitary forces have regained power after years of having their influence curtailed by Saddam’s regime. Consequently, Lasky (
<xref ref-type="bibr" rid="ref320">2006</xref>
: 8) points out, ‘radical religious groups can more openly harass women who defy their interpretations of Shari’a’. This has seen a social patrolling and disciplining of women’s dress, behaviour and activities. Anecdotal evidence collected by NGOs and researchers suggest that women, particularly in urban areas, have been ‘terrorised’ into wearing the
<italic>hijab</italic>
(veil) or
<italic>abaya</italic>
(full length Islamic dress). Young women at colleges and universities have particularly been victims of attack and harassment designed to intimidate them to conform to radical interpretations of Islamic behaviour (
<xref ref-type="bibr" rid="ref6">Abdela, 2005</xref>
). As already discussed, women participating in public issues and affairs have been subject to verbal threats and intimidations, acid attacks and assassination. Similarly, men and women advocating women’s rights have been subject to attacks. Reports suggest that 38 lawyers have been murdered and hundreds attacked for defending cases seen by radicals as contrary to Islam (
<xref ref-type="bibr" rid="ref269">IRIN, 2006b</xref>
). The Iraqi Lawyers Association have indicated that lawyers advocating on behalf of women in cases of child custody, inheritance and honour crimes are particularly vulnerable to attack (
<xref ref-type="bibr" rid="ref269">IRIN, 2006b</xref>
). In July 2006 a well-known lawyer, Salah Abdel-Kader, who handled cases of honour killings and custody issues, was shot dead in his Baghdad office. A note near his body stated ‘This is the price to pay for those who do not follow Islamic laws and defend what is dreadful and dirty’ (see
<xref ref-type="bibr" rid="ref269">IRIN, 2006b</xref>
).</p>
<p>Lawyers have been particularly vocal in their criticisms of the new Iraqi constitution which will potentially see women stripped of their rights. Prior to the October 2005 unveiling of the constitution, US President George Bush told the American people in August that ‘the fact that Iraq will have a democratic constitution that honors women’s rights, the rights of minorities, is going to be an important change in the broader Middle East’ (
<xref ref-type="bibr" rid="ref89">Bush, 2005</xref>
). Yet, for many Iraqi women, the ironic ‘fact’ is that women’s rights had better guarantee and consistency of access under Saddam’s dictatorship (
<xref ref-type="bibr" rid="ref259">Hunt and Posa, 2004</xref>
: 42). While the new constitution ‘aims to achieve a percentage of women’s representation not less than one-quarter of the Council of Representatives members’ (Article 47), it does not necessarily translate into a clear women’s rights agenda. While the quota was successfully achieved in the transitional National Assembly elected in January 2005, nearly half of the women elected are members of a conservative Shi’a coalition and have not vocally deviated from the party’s conservative line (
<xref ref-type="bibr" rid="ref320">Lasky, 2006</xref>
: 14). This supports suggestion that the parliament has been stacked by clerics ‘with women who had few qualifications or political ambitions of their own but who would blindly support their agenda’ (
<xref ref-type="bibr" rid="ref414">Philp, 2005</xref>
). Most vocal of the women parliamentarians is Dr Jenan Al-Ubaedey who has spoken out in favour of polygamy and wife beating claiming that ‘If you say to a man he cannot use force
<xref id="page_52" ref-type="page"></xref>
against a woman, you are asking the impossible … So we say a husband can beat his wife, but he cannot leave a mark’ (quoted in
<xref ref-type="bibr" rid="ref414">Philp, 2005</xref>
).</p>
<p>Similarly, the interpretation of the constitution could also undermine efforts to protect women’s rights. While the new constitution ensures that ‘Iraqis are equal before the law without discrimination based on gender, …’ (Article 14) it also establishes under Article 2 that ‘Islam is the official religion of the State and it is a fundamental source of legislation’ and ‘no law that contradicts the established provisions of Islam may be established’. As has been evident in a number of countries using Shari’a principles, the ‘established provisions of Islam’ are open to interpretation (see
<xref ref-type="bibr" rid="ref320">Lasky, 2006</xref>
: 13). Interpretation of the constitution is undertaken by the Supreme Court, but the members of the Supreme Court will be determined by the Parliament. Lasky (
<xref ref-type="bibr" rid="ref320">2006</xref>
: 13) points out that if conservative groups control the Parliament then conservative rulings will follow. Evidence of this has been the power of conservative Islamists to block the appointment of a female judge in Nijaf. This ‘compromise’ ‘of sacrificing Iraqi women’s political participation to pacify vocal minorities is hardly anomalous’ (
<xref ref-type="bibr" rid="ref259">Hunt and Posa, 2004</xref>
, 40). This trend suggests that negotiations over governance and legislation will see the loss of women’s rights as the compromise between radical and moderate factions. Yet for the most part it still remains to be seen how this new constitution and its implementation will affect women with regard to issues such as inheritance, child custody, divorce, and justice for honour crimes and gendered violence. However early indications suggest that Iraq, which had previously been lauded as having some of the most progressive family and personal laws in the Middle East, will take a step backwards.</p>
<p>In short, the ‘War on Terror’ has brought terror to the lives of Iraqi women. Recognition of this highlights a deep, surging, and intricately interwoven counternarrative of the ‘War on Terror’ which sees it
<italic>not</italic>
as a ‘War for Security’ but rather as a ‘War
<italic>of</italic>
terror
<italic>on</italic>
Women’. While careful not to romanticise women’s lives under Saddam, the current chaos, uncertainty and tragedy in their lives engrains a basic physical and emotional insecurity that had been recently unknown in Iraq. Subsumed by the grand narratives of democracy, freedom and liberty, their tragedies, as demanding as those who perished in the twin towers, remain largely unheard. This is not historically peculiar. Throughout history, periods of dramatic political upheaval, which laud opportunities for ‘progressive change’, have simultaneously seen women’s rights and feminist agendas overwhelmed or compromised by apparently more pressing ambitions (see
<xref ref-type="bibr" rid="ref57">Bleiker, 2000</xref>
). Lost in the clamour of international politics, many of these crises only become visible under a critical feminist lens which draws upon methodological, ontological and epistemological techniques specifically designed to focus on women’s lives. The result is research, analysis and knowledge that gives voice to the silent and legitimacy to the vulnerable.</p>
<p>This chapter has sought to add to this research by using a critical feminist approach to examine the claim that the ‘War on Terror’ is a ‘War for Security’. It has done so first by analysing the political manipulation of gender and gendered identities. In doing so it has demonstrated how this manipulation has provided
<xref id="page_53" ref-type="page"></xref>
an important foundation for the creation of knowledge about the ‘War on Terror’ project. A critical analysis of the gendered uses and representations of women such as Laura Bush, Cherie Blair, Jessica Lynch and the collective ‘women of Afghanistan’ revealed a specific manipulation of their gendered identities toward a particular end: a moral justification and reinforcement for the ‘War on Terror’ in the Afghanistan and Iraq campaigns. Meanwhile, the un-ladylike behaviour of Lynndie England could be dismissed as an aberration of her gender in the same breath as the immoral acts of Abu Ghraib could be dismissed as an aberration of the nation of the United States. Yet in both cases, public acceptance of a certain understanding of gender was vital: the feminine, be it either distressed or malicious is, in the grand scheme of things, vulnerable and powerless.</p>
<p>It is this understanding that has encouraged a healthy ignorance, and even a quiet expectation, of the hidden violence experienced by women in the ‘War on Terror’. It also goes some way to explaining how a war can be launched with the claim of fighting for ‘the rights and dignity of women’ (
<xref ref-type="bibr" rid="ref82">Bush 2001</xref>
) yet remain so derelict in demonstrating any sustained concern for women’s basic security needs. The rhetorical regard for women as enumerated by the architects of this ‘War on Terror’ is devoid of any genuine feminist ambition. The second part of this chapter addressed the extent to which this has been the case by focusing specifically on the ongoing crisis in Iraq. In doing so it revealed how the injection of a feminist analysis uncovers a very different ‘War on Terror’ to the one often portrayed by the war’s leaders. Instead, it reveals a conflict which, on both sides, uses women’s identities and abuses women’s bodies in pursuit of its own goals. Critical feminist intervention seeks to highlight, analyse, and combat this culture which has already become so ingrained in the ‘War on Terror’. And while feminists continue to amass insights into, and micro-narratives of, women’s experiences, there is, emerging in Coalition nations, a broader public support for the critical feminist argument that a war for security is an oxymoron (
<xref ref-type="bibr" rid="ref543">Weeks, 2007</xref>
).
<xref id="page_54" ref-type="page"></xref>
</p>
</sec>
</body>
</book-part>
</body>
</book-part>
<book-part book-part-type="part" book-part-number="II" id="partII">
<book-part-meta>
<title-group>
<title>
<xref id="page_55" ref-type="page"></xref>
Ethics, emotions and law in the war on terror
<xref id="page_56" ref-type="page"></xref>
</title>
</title-group>
</book-part-meta>
<body>
<book-part book-part-type="chapter" book-part-number="4" id="chapter4">
<book-part-meta>
<title-group>
<title>
<xref id="page_57" ref-type="page"></xref>
Emotions in the war on terror</title>
<alt-title alt-title-type="running-head-verso">Emotions in the war on terror</alt-title>
<alt-title alt-title-type="running-head-recto">Emma Hutchinson and Roland Bleiker</alt-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<given-names>Emma</given-names>
<surname>Hutchison</surname>
</name>
</contrib>
<contrib contrib-type="author">
<name>
<given-names>Roland</given-names>
<surname>Bleiker</surname>
</name>
</contrib>
</contrib-group>
</book-part-meta>
<body>
<p>Terrorist attacks are deeply traumatic. They disrupt the normal course of life and leave a profoundly emotional impact, often generating fear, anger and resentment. Dealing with the legacy of such traumas is a major political challenge. Yet this challenge is often exacerbated by prevailing ways of confronting the threat of terrorism. In most instances, political elites deal with the legacy of pain and death by re-imposing order. Emotions, such as fear, are manipulated to justify particular policy approaches. A case in point here is the situation following the terrorist attacks of 11 September 2001 (9/11), when the US government and its allies employed a strong rhetoric of evil to gain broad support for their ‘war on terror’, most notably for their invasions of Afghanistan and Iraq. Such an appropriation of emotions builds a sense of identity and political community that rests on a stark separation between a safe inside and a threatening outside. Dealt with in this way, the threat and continuing trauma of terrorism can come to inscribe and perpetuate exclusive and often violent ways of configuring community. Rather than solving the problems at stake, ensuing political attitudes generate new antagonisms which, in turn, increase rather than reduce the spectre of terrorism.</p>
<p>A thorough understanding of the powerful but often neglected role of emotions is essential to move from conflict-prone patterns towards the possibility of establishing a culture of healing and reconciliation. Rather than understanding security as simply the management of fear, anger and resentment, one must examine how emotions are linked to notions of identity, belonging and community.</p>
<p>We argue that confronting the threat of terrorism more effectively requires paying much closer attention to this process. To be more precise, our argument is two-fold. First we outline in detail why and how prevailing antagonistic and militaristic ways of dealing with terrorism risk producing violent and destructive forms of community. The second part of our argument considers alternative ways of working through the threat and legacy of terrorism. We point out that an understanding of how emotions permeate political policies and actions provides inroads into how cycles of violence may be fundamentally reconfigured. Emotions such as compassion and empathy could be actively cultivated in an effort to construct more inclusive, non-violent and rehabilitative configurations of community.</p>
<p>
<xref id="page_58" ref-type="page"></xref>
On some level the main point we want to make – that restoring security after a terrorist attack requires a conscious political engagement with emotions such as empathy and compassion, rather than merely fear and anger – is commonsensical. Of course, the spectre of violence can be reduced if political elites on all sides advocate their objectives through compassion, rather than hatred. However, the issue is not as self-evident and straight-forward as it seems. Although the role of emotions has been debated extensively among philosophers, sociologists, anthropologists and psychologists, few if any of these insights have entered the study of security and international relations. Emotions are largely assumed to be personal and irrational reactions, and thus of little relevance to conceptualizing political issues. Those few approaches that do look at emotions, such as psychological explanations of foreign policy decision making, tend to see them as mere ‘deviations from rationality’, as factors that could explain misperceptions (
<xref ref-type="bibr" rid="ref359">Mercer 2005</xref>
: 97). As a result, emotions are seldom seen as politically relevant in themselves, even while political events – and terrorism in particular – are so evidently emotional. Indeed, responses to fear have become rationalized to the point that we can no longer recognize, let alone deal with, the emotions that lie at the origin of the events in question.</p>
<p>A few scholars have already begun to recognize linkages between emotions and security. In a recent
<italic>Foreign Affairs</italic>
article Dominique Moïsi (
<xref ref-type="bibr" rid="ref367">2007</xref>
) comments that ‘the clash of emotions’ − rising fear in the ‘West’ and a deep-seated sense of humiliation in the ‘Arab’ and ‘Muslim’ world − has created a world order of distinct complexity, if not perpetual anxiety, uncertainty and instability (on this theme, see also
<xref ref-type="bibr" rid="ref448">Saurette 2006</xref>
;
<xref ref-type="bibr" rid="ref142">Danchev 2006</xref>
). Moïsi explains that emotions play a crucial role in determining the dynamics of the international system; they help to shape institutionalized political processes and decisions, and ultimately whether conflict or peace will prevail. John Mercer (
<xref ref-type="bibr" rid="ref358">1996</xref>
,
<xref ref-type="bibr" rid="ref359">2005</xref>
), Neta Crawford (
<xref ref-type="bibr" rid="ref133">2000</xref>
), William Connolly (
<xref ref-type="bibr" rid="ref127">2002</xref>
) and Andrew Ross (
<xref ref-type="bibr" rid="ref437">2005</xref>
,
<xref ref-type="bibr" rid="ref438">2006</xref>
) also suggest that much can be learnt from recognizing how emotions ubiquitously filter through the social structures that underpin political behaviour and policies, ranging anywhere from voting to the waging of war. We build upon these and other contributions, whose main common theme is that emotions help to constitute the social and political world. Emotions influence perceptions and beliefs, mobilize agency and constitute the forms of community that shape political interactions.</p>
<p>Once emotions are taken seriously the very notion of a ‘war on terror’ becomes problematic, for it undermines the security it seeks to create. Military means alone can never provide comprehensive security. Even the world’s most mighty military power was not able to prevent the attacks of 9/11, which were carried out with simple means. The situation is no different with the wars of response that have been fought since 9/11. Daily suicide attacks have been the norm in Iraq under the occupation of the US and allied troops. Terrorism must be fought with a range of different means and strategies, not merely those offered by coercive force. Besides obvious alternatives, such as policing, intelligence and diplomacy, attention needs to be directed towards how belligerent forms of community come
<xref id="page_59" ref-type="page"></xref>
to be in the first place. To stress this point is not to deny that military means are necessary to provide security and, at times, to promote justice and human rights. Nor is it to absolve the perpetrators of 9/11 of responsibility or to neglect the need to hold them accountable for their actions. Nor does our plea to take emotions seriously underestimate the danger of radical terrorist movements, whether couched in religious or secular terms. There will always be extremist individuals who engage in acts of terrorism. One can minimize, but never exclude this danger. But the ensuing challenges must be approached with a mindset that learns from past mistakes and is willing to actively seek out new strategies for understanding and dealing with terrorism. Understanding the role of emotions is an essential element in this ongoing process.</p>
<sec id="sec4_1">
<title>Manipulating terror: communities of fear and anger</title>
<p>A terrorist attack, be it experienced as a direct witness or observed from a safe distance, is often so shocking that our understanding of how the world works is severely disrupted. The comfort and stability of normal habits and expectations are stripped away. No longer can life be envisaged as a smooth trajectory from here to there. Bonds between personhood and community are broken, and the social context we ordinarily place ourselves in feels betrayed. Those who survive traumatic experiences may well have preserved their physical lives, but the meaning ascribed to being becomes altered, often in revelatory and irreconcilable ways.</p>
<p>Terrorist attacks are thus not processed in the same way as other political events. Their sudden and often unpredictable nature prompts feelings of disbelief and terror. Cathy Caruth (
<xref ref-type="bibr" rid="ref106">1995</xref>
: 153) describes trauma as ‘the confrontation with an event that, in its unexpectedness and horror, cannot be placed within the schemes of prior knowledge’. The practical implications of this insight becomes clearer when considering the aftermath of the terrorist attacks on New York and Washington. A common, immediate response to the events was one of overwhelming shock: a feeling that something like this is too unreal to be true. The attack shattered our understanding of normality; it interrupted the daily flow of events and confronted us with our inability to represent something that, in essence, cannot be represented, something that is beyond our imagination (
<xref ref-type="bibr" rid="ref64">Bourke 2005</xref>
: 357–91;
<xref ref-type="bibr" rid="ref169">Edkins 2002</xref>
: 243–4;
<xref ref-type="bibr" rid="ref170">2003</xref>
: 2–9, 57–60, 111–14;
<xref ref-type="bibr" rid="ref257">Humphrey 2002</xref>
: 11–25;
<xref ref-type="bibr" rid="ref563">Zylinska 2004</xref>
: 231–3). The terrifying visual presentation of death and suffering superseded our understanding of what could conceivably happen.</p>
<p>The terror and trauma reaped by terrorist attacks not only uproots deeply entrenched political patterns and expectations. They also mark the beginning of a new political era. Emotions play a central role in this process too.</p>
<p>Emotions help construct a sense of identity and solidarity that can emerge despite – or, rather, as a direct response to – the feelings of pain, solitude and fragmentation that are generated by the trauma. Traumatic events can pull people together, giving them a sense of common purpose. Injury and death – or what some commentators call a ‘culture of pain’ − can therefore become instrumental
<xref id="page_60" ref-type="page"></xref>
to the constitution of community and the sense of collective identity that emerges in the wake of trauma (see
<xref ref-type="bibr" rid="ref372">Morris 1993</xref>
). The ensuing dynamics decisively shape the political patterns ahead. They play a crucial role in determining whether conflict or peace will prevail in the long run. This is why it is important to gain a better understanding of the emotional factors that are involved in setting up these patterns in the first place.</p>
<p>The disruptive, chaotic and emotional situation that follows terrorist attacks constitutes a unique political opportunity to construct new forms of identity and community – forms that are less likely to lead to violence and new conflict. In reality, though, such opportunities are far too often lost. In most cases, the experience of dislocation wrought by traumatic events is swiftly countered with political projects that seek to mobilize the unleashed emotional energy for projects of mastery and control (
<xref ref-type="bibr" rid="ref256">Humphrey 2000</xref>
: 13). Certain forms of emotions − hatred, fear and anger − become central tools for political manipulation while others, such as compassion and wonder, become marginalized. The consequences are often fatal, leading to new sources of hate which in turn spiral into new forms of conflict.</p>
<p>Of central importance here are manipulations of the politics of fear (
<xref ref-type="bibr" rid="ref9">Ahmed 2004</xref>
: 62–81;
<xref ref-type="bibr" rid="ref71">Brown 1995</xref>
: 68–73;
<xref ref-type="bibr" rid="ref91">Butler 2004</xref>
: 19–49). By removing feelings of security, representations of terrorism manifest immense uncertainty, anxiety and alarm. This is not simply the case for those who have survived or witnessed trauma first-hand, but also applies to society more generally (
<xref ref-type="bibr" rid="ref331">Lisle 2004</xref>
: 8;
<xref ref-type="bibr" rid="ref171">Edkins 2004</xref>
: 248–9, 253–6). In the aftermath of terrorist attacks the notion of fear saturates the journalistic and political discourses available for public consumption (
<xref ref-type="bibr" rid="ref248">Hoskins 2006</xref>
: 453–7) This was, for instance, the case with 9/11, with the Bali Bombing of 2002 and the terrorist attack on London in July 2005. It is through the ensuing public discourses that fear can be passed down, constructing not only perceptions of an ongoing threat but also drawing clear boundaries between zones that are safe and those that are not. Fear, then, comes to generate a culture of anxiety and resentment, pitting people against whatever or whoever is perceived to threaten them. Individuals are being mobilized around what seems the only natural response to terrorism: war.</p>
<p>The events of 9/11 highlight how politicians frequently manipulate feelings of fear and anger that are associated with trauma. Look at the policy responses to 9/11, particularly in the United States. Washington’s foreign policy became immediately centred around this major event. Couched in a rhetoric of ‘good’ versus ‘evil’, the US reaction to 9/11 re-established the sense of order and certitude that had existed during the Cold War: an inside/outside world in which, according to the words of president George W. Bush, ‘you are either with us or against us’. But this very rhetoric of evil removed the phenomena of terrorism into the realm of irrationality. Evil is an emotional term of condemnation for things that can neither be fully comprehended nor addressed, except through militaristic forms of dissuasion and retaliation (
<xref ref-type="bibr" rid="ref307">Klusmeyer and Suhrke 2002</xref>
: 27, 29, 35, 37;
<xref ref-type="bibr" rid="ref179">Euben 2002</xref>
: 4). The presentation of ‘evil’ as irrational and incomprehensible provides an ideal opportunity to engage in political manipulations.</p>
<p>
<xref id="page_61" ref-type="page"></xref>
In the absence of rational or even knowable phenomena, and without understanding the complex interplay of emotional factors, the notion of a war on terror could be justified and legitimized with relative ease. The ensuing policy positions have then become very difficult to challenge. This is the case even in the face of highly convincing conceptual or even empirical critique, such as the fact the war in Iraq was presented as essential in the fight against global terrorism, even though it was waged against a government that had no known links to the perpetrators of 9/11. Add to this that the war was directly legitimized by the immanent need of a pre-emptive attack designed to destroy dangerous weapons of mass destruction which, as it later turned out, never existed. But even in the absence of legitimacy the respective policy discourses could not be seriously challenged, for all critique was dismissed as unpatriotic subversion (
<xref ref-type="bibr" rid="ref91">Butler 2004</xref>
: 1–18;
<xref ref-type="bibr" rid="ref151">Der Derian 2003</xref>
: 20–2, 27). No matter how authoritarian the Iraqi regime may have been, and no matter how much its removal may have been desirable, one can view the US legitimization of the war in the same terms that were used by Al Gore (
<xref ref-type="bibr" rid="ref217">Gore 2004</xref>
: 779) to characterize terrorism itself, as ‘the ultimate misuse of fear for political ends’ (see also
<xref ref-type="bibr" rid="ref63">Booth and Dunne 2002</xref>
;
<xref ref-type="bibr" rid="ref114">Chan 2005</xref>
).</p>
<p>Half a decade after 9/11 the spectre of terrorism remains as threatening and elusive as ever. The wars of response in Afghanistan and Iraq have not brought peace but have instead generated new forms of hatred and political violence. No end to the spiralling cycle of violence is in sight. Fault lines of conflict have instead been set for decades. They have been drawn around arbitrary and highly stereotypical perceptions of what and who might constitute a threat. A case in point here is the much discussed clash of civilizations, which assigns essential attributes to diverse cultural traditions, and then juxtaposes them in an inherently conflict-prone manner. Although dating back to Samuel Huntington’s (
<xref ref-type="bibr" rid="ref260">1996</xref>
) search for identity and community in the wake of the collapsing Cold War structure, the (il)logic of the clash of civilization applies well to the situation following 9/11. And the (il)logic is the very same that dominated realist strategies during the Cold War: that feelings of identity, belonging and community can only be constituted in reference to an external threat, which has to be warded off at any cost. The only difference is that civilizations replaced states as the main actors, and that foreign cultures, evil rogues and terrorists now took the place of communist subversion and the evil Soviet empire. In either case, though, the roots of the conflict remain unaddressed. All this is not to deny that threats did and do exist. Rather, it is to point out that prevailing ways of dealing with them have not healed the wounds opened up by traumatic events but, instead, have set the stage for new tensions and conflicts.</p>
<p>The long-term consequences of such political manipulations are far-reaching. Numerous problematic scenarios emerge when emotions such as fear, anger and hatred form the basis for new forms of political identities and communities. The most worrying of these is that a political community constituted by feelings of anger and fear of the outside will inevitably be dragged into new forms of conflict. The stakes are particularly high in the current context of a war against terrorism. Political elites have constituted a world where to be secure means to be
<xref id="page_62" ref-type="page"></xref>
cordoning off a safe inside – a sovereign state protected by military means – from a threatening outside. Without unravelling the impact of the various emotions associated with terrorism and political trauma, the issues that cause conflict in the first place remain concealed and therefore unaddressed. Healing the wounds of trauma becomes a matter of retribution and revenge, rather than a project begetting a mutually considered peace and emotional catharsis.</p>
</sec>
<sec id="sec4_2">
<title>Emotions are more than individual and irrational impulses</title>
<p>A more productive way of dealing with terrorism starts with investigating its emotional aspects. Attention needs to be given to the role emotions play in constructing identity and community. As the previous section discussed, emotions can play a key role in mobilizing the collective agency needed to both commit acts of atrocity and to retaliate through prolonged periods of military force. To understand the significance of these factors we now take a brief detour and embark on a conceptualization of emotions, so that we can then return to the events of 9/11 with a more appropriate appreciation of the linkages between emotion and the current ‘war on terror’.</p>
<p>Prevalent scholarly approaches to politics, security and international relations pay little or no attention to emotions. They are generally considered subjective and irrational reactions of an individual being, and are thus seen to involve neither thought nor knowledge that could be relevant for public and political deliberations. Complicating a scholarly understanding of emotions further is the absence of methodological means to examine their role and impact. Indeed, the type of rationalistic and organizational models that prevail in most policy analysis of security issues conceive of emotions as rather ephemeral phenomena, unable to be quantified, or otherwise evaluated, even in qualitative terms. Investigating their political relevance would seem to result in research that is speculative or tenuous at best. Such views are part of a deeply entrenched western philosophical tradition that has sought to decouple emotion and rationality (
<xref ref-type="bibr" rid="ref176">Elster 1999</xref>
;
<xref ref-type="bibr" rid="ref100">Calhoun 2001</xref>
). Emotions have come to be seen as the opposite of reason. Historically perceived to encapsulate women’s ‘dangerous desires’, emotions were thought to be feelings or bodily sensations that overtook us, distorting thought and the ability to make ‘rational’ and ethical judgement (
<xref ref-type="bibr" rid="ref278">Jeleniewski Seidler 1998</xref>
: 193–210). ‘Justice’ must be free of passion, it was believed, because emotions impel people to perform irrational acts of violence and harm (
<xref ref-type="bibr" rid="ref247">Homes 1995</xref>
;
<xref ref-type="bibr" rid="ref277">Jamieson 1992</xref>
).</p>
<p>Although largely neglected by security experts and international relations scholars in general, emotions have been of central concern in psychology, anthropology, sociology, philosophy and feminist theory. Many of these scholars disagree with each other. They wage passionate debates about the manner in which emotions should be understood and appreciated.
<sup>
<xref ref-type="fn" rid="fn4_1">1</xref>
</sup>
But there are still some common themes, which we would like to identify briefly here in an attempt to map out the role that emotions can play in cultivating a more adequate approach to security in the wake of a terrorist attack. Two key aspects of this literature stand out. First is
<xref id="page_63" ref-type="page"></xref>
the recognition that emotions are more than mere personal reactions. They play an important social and political role, particularly in the process of constituting identity and community attachments. The second involves an investigation into the extent to which emotions are not just irrational reactions, but also forms of insight and judgement.</p>
<p>A first key challenge consists in recognizing and exploring the socio-political nature and role of emotions. Rather than simply considering emotions as biologically grounded, as it was once thought, emotions are phenomena shaped by socio-cultural interactions. Ways we feel emerge from and are constitutive of the social and institutional processes that bind society together. This presents an understanding of emotion as derived from a social context rather than internal psychological conditions alone. Particular experiences evoke particular emotions, but they are shaped through patterns of communication and language, and more broadly, through the socialization into particular historically grounded ways of being (
<xref ref-type="bibr" rid="ref396">Nussbaum 2001</xref>
: 107–9, 175–81;
<xref ref-type="bibr" rid="ref469">Shilling 1997</xref>
: 197–8). In this way, as Ian Burkitt (
<xref ref-type="bibr" rid="ref80">1991</xref>
: 2) suggests, ‘Feelings say more about the type of social relations in which we live … than anything about our essential nature as human beings’. Even though emotions surface from a person’s instantaneous evaluation of circumstance, they can, at the same time, reflect socio-culturally embedded ways of understanding and being in the world (
<xref ref-type="bibr" rid="ref243">Hochschild 1998</xref>
).</p>
<p>Important here is the notion that feelings are an active component of identity and community.
<sup>
<xref ref-type="fn" rid="fn4_2">2</xref>
</sup>
Emotions influence attitudes, behaviours and actions (
<xref ref-type="bibr" rid="ref349">Marcus 2000</xref>
: 225–7). They help us to make sense of our self, and to situate us in relation to others and the world that surrounds us. By framing forms of personal and social understanding, emotions are inclinations that lend individuals to locate their identity within a wider collective. As Sara Ahmed suggests, emotions are an intimate part of the attachments that bind individuals to particular objects and to others; they shade the relational ties that can come to constitute identity and belonging (2004: 28). Feelings of both pleasure and pain are implicated here. Just as an experience that brings pleasure can create a certain kind of attachment to whatever brings joy, a painful encounter may create a similar attachment, arguably a fearful or anxiety-filled one, to the object or person that inflicted the pain. Thomas Scheff stresses that claims for identity and recognition are intrinsically emotional. Indeed, as Scheff contends, ‘the urge to belong, and the intense emotions of shame and pride associated with it, may be the most powerful and divisive forces in the human world’. Feelings of affection, love, and loyalty, he claims, can act as the adhesive that bind community in the face of a common threat or fear (
<xref ref-type="bibr" rid="ref451">Scheff 1994</xref>
: 277, 279–80).</p>
<p>The second key point is that emotions are more than just irrational impulses. A substantial body of literature now rejects the traditional dichotomy of rational/ irrational and dismisses the connotations this duality ordinarily imposes on the cultural sociology of emotion (
<xref ref-type="bibr" rid="ref394">Nussbaum 1995a</xref>
: 53–78). Like other aspects of culture, emotions can be seen as an element of all social interaction. Emotions accompany so-called ‘rational’ actions as much as ‘irrational’ ones, positive experiences as much as negative. Robert Solomon and Martha Nussbaum are two
<xref id="page_64" ref-type="page"></xref>
authors who stress that emotions are important forms of knowledge and evaluative thought (
<xref ref-type="bibr" rid="ref396">Nussbaum 2001</xref>
: 1–22;
<xref ref-type="bibr" rid="ref491">Solomon 2003</xref>
:
<xref ref-type="bibr" rid="ref490">Solomon 1993</xref>
). Both fiercely defend the proposition that emotions can tell us certain things, providing insights and pointers that could be of use in our attempts to address social and political challenges. ‘Emotions are not irrational pushes and pulls’, Nussbaum argues, ‘They are ways of viewing the world. They reside at the core of one’s being, the part of it that makes sense of the world’ (
<xref ref-type="bibr" rid="ref395">Nussbaum 1995b</xref>
: 374). Thus, for Nussbaum and Solomon the strength of emotions lie in that they are, at minimum, perceptions. An emotion is a cognitive activity reflective of a ‘kind of knowing’; emotions are a ‘piece of understanding’ (
<xref ref-type="bibr" rid="ref393">Nussbaum 1990</xref>
: 45).</p>
<p>Understood in this way emotions either involve, or indeed are, judgements. Emotions are always about something, or are directed at something for specific reasons. They can be seen as elements of appraisal. Anger implies that something thought to be bad or wrong has happened; fear can be attributed to the feeling that something untoward may happen; and similarly, joy and happiness imply something good. They are formed through interaction and involvement (or a lack of) with the social world, and are at least partly emblematic of the way individuals and collectives apprehend or perceive the world (
<xref ref-type="bibr" rid="ref447">Sartre 2002</xref>
).</p>
<p>This so-called cognitive approach to emotions, epitomized by the work of Solomon and Nussbaum, has always been juxtaposed to more biologically based assumptions about emotions. Such positions, influenced by William James but going back to ancient Greek philosophy, assume that emotions are not primarily thoughts, judgements and beliefs, but bodily sensations. We refrain from entering these debates in detail here, in part because they lie outside the scope of this chapter, in part because several international relations scholars, such as Crawford (
<xref ref-type="bibr" rid="ref133">2000</xref>
: 126–8), Marcus (
<xref ref-type="bibr" rid="ref349">2000</xref>
: 231–2), Mercer (
<xref ref-type="bibr" rid="ref359">2005</xref>
: 93–4), Ross (
<xref ref-type="bibr" rid="ref437">2005</xref>
;
<xref ref-type="bibr" rid="ref438">2006</xref>
) and Connolly(
<xref ref-type="bibr" rid="ref127">2002</xref>
), have now drawn attention to the issues at stake. The latter two authors have, in addition, outlined the relevance of recent insights on affects from the neurosciences and attempts to apply them to the study of political phenomena. They also stress the need to go beyond locating specific ‘feelings’, such as anger, resentment or shame. A view that considered emotions as ‘affective energies’ or ‘motives’, they suggest, may be a more holistic way of conceptualizing political issues (
<xref ref-type="bibr" rid="ref438">Ross 2006</xref>
: 212).</p>
</sec>
<sec id="sec4_3">
<title>Reconstructing political community in the wake of terror</title>
<p>Although scholars in the sociology of emotions disagree on numerous fronts, they all acknowledge, in one way or another, that emotions are more than the irrational and private reactions they were once thought to be. Emotions are more than feelings of vulnerability that emerge in response to events that lie outside of control, such as terrorist attacks. But if emotions do indeed play a significant role in constituting identities and political communities, then they can and must be seen as playing a central element in how conflicts are generated, viewed and solved.</p>
<p>
<xref id="page_65" ref-type="page"></xref>
We now provide a few broad suggestions about how emotions could be understood and employed more constructively. A brief essay can, of course, not provide an exhaustive account of the role that emotions play in security policy. Nor can it come up with concrete, practical steps towards countering terrorism. Doing so is primarily the task of politicians, security experts and diplomats. It also requires assessing the unique circumstances that surround individual acts of terrorism. But viable policy advice requires a prior engagement with the complex issues at stake. This is why we focus on a preceding step that is just as important: identifying and exploring the type of emotional and political mindsets with which existing conflicts can be understood and managed more successfully.</p>
<p>We concentrate on one particular but important aspect in the relationship between terrorism, emotions and security policy: how an alternative, more positive sense of identity and community can be constructed following the traumatic experiences of a terrorist attack. At its broadest, the strategy for restoring security and promoting a culture of healing that we propose involves sensitivity towards the emotional and psychological trauma that follow acts of terrorism. We highlight two key aspects.</p>
<p>First, we stress that there are no compelling reasons why fear must necessarily lead to political manifestations that promote and justify more violence and war. The emotions associated with terrorism, such as sadness, anger or anxiety, do not automatically necessitate a retaliatory response. Recognizing the profoundly emotional nature of terrorism can provide an opportunity to rethink prevailing ways of dealing with events that seem to evoke a sense of social and political damage. Rather than constructing community and formulating policy around fear alone, the strategy we propose suggests that feelings of vulnerability can be considered in a politically enabling way. Indeed, the sense of contingency that ensues after trauma − the sense of insecurity − can be thought as creating a space for political change.</p>
<p>Second, a more thorough and active engagement with emotions such as compassion and empathy is key to moving towards a culture focused on understanding, acceptance and the genuine effort to ameliorate divisive socio-cultural and political relations. As commonsensical as this point may seem, seldom does it explicitly feature in conventional modelling of security issues or policy. But if scholars and politicians have a better understanding of emotions, then they would also be able to employ them more effectively in attempts to promote healing and reconciliation in the aftermath of trauma.</p>
<p>Deciding how to respond to terrorism thus entails not only questions of strategy, but also issues related to ethics and responsibility. Political leaders and the public at large must actively contemplate and debate how individuals and societies live on after a terrorist attack: how they could reconcile the pain that they endured or may continue to suffer. To minimize the danger of re-emerging patterns of violence the act of remembering must thus remain open for critical reflection. The ensuing process would involve leaders in politics and the media becoming more aware of the implications involved in the proliferation of fear and suspicion. But essential as well would be an attempt to draw more actively from the experiences
<xref id="page_66" ref-type="page"></xref>
and understandings of ordinary people. It is in this light that Phillip Darby (
<xref ref-type="bibr" rid="ref146">2006</xref>
: 460) argues for ‘locating a politics of security within society, rather than above it’.</p>
<p>Breaking cycles of violence entails establishing a sense of political community that views difference not as a threat to identity, but as an inevitable and perhaps even enriching aspect of life. The work of Emmanuel Levinas (
<xref ref-type="bibr" rid="ref329">1996</xref>
: 166;
<xref ref-type="bibr" rid="ref328">1987</xref>
;
<xref ref-type="bibr" rid="ref327">1969</xref>
) offers some crucial signposts here, for his notion of ethics resolves around articulating a relationship to difference that displays understanding of, and respect for, the other’s identity performances, even if they are inherently incommensurable. Several international relations scholars, such as David Campbell (
<xref ref-type="bibr" rid="ref101">1994</xref>
; 198: iix;
<xref ref-type="bibr" rid="ref103">2005</xref>
), Michael Shapiro (
<xref ref-type="bibr" rid="ref465">1997</xref>
) and William Connolly (
<xref ref-type="bibr" rid="ref126">1995</xref>
), have started to employ such understandings of ethics to the realm of political conflict, thus viewing questions of ethics and justice primarily as ‘the relationship to the other’. The point of such attitudes to the political is not to deny or erase difference, be they related to religion, ethnicity, ideology or language. The key, rather is to recognize that the most serious cause of violence today stems not from interactions with difference, but, as Connolly (
<xref ref-type="bibr" rid="ref126">1995</xref>
: xxi–ii) convincingly argues, from doctrines and movements that suppress it by trying to reinstate a unified faith in one form of identification.</p>
<p>In an ideal scenario, such respect for difference should go beyond tolerance, for tolerance assumes a basic standard against which anything else is to be judged. Accepting alterity, by contrast, requires abandoning this privileged standpoint, perhaps even at those moments when one is deeply convinced of the superiority of one’s own moral position. Some even argue that an engagement with alterity is most crucial precisely at those moments when the other’s position poses a fundamental danger to one’s own values (
<xref ref-type="bibr" rid="ref178">Euben 1999</xref>
: 16). Scholars who engage questions of reconciliation have long sought to understand how it might be possible to nullify cycles of violence and create prosperous and respectful engagements between adversaries. The key issues involve, as Andrew Schaap (
<xref ref-type="bibr" rid="ref450">2005</xref>
: 10) puts it, the challenge of ‘how to transform a relation of enmity into one of friendship’. Considered in these terms, reconciliation is not about ‘settling accounts’ but about breaking with the violence of the past and initiating political arrangements that will secure ethical reflection.</p>
<p>Instead of institutionalizing and commemorating traumatic events and their memory in ways that perpetuate existing prejudices and exclusions, trauma and violence need to be reconfigured as something to be learnt from, something that can prompt the inspiration that is needed to conceptualize the political in less disparaging and more inclusive ways. An approach to security that sees emotions as both part of the social fabric and as forms of knowledge and judgement would consist of articulating identity and notions of community in less destructive ways, and in rendering these articulations politically acceptable. A political process of healing would place fear and anger in context, thus drawing more actively upon feelings of compassion and empathy in order to articulate and realize a more respectful relationship between identity and difference. Placing emphasis on processes of healing and reconciliation is not to minimize the danger of terrorist
<xref id="page_67" ref-type="page"></xref>
threats or to absolve terrorist of responsibility. It is, rather, a resourceful attempt to come up with policy approaches that can overcome, rather than perpetuate, the stereotypical understandings of identity and difference that often drive conflict in the first place.</p>
</sec>
<sec id="sec4_4">
<title>Conclusion</title>
<p>Our attempt to map out an emotionally attuned way of dealing with terrorist treats has been both broad and preliminary. Much more is, of course, needed to translate such general suggestions into concrete and viable policy recommendations. But before such a task can begin we must have a much clearer understanding of how emotions operate in the context of international security. Drawing attention to the need for such an understanding has been the main ambition of this chapter.</p>
<p>A more appropriate approach to security begins by recognizing that terrorist attacks, such as 9/11, trigger a range of powerful and often seemingly contradictory emotions: fear of death and suffering, awe at the sheer magnitude of a traumatic event; anger at whoever or whatever caused the tragedy; relief for having survived; hatred towards those deemed responsible, compassion for those who died or are in pain. The protagonist of Jonathan Safran Foyer’s fictional attempt to deal with the impact of 9/11 puts it better than any ‘real’ analysis could: ‘right now I am feeling sadness, happiness, anger, love, guilt, joy, shame, and a little bit of humor … My insides don’t match up with my outsides’ (2005: 163, 201).</p>
<p>Experts on terrorism and international security are not adequately equipped to understand the complex emotional dimensions of terrorist threats. Emotions are, by and large, still seen as purely private and irrational phenomena – and thus of little relevance to political analysis and public deliberations about security issues. But excluding the role of emotions from scholarly inquiries and political analysis is paradoxical, for traumatic events, such as terrorist attacks, are highly emotional phenomena. The motives and means of terrorists are usually presented in emotional terms, as ‘fanatical’, ‘irrational’ or simply ‘evil’. Reactions to terrorist attacks are equally emotional. They involve dealing with the memory of death, suffering and trauma, leading to emotional calls for political action, often involving feelings of retribution that go far beyond the mere need to provide security. Political leaders do not shy away from drawing upon emotional appeals, such as nationalist rhetoric, to win support for their positions. And yet, the actual policy analyses of terrorist threats are advanced in a highly detached and rationalized manner. This has been the case during much of the Cold War and continues today (
<xref ref-type="bibr" rid="ref124">Cohn 1987</xref>
;
<xref ref-type="bibr" rid="ref449">Scarry 1985</xref>
). Consider, as one example among many, a recent media release by the Australian Law Reform Commission, which aims at generating public debate on the effectiveness and need for sedition laws. Its main objective is to come up with constructive policy advice by taking ‘some of the emotion out of the debate’ (
<xref ref-type="bibr" rid="ref27">Australian Government 2006</xref>
).</p>
<p>The neglect of emotion in policy analysis and international relations scholarship has lead to a situation where emotions can easily be manipulated by political elites, even if this is achieved unconsciously. But this phenomena is neither surprising
<xref id="page_68" ref-type="page"></xref>
nor new. Numerous modern philosophers have long drawn attention to the key role that fear plays in projects of political renewal. Politicians have, indeed, always used fear to manipulate the population in the manner that served their particular interests. Thomas Hobbes even went a step further. Fear, he believed, not only leaves strong marks on public debates and policy making. It can also serve as an important source for collective political and moral foundations (
<xref ref-type="bibr" rid="ref434">Robin 2004</xref>
: 4, 16, 34). Numerous scholars – before and after 9/11 – have stressed how the fear created by terror can create moral certainty and lead otherwise diverse and disagreeing constituencies to swift, universal agreements on basic principles and actions. As a result, though, the foundations of our morals are articulated mostly in negative ways, based on fear and closure, rather than on a willingness to openly discuss difficult issues and ground political positions in a positive affirmation of basic values and principles (
<xref ref-type="bibr" rid="ref434">Robin 2004</xref>
: 145–6;
<xref ref-type="bibr" rid="ref470">Shklar 1984</xref>
: 5, 9).</p>
<p>The political manipulation of fear has fostered approaches to security that fail to draw upon the possibilities of both individual and social healing. Emotions tend to be seen as something to either struggle against or work through. The result is a very narrow understanding of how security and peace are being constituted – one that fails to conceptualize emotions a source of political imagination, inspiration, caring and hope.</p>
<p>Applying emotional insight to the traumatic events of 9/11 would entail a fundamental rethinking of prevailing approaches to politics and security. Rather than dealing with the trauma and its breach of security primarily in militaristic terms, a process of healing would seek to use the positive opportunities opened up by the disruptive event. Identity and community would then not be constituted in the context of a discourse of good versus evil, of inside versus outside, but in a manner that highlights the need to overcome the very antagonistic oppositions and conflicts that such distinctions generate. Instead of wars of retaliation, which are unlikely to solve any of the issues at stake, a more productive approach would, for instance, consist of establishing more cross-cultural respect and new forms of collaboration, which can build empathy and trust among parties once engaged in conflict. Societies may thus be able to work through trauma in politically transformative, rather than merely restorative ways. Instead of inscribing dichotomous or even righteous forms of defining identity, this alternative would generate more accepting and empathetic configurations of community.</p>
<p>Processes of healing in the wake of trauma do, of course, inevitably take time. Entrenched identities cannot be uprooted over night, nor can the antagonistic political attitudes and practices that are intertwined with these identities. Reconciliation is a long term project. But traumatic events, precisely because they disrupt existing patterns of identity and community, offer unique opportunities to initiate such a long term process of healing. However, to do so scholars and political elites must have a better understanding of the emotional aspects involved in this process. Crucial here are collective efforts to draw upon the whole range of emotions, not only fear, anger and hatred, but also empathy and compassion. Rendering the latter more politically acceptable could make a crucial
<xref id="page_69" ref-type="page"></xref>
difference, particularly at future moments of acute political crisis, when levels of understanding, acceptance and trust can play a decisive role in determining whether conflict or peace will prevail.</p>
</sec>
<sec id="sec4_5">
<title>Acknowledgements</title>
<p>This paper has emerged out of a project that was first presented at a workshop on ‘Reconciliation, Politics and the Emotions’ at the Monash Prato Centre, 26–28 June 2006. Thanks to the two workshop conveners, Michael Ure and Mervyn Frost. For their support and critical feedback the authors warmly thank all workshop participants. Emma would also like to acknowledge the support of the University of Queensland Graduate School Research Travel Award. Roland’s work on this project was generously supported by a fellowship from the Centre for Research in the Arts, Social Sciences and Humanities at Cambridge University.</p>
</sec>
</body>
<back>
<notes>
<title>Notes</title>
<fn-group>
<fn id="fn4_1">
<label>1</label>
<p>See, for instance, Lila Abu-Lughod and Catherine A. Lutz (eds),
<italic>Language and the Politics of Emotion</italic>
(Cambridge: Cambridge University Press, 1990); Claire Armon-Jones,
<italic>Varieties of Affect</italic>
(New York: Harvester Wheatsheaf, 1991); Jack M. Barbalet (ed.)
<italic>Emotions and Sociology</italic>
(Oxford: Blackwell, 2002); Jack M. Barbalet,
<italic>Emotion, Social Theory and Social Structure: A Macrosociological Approach</italic>
(Cambridge: Cambridge University Press, 2001); Gillian Bendelow and Simon J. Williams (eds)
<italic>Emotions and Social Life: Critical Themes and Contemporary Issues</italic>
(London: Routlege, 1998); Jon Elster,
<italic>Alchemies of the Mind: Rationality and the Emotions</italic>
(Cambridge: Cambridge University Press, 1999); Peter Goldie,
<italic>The Emotions: A Philosophical Exploration</italic>
(Oxford: Clarendon Press, 2002); Rom Harré,
<italic>The Social Construction of Emotions</italic>
(Oxford: Blackwell, 1986); Alison M. Jaggar, ‘Love and Knowledge: Emotion in Feminist Epistemology’, in Susan R. Bordo and Alison M. Jaggar (eds),
<italic>Gender/Body/Knowledge: Feminist Reconstructions of Being and Knowing</italic>
(New Brunswick, NJ: Rutgers University Press, 1989), pp. 145–71; Martha C. Nussbaum,
<italic>Upheavals of Thought: The Intelligence of Emotions</italic>
(Cambridge: Cambridge University Press, 2001); Stephen Leighton (ed.),
<italic>Philosophy and the Emotions</italic>
(Peterborough: Broadview Press, 2003); Chris Shilling, ‘Emotions, Embodiment and the Sensation of Society’,
<italic>Sociological Review,</italic>
vol. 45, no. 2, 1997, pp. 195–219; Robert C. Solomon,
<italic>Not Passions Slave: Emotions and Choice</italic>
(Oxford: Oxford University, 2003); Simon J. Williams,
<italic>Emotions and Social Theory: Corporeal Reflections on the (Ir)Rational</italic>
(London: Sage, 1991).</p>
</fn>
<fn id="fn4_2">
<label>2</label>
<p>See, in particular, Ahmed,
<italic>The Cultural Politics of Emotion;</italic>
Lauren Berlant, ‘The Subject of True Feeling: Pain, Privacy, Politics’ in Jodi Dean (ed.),
<italic>Cultural Studies and Political Theory</italic>
(Ithaca, NY: Cornell University Press, 2000), pp. 42–312; Mabel Berezin, ‘Emotions and Political Identity: Mobilizing Affection for the Polity’, in James Jasper, Jeff Goodwin, Francesca Polletta (eds),
<italic>Passionate Politics: Emotion and Social Movements</italic>
(Chicago, IL: University of Chicago Press), pp. 83–98; and Mabel Berezin, ‘Secure States: Towards a Political Sociology of Emotion’, in Jack Barbalet (ed.),
<italic>Emotions and Sociology</italic>
(Oxford: Blackwell, 2002), pp. 33–52; Karin M. Fierke, ‘Whereof We Can Speak, Thereof We Must Not Be Silent: Trauma, Political Solipsism and War’,
<italic>Review of International Studies,</italic>
Vol. 30, 2004, pp. 471–91; Kate Nash, ‘Cosmopolitan Political Community: Why Does It Feel So Right?’,
<italic>Constellations: An International Journal of Critical and Democratic Theory,</italic>
Vol. 10,
<xref id="page_70" ref-type="page"></xref>
No. 4, 2003, pp. 506–18; Thomas J. Scheff,
<italic>Bloody Revenge: Emotions, Nationalism and War</italic>
(Boulder, CO: Westview Press, 1994, and Thomas J. Scheff, ‘Emotions and Identity: A Theory of Ethnic Nationalism’, in Craig Calhoun (ed.),
<italic>Social Theory and the Politics of Identity</italic>
(Oxford: Blackwell, 1994), pp. 277–303.</p>
</fn>
</fn-group>
</notes>
</back>
</book-part>
<book-part book-part-type="chapter" book-part-number="5" id="chapter5">
<book-part-meta>
<title-group>
<title>
<xref id="page_71" ref-type="page"></xref>
International law and the state of exception</title>
<alt-title alt-title-type="running-head-verso">International law and the state of exception</alt-title>
<alt-title alt-title-type="running-head-recto">Sara E. Davies</alt-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<given-names>Sara E.</given-names>
<surname>Davies
<sup>
<xref ref-type="fn" rid="fn5_1">1</xref>
</sup>
</surname>
</name>
</contrib>
</contrib-group>
</book-part-meta>
<body>
<p>The US and its allies invaded Afghanistan on 7 October 2001 citing their inherent right to self-defence as enshrined in Article 51 of the UN Charter and supported by Resolutions 1368 (2001) and 1373 (2001).
<sup>
<xref ref-type="fn" rid="fn5_2">2</xref>
</sup>
In November 2001, President Bush signed a Military Order creating a framework for military commissions that could try those being detained within Afghanistan and on the borders of Pakistan for ‘reasons related to the conflict’ (
<xref ref-type="bibr" rid="ref165">Duffy 2005</xref>
: 379;
<xref ref-type="bibr" rid="ref324">Leitzau 2005</xref>
: 49). In January 2002, hundreds of people – estimates ranged from 550 to 698 detainees – had been detained and forcibly removed from Afghanistan to the US Naval Base in Guantanamo Bay (
<xref ref-type="bibr" rid="ref165">Duffy 2005</xref>
: 379;
<xref ref-type="bibr" rid="ref498">Steyn 2004</xref>
: 7).
<sup>
<xref ref-type="fn" rid="fn5_3">3</xref>
</sup>
</p>
<p>The conditions under which these individuals have been held has elicited concern and strong criticism.
<sup>
<xref ref-type="fn" rid="fn5_4">4</xref>
</sup>
Concerns over the detainees’ welfare, the lack of transparent judicial proceedings and an apparent recalcitrance by the US administration to adhere to due process and the rule of law, has provoked condemnation of the US administration. For instance, in an address for the British Institute of International and Comparative Law, Lord Steyn stated that:</p>
<disp-quote>
<p>At present we are not meant to know what is happening at Guantanamo Bay. But history will not be neutered. What takes place there today in the name of the United States will assuredly, in due course, be judged at the bar of informed international opinion.</p>
<attrib>(
<xref ref-type="bibr" rid="ref498">Steyn 2004</xref>
: 8)</attrib>
</disp-quote>
<p>The International Committee of the Red Cross (ICRC) has reported that those held in Guantanamo Bay have been ‘subjected to unusually long periods of interrogation’ (
<xref ref-type="bibr" rid="ref262">ICRC 2005</xref>
). The interrogation techniques have included many forms of abuse and human rights violations sometimes conducted with the assistance of defence medical personnel (
<xref ref-type="bibr" rid="ref119">Clark 2006</xref>
: 571). The US Department of Defense (DOD) has stated that Guantanamo is the ‘only DOD strategic interrogation center and will remain useful as long as the war on terrorism is underway and new enemy combatants are captured and sent there’ (
<xref ref-type="bibr" rid="ref522">United States Department of Defense 2006c</xref>
: 4). Out of the 422 detainees presently being held, ten have been charged (
<xref ref-type="bibr" rid="ref521">United States Department of Defense 2006b</xref>
: 1). Many still remain in solitary confinement, and are subject to regular
<xref id="page_72" ref-type="page"></xref>
coercive ‘interrogation techniques’ (
<xref ref-type="bibr" rid="ref119">Clark 2006</xref>
). With the exception of these ten individuals charged (first charges were laid against four detainees in 2004), none of the remaining detainees have been charged or are able to test the legality of their detention (
<xref ref-type="bibr" rid="ref498">Steyn 2004</xref>
: 10).</p>
<p>There have been a number of legal challenges lodged on behalf of the four originally charged for violating the laws of war (
<xref ref-type="bibr" rid="ref521">United States Department of Defense 2006b</xref>
). The US Supreme Court has, thus far in 2004 and 2006, made four important judgments on the charges made against these individuals, their detention and the nature of the military commissions:</p>
<list list-type="unorder">
<list-item>
<p>Each individual in Guantanamo Bay has the right to challenge their detention on US soil (the right to habeas corpus).
<sup>
<xref ref-type="fn" rid="fn5_5">5</xref>
</sup>
</p>
</list-item>
<list-item>
<p>Each detainee has the right to legal counsel and to appear before the Commission.</p>
</list-item>
<list-item>
<p>The procedures of the Military Commissions set up to hear the cases of the four individuals tried for various offences must be consistent with the Uniform Code of Military Justice (UCMJ) and cannot be authorized by the President alone – the Commissions must be approved by Congress.</p>
</list-item>
<list-item>
<p>The detainees have the right to claim Prisoner of War (POW) status under Common Article 3 of the Geneva Conventions.</p>
</list-item>
</list>
<p>However, in spite of these findings the detention of these individuals continues. While a number of states such as the United Kingdom has secured the release of all their citizens (all of whom were later released with no charges); other states such as Afghanistan and Pakistan have remained unable to secure the release of their detained citizens upon request or gain knowledge of the precise number of citizens detained, with the exception of circumstances where the US has let them go due to them being ‘of no further use or value’ to the United States Department of Defense (
<xref ref-type="bibr" rid="ref520">United States Department of Defense 2006a</xref>
).</p>
<p>This chapter seeks to understand the legal status of the detainees at Guantanamo Bay and what their status tells us about the relationship between law and politics. In particular, this chapter will explore whether Guantanamo Bay represents a ‘legal black hole’, an exception to the rule of law, or a situation where the application of existing law has simply not been strong enough. This chapter will unfold in three parts. The first section will provide a brief account of how Guantanamo Bay has been commonly understood in legal terms. Establishing the legal understandings of Guantanamo Bay provides us with three possible explanations for Guantanamo Bay’s legal character. All of these explanations are concerned with understanding whether Guantanamo Bay is an
<italic>exceptional</italic>
response to the threat posed by terrorism or an illegal response which requires the swift administration of law and international political pressure to bring about its end.</p>
<p>The second part of this chapter will then explore the case of David Hicks, the only Australian citizen to remain in confinement at Guantanamo Bay since his arrest in Afghanistan in December 2001 and detention in Guantanamo Bay since January 2002.
<sup>
<xref ref-type="fn" rid="fn5_7">7</xref>
</sup>
David Hicks is one of the four detainees originally charged and
<xref id="page_73" ref-type="page"></xref>
called to appear before the Military Commission. His case is of particular note due to the refusal of the Australian government to seek his release or even demand that the guidelines for treatment of prisoners, as set out in international humanitarian law, be applied (
<xref ref-type="bibr" rid="ref129">
<italic>Sydney Morning Herald</italic>
2006</xref>
). The focus on Hicks’ case provides an illustration of the conditions that detainees face in Guantanamo Bay and will provide an effective case study for evaluating the applicability of the three legal understandings that seek to explain the legal character of Guantanamo Bay.</p>
<p>Finally, this chapter will address whether any of the three approaches shed light on why the detainees remain in continued detention. I make three arguments in this final section. I argue first, that there is little evidence that Guantanamo Bay is a ‘legal black hole’. The US administration has not been able to isolate it from judicial reach. As evidenced by the US Supreme Court findings, there is a great amount of law that is applicable to the detainees in Guantanamo Bay. Second, Guantanamo Bay is not an exception to the US rule of law. There are limits to the derogations that the US executive can call upon to excuse itself from providing the detainees with access to due process. Again, the Supreme Court findings have been immensely significant in demonstrating that the US President will be held to account for acting under ‘emergency powers’, and furthermore that his powers, even under these circumstances are finite. The court also found that the US government cannot derogate from international law, arguing that the Geneva Conventions still apply even in war as complicated as the ‘War on Terror’. My third argument is that legal instrumentalists have thus far appeared to be most persuasive in explaining Guantanamo Bay. However, the actions taken by the US administration since the findings of the Supreme Court does not mean that we should take comfort from this finding.</p>
<sec id="sec5_1">
<title>Guantanamo Bay</title>
<p>The existence of a territory where prisoners can be forcibly moved and then held for an undetermined amount of time without charge seems unfathomable in the twenty-first century. The progress made in the treatment of prisoners under international humanitarian law, such as the Third and Fourth Geneva Conventions which concerns the treatment of combatants and civilians (respectively) in times of war
<sup>
<xref ref-type="fn" rid="fn5_6">6</xref>
</sup>
appears to have been eroded by one act of a US President. In early 2002, President Bush’s administration outlined why those captured and associated with al Qaeda would be (and could be) labelled as ‘unlawful combatants’ (
<xref ref-type="bibr" rid="ref324">Lietzau 2005</xref>
). This status was, ostensibly, to remove any protections that could be afforded to them under the Third or Fourth Geneva Convention. Lietzau argues that President Bush did this because he correctly engaged with the ‘the body of law applicable in armed conflict – the law of war’ and that the Geneva Conventions only regulated those ‘entitled to participate in hostilities’ (
<xref ref-type="bibr" rid="ref324">Lietzau 2005</xref>
: 45).</p>
<p>This use of legal means to legitimize the treatment of Guantanamo Bay detainees, while at the same time attempting to deny them legal remedy to challenge these means, has aroused many concerns. For example, despite the fact that Guantanamo Bay detainees’ status as terrorists has not yet been proven in a
<xref id="page_74" ref-type="page"></xref>
court or tribunal, the US administration constantly refers to them as ‘terrorists’ and ‘evil people’ (The Age 2004).
<sup>
<xref ref-type="fn" rid="fn5_8">8</xref>
</sup>
The primary concern is how can the treatment of detainees in Guantanamo Bay be explained when the state responsible is meant to have one of the most sophisticated separation of powers model of government, which guarantees judicial independence from the legislative and executive branches of government (
<xref ref-type="bibr" rid="ref483">Slaughter 2005</xref>
)? In addition, how does a country that bears a domestic rights protection bill which has inspired other states seeking to strengthen their own standing as a liberal democratic society (
<xref ref-type="bibr" rid="ref308">Koh 2005</xref>
), get away with such human rights abuses?</p>
</sec>
<sec id="sec5_2">
<title>Three appreciations of Guantanamo Bay</title>
<p>Attempts to understand the US administration’s justification of, as well as the continued detention of prisoners in Guantanamo Bay has resulted in three predominant explanations: first, legal state of exception; second, political state of exception and third, the legalist challenge. I will introduce each approach in order to offer three ways of thinking about the case of David Hicks. In doing so, I seek to understand which approach, if any, best explains the actions of the United States administration and the consequences that may stem from the continued existence of Guantanamo Bay.</p>
<sec id="sec5_2_1">
<title>Legal state of exception</title>
<p>The choice of Guantanamo Bay (GB) as a facility to hold people deemed to be beyond the ‘pale of law’ certainly seems to support the first explanation, which holds GB to be a legal state of exception. GB is located in Cuba, but GB’s territory falls under the sovereignty of the United States even though up until the US Supreme Court decision in 2004, it was excised from the reach of US judicial law (
<xref ref-type="bibr" rid="ref188">Fisher 2005</xref>
: 246–7). GB was first used as an exceptional holding ground when Haitian refugees were detained in GB during the early to mid-1990s. While, no doubt, the detention of refugees was an attempt to deter others thinking of making the dangerous trip into US waters for refuge, it was also an attempt to physically isolate these individuals from the bureaucratic and legal structures of the liberal democratic state (
<xref ref-type="bibr" rid="ref296">Kaplan 2005</xref>
: 840–1). GB is an attempt to make individuals physically, emotionally and legally isolated from the liberal democratic trappings that would be available in the US. There are no human rights groups nearby. The media can only access the grounds with permission. It is difficult for legal counsel to gain access and the conditions in these camps are bleak (
<xref ref-type="bibr" rid="ref371">Mori 2006</xref>
). Essentially, this is a zone where the US Bill of Rights
<italic>seems</italic>
to have not reached.</p>
<p>The use of GB for detaining ‘enemy combatants’ transported from the deserts of Afghanistan and borders of Pakistan reveals two important things. First, that these people are powerless – decisions over their lives are in the hands of the US government. Second, it sustains the perception that these people have committed heinous crimes that make them far too threatening to be allowed access to the legal procedures that US citizens enjoy. The detention and treatment of GB detainees is
<xref id="page_75" ref-type="page"></xref>
a demonstration of the power of the US government, the threat that it perceives the state to be under and the steps that the Executive is willing to take against those who they believe threaten it. The position of the US to many thus reflects the state of exception (SOE) that Carl Schmitt wrote of in the 1960s when he argued that liberal states, like any other powerful institution, will see to deny liberty if they feel that their own survival is threatened.</p>
<p>Carl Schmitt, a supporter of the Nazi Party in Germany during World War II, wrote the
<italic>Nomos of the Earth</italic>
and
<italic>The Partisan</italic>
after the defeat of Nazism and in the wake of the Cold War. Both volumes argue that the liberal democratic state is not the ultimate universal provider of freedom and liberty as its advocates would argue (
<xref ref-type="bibr" rid="ref454">Scheuerman 1994</xref>
;
<xref ref-type="bibr" rid="ref225">Gross 2000</xref>
). Schmitt argues that liberal states were no different from totalitarian states if threatened. In such cases, liberal states abandon their ‘pre-established general norms’ that cover all possible situations in the face of a ‘sudden, urgent, usually unforeseen events or situations that require immediate action, often without time for prior reflection and consideration’ (
<xref ref-type="bibr" rid="ref225">Gross 2000</xref>
: 1827). The state of emergency is denied by liberalism as a norm in ‘ordinary state of affairs’, but in the face of an emergency the very basis of freedom which underpins liberalism is abandoned (
<xref ref-type="bibr" rid="ref225">Gross 2000</xref>
: 1828). Therefore, the ‘norm’ that appeared to exist prior to the exception was actually not reality. Exception, argues Schmitt, is the reality for it is at this moment that we truly know the scope of the state’s powers according to law and of individuals’ powerlessness. As Schmitt argues in
<italic>Political Theology,</italic>
‘the rule proves nothing; the exception proves everything: it confirms not only the rule but also its existence, which derives only from the exception’ (
<xref ref-type="bibr" rid="ref456">Schmitt 1985</xref>
).</p>
<p>In relation to GB, Schmitt’s argument exemplifies how the liberal state is able to create legal exceptions to its legal norms (
<xref ref-type="bibr" rid="ref455">Scheuerman 2006</xref>
). Al Qaeda, for example, fights for a cause which is not state connected or affiliated to ‘normal’ inter-state politics. So then, how does a liberal state make sense of an actor that fights to fulfil fundamentalist religious dogma? It doesn’t. Essentially, the West has been able to create a legal system where it can justify extreme acts of violence against those who do not ‘fit’ the Western state system (
<xref ref-type="bibr" rid="ref455">Scheuerman 2006</xref>
). For example, Scheuerman argues that the Geneva Convention calls for legal combatants to bear their weapons openly and wear uniforms to signify that they are part of a combatant force: yet, he asks, what power do these symbols really have when guerrilla fighting is being conducted in Fallujah or when insignia are invisible in the dead of the night (2006: 117). According to Schmitt, liberal states have created these types of rules so as to create legal vacuums which allow them to treat enemies with extreme violence that can be justified by reference to a legal state of exception.</p>
<p>Scheuerman (
<xref ref-type="bibr" rid="ref455">2006</xref>
) and other supporters of Schmitt’s work argue, essentially, that liberal governments create legal black holes to in order to develop power beyond the discretionary norm of a liberal society (
<xref ref-type="bibr" rid="ref23">Aron 1986</xref>
;
<xref ref-type="bibr" rid="ref514">Tushnet 2005</xref>
). The Bush administration argues that international laws don’t apply to the terrorists found in Afghanistan, and that there are no laws that adequately deal with the potential gravity of their actions. The state of emergency compels the need for
<xref id="page_76" ref-type="page"></xref>
administrative action in the face of a ‘legal vacuum’. A legal vacuum was caused by the refusal of the US administration to treat al Qaeda combatants as being on the same footing, or level, as their own combatants. As Scheuerman argues:</p>
<disp-quote>
<p>For the Bush Administration, as for Schmitt, the weaknesses of the existing legal regime for terrorism are not simply a lamentable reminder of the limits of statutory law, or reason for reforming international law in order to make it better suited to the challenges of terrorism. It interprets the existing legal lacunae instead as evidence for the necessity of a fundamentally
<italic>norm-less</italic>
realm of decision making in which the executive possesses full discretionary authority.</p>
<attrib>(
<xref ref-type="bibr" rid="ref455">Scheuerman 2006</xref>
: 118)</attrib>
</disp-quote>
<p>As a result, the US administration’s argument that there are no laws to deal with terrorists becomes a justification for dealing with them as the administration sees fit (
<xref ref-type="bibr" rid="ref226">Gross 2006</xref>
). The executive has created a justification for the legal vacuum. The state of exception becomes legal through the executive’s invocation of it. This act has led, others argue, to further consequences post 9/11. Steven Lukes for example, argues that the use of torture on detainees had led to a point where liberal democracy in the US and UK ‘may not these days be in such good shape as … thought’ (2005: 15). Lukes argues that the readiness in which executive branches of government agree to torture now may be permissible in circumstances we never thought possible before (2005). The brutality of 9/11 and the bombings in London in July 2005, justify the exceptional acts that liberal states such as the US and UK must take to survive (
<xref ref-type="bibr" rid="ref336">Lukes 2005</xref>
).</p>
<p>Paul Hoffman, Chair of the International Executive Committee of Amnesty International, argues that though he disputes it, the ‘war on terrorism’ has been waged with the evocation that the rule of law is unable to effectively respond to the threat (hence the need to allow for new interpretations and new laws) (2004). David Luban (
<xref ref-type="bibr" rid="ref333">2005</xref>
) argues that the liberal state has to label terrorism as an unlawful act of war, and thus place it beyond a typical criminal act. Labelling terrorism as just a criminal act doesn’t allow the government, for example, to shoot the terrorists; rather, it forces them to provide the terrorists with due process (which makes burden of proof potentially problematic). In war, there are a range of acts that become legitimate if you treat terrorists as enemies against the state. To begin with, burden of proof is weaker in war – no need for proof beyond reasonable doubt when a soldier faces someone that they suppose is an enemy soldier. Legitimate targets are those who might harm, rather than have harmed (
<xref ref-type="bibr" rid="ref333">Luban 2005</xref>
) and ultimately, detainees lack the usual rights of criminal suspects (presumption of innocence is just one example). Luban argues that GB is thus the perfect example of a hybrid war-law model that the US administration has created to fill in the void where neither war law nor criminal law is adequate to deal with the war on terror (2005: 221). Essentially, these arguments seek to demonstrate how GB correlates with Schmitt’s argument that the liberal state will construct exceptions that have no legal remedy, i.e. the ‘unlawful combatants’
<xref id="page_77" ref-type="page"></xref>
in Guantanamo Bay, in order for the state to retain ultimate authority. Schmitt argues that the norm is emergency, not order; while liberalism putatively rests on the opposite being true (
<xref ref-type="bibr" rid="ref225">Gross 2000</xref>
: 1854). As a consequence, when liberalism is unable to deal with the exceptional it has to find a way to incorporate the suspension of the rule of law into law to survive.</p>
</sec>
<sec id="sec5_2_2">
<title>Political state of exception</title>
<p>Giorgio Agamben’s recent work,
<italic>The State of Exception,</italic>
also directly refers to the situation in GB. However, Agamben challenges or ‘rewrites’ (
<xref ref-type="bibr" rid="ref366">Minca 2005</xref>
: 406) Schmitt’s depiction of the state of exception (SOE), arguing that Schmitt creates a legal vacuum which paradoxically allows for the
<italic>legal justification</italic>
of violence. Agamben questions this legal vacuum and argues that Schmitt’s depiction is no more than a justification for violence (2005). While Agamben doesn’t doubt the existence of the exception, he believes that its existence is based on much more than excusing the violent deprivation of liberty. Rather, the key is to understand the political decisions that led to its invocation:</p>
<disp-quote>
<p>In truth, the state of exception is neither external nor internal to the judicial order … The suspension of the norm does not mean its abolition, and the zone of anomie that it establishes is not (or at least claims not to be) unrelated to the juridical order. Hence, the interest of those theories that, like Schmitt’s, complicates the topographical opposition into a more complex topological relation, in which the very limit of the juridical order is at issue. In any case, to understand the problem of the state of exception, one must first correctly determine its localization (or illocalization). As we will see, the conflict over the state of exception presents itself essentially as a dispute over its proper locus.</p>
<attrib>(
<xref ref-type="bibr" rid="ref8">Agamben 2005</xref>
: 23–4)</attrib>
</disp-quote>
<p>Agamben argues that the SOE can be a legal justification for political action because of the codification of derogation in domestic law and international law.
<sup>
<xref ref-type="fn" rid="fn5_9">9</xref>
</sup>
All states, when threatened with an emergency that could threaten their existence, are allowed to temporarily derogate from their ratification of international human rights treaties and domestic constitution (
<xref ref-type="bibr" rid="ref258">Humphreys 2006</xref>
: 678). As a result, states can lawfully transgress human rights. The consequence of derogation, Agamben argues, is that defining when the nation is under a state of emergency becomes a ‘subjective judgment’ (2005: 30). Thus even though the declaration of SOE is a lawful suspension of the rule of law, it has required a political justification for determining its necessity.</p>
<p>Under this model of derogation, Agamben argues, the SOE has moved from its original ‘state of siege’ emphasis where it was only acceptable to claim emergencies in times of war to now being an acceptable declaration for democratic states when they need to ‘cope with social disorder and economic crises’ (
<xref ref-type="bibr" rid="ref258">Humphreys 2006</xref>
: 679). Agamben shows how through the nineteenth and twentieth centuries, the
<xref id="page_78" ref-type="page"></xref>
SOE has been used by the US and European states to justify extensive government powers during times of political crisis (such as economic depressions, union strikes and Lincoln’s abolition of slavery) (2005). Essentially, the SOE takes on a political meaning – where the state’s continued existence becomes dependent on the executive having greater powers to manage the crisis.</p>
<p>Agamben argues that what is crucial about SOEs is that the executive does not seek to incorporate the suspension of the law
<italic>into</italic>
law, as Schmitt argues. Rather, the SOE is sought by the executive in order to create a ‘space without law’ where the conduct of violence cannot be declared as lawful, but nor can it be declared as unlawful (
<xref ref-type="bibr" rid="ref366">Minca 2005</xref>
). Thus Agamben is at pains to show that the SOE is not a lawful act, nor does it seek to inhabit the judicial realm: it is a zone of anomie, where the executive does not wish its actions to be subjected to the law (
<xref ref-type="bibr" rid="ref8">Agamben 2005</xref>
).</p>
<p>The executive can enable a zone of anomie, for a time where law does not apply, because of the existence of derogation. Derogation from individual rights have been justified by democratic states through domestic and international law providing an ‘escape clause’ in times of ‘emergencies’ (
<xref ref-type="bibr" rid="ref8">Agamben 2005</xref>
). States can thus legitimately declare a zone of anomie – a zone where state will not be held accountable to the rule of law – if they believe that it is a political necessity. Thus the social contract between a liberal democratic state and its citizens will be abandoned in the face of external threats that threaten the very existence of the state.</p>
<p>Therefore, to Agamben, Guantanamo Bay is a zone of anomie. Unlike Schmitt, Agamben does not see Guantanamo as the product of a legal vacuum that has been crafted by the executive to legitimate its actions. Rather, more frighteningly, GB represents the complete suspension of the rule of law. GB cannot be legislated into existence because there is no legislation or laws that legitimate its existence – as the Supreme Court demonstrates when it rejects the US administration’s arguments. However, in spite of the judicial rejection of the GB detentions, the facility continues to exist. The continued existence of Guantanamo Bay
<italic>in spite</italic>
of the US Supreme Court findings does indicate, disturbingly, that GB is a zone created with the intent of being outside the law, where the law cannot capture and overturn the anomie.</p>
<p>The result, according to Agamben, is that the state of exception is a political act where, in this case, it can be justified as a necessity to preserve the rule of law and security of the society. Guantanamo Bay has become a state of necessity for the protection of American citizens, as President Bush argued when the US Supreme Court overruled the charges against the four charged in Guantanamo Bay in June 2006: ‘I am not going to jeopardize the safety of American people. People have got to understand that. These people were picked up off a battlefield, and I will protect the people’ (
<xref ref-type="bibr" rid="ref361">Miles 2006</xref>
: 1). When statements like these are made, arguments against the necessity for this type of action only have a greater hurdle to jump. The historical right of democratic governments to use derogation in times of emergency is a subjective judgment (
<xref ref-type="bibr" rid="ref8">Agamben 2005</xref>
: 30), but it nonetheless creates a political environment where arguments against the right to derogate, to
<xref id="page_79" ref-type="page"></xref>
challenge its necessity, have higher hurdles to jump. This is the zone of anomie that Agamben argues is Guantanamo Bay.</p>
</sec>
<sec id="sec5_2_3">
<title>Legalist challenge</title>
<p>The legalists have paid a lot of attention to the arguments presented by Agamben and his supporters as well as the Schmittian explanations for GB’s legal status. However the legalists, as their name suggests, desperately seek to bring the law back in as a challenge to both Agamben and Schmitt. They reject the argument that a ‘legal black hole’ exists in the case of GB and also dispute that a suspended rule of law hangs over GB (
<xref ref-type="bibr" rid="ref279">Johns 2005</xref>
;
<xref ref-type="bibr" rid="ref350">Marks 2006</xref>
). Rather this group draws on a combination of legal positivist rules and naturalist legal principles to argue that GB does fall within the realm of law. Principally, the legalists argue that the continued existence of GB is not due to the absence of legal norms telling us whether GB is lawful or unlawful or a derogation from the laws that exist; rather, it is because there is a political lack of will to enforce the laws as they should be enforced (
<xref ref-type="bibr" rid="ref165">Duffy 2005</xref>
;
<xref ref-type="bibr" rid="ref350">Marks 2006</xref>
;
<xref ref-type="bibr" rid="ref279">Johns 2005</xref>
;
<xref ref-type="bibr" rid="ref497">Stewart 2006</xref>
;
<xref ref-type="bibr" rid="ref189">Fletcher 2006</xref>
).</p>
<p>The problem that the legalists have been unable to answer is that if their legal arguments cannot force the closure of Guantanamo, or at least guarantee treatment of detainees according to international humanitarian law (IHL), will it indicate a shift of legal precedent where such establishments may become legal? This could result in a situation even worse than the state of exception that Agamben or Schmitt followers envision: it could become a legal, non-exceptional, justified addition to legal and political processes across the world (
<xref ref-type="bibr" rid="ref498">Steyn 2004</xref>
).</p>
<p>There is a large cohort of legalists that have challenged the idea that GB is an exception to the rule of law or represents a legal black hole, so I will not be able to cover all of their writings. However, a select number including Fleur Johns (
<xref ref-type="bibr" rid="ref279">2005</xref>
), Elizabeth Dahlstrom (
<xref ref-type="bibr" rid="ref139">2003</xref>
), Susan Marks (
<xref ref-type="bibr" rid="ref350">2006</xref>
), Paul Hoffman (
<xref ref-type="bibr" rid="ref244">2004</xref>
), Helen Duffy (
<xref ref-type="bibr" rid="ref165">2005</xref>
), and James G. Stewart (
<xref ref-type="bibr" rid="ref497">2006</xref>
) have argued, very persuasively, that we need to ‘rethink Guantanamo’ (
<xref ref-type="bibr" rid="ref497">Stewart 2006</xref>
).</p>
<p>Their arguments are threefold. First, they hold that the lack of reference to international law and/or refusal to acknowledge the clarity of international humanitarian law on the matters of POWs, detention, court tribunals and torture is not an ‘interpretative challenge’. The legalists argue that there is a 60 year tradition of interpreting, refining and using the laws of war to create a set of rules or principles (depending on whether you are a positivist or naturalist in your interpretation of international law) that guide states on how they should act. Indulging, they argue, in descriptions of GB as a zone of anomie or ‘black hole’ enables the US administration to essentially get away with illegal practices that the international community, the US included, would not abide from another state (
<xref ref-type="bibr" rid="ref279">Johns 2005</xref>
;
<xref ref-type="bibr" rid="ref497">Stewart 2006</xref>
).</p>
<p>Second, the legalists argue that the right to derogation, which Agamben speaks of, is indeed a legitimate part of international and domestic law, recognized by a number of conventions that states have ratified, including the ICCPR. However, what the legalists do not agree with is the argument that derogation has an
<xref id="page_80" ref-type="page"></xref>
unspecified time frame where it is up to the administration to decide when the threat is over (i.e.
<xref ref-type="bibr" rid="ref223">Greenwood 2002</xref>
). This interpretation of derogation has, most notably, been neglected by the US Supreme Court in June 2006 and a number of academic interpretations of the Geneva Conventions (
<xref ref-type="bibr" rid="ref189">Fletcher 2006</xref>
;
<xref ref-type="bibr" rid="ref497">Stewart 2006</xref>
). Other legalists present the argument differently, stating that if the US wished to use the state of emergency argument there are legal avenues that they could take to do this while still remaining within the rule of law. Under Article 4 of the ICCPR there is a clause that allows the temporary suspension of certain rights ‘in time of public emergency’ (
<xref ref-type="bibr" rid="ref139">Dahlstrom 2003</xref>
: 670), as Agamben earlier mentions. However, Article 4 (3) does not allow derogation from the rights to life, religion, freedom from torture, slavery and the prohibition against
<italic>ex post facto</italic>
laws, even in times of emergency. Dahlstrom does point out that Article 9 – the right to be free from arbitrary detention – is not on this list of rights and therefore if the US is seeking a temporary derogation they would be well within their legal rights to notify the UN Secretary General of their temporary suspension (2003: 670). Susan Marks (
<xref ref-type="bibr" rid="ref350">2006</xref>
) argues that this refusal to follow legal convention is the result of the US administration seeking to use, as exemplified by John Yoo and Jay Bybee, another set of legal arguments that can justify their actions. Yoo and Bybee wrote the infamous ‘torture memos’, which took an ‘aggressive approach to the war on terrorism in general and to the detention and interrogation of terrorism suspects in particular’ (
<xref ref-type="bibr" rid="ref553">Wippman 2005</xref>
: 22). This, argues Marks, is not the product of a legal black hole or a legal anomie, but a legal construct that international law and domestic law allows to be constituted (2006: 347).</p>
<p>Third, if legalists are able to create a whole set of arguments stating why GB is an illegal, inhumane breach of human rights, international humanitarian law and thus US’s own domestic law (
<xref ref-type="bibr" rid="ref279">Johns 2005</xref>
,
<xref ref-type="bibr" rid="ref244">Hoffman 2004</xref>
and
<xref ref-type="bibr" rid="ref165">Duffy 2005</xref>
), why has GB continued to exist for five years with, all things considered, little condemnation by allied (or non allied) states (
<xref ref-type="bibr" rid="ref498">Steyn 2004</xref>
)? This is the third concern of the legalists: if there are a clear set of international laws stipulating the unlawfulness and inhumanity of GB, but little attempts by states to insist the US adhere to them, is this the beginning of a new legal precedent? A division then occurs here, where the legal naturalists argue that the traditional of politics ‘interfering’ with law obscures how it
<italic>really</italic>
should be interpreted and adhered to (
<xref ref-type="bibr" rid="ref431">Roberts 2004</xref>
;
<xref ref-type="bibr" rid="ref165">Duffy 2005</xref>
;
<xref ref-type="bibr" rid="ref279">Johns 2005</xref>
;
<xref ref-type="bibr" rid="ref244">Hoffman 2004</xref>
); while the positivists start to look at the precedent that these interpretations of the Geneva Conventions, for example, will have on international law with little concern beyond the instrumental implications (
<xref ref-type="bibr" rid="ref223">Greenwood 2002</xref>
;
<xref ref-type="bibr" rid="ref166">Dworkin 2004</xref>
; Dahlstrom 2004). Greenwood (
<xref ref-type="bibr" rid="ref223">2002</xref>
), for instance, argues that the US interpretation of international law is permitted because of how international law is framed and therefore as long as they remain within the bounds of customary law and a plausible legal argument, we are simply witnessing how international law develops in response to events.</p>
<p>So where do we go from here? Is the legalist challenge simply to bring the US back from the legal black hole or zone of anomie, or is it to understand how political choices made in the name of law account for GB’s continued existence? We are left with three very different explanations for GB’s political and legal
<xref id="page_81" ref-type="page"></xref>
status. Meanwhile, individual lives are being left in limbo behind the concrete walls of GB. I will now look at the story of David Hicks to see if we can get any closer to understanding these different explanations.</p>
</sec>
</sec>
<sec id="sec5_3">
<title>David Hicks: exception or norm?</title>
<p>David Matthew Hicks is an Australian citizen who has been detained at Guantanamo Bay since January 2002. David Hicks was detained by the Northern Alliance and then handed over to US custody in Afghanistan in December 2001. Hicks is allegedly a member of al Qaeda and is suspected of assisting the Taliban in the early stages of the US allied invasion into Afghanistan (
<xref ref-type="bibr" rid="ref558">Yoch Jr 2006</xref>
). Hicks is one of the few detainees to be charged by the US administration on the following: first, conspiracy to commit murder, attack civilians and civilian objects and terrorism; second, attempted murder of allied soldiers; and third aiding the enemy (
<xref ref-type="bibr" rid="ref352">Martyn 2005</xref>
;
<xref ref-type="bibr" rid="ref510">The Age 2004</xref>
). Hicks has been charged under the Military Order that President Bush signed on 13 November 2001, and the jurisdiction of the Military Tribunal that charged him with these three offences was based on President’s orders on 3 July 2003 (
<xref ref-type="bibr" rid="ref522">United States Department of Defense 2006c</xref>
).</p>
<p>David Hicks joined the Kosovo Liberation Army (KLA) in May 1999 after, it seems, he was rejected by the Australian Defense Forces (ADF) (
<xref ref-type="bibr" rid="ref517">United States Department of Defense 2004</xref>
: 1). While with the KLA, it is alleged that Hicks engaged in basic military training and fought on behalf of the Albanian Muslims. Upon his return to Australia Hicks converted to Islam and by November 1999, he had travelled to Pakistan to join Lashkar e Tayyiba (LET) or ‘Army of the Righteous’, which is now listed as a terrorist organization by the US (
<xref ref-type="bibr" rid="ref517">United States Department of Defense 2004</xref>
: 1). Within a few months of training, Hicks with a letter of introduction from LET, went to the Afghanistan border. It is alleged that upon his arrival, Hicks attended al Qaeda terrorist training camps. His entry into Afghanistan was in January 2001 and on 9 December 2001, Hicks was arrested by the Northern Alliance and then transferred to the US custody (
<xref ref-type="bibr" rid="ref517">United States Department of Defense 2004</xref>
: 2).</p>
<p>After a short detention in Afghanistan, Hicks was one of the first prisoners to be moved from Afghanistan to Guantanamo, he arrived at the US Naval Base on 11 January 2002 (
<xref ref-type="bibr" rid="ref249">Hovell 2005</xref>
). President Bush then labelled those arrested and held in Guantanamo Bay as ‘unlawful combatants’ under a directive issued on 7 February 2002 (
<xref ref-type="bibr" rid="ref249">Hovell 2005</xref>
). Hicks’ family, meanwhile, registered his possible arrest with the Centre for Constitutional Rights and lodged a habeas petition on his behalf in federal court in Washington DC along with the families of Shafiz Rasul and Asif Iqbal from Britain (
<xref ref-type="bibr" rid="ref360">Miami Herald 2005</xref>
). Eventually, the first petition filed –
<italic>Rasul v. Bush</italic>
– would be heard by the Supreme Court. Before the hearing though, Rasul and Iqbal were returned to Britain and then set free by UK authorities on 9 March 2004. On 28 June 2004, the Supreme Court found in Rasul’s favour, ruling 6-3 that Guantanamo detainees can challenge their imprisonment in federal courts (
<xref ref-type="bibr" rid="ref360">Miami Herald 2005</xref>
). However, on 10 June 2004, the US administration brought charges against David Hicks for prosecution before
<xref id="page_82" ref-type="page"></xref>
a US military commission. The military commission was the first to be used in the US since the 1940s during World War II (
<xref ref-type="bibr" rid="ref352">Martyn 2005</xref>
). The commission was set up under a Presidential Order, which did not have any
<italic>‘explicit</italic>
basis in legislation or other Congressional authorization’ (
<xref ref-type="bibr" rid="ref352">Martyn 2005</xref>
). The commission would only try non-US citizens ‘who are current or former members of al Qaeda or any person that has aided or conspired to commit acts of international terrorism against the US or its interests’ (
<xref ref-type="bibr" rid="ref352">Martyn 2005</xref>
). This original commission had three senior military officers presiding, only one with legal experience. Standard rules for evidence applicable in US and Australian courts did not apply to this commission and only a majority vote was needed for a verdict to be reached (
<xref ref-type="bibr" rid="ref352">Martyn 2005</xref>
).</p>
<p>Hicks’ first charge was conspiracy on the grounds of contacting al Qaeda operatives ‘known and unknown’ that have engaged in terrorist attacks (
<xref ref-type="bibr" rid="ref517">United States Department of Defense 2004</xref>
: 3). Hicks is alleged to have trained as a member of al Qaeda in a number of military camps. The charge details that Hicks, on a brief visit to Pakistan in September 2001, returned to Afghanistan after seeing the images of the World Trade Center Towers collapse on television. Upon his return, Hicks was assigned to Qandahar Airport where he and others guarded a Taliban tank – this was at the same time that the Allied forces began invasion in late October 2001 (
<xref ref-type="bibr" rid="ref517">United States Department of Defense 2004</xref>
: 4–5). Within a month, Hicks had been arrested by the Northern Alliance, on his way to Konduz, Afghanistan.</p>
<p>For these actions, Hicks has been charged by the US Administration for conspiracy which they define as ‘attacking civilians; attacking civilian objects; murder by an unprivileged belligerent; destruction of property by an unprivileged belligerent; and terrorism’ (
<xref ref-type="bibr" rid="ref517">United States Department of Defense 2004</xref>
: 3). It is alleged that because Hicks knowingly participated in al Qaeda’s insurgency that he should be charged for being a conspirator, though no evidence has been presented that Hicks personally committed any of the crimes defined as constituting conspiracy (those listed above).</p>
<p>Hicks’ second charge is ‘attempted murder by an unprivileged belligerent’ (
<xref ref-type="bibr" rid="ref517">United States Department of Defense 2004</xref>
: 5). Under this charge Hicks, as a member of al Qaeda who was in Afghanistan</p>
<disp-quote>
<p>between on or about September 11, 2001 and December 1, 2001 as a perpetrator, co-conspirator, member of an enterprise of persons who shared a common criminal purpose, an aider or abettor, or some combination thereof, attempted to murder diverse persons by directing small arms fire, explosives, and other means intended to kill American, British, Canadian, Australian, Afghan and other Coalition forces, while he [Hicks] did not enjoy combatant immunity and such conduct taking place in the context of and associated with armed conflict.</p>
<attrib>(
<xref ref-type="bibr" rid="ref517">United States Department of Defense 2004</xref>
: 5)</attrib>
</disp-quote>
<p>Hicks’ final charge is ‘aiding the enemy’. The content of this charge is that due to his presence in Afghanistan ‘between on or about January 1, 2001 and
<xref id="page_83" ref-type="page"></xref>
December 1, 2001, intentionally aided the enemy, to wit: al Qaida and the Taliban’ (
<xref ref-type="bibr" rid="ref517">United States Department of Defense 2004</xref>
: 5) and participated in armed conflict. Hicks’ military appointed lawyer, Major Michael Dan Mori and his civilian legal team have both strongly denied the lawfulness of these charges and expressed concern about the overt political tone dominating their client’s treatment (
<xref ref-type="bibr" rid="ref549">Wilkinson and Pearlmann 2004</xref>
). Major Mori has repeatedly raised the fact that states such as Britain, Yemen and France have secured their citizens’ release from Guantanamo Bay, while Hicks remained in detention for two years without charge and then the grounds on which he was charged, they allege, are spurious. In a hearing before the US District Court of the District of Columbia, Hicks’ legal team argued that:</p>
<disp-quote>
<p>At no time did Hicks engage in any criminal or terrorist conduct. Nor did he kill, injure, fire upon, or direct fire upon, any U.S. or Coalition Forces, or the Northern Alliance forces initially responsible for his seizure. Nor did he attempt any such conduct. He did not at any time commit any criminal violations, or any violations of the law of war. Nor did he ever enter into any agreement with anyone to do so.</p>
<attrib>(
<xref ref-type="bibr" rid="ref352">Martyn 2005</xref>
)</attrib>
</disp-quote>
<p>Despite pleas from Hicks’ defence counsel, his family and all of the Australian States and Territories Attorney-Generals, the Commonwealth government repeatedly refused to seek the return of Hicks to Australia. The Australian government’s recalcitrance is believed to be based on the fact that Hicks cannot be charged with any offence in Australia (
<xref ref-type="bibr" rid="ref348">McNally 2004</xref>
;
<xref ref-type="bibr" rid="ref129">Coorey 2006</xref>
). This would result in Hicks’ immediate release and the Australian government does not wish to let an individual associated with al Qaeda not face charges (
<xref ref-type="bibr" rid="ref129">
<italic>Sydney Morning Herald</italic>
2006</xref>
). The reason for the belief that Hicks cannot be charged are as follows. First, Hicks was literally on the other side of Afghanistan when the allied troops invaded. Therefore, the second charge against Hicks: ‘attempted murder of allied soldiers’ is physically impossible. Hicks only ever encountered the Northern Alliance during the period of allied invasion, which led to his arrest before being turned over to the US troops in early December 2001 (
<xref ref-type="bibr" rid="ref371">Mori 2006</xref>
).</p>
<p>Hicks is also charged with conspiracy on the grounds of contacting al Qaeda operatives ‘known and unknown’ that have engaged in terrorist attacks. As will be discussed in the
<italic>Hamdan v. Rumsfeld</italic>
case, the US Supreme Court found that under the laws of war (which is what these individuals must be tried under), there is no legal precedent for including conspiracy (
<xref ref-type="bibr" rid="ref189">Fletcher 2006</xref>
). Therefore, the charge of conspiracy has been deemed by the Supreme Court as being unlawful and there is no reason to suspect that a similar finding wouldn’t be made in Australian courts (
<xref ref-type="bibr" rid="ref442">Rothwell 2006</xref>
).</p>
<p>Finally, the armed belligerent charge is extremely contentious. The 2006 Supreme Court ruling (Supreme Court of the United States (
<xref ref-type="bibr" rid="ref503">2006</xref>
): hereafter 548 US 2006) found that combatants such as Hicks are entitled to a trial based on the
<xref id="page_84" ref-type="page"></xref>
laws of the country that they are detained in and furthermore, that their status as combatants should also be evaluated. Common Article 3 of the Geneva Convention recognizes conflicts may apply in cases where the enemy is not a signatory to the Geneva Convention and that in these circumstances, those arrested still should be treated under the general provisions of the Convention (
<xref ref-type="bibr" rid="ref442">Rothwell 2006</xref>
). In essence, this also removes the validity of the ‘armed belligerent charge’ because, technically, there cannot be a law
<italic>against</italic>
being a soldier; or in times of war, firing your rifle when another combatant is firing theirs at you (
<xref ref-type="bibr" rid="ref371">Mori 2006</xref>
).</p>
<p>The likelihood that Hicks could not be charged with any crime is politically unpalatable to the Australian government. This has resulted in their efforts being limited to ensuring that Hicks has a ‘speedy trial’ and that he does not face the death penalty (
<xref ref-type="bibr" rid="ref238">Hibbitts 2006</xref>
;
<xref ref-type="bibr" rid="ref402">O’Malley 2006</xref>
). Unsurprisingly, Hicks has pleaded ‘not guilty’ to all three charges and his legal counsel has repeatedly expressed strong reservations about the charges, the military commissions and the treatment of Hicks in detention (
<xref ref-type="bibr" rid="ref348">McNally 2004</xref>
;
<italic>Sydney Morning Herald</italic>
2006;
<xref ref-type="bibr" rid="ref352">Martyn 2005</xref>
;
<xref ref-type="bibr" rid="ref238">Hibbitts 2006</xref>
;
<xref ref-type="bibr" rid="ref371">Mori 2006</xref>
). However, the Australian government and the US administration have criticized his legal counsel for advising their client to enter this plea, arguing that this will only create ‘unnecessary delays’ (
<xref ref-type="bibr" rid="ref160">Downer 2005a</xref>
). For example, Major Mori has sought stays on his client’s behalf while fellow detainees such as
<italic>Rasul v. Bush</italic>
(
<xref ref-type="bibr" rid="ref1">US Supreme Court 2004</xref>
) and Hamdan (
<xref ref-type="bibr" rid="ref2">US Supreme Court 2006</xref>
) tested the validity of the charges, their status as unlawful combatants and the Military Commission itself. Despite criticism from the Australian government, Major Mori’s actions were supported by US District Judge, Colleen Kollar-Kotelly. Judge Kollar-Kotelly ruled on 14 November 2005 that until the
<italic>Hamdan v. Rumsfeld</italic>
case is decided on, the military commission trying Hicks must not resume (
<xref ref-type="bibr" rid="ref360">Miami Herald 2005</xref>
). This, argues Hicks’ defence counsel, reveals how important these cases are and the necessity for their legal validity to be established before Hicks is personally submitted to these proceedings (
<xref ref-type="bibr" rid="ref371">Mori 2006</xref>
).</p>
<p>The result of
<italic>Hamdan v. Rumsfeld,</italic>
decided on 29 June 2006 was crucial for David Hicks. The Supreme Court found (5-3) that Salim Ahmed Hamden, a 35-year-old citizen of Yemen and one of the four charged with war crimes, could not be subjected to the ‘executive power’ (
<xref ref-type="bibr" rid="ref189">Fletcher 2006</xref>
: 443) of the United States administration. Hamdan was Bin Laden’s personal driver for five years up to 9/11. Upon his arrest he was sent to Guantanamo Bay and deemed eligible for trial by military commission a year later. Another year after this, Hamdan was charged with ‘conspiracy … offenses triable by military commission’ (548 US 2006: 1).</p>
<p>The three findings made in the Hamdan case by the Supreme Court was a crucial outcome for Hicks. First, the Supreme Court found that there were significant procedural defects in the composition of the Military Tribunal itself that
<italic>violated international law</italic>
(
<xref ref-type="bibr" rid="ref189">Fletcher 2006</xref>
: 444). The military commission, argued the Supreme Court, was not ‘expressly authorized by any congressional act’ (548 US 2006: 3). There is no legal precedent, the court argued, for the President to ‘invoke military commissions whenever he deems them necessary’ (548 US 2006: 3). The President must comply with the law of war and thus
<xref id="page_85" ref-type="page"></xref>
require congressional authorization – which he did not obtain prior to setting up the tribunal.</p>
<p>In its composition, the military tribunal was also found to breach the United States Uniform Military Code of Justice (UMCJ) and the 1949 Geneva Conventions (548 US 2006: 4). The commission’s procedures allow the accused and his counsel to be excluded from learning of, or obtaining, evidence presented during the proceedings by the prosecution. Essentially, all evidence gathered against an individual could be ‘closed’. The court ruled that the present commissions would result in the ‘denial of a full and fair trial’ (548 US 2006: 4). In referring to the rules stated under UMCJ (particularly Article 36), the court argued that the present composition of the commission meant that Hamden’s commission trial (and thus Hicks’) was ‘illegal’ (548 US 2006: 5). The court further argued that if the commission’s procedures continued it would also ‘violate the Geneva Conventions’ (548 US 2006: 6).</p>
<p>This is the second crucial finding made by the US Supreme Court – that the Geneva Conventions
<italic>do</italic>
apply to the detainees held in Guantanamo Bay. The US government had repeatedly attempted to deny that the Geneva Conventions applied in this case because (a) they are not judicially enforceable and (b) Hamdan was not entitled to their protection as an enemy combatant (548 US 2006: 6). Both arguments, the Supreme Court found, were not persuasive. First, the Geneva Conventions are ‘indisputably part of the law of war’ and under domestic law, compliance with the Conventions is a condition under UCMJ Article 21 (548 US 2006: 7). On the second point raised by the US government, the court agreed that al Qaeda is not a signatory to the Conventions and that it could be argued that the US conflict with al Qaeda was ‘distinct from the war with signatory Afghanistan’ (548 US 2006: 6). However, this was not the matter that needed to be determined by the court (548 US 2006: 6). The US Supreme Court argued instead that one provision of the Geneva Conventions applies regardless of whether the conflict is between signatories or not. This provision is Common Article 3, which is included in all four Conventions and ‘affords some minimal protection, falling short of full protection under the Conventions, to individuals associated with neither a signatory nor even a non-signatory who are involved in a conflict “in the territory of” a signatory’ (548 US 2006: 6–7). Article 3 also calls for a ‘regularly constituted court’, which is understood to mean a military court established ‘in accordance with the laws and procedures already in force in a country’ (548 US 2006: 7). In the US, military courts are established by congressional statute and thus the President’s military commissions not only breached domestic law, but also the Geneva Conventions (548 US 2006: 7).</p>
<p>In addressing the conspiracy charge, the court argued that such a charge precluded the military commissions, which were set up only to prosecute laws of war. Conspiracy is a common law charge and thus it cannot be considered a violation under the law of war (
<xref ref-type="bibr" rid="ref189">Fletcher 2006</xref>
). The crime does not appear in the Geneva Conventions or The Hague Conventions and the court noted that it was ‘pointedly rejected’ as a violation in the International Military Tribunal at Nuremburg (548 US 2006: 8). Essentially, the crime of conspiracy emphasizes
<xref id="page_86" ref-type="page"></xref>
‘police intervention before criminal plans develop into harmful activity’ (
<xref ref-type="bibr" rid="ref189">Fletcher 2006</xref>
: 446). There is no such possibility under international law for sovereigns to be able to function in this manner and therefore the conspiracy charge cannot apply to combatants captured during war. The Supreme Court upheld the argument presented on the behalf of Hamdan and found that conspiracy is ‘not triable by law-of-war military commission’ (548 US 2006: 7). In particular, the crime of 9/11 cannot be associated with the charges laid against Hamdan or others detained in Guantanamo Bay – only their engagement in the theatre of war and offences committed during the war could be heard by the military commission (548 US 2006: 7).</p>
<p>Finally, the Supreme Court found that individuals could not be held indefinitely in a detention facility such as Guantanamo Bay. The Constitution ‘permits indefinite detention only in narrow circumstances and based upon rigorous procedural safeguards – precisely the opposite of the CSRT’s [Combatant Status Review Tribunal] sweeping definition of “enemy combatant” and woefully inadequate fact-finding process’ (548 US 2006: 4–5).
<sup>
<xref ref-type="fn" rid="fn5_10">10</xref>
</sup>
This finding was after the Supreme Court had already found (6-3) in
<italic>Rasul v. Bush</italic>
in 2004 that Guantanamo Bay detainees had the right to challenge their captivity and plead as combatants under the Geneva Conventions (
<xref ref-type="bibr" rid="ref360">Miami Herald 2005</xref>
).</p>
<p>After the US Supreme Court findings in late June 2006, the US President sought to pass a Military Commission Act (MCA) through Congress which would meet the Supreme Court’s demand for military commissions to be set up under a congressional statute (
<xref ref-type="bibr" rid="ref361">Miles 2006</xref>
).
<sup>
<xref ref-type="fn" rid="fn5_11">11</xref>
</sup>
However, the contents of this Act have also proven controversial (
<xref ref-type="bibr" rid="ref14">AIA 2006</xref>
). The Act awards the commission with the right to determine combatant status; to charge individuals associated with terrorist organizations or conspiracy; any evidence obtained by the prosecution does not need to be handed over to the defence; and the composition of those presiding over the commissioner can be determined at the President and Secretary of Defense’s discretion (
<xref ref-type="bibr" rid="ref442">Rothwell 2006</xref>
;
<xref ref-type="bibr" rid="ref14">AIA 2006</xref>
;
<xref ref-type="bibr" rid="ref406">Pantesco 2006</xref>
). Essentially, the Act attempts to legislate what the US Supreme Court argued was not in accordance with existing rule of law. The key test, as the Hamdan and Hicks lawyers are already preparing to argue, is whether instituting these acts as law will still breach the scope of Presidential and Congressional authority according to UMCJ and the Geneva Conventions.</p>
</sec>
<sec id="sec5_4">
<title>Where to from here?</title>
<p>The preceding discussion reveals three key points in relation to GB’s legal status and continued existence. First, each of the charges laid against the four detainees originally charged have, under the
<italic>Hamdan v. Rumsfeld</italic>
findings, been ruled as unlawful. In addition, the proceedings under which these charges were laid and the Presidential authority for the commissions were all declared to be unlawful according to US rule of law, the UMCJ and the Geneva Conventions. The US Supreme Court findings thus challenge the argument of advocates of Carl Schmitt that Guantanamo Bay represents a ‘legal black hole’. The Schmitt argument relies
<xref id="page_87" ref-type="page"></xref>
upon the two key claims: first, that the judicial branch of government will adopt and even promote legally dubious practices in order to appease the executive; and second, that the ‘legal black hole’ that evolves from such practices will be seen as justified when measured against the threat. What the last five years of Guantanamo Bay has demonstrated is that the highest judicial branch of government, the US Supreme Court, has not sought to ratify the US President or his executive powers as being beyond legal reproach. Rather, the US Supreme Court in its June 2006 findings on
<italic>Hamdan v. Rusmfeld,</italic>
disagreed with the US President’s justification for the lack of uniform procedures in the handling of Hamdan’s trial compared with other court-martials. Justice Stevens, who delivered the opinion of the court, stated:</p>
<disp-quote>
<p>[T]he ‘practicability’ determination that the President has made is insufficient to justify variances from the procedures governing courts-martial … The absence of any showing of impracticability is particularly disturbing when considered in light of the clear and admitted failure to apply one of the most fundamental protections afforded not just by the Manual for Courts-Martial but also by the UCMJ itself.</p>
<attrib>(548 US 2006: 5)</attrib>
</disp-quote>
<p>This finding was in addition to the same court’s finding two years before, where it found that all detainees in Guantanamo Bay had the right to petition for
<italic>habeas corpus</italic>
in federal courts. Essentially, the court denied that the President had powers in
<italic>any circumstances</italic>
to remove an essential right such as
<italic>habeas corpus</italic>
from particular persons (
<xref ref-type="bibr" rid="ref166">Dworkin 2004</xref>
: 5).</p>
<p>In the case of Hicks, whose charges were dropped in the wake of
<italic>Hamdan v. Rumsfeld,</italic>
we see that his conditions of detention are not beyond applicable law. There are a clear set of rights and legal processes that Hicks has been denied; and this indicates not a failure of the law
<italic>per se,</italic>
but the failure of politics as intimated by Antonio Agamben. However, even this argument needs to be reconsidered in light of the important role that
<italic>international</italic>
law has played in sustaining the case that the continued detention of these individuals in Guantanamo Bay is unlawful.</p>
<p>Antonio Agamben has argued that the right of derogation permits liberal states to depart from the rule of law when survival of the state is threatened. The permission for states to claim ‘exceptional’ circumstances which enables a ‘hold’ on the application of the rule of law and international law (particularly in the area of human rights) leads to
<italic>necessitas legem non habet</italic>
(necessity has no law) (
<xref ref-type="bibr" rid="ref8">Agamben 2005</xref>
: 24). The necessity is the event or occurrence that threatens the existence of the state and this necessity, Agamben argues, allows states to legitimately declare a zone of anomie. Anomie is an area where, in instances of political necessity, the state will not be held accountable to the rule of law. Agamben has likened the zone of anomie, as shown above, to Guantanamo Bay. However, derogation from the law by a state requires that the judiciary accepts this derogation and that existing international laws applicable to the treatment and detention of individuals can be derogated. However, as we see in the case of
<xref id="page_88" ref-type="page"></xref>
Guantanamo Bay, the derogation argument has been refuted by the US Supreme Court.</p>
<p>The Supreme Court is uniquely positioned in that it holds the US government accountable to the rule of law and thus the court’s acquiescence on the derogation argument is crucial for lending legitimacy to the government’s actions (
<xref ref-type="bibr" rid="ref188">Fisher 2005</xref>
;
<xref ref-type="bibr" rid="ref483">Slaughter 2005</xref>
). However, the US Supreme Court has found that while the US government’s claim that the individuals held in GB may constitute a serious threat to the state and that the US President is entitled to claim a ‘state of war’ against Al Qaeda, this makes the application of the Geneva Conventions all the more important in the case of Guantanamo Bay.</p>
<p>First, the reference and use of international law, i.e. Geneva Conventions, by the US Supreme Court needs to be noted. There has been a long supported view that the US Supreme Court has a history of reluctantly applying international law to domestic cases because, previous court judges have argued, the supremacy of domestic law is vindicated by democratic processes (
<xref ref-type="bibr" rid="ref498">Steyn 2004</xref>
;
<xref ref-type="bibr" rid="ref483">Slaughter 2005</xref>
). However, there has been an increasing move by members of the court to refer to and utilize international law jurisprudence (
<xref ref-type="bibr" rid="ref483">Slaughter 2005</xref>
). The cases that the US Supreme Court has presided over in the matter of Guantanamo Bay have been landmark cases. This is not just because the court has sought to apply international law in the case of foreigners being detained; but also in the cases of American citizens that have been detained in GB (
<xref ref-type="bibr" rid="ref166">Dworkin 2004</xref>
). Unlike Agamben’s argument, the US Supreme Court found that derogation to certain laws does not have unlimited application. The US Supreme Court found, in support of many legalist advocates, that the Geneva Conventions did apply. The court rejected the government’s allegations that the Conventions were not judicially enforceable, or that Hamdan was not entitled to their protections (548 US 2006: 6). The court found that the Geneva Conventions were in fact judicially enforceable because the Geneva Conventions are ‘indisputably part of the law of war’ (548 US 2006: 6) and also part of the domestic UCMJ; and in neither case was derogation allowed at the level that the President was requesting.</p>
<p>Second, the court also rejected the government’s argument that the Geneva Conventions did not apply to Hamdan because, like Hicks, he was a member of al Qaeda (which is not a signatory to the Convention) and that the conflict itself was distinct from those defined in the Conventions (548 US 2006: 6). While the court avoided arguing whether al Qaeda and the conflict itself fell under the Geneva Convention; what it found was even more important when considering the derogation argument. Justice Stevens stated that:</p>
<disp-quote>
<p>[T]he Court need not decide the merits of this argument [above] because there is at least one provision of the Geneva Conventions that applies here even if the relevant conflict is not between signatories. Common Article 3, which appears in all four Conventions, provides that, in a ‘conflict not of an international character occurring in the territory of one of the High Contracting Parties [i.e., signatories], each Party to the conflict shall be bound to apply, as a minimum’, certain provisions protecting ‘[p]ersons
<xref id="page_89" ref-type="page"></xref>
… placed hors de combat by … detention’, including a prohibition on ‘the passing of sentences …without previous judgment … by a regularly constituted court affording all the judicial guarantees … recognized as indispensable by civilized peoples’.</p>
<attrib>(548 US 2006: 6)</attrib>
</disp-quote>
<p>Thus the Supreme Court argued that any reason
<italic>not</italic>
to apply Common Article 3 to Hamdan, Hicks and others in Guantanamo Bay would be
<italic>erroneous</italic>
(548 US 2006: 6). This is because Common Article 3 is precisely about providing minimum protection for those cases where the derogation argument may attempted. This understanding by the US Supreme Court of Common Article 3 and its applicability to the detainees in Guantanamo Bay is crucial because it reveals that international law is not an instrument that states can place outside their judicial system in times of emergency. As Justice Stevens states: ‘[E]ven assuming that Hamdan is a dangerous individual who would cause great harm or death to innocent civilians given the opportunity, the Executive nevertheless must comply with the prevailing rule of law in undertaking to try him and subject him to criminal punishment’ (548 US 2006: 6). When considering Agamben’s argument, the importance of this statement cannot be overstated. Essentially, the judiciary is not only holding the President to account for the processes by which he declared the detentions in GB lawful, they are also refuting the state of emergency claim that the President is using to justify the detention practices. The Supreme Court has essentially said that (a) no derogation from domestic law or international law, which frames law of war and court martial proceedings, is allowed and (b) no emergency is great enough for the Executive branch of government to claim zone of anomie – a zone where the rule of law does not apply.</p>
<p>However, even though we can see that the legal black hole and zone of anomie descriptions of Guantanamo Bay are not entirely accurate, we need to be cautious in agreeing with the legalist case. The legalists assume that if only the law was properly applied the situation in Guantanamo Bay would change or even end. Yet what has really changed through these court findings? We can point to positive developments such as the law being ‘restored’ to Guantanamo Bay through the detainees having a Supreme Court declared right to challenge their imprisonment and denial of access to domestic courts. The judicial branch has not been subsumed by the emergency itself, in that they have referred to the invalidity of the US President’s actions in spite of the emergency and the need to still uphold international laws such as the Geneva Conventions. While these are important developments, approximately 430 individuals still remain in Guantanamo Bay. David Hicks still remains in solitary confinement, despite cooperating with authorities, and isn’t permitted regular access to legal counsel or consular officials (
<xref ref-type="bibr" rid="ref238">Hibbitts 2006</xref>
;
<xref ref-type="bibr" rid="ref442">Rothwell 2006</xref>
).</p>
<p>While the legalists are able to argue that the US government has not successfully constructed Guantanamo Bay as a legal black hole or zone of anomie, do we need to see the government change its actions before we can take comfort from the court’s findings? The detainees in Guantanamo Bay still remain in limbo despite
<xref id="page_90" ref-type="page"></xref>
the court ruling that their status, legal access and court proceedings need to be changed according to the UCMJ and Geneva Conventions. The reaction of the US government has been simply to remove the processes further away from the realm of the court by legislating the illegalities away (
<xref ref-type="bibr" rid="ref361">Miles 2006</xref>
;
<xref ref-type="bibr" rid="ref204">Garamone 2006</xref>
). This is best exemplified by the US administration’s success in having both houses of Congress pass the MCA – Military Commissions Act – on 16 September 2006. The MCA seeks to strip the US courts of jurisdiction to consider habeas corpus appeals from any foreign national held in US custody; defines any individual held in US custody as an enemy combatant; while section 948(b) prohibits detainees from invoking their rights under the Geneva Conventions; and the prosecution is allowed to bring evidence to the court that was obtained under torture, with the defence counsel denied access to any information deemed as ‘classified’ (
<xref ref-type="bibr" rid="ref14">AIA 2006</xref>
: 2;
<xref ref-type="bibr" rid="ref371">Mori 2006</xref>
).</p>
<p>The government has essentially sought to continue their detention by creating laws that will inevitably face federal court challenges in another five or so years (
<xref ref-type="bibr" rid="ref189">Fletcher 2006</xref>
: 446). The response of the US government to the Supreme Court findings has thus led to two significant outcomes. The first is that while the victory for international law has been a ‘win’ in the short term, it could establish a longer term loss. What is the point of referring to the Geneva Conventions in landmark decisions if the Executive continues to refuse its applicability? Do the efforts by the US government, now passed by Congress, to remove the right of these individuals to access the Geneva Conventions reflect a win for the Supreme Court’s findings? These political acts do bear some consideration for Schmitt’s argument – that the political will to power consumes everything, even the rule of law, when a state feels threatened.</p>
<p>The second concern with the current state of ambiguity is the political grounds on which David Hicks and other detainees in GB are held. The justifications are overwhelmingly political. David Hicks and his fellow detainees are now subject to MCA of 2006, which ‘will help secure this country, and it sends a clear message: This nation is patient and decent and fair, and will never back down from the threats to our freedom’ (
<xref ref-type="bibr" rid="ref547">White House 2006a</xref>
). Ergo, even if Hicks’ imprisonment is not legal, it still feels right for many US citizens and Australians.
<sup>
<xref ref-type="fn" rid="fn5_12">12</xref>
</sup>
As demonstrated by the fact that the only request Australia’s Prime Minister and Commonwealth Attorney General have made is that Hicks trial resume as soon as possible (
<xref ref-type="bibr" rid="ref402">O’Malley 2006</xref>
;
<xref ref-type="bibr" rid="ref406">Pantesco 2006</xref>
;
<xref ref-type="bibr" rid="ref5">ABC 2006</xref>
). That the findings of the Supreme Court have not led to Australia’s demands for Hicks’ release is evidence of the political necessity that Hicks continued detention has become. It is at this point that Agamben’s warnings come into play: necessity has no law. Hicks is a threat that must be contained.</p>
<p>State leaders now refer to doing what is right, rather than what is lawful. Releasing David Hicks would be a ‘victory’ for the terrorists (
<xref ref-type="bibr" rid="ref547">White House 2006a</xref>
). Releasing Hicks would do nothing for democracy, but threaten its very foundations (
<xref ref-type="bibr" rid="ref547">White House 2006a</xref>
). These types of statements cast a shadow on the legalists’ adherence to law. It reminds us that there is no opposition between law and politics (
<xref ref-type="bibr" rid="ref311">Koskenniemi 2005</xref>
: 613).</p>
<p>
<xref id="page_91" ref-type="page"></xref>
So where to from here? We have learnt thus far, that GB cannot be completely explained by the Schmittian legal state of exception or Agamben political state of exception. The legalist interpretation of GB has been supported by the US Supreme Court rulings. But we cannot take comfort from this fact. The legalist faith that just implementing the law will provide the answer has fallen short of producing the expected outcome because, as this chapter has shown: law is politics. Therefore, even though the legalist explanation has come closest to explaining GB’s existence to date – it has not led to a significant change of conditions for those in Guantanamo Bay. The US administration has, since the court ruling, sought through Congress to legislate away the illegalities that the Supreme Court found. The legal status of David Hicks and other detainees in Guantanamo Bay has fallen now into a new state of limbo. This period will be most crucial for testing core liberal values and thus this time, the stakes for legalists will be much higher than for the advocates of Schmitt or Agamben.</p>
</sec>
</body>
<back>
<notes>
<title>Notes</title>
<fn-group>
<fn id="fn5_1">
<label>1</label>
<p>Since this chapter was written, David Hicks pleaded guilty to the lesser charge of providing material support to terrorism and received a short sentence which he is serving in Australia. He will be released on 31 December 2007.</p>
</fn>
<fn id="fn5_2">
<label>2</label>
<p>There is debate about the claim that Resolutions 1368 and 1373 supported the US invasion into Afghanistan. Compare Greenwood (
<xref ref-type="bibr" rid="ref223">2002</xref>
) against Megret (
<xref ref-type="bibr" rid="ref355">2002</xref>
).</p>
</fn>
<fn id="fn5_3">
<label>3</label>
<p>The US Department of Defense reported in a document dated 4 March 2005, that Joint Task Force Guantanamo Bay held 550 ‘enemy combatants’ in custody (
<xref ref-type="bibr" rid="ref518">US DOD 2005a</xref>
: 1). In a defence news report dated 17 October 2006, it was reported that 440 detainees remained in custody at Guantanamo Bay (
<xref ref-type="bibr" rid="ref204">Garamone 2006</xref>
: 1). A report on 16 October 2006 announced that ‘approximately 340 detainees have departed Guantanamo’; and a further 435 detainees remained in custody in Guantanamo (
<xref ref-type="bibr" rid="ref518">US DOD 2006a</xref>
: 1). This report also states that approximately 110 detainees are eligible for transfer; with their departure pending on an agreement between the US and other nations. On 17 December 2006, 18 detainees were returned to Afghanistan. This brings the total remaining in Guantanamo Bay to either to 417 or 422 detainees, depending on the October figures.</p>
</fn>
<fn id="fn5_4">
<label>4</label>
<p>Peter A. Clark (
<xref ref-type="bibr" rid="ref119">2006</xref>
) details the level of concern raised about the health and psychological well being of detainees, citing the documentation of abuses against them. Helen Duffy also details the international responses as being extremely strong in their condemnation of Guantanamo Bay. She refers to statements from the ICRC, the UN High Commissioner for Human Rights and the Working Group on Arbitrary Detention; as well as the UK Parliament lodging an amicus brief with the US Supreme Court (
<xref ref-type="bibr" rid="ref165">Duffy 2005</xref>
: 434–7).</p>
</fn>
<fn id="fn5_5">
<label>5</label>
<p>The US administration originally tried to argue that Guantanamo Bay was beyond US Sovereign Territory for judicial hearings, see
<italic>Rasul v. Bush</italic>
2004.</p>
</fn>
<fn id="fn5_6">
<label>6</label>
<p>The second Australian, Mandoob Habib was arrested on the borders of Pakistan in the same time period and held at Guantanamo Bay until his release in January 2005. Mr Habib was released without explanation after two years and nine months spent in detention (
<xref ref-type="bibr" rid="ref504">
<italic>Sydney Morning Herald</italic>
2005</xref>
).</p>
</fn>
<fn id="fn5_7">
<label>7</label>
<p>There has been great debate about whether the ‘War on Terror’ constitutes an actual war under international law. The detainees held in Guantanamo Bay were captured while the US was at war with Afghanistan. The question that follows from this is whether the continued holding of the detainees is justified now that Afghanistan has
<xref id="page_92" ref-type="page"></xref>
been returned to domestic authority; nor is there any knowledge as to when the ‘War on Terror’ will end or if it is defined as a War that justifies continued detention of prisoners under the Geneva Conventions. (
<xref ref-type="bibr" rid="ref223">Greenwood 2002</xref>
;
<xref ref-type="bibr" rid="ref167">Dworkin 2005</xref>
;
<xref ref-type="bibr" rid="ref553">Wippman 2005</xref>
; McAlea 2004;
<xref ref-type="bibr" rid="ref497">Stewart 2006</xref>
).</p>
</fn>
<fn id="fn5_8">
<label>8</label>
<p>President Bush said in response that to the Supreme Court ruling on
<italic>Hamdan v. Rumsfeld</italic>
that it ‘won’t cause killers to be put out on the street’ (
<xref ref-type="bibr" rid="ref361">Miles 2006</xref>
: 1). Lieutenant Colonel Judge Advocate Michael Newton, assigned to the US Military Academy at West Point, has argued that those who are in US custody are terrorists and the ‘concept of ‘unlawful combatants’ is merely a rhetorical description. It does not imply that terrorists are entitled to any of the rights accorded to ‘combatants’ under the law of war (
<xref ref-type="bibr" rid="ref390">Newton 2005</xref>
: 86).</p>
</fn>
<fn id="fn5_9">
<label>9</label>
<p>This is contested by many, and I return to it later in the chapter.</p>
</fn>
<fn id="fn5_10">
<label>10</label>
<p>CSRT was set up to investigate and charge the four Guantanamo Bay detainees. The
<italic>Rasul v. Bush</italic>
finding led to the Pentagon creating the CSRT, where a panel of military officers reviewed each detainee’s enemy combatant status. The CSRT was declared unlawful by the Supreme Court in 2006 (
<xref ref-type="bibr" rid="ref230">Hafetz 2006</xref>
: 2).</p>
</fn>
<fn id="fn5_11">
<label>11</label>
<p>The MCA was passed by Congress on 16 September 2006 and passed into force on 17 October 2006.</p>
</fn>
<fn id="fn5_12">
<label>12</label>
<p>However, it must be noted that there has been support for Hicks within Australia. Australia’s state and territory governments signed the Freemantle Declaration in October 2006, which calls for David Hicks to be returned home. On 7 December 2006, four Commonwealth Parliamentarians filed a case calling for Hicks’ return to Australia (
<xref ref-type="bibr" rid="ref5">ABC 2006</xref>
). Rallies for David Hicks were held in a number of cities around Australia on 9 December 2006 (
<xref ref-type="bibr" rid="ref5">ABC 2006</xref>
). The Hicks legal team has also lodged papers with the Federal Court in December 2006, calling for the Government to ask the US Administration for the release of Hicks because of a Commonwealth Constitutional duty to protect him (
<xref ref-type="bibr" rid="ref129">Coorey 2006</xref>
).</p>
</fn>
</fn-group>
</notes>
</back>
</book-part>
<book-part book-part-type="chapter" book-part-number="6" id="chapter6">
<book-part-meta>
<title-group>
<title>
<xref id="page_93" ref-type="page"></xref>
New thinking in the just war tradition</title>
<subtitle>Theorizing the war on terror</subtitle>
<alt-title alt-title-type="running-head-verso">New thinking in the just war tradition</alt-title>
<alt-title alt-title-type="running-head-recto">Cian O’Driscoll</alt-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<given-names>Cian</given-names>
<surname>O’Driscoll</surname>
</name>
</contrib>
</contrib-group>
</book-part-meta>
<body>
<p>The present age, defined by the war on terror, has been characterized by President Bush as a time of ‘chaos and constant alarm’ (
<xref ref-type="bibr" rid="ref87">Bush 2003b</xref>
). It might also be described as a time of flux or change. Indeed, some commentators have suggested that the current period reflects a great degree of ‘uncertainty’ and ‘disequilibrium’ (
<xref ref-type="bibr" rid="ref118">Clark 2005</xref>
: 224–80;
<xref ref-type="bibr" rid="ref261">Hurrell 2002</xref>
). In the aftermath of 11 September 2001, they argue, a whole series of truths, conventions, and practices, previously taken for granted, have been called into question. This is certainly evident with respect to the just war tradition. The right of states to wage war in certain circumstances has been subject to concerted scrutiny as theorists and interested observers have examined whether received doctrine should be retained unaltered, scrapped, or modified to fit today’s security environment. This chapter will argue that there is, at present, a move afoot within the just war tradition towards re-casting the idea of the just war along more morally expansive lines which extol the imperatives of justice, responsibility, judgement, and struggle-against-evil. This is more in tune with classical articulations of the
<italic>jus ad bellum</italic>
than with the legalist approach to war dominant in the twentieth century. This chapter further contends that this move is echoed in the public rhetoric of state leaders today and is potentially very consequential: at the same time as it fosters a broader right to war, this expansion sets the possibility of restraint in war, the
<italic>jus in bello,</italic>
on a precarious footing. This is surely something to be guarded against lest we allow war to resume the semblance of ‘monstrous barbarity’ and riotous fury that Grotius warned against in his 1625 masterpiece,
<italic>The Rights of War and Peace</italic>
(
<xref ref-type="bibr" rid="ref227">2005</xref>
: 106).</p>
<sec id="sec6_1">
<title>Theorizing the war on terror: the current state of the art</title>
<p>Contemporary just war literature certainly supports a rather broad-based, expansive approach to the
<italic>jus ad bellum.</italic>
This tendency is reflected, for example, in recent landmark works by Jean Bethke Elshtain (
<xref ref-type="bibr" rid="ref175">2004</xref>
), James Turner Johnson (
<xref ref-type="bibr" rid="ref285">2005</xref>
), and Oliver O’Donovan (
<xref ref-type="bibr" rid="ref399">2003</xref>
) – three of today’s most prominent and influential just war theorists.
<sup>
<xref ref-type="fn" rid="fn6_1">1</xref>
</sup>
All three are concerned to re-visit and re-examine the state of the just war question in light of the on-going war on terror. Their offerings provide, perhaps, the best indication of any new developments taking place within the contemporary just war tradition. It is to an analysis of these
<xref id="page_94" ref-type="page"></xref>
works that I turn now, with a view to highlighting the trends and developments that they suggest.</p>
<p>Jean Bethke Elshtain’s
<italic>Just War Against Terror,</italic>
first published in 2003 (and re-published in 2004), aroused a storm of controversy upon its launch.
<sup>
<xref ref-type="fn" rid="fn6_2">2</xref>
</sup>
Many of Elshtain’s peers in the academy were critical of her apparent acquiescence to the demands of US power, branding her an apologist for the Bush administration. While there is certainly much to consider when it comes to Elshtain’s vociferous support for the war on terror, this chapter is concerned instead with the vision of the just war tradition that she presents in this book. The first thing to say in this respect is that Elshtain sets her stall out in Augustinian terms. Indeed, her approach to the just war tradition is heavily influenced by the fourth-century writings of St Augustine, Bishop of Hippo. It is his elaboration of the notion of
<italic>Tranquillitas Ordinas</italic>
(equivalent to the modern notion of a limited civic peace) and the burden of order that provides the tradition’s point of departure, and most visible landmark, according to Elshtain (
<xref ref-type="bibr" rid="ref173">1992</xref>
: 323–4).</p>
<disp-quote>
<p>When citizens evoke justice [in relation to war], they tap into the complex Western tradition called ‘just war’. The origins of this tradition are usually traced from St Augustine’s fourth-century masterwork,
<italic>The City of God.</italic>
In that massive text, Augustine grapples with how best to think about force and coercion in light of the fact that the Christian saviour was heralded as the Prince of Peace by angels proclaiming ‘peace on earth and goodwill’ to all peoples.</p>
<attrib>(2004: 50)</attrib>
</disp-quote>
<p>Augustine’s political theology, then, provides the point of departure for Elshtain’s treatment of the just war tradition.</p>
<p>According to Elshtain, Augustine’s thoughts on these matters provide the genesis of the just war tradition, framing subsequent centuries of theorizing on the justice of war in the quotidien world. It identifies the human condition with the problematic of the proper relationship between force, order, justice, and peace, and suggests the
<italic>Tranquillitas Ordinas,</italic>
rather than utopian idealism, as the proper standard for human conduct. Order of a limited and partial nature is posited as the condition for civic life, and governments are charged with the responsibility for its preservation (2004: 49). Thus Elshtain claims: ‘The presupposition of just war thinking is that war can sometimes be an instrument of justice; that war can help to put right a massive injustice or restore a right order where there is disorder, including those disorders that … call themselves “peace” ’ (2004: 50). The primary responsibility of government, then, is the same today as it was in the days of Rome: it is to provide for basic security and ordinary civic peace – or, in Elshtain’s words, derived from Augustine, to uphold the
<italic>Tranquillitas Ordinas.</italic>
This leads to a recognition of four possible just causes for war: punishment, re-claiming something wrongly taken, defence-against-aggression, and the protection of the innocent.</p>
<p>
<xref id="page_95" ref-type="page"></xref>
In a revealing move Elshtain also delves into the theological origins of Augustine’s just war thought by drawing on the Pauline refrain that the prince is the minister of God in support of her claim that the act of governing is a godly vocation. In Elshtain’s words, the duty of government is a ‘solemn responsibility for which there is a divine warrant’ (
<xref ref-type="bibr" rid="ref174">Elshtain at The Pew Forum 2002</xref>
). This charge may sometimes extend even to the punishment of wrongdoers by means of armed force: ‘St. Paul claims that earthly dominion has been established to serve God and to benefit all human beings. It is the rightful authority of earthly kings and kingdoms to punish wrongdoers’ (2004: 52). Indeed, so far as Elshtain is concerned, the Pauline refrain, and the Christian tradition of which it is a part, informs us that ‘government is instituted by God’. This does not mean that ‘every government and every government official is godly, but rather that he or she is charged with a solemn responsibility for which there is a divine warrant’ (
<xref ref-type="bibr" rid="ref174">Elshtain 2002</xref>
: 64). In line with this, the just war tradition ‘offers a way to exercise that responsibility’.</p>
<p>James Turner Johnson’s
<italic>The War to Oust Saddam Hussein,</italic>
published in 2005, is hardly less forthright in tone (2005). Writing as a self-styled ‘liberal hawk’, Johnson sets out to re-state the just war tradition in order that it might aid us in posing the correct questions as we struggle to make sense of the rights and wrongs of the war on terror (
<xref ref-type="bibr" rid="ref286">Johnson 2006</xref>
: 135). Johnson is concerned that the just war tradition as we know it today is an impoverished imitation of its proper form. Corrupted by an over-wheening strain of pacifism and a (deviant) proclivity to emphasize consequentialist over deontological reasoning, the just war tradition today resembles something approximating the
<italic>jus contra bellum,</italic>
as described by Paul Ramsey. Put simply, it assumes as its starting point a ‘presumption against war’ and conveys a thoroughgoing scepticism regarding the utility (and therefore morality) of force in general (2005: 26–32). It is Johnson’s aim to correct what he sees as this perversion of the just war tradition, and to provide a template for future just war analysis that is more faithful to the tradition as he understands it.</p>
<p>Johnson is especially keen to dispel the idea that there is a presumption against war at the core of the just war tradition. He is, he writes, highly ‘critical of the concept that the just war idea begins with a presumption against war … and that the function of the just war criteria is to override this general negative presumption. To think of the just war idea this way makes it over into something very different from what it properly is’ (2005: 34). Indeed, in place of an unfounded presumption against war, Johnson suggests that a ‘presumption against injustice’, lies at the heart of just war reasoning (
<xref ref-type="bibr" rid="ref284">Johnson 1999</xref>
: 38). A faithful reading of the tradition, he contends, is cognizant of the limits of the existing order and always mindful of the injustices it conceals. It accepts that it is sometimes necessary and proper to employ force against the status quo so that a more just order may be achieved. Viewed in this way, war is not perceived as an intrinsically immoral exercise, or even just the ugliest of things; instead it is an instrument of justice. In Johnson’s words:</p>
<disp-quote>
<p>
<xref id="page_96" ref-type="page"></xref>
It takes its moral character from who uses it, from the reasons used to justify it, and from the intention with which it is used. (…) Just war tradition has to do with defining the possible good use of force, not finding exceptional cases when it is possible to use something inherently evil (force) for the purpose of good.</p>
<attrib>(
<xref ref-type="bibr" rid="ref285">Johnson 2005</xref>
: 36)</attrib>
</disp-quote>
<p>This instrumental understanding of the use of force produces a broader reading of the right to war; it supposes an interventionist ethic in place of a
<italic>jus contra bellum.</italic>
Rather than starting with the presumption that the use of force is itself morally problematic, this concept of the just war is centred upon the responsible use of force directed against wrongdoing and injustice. The just war tradition properly understood, Johnson concludes, is all about ‘the use of the authority and force of the rightly ordered political community (…) to
<italic>prevent, punish, and rectify injustice’</italic>
(
<xref ref-type="bibr" rid="ref283">Johnson 1996</xref>
: 30).</p>
<p>Johnson shares with Elshtain, then, an appreciation that force may be employed as a ‘servant of justice’ (
<xref ref-type="bibr" rid="ref175">Elshtain 2004</xref>
: 57). However, he devotes more time than Elshtain to discussing the matter of restraint in war – that is, the preserve of
<italic>jus in bello.</italic>
In particular, he re-asserts the imperatives of non-combatant immunity and proportionality in the conduct of war, but perceives the American way of war (driven by the so-called revolution in military affairs) as working in synchrony with these moral requirements.</p>
<p>Oliver O’Donovan’s latest book,
<italic>The Just War Revisited,</italic>
purports to re-examine the just war tradition in the wake of the tragedy of 11 September 2001. Building upon a neo-scholastic foundation, he attempts to re-cast the idea of the just war as a ‘praxis of judgment’, essentially an updating of the Pauline idea that the prince must act as the minister of God to execute His wrath upon the evildoers (
<xref ref-type="bibr" rid="ref399">O’Donovan 2003</xref>
: 13). In this regard, he is on the same page as Elshtain. He states that any account of the just war must flow from the central proposal that armed conflict is to be ‘re-conceived as an extra-ordinary extension of ordinary acts of judgment’ (16). War, on this view, is an extension into the international sphere of governmental responsibility for the maintenance of law and order. As such it ought to reflect the very same processes and principles that are enacted on a daily basis in courtrooms and magistrate’s offices across the land. Such an account suggests, first, that conflict can be ‘brought within the scope of the authority on which government may normally call, and, second, that it can be undertaken in such a manner as to establish justice’ (16). Of course, this is a rather expansive conception of the just war. It betrays a ‘natural law rather than a positive law orientation’, and proposes that states might have responsibility for, and jurisdiction over, other communities (23–8). The practical result of this is that O’Donovan’s conception of the just war, like that of Elshtain and also Johnson, is amenable to such practices as penal (or punitive) war, as well as humanitarian and so-called constabulary uses of force. In this respect, the First Gulf War (1991) stands as the paradigmatic just war: it marks an occasion where war served as a means of enacting justice and the will of the society of states by overturning
<xref id="page_97" ref-type="page"></xref>
an act of international wrongdoing (125). The 2003 invasion of Iraq rested on more dubious grounds according to O’Donovan, largely due to the fact that it was justified as an anticipatory war which denigrated the judicial aspect of war.</p>
</sec>
<sec id="sec6_2">
<title>Bush and Blair’s just war against terror</title>
<p>A common concern with order and responsibility unifies Elshtain, Johnson, and O’Donovan. Elshtain writes of the ‘burden of American power’ in Augustinian terms which stress the prerogatives of just government; Johnson treats the problematic of how force might be employed in the service of proper authority; and O’Donovan places great weight on the praxis of judgement and the enforcement of right in the international arena. Each of these preoccupations fails to correspond to the legal stipulations of the UN Charter, the Covenant of the League of Nations, or the legalistic approach to war more generally; instead they reflect an overriding concern with what Johnson terms ‘vindicative justice’.</p>
<p>Vindicative justice, as Johnson describes it, is related to the responsibility of state leaders and governments to exercise authority in the service of order and justice. It denotes that the government is the repository of three primary duties: to maintain order within a given community by defending against internal wrongdoing and external attack; to restore justice by punishing those responsible for wrongdoing; and to re-establish the conditions for future civic order.
<sup>
<xref ref-type="fn" rid="fn6_3">3</xref>
</sup>
The government is thereby charged with the object of, in Augustine’s words (also cited by Thomas Aquinas and Francisco de Vitoria), ‘securing the peace by coercing the wicked and helping the good’ (
<xref ref-type="bibr" rid="ref284">Johnson 1999</xref>
: 49;
<xref ref-type="bibr" rid="ref24">Augustine 1998</xref>
: 933–7;
<xref ref-type="bibr" rid="ref25">Augustine 2001</xref>
: 214–8;
<xref ref-type="bibr" rid="ref20">Aquinas 2002</xref>
: 241;
<xref ref-type="bibr" rid="ref534">Vitoria 1991</xref>
: 83).</p>
<p>It is this preoccupation with the governmental responsibility for order that is the defining mark of the contemporary just war tradition, as it is represented by Elshtain, Johnson, and O’Donovan.
<sup>
<xref ref-type="fn" rid="fn6_4">4</xref>
</sup>
Indeed, a broader survey of the just war literature reveals that this pre-occupation is actually quite prevalent within contemporary just war discourse.
<sup>
<xref ref-type="fn" rid="fn6_5">5</xref>
</sup>
More significantly, however, this willingness to countenance the possibility of a more expansive right to war on the basis of vindicative justice is not just confined to the academy; it appears to have fed into public debate, most notably in the rhetoric of state leaders as they speak about war.</p>
<p>An emphasis on vindicative justice is evident in the public rhetoric of certain state leaders, most notably President George W. Bush and Prime Minister Tony Blair, in the context of the war on terror. In the years following 11 September 2001, Bush and Blair have displayed a marked tendency to address the issue of war and peace in a morally charged manner. Consider the Old Testament style sloganeering – ‘whether we bring our enemies to justice, or bring justice to our enemies, justice will be done’ – that Bush indulges in when discussing the war on terror (
<xref ref-type="bibr" rid="ref82">Bush 2001</xref>
). Statements such as this are rich with allusions to what might otherwise be considered archaic notions of justice which stress the virtues of retribution, and call to mind the biblical injunction of an eye for an eye and a tooth for a tooth. Indeed, Bush regularly refers to the war on terror in sweeping,
<xref id="page_98" ref-type="page"></xref>
moralistic overtones that make recourse to the rhetoric of good and evil and even divine providence.
<sup>
<xref ref-type="fn" rid="fn6_6">6</xref>
</sup>
Typical here is his 2002 West Point address which committed America to leading a worldwide fight against evil. ‘We are in a conflict between good and evil, and America will call evil by its name. By confronting evil and lawless regimes, we do not create a problem, we reveal a problem. And we will lead the world in opposing it’ (
<xref ref-type="bibr" rid="ref83">Bush 2002</xref>
). Similarly, in an interview with Bob Woodward, Bush even went so far as to suggest that he considers himself to be an instrument of the ‘Lord’s will’ on Earth, and prays daily for the strength to be ‘as good a messenger of His will as possible’ (
<xref ref-type="bibr" rid="ref556">Woodward 2004</xref>
: 279).</p>
<p>Similar references to good and evil also appear in Blair’s public statements. For instance, just hours after the terrorist attacks of 11 September 2001, Blair condemned the culprits of this outrage and committed that he would ‘not rest until this evil is driven from our world’ (
<xref ref-type="bibr" rid="ref55">Blair 2001</xref>
). Following the London bombings of July 2005, Blair again reverted to the language of good and evil, describing the war on terror as a ‘global struggle’ against an ‘evil ideology’ (
<xref ref-type="bibr" rid="ref56">Blair 2005</xref>
). This style of rhetoric is, however, nothing new for Blair. As early as 1993, he contributed a foreword to a collection of essays on Christianity and Socialism edited by Christopher Bryant wherein he presented the challenge of politics as a call to stand in judgement against all that is wrong and bad in this world (1993: 12). Blair, then, is a leader who favours Christian values in the public sphere (
<xref ref-type="bibr" rid="ref425">Rentoul 2001</xref>
: 351–7;
<xref ref-type="bibr" rid="ref495">Stephens 2004</xref>
: 32).</p>
<p>Notably, the invasion of Iraq was also justified as part of this struggle to eradicate evil from this world. Indeed, Bush and Blair offered a variety of justifications for the invasion of Iraq. They variously presented the invasion of Iraq as a pre-emptive war to eliminate Iraqi weapons of mass destruction (WMD), a punitive war to hold Iraq to account for its violation of the writ of the UN Security Council, a humanitarian war designed to bring human rights and democracy to the people of Iraq, and part of a greater struggle to rid the world of evil.
<sup>
<xref ref-type="fn" rid="fn6_7">7</xref>
</sup>
In each case, the invasion was represented as a means to securing the peace by coercing the wicked and helping the good. The imperative of vindicative justice was, it seems, prominently in the foreground of Bush and Blair’s rhetoric with respect to both the invasion of Iraq and the broader War on Terror.</p>
</sec>
<sec id="sec6_3">
<title>The ‘defensive matrix’: end of a century?</title>
<p>This broad-based approach to
<italic>the jus ad</italic>
bellum evident in the writings of Elshtain, Johnson, and O’Donovan, as well as the public rhetoric of Bush and Blair, stands in stark contrast to the narrow and legalistic form the right to war assumed for the best part of the twentieth century. It is this sharp break, and what it suggests, that I intend to explore in the final section of this chapter. Presently, however, a few words on twentieth-century just war thought are required in order to provide the background for this discussion.</p>
<p>The consensus view in the twentieth century was that only defence-against-aggression (urgent and necessary) justifies the recourse to war. Following the ‘mechanized slaughter’ of the First World War, and the belated acknowledgement
<xref id="page_99" ref-type="page"></xref>
that industrial age warfare threatened death and destruction on a previously unimaginable scale, peace societies sprung up all over Europe and America questing for a ban on war of all forms (
<xref ref-type="bibr" rid="ref263">Ignatieff 1997</xref>
: 112;
<xref ref-type="bibr" rid="ref253">Howard 1978</xref>
). This was partially realized by the Covenant of the League of Nations (1919) and the Kellogg-Briand Pact (1928) which led the way in criminalizing the non-defensive use of force (
<xref ref-type="bibr" rid="ref297">Karoubi 2004</xref>
: 102–3). This position was further endorsed in the aftermath of the Second World War as the advent of nuclear weapons magnified the risks of modern war. The drafters of the UN Charter were mindful of this, and they reaffirmed the ban on all recourse to non-defensive war. According to William V. O’Brien, the UN Charter confirms the blanket ban on the use of force as an instrument of foreign policy, and stipulates that the self-defence is the sole just cause for war in the modern era (1981: 22–3). The drafting of the Charter, then, copper-fastened the idea that there was only one proper ground for war, defence, and that all other recourse to war would be equated with aggression. Johnson would later label this position the ‘aggressor-defender’ model of
<italic>jus ad bellum</italic>
while O’Donovan refers to it as a defensive matrix.</p>
<p>This position was re-asserted once more during the course of the Nuremberg and Tokyo Criminal Tribunals as the surviving leaders of Germany and Japan were tried for their roles in planning, preparing and waging an aggressive war (
<xref ref-type="bibr" rid="ref180">Falk 1963</xref>
: 74). Indeed, it passed over into state practice and political theory as the twentieth century progressed. With respect to state practice, national leaders confirmed it every time they sought to present their wars as acts of self-defence and the actions of any hostile third party as instances of criminal aggression. Where political theory is concerned, the association of the just war with the defensive use of force gathered pace within the community of just war scholars. Writing in 1960, for example, Robert Tucker argued that ‘The just war is war fought either in self-defence or in collective defence against an armed attack. Conversely, the unjust war […] is the war initiated in circumstances other than those of self- or collective defence against armed aggression’ (1960: 11). Michael Walzer lent further credence to this viewpoint in his classic 1977 work,
<italic>Just and Unjust Wars,</italic>
when he declared that ‘nothing but aggression can justify war’. Defence-against-aggression, he offers, is the ‘single and only just cause’ for war in the twentieth century and the basis of the ‘legalist paradigm’ – his term for the twentieth century
<italic>jus ad bellum</italic>
(1992: 62). Walzer, of course, connected this position to the twentieth-century commonplace that the
<italic>jus ad bellum</italic>
and
<italic>jus in bello</italic>
must be treated as ‘logically independent’ categories which share no relation to one another (21–7). A state’s justification for war, he contends, should not impact upon the
<italic>jus in bello</italic>
restraints owing to its soldiers on the battlefield. In other words, the strictures of the
<italic>jus in bello</italic>
apply ‘equally and indifferently’ to all soldiers, regardless of whether they are fighting for a just cause or not (124).</p>
<p>Ostensibly there is little connection between twentieth-century just war thought, as I have just laid it out, and the visions of the just war presented by Elshtain, Johnson, and O’Donovan, and indeed Bush and Blair, in the context of the War on Terror. In fact, Johnson and O’Donovan both seek to distance themselves quite explicitly from the mainstream of twentieth-century just war thought. Johnson, for
<xref id="page_100" ref-type="page"></xref>
example, is critical of the idea that defence-against-aggression provides the only just cause for war, branding this a ‘reductionist’ doctrine (1981: 328; 1975: 268). He proposes that the
<italic>jus ad bellum</italic>
should, ideally, be cast in broader terms than the legalistic strictures of defence and aggression (1981: 328). Historically speaking, he suggests, the
<italic>jus ad bellum</italic>
does not speak solely to the stipulations of the UN Charter but relates to overarching questions of justice and good government. O’Donovan pursues a similar argument. He is adamant that the emphasis on defence-against-aggression in twentieth-century just war thought is misplaced and damaging. It produces, he submits, a vacuous reading of justice and war which pits states against one another in a survival contest rather than encouraging them to cooperate for the common good in a spirit of public international responsibility (
<xref ref-type="bibr" rid="ref399">O’Donovan 2003</xref>
: 55). Elshtain’s argument follows a different path, but also expresses a degree of disillusionment with the legalistic tenor of twentieth-century just war thought. She looks beyond the formalities of the UN Charter, and indeed the basic norms of state sovereignty and non-intervention, in order to reconcile the just war tradition to what she recognizes as the requirements and opportunities afforded by American hegemony and the nascent human rights regime. With respect to Bush and Blair, they have both tended to frame the War on Terror in moralistic terms which stress the imperatives of judgement and responsibility over the narrower optics of defence-against-aggression.</p>
<p>Viewed collectively, then, the recent writings of Elshtain, Johnson, and O’Donovan – the toast of contemporary just war tradition – as well as the speeches of Bush and Blair, do not seem to correspond in any robust manner with twentiethcentury just war thought. Yet this does not mean that they stand apart from the just war tradition altogether. Indeed, they seem to share certain points of convergence with a more classical conception of the just war, one that we might associate with a series of medieval and early modern thinkers from Augustine to Grotius. The next section will explore these points of intersection.</p>
</sec>
<sec id="sec6_4">
<title>Vindicative justice: echoes of the classical just war tradition</title>
<p>The main point of confluence relates to vindicative justice, which I mentioned earlier in connection to Johnson. Of course, the notion of vindicative justice is not Johnson’s invention; it possesses a significant lineage within the medieval just war tradition. We might find, then, some parallels to developments in the contemporary just war tradition within that particular strand of medieval just war thought from which the idea of vindicative justice is drawn. This leads to an interesting opportunity: by examining this medieval strand of just war thought we might gain a deeper understanding of the recent tendency to hark to the idea of vindicative justice, as signalled by the recent writings of Elshtain, Johnson, and O’Donovan.</p>
<p>While Johnson extracts the idea of vindicative justice from the writings of Aquinas, Vitoria, and Francisco Suárez, it has much deeper roots than this, and is ultimately derived from St Paul’s proclamation (Romans 13:4) that the prince (or state leader) is the minister of God to execute His wrath upon the evildoer.
<xref id="page_101" ref-type="page"></xref>
This conception of authority empowers the prince to use the sword to establish (or re-establish) a just and peaceful political order. It is in this spirit that Aquinas remarks that it pertains to the prince to use the sword of war in order that we may have true peace: ‘Those who wage war justly aim at peace, and so they are not opposed to peace, except to the evil peace’ (
<xref ref-type="bibr" rid="ref20">Aquinas 2002</xref>
: 241;
<xref ref-type="bibr" rid="ref500">Suárez 1944a</xref>
: 802). The just war, on this view, is a war fought on princely authority with the object of vindicating proper relations between communities where they have been disrupted by some instance of wrongdoing. As Suárez writes, ‘that war is justified which is taken under legitimate and public authority, with the intention of holding an enemy to his duty and of reducing to its due order that which was disorderly’ (1944a: 819).</p>
<p>It was Augustine who first related the prince’s right to war to the duties of good government and judgement. In a much quoted letter, Augustine addresses Macedonius to the effect that the question of justice and war is at heart a matter of judgement and must be considered in these terms. ‘The might of the emperor’ and ‘the soldier’s weapons’ are essentially an extension of the judicial office into the international realm, he advises, and may be used in order to ‘put a check on the bad so that the good may live peacefully’ among them (
<xref ref-type="bibr" rid="ref25">Augustine 2001</xref>
: 80).</p>
<p>This thematic line also runs right through the writings of Vitoria and Suárez. Vitoria, for instance, is explicit in comparing the role of the warring prince to that of the domestic judge. ‘The prince who wages a just war’, he writes, ‘becomes ipso facto the judge of the enemy, and may punish them judicially and sentence them according to the offence’ (
<xref ref-type="bibr" rid="ref534">Vitoria 1991</xref>
: 288). James Brown Scott writes that this comparison is central to Vitoria’s thinking on the rights of war. Vitoria’s doctrine, Scott argues, is properly understood as a judicial system for international society where the princes are posited as judges responsible for prosecuting any violation of natural rights on the writ of the law of nations. ‘Hence it is that Vitoria’s prince may redress rights and punish wrongs just as may a judge of civil or criminal jurisdiction … On an international scale, the prince is the executor of the judgement which he has rendered’ (
<xref ref-type="bibr" rid="ref461">Brown Scott 1934</xref>
: 211). If anything, Suárez amplified this idea that princely authority functions as a means of judgement. The power of declaring war, Suárez states, is a ‘power of jurisdiction’.</p>
<disp-quote>
<p>Wherefore just as the sovereign may punish his own subjects when they offend others, so may he avenge himself on another prince or state which by reason of some offence becomes subject to him; and this vengeance cannot be sought at the hands of another judge, because the prince of whom we are speaking has no superior in temporal affairs; therefore, if that offender is not prepared to give satisfaction, he may be compelled to do so by war.</p>
<attrib>(
<xref ref-type="bibr" rid="ref500">Suárez 1944a</xref>
: 806)</attrib>
</disp-quote>
<p>There is also an element of continuity between this position and Hugo Griotius’ argument that any state may undertake to punish a delinquent state on behalf of international society on the basis that by violating the natural order the delinquent state has rendered itself inferior to all other parties, and is therefore subject to
<xref id="page_102" ref-type="page"></xref>
their justice.
<sup>
<xref ref-type="fn" rid="fn6_8">8</xref>
</sup>
The core of this argument is the view that the prince may preside in judgement over the wrongdoing of others, and it is on this basis that he may lead his community or kingdom to war.</p>
<p>This thematic line clearly resonates quite strongly in the contemporary just war literature represented here by Elshtain, Johnson, and O’Donovan, and also in Bush and Blair’s rhetoric regarding the war on terror. O’Donovan’s ‘praxis of judgment’, Johnson’s concern with proper authority, Elshtain’s insistence that power and responsibility must go hand in hand, and Bush and Blair’s determination to present the war as an instance of international law-enforcement stand as testimony to the prevalence of this trope within the contemporary just war tradition. In their efforts to map out a course, for both the moralist and the world at large, through the war on terror, these theorists and state-leaders have ‘tapped into’ that strand of medieval just war thought which emphasizes the imperative for the prince to act as the agent (and executor) of order in the quotidian world (
<xref ref-type="bibr" rid="ref175">Elshtain 2004</xref>
: 50). In doing so, they present a vision of the
<italic>jus ad bellum</italic>
which is at odds with twentieth-century thought regarding the right to war. Where in the twentieth century the recourse to force was scrutinized against a legalist matrix, bracketed by the tightly circumscribed concepts of aggression and defence, today it seems more likely to be examined as a ‘juridical’ exercise in responsibility. War is thus represented as an instrument of international order and a means of enforcing the right rather than, as in the twentieth century, a challenge to peace and security.
<sup>
<xref ref-type="fn" rid="fn6_9">9</xref>
</sup>
This opens the way towards a revised and more open approach to the right to war. All indications, then, point towards the emergence of a broader conception of the
<italic>jus ad bellum,</italic>
cast in terms of governmental responsibility and judgement, in the context of the contemporary security environment.</p>
</sec>
<sec id="sec6_5">
<title>Conclusion</title>
<p>In conclusion, this chapter has argued that the contemporary just war tradition reflects a shift away from the legalistic approach to the
<italic>jus ad bellum,</italic>
which was prevalent for the best part of the twentieth century. In its stead, the contemporary just war tradition indicates a pre-occupation with the problematic of war as a practice of responsible government, and in this respect resonates with the Pauline-inflected strand of medieval just war tradition which stresses the judicial/punitive function of war. This, however, is not merely a matter of academic interest; it has serious implications for the manner by which wars are waged in the present age and, consequently, the shape of international society in the years to come. Most obviously, it suggests a shift towards a broader, more expansive conception of the
<italic>jus ad bellum,</italic>
one which is more amenable to an interventionist ethic and suggestive of the inception of an ‘age of liberal wars’ (
<xref ref-type="bibr" rid="ref198">Freedman 2005</xref>
).</p>
<p>Where war is viewed as a practice of responsible government or judgement, the conviction that self-defence constitutes the only possible just cause for war is displaced, resulting in a more permissive licence for the use of force in international affairs. This development is evident in state practice today. President Bush and Prime Minister Blair, for example, have tended to address the issue of war and
<xref id="page_103" ref-type="page"></xref>
justice in a more morally charged manner in recent years. This is apparent even just from the names originally assigned to the respective military operations in Afghanistan and Iraq: ‘Infinite Justice’ and ‘Iraqi Freedom’. Rather than referring to a restrictive right to war equated solely with defence-against-aggression, they have utilized a much further reaching set of concepts which pertain to the imperatives of punishment, justice, humanitarianism, and good and evil.</p>
<p>This style of rhetoric marks a sea change from the days of the twentieth century when state leaders often went to great lengths in their efforts to represent each and every use of force they engaged in as a defensive action, in conformity with article 2(4) of the UN Charter.
<sup>
<xref ref-type="fn" rid="fn6_10">10</xref>
</sup>
Of course, some leaders such as President Ronald Reagan did occasionally (and very famously) invoke the language of good and evil, but it was generally distinct from any justifications for the use of force. Indeed, Reagan followed the twentieth-century model rather faithfully by attempting to stretch the bounds of self-defence to justify American acts of war – such as the 1986 bombing of Libya – that did not obviously fall within this bracket (
<xref ref-type="bibr" rid="ref96">Byers 2003</xref>
: 179). Thus, where in the twentieth century only defence-against-aggression provided a secure grounds for war, there is some momentum today behind the idea that war may be waged for a number of purposes; most prominently to forestall future threats from emerging, to manage international peace and security, to enforce the writ of the UN, to intervene in countries where the government is repressing its own people, and to spread the principles of good government. In this respect, one might like to say that new thinking in the just war tradition is stretching the boundaries of what is acceptable.</p>
<p>This is immensely important. By setting out the
<italic>jus ad bellum</italic>
justifications for war in such emotive, charged terms, the likelihood of the war being conducted in a restrained manner is minimized. Put simply, where war is justified in such a sweeping, all-encompassing manner, the imperative of restraint is diminished. The modern
<italic>jus in bello,</italic>
based as it upon rights and protocols, necessarily appears shallow when confronted with the language of divine justice, responsibility, and struggle-against-evil. As the Bob Dylan song goes, ‘you don’t count the dead with God on your side’. This is a shortcoming that more classical approaches to the
<italic>jus in bello</italic>
avoided as they were typically cast in the same expansive terms as the
<italic>jus ad bellum</italic>
– and were stronger for it. It is only when the symmetry between the
<italic>jus ad bellum</italic>
and the
<italic>jus in bello</italic>
is lost, as it arguably has been in the context of the war on terror, that trouble ensues. The refusal on behalf of the US to treat captured enemy combatants as prisoners of war who fall under the protection of the Geneva Conventions, the practice of prisoner abuse and torture in detainment facilities such as Abu Ghraib and Camp X-Ray, and the use of prohibited weapons such as white phosphorous in Fallujah present themselves for consideration in this regard (
<xref ref-type="bibr" rid="ref351">Marqusee 2005</xref>
;
<xref ref-type="bibr" rid="ref368">Monbiot 2005</xref>
). These deviations from the standard norms of the
<italic>jus in bello</italic>
are, however – and this is my point – quite intelligible when placed in the context of a global war on terror that has been justified as the ‘highest calling of history’ (
<xref ref-type="bibr" rid="ref86">Bush 2003a</xref>
).</p>
<p>It is precisely this slide into licentiousness that must be guarded against with the utmost vigilance lest we allow for a resumption of the unfettered barbarity
<xref id="page_104" ref-type="page"></xref>
that once prompted Grotius to write
<italic>The Rights of War and Peace.</italic>
Grotius’s response to the horror that faced his generation was simple. He reminded his readers that wars may be undertaken as a judicial act, but ‘to render Wars just, they are to be waged with no less Care and Integrity, than judicial proceedings are usually carried on’ (2005, 102). This is a lesson which I would contend is worth re-iterating today. The tragedy is that this lesson is unlikely to be respected when the
<italic>jus ad bellum</italic>
justifications for war are offered in such strong and morally charged terms.</p>
</sec>
<sec id="sec6_6">
<title>Acknowledgements</title>
<p>I would like to thank Lisa Denney, Columba Peoples, Darren Brunk, and Nick Vaughan-Williams for their helpful comments. I would also like to acknowledge my debt to Toni Erskine and Ian Clark for their support and guidance over the past few years. Finally, I am grateful to the editors of this volume for the invitation to participate in this project.</p>
</sec>
</body>
<back>
<notes>
<title>Notes</title>
<fn-group>
<fn id="fn6_1">
<label>1</label>
<p>One would also include Michael Walzer as one of the foremost contemporary just war theorists. However, he has not produced any book-length treatment of just war thought since the advent of the war on terror.
<italic>Arguing About War</italic>
is, of course, a compendium of essays written between 1977 and 2004; it is not a concentrated re-examination of the just war tradition in the context of the War on Terror. See:
<xref ref-type="bibr" rid="ref539">Walzer 2004</xref>
.</p>
</fn>
<fn id="fn6_2">
<label>2</label>
<p>For example, see
<xref ref-type="bibr" rid="ref424">Rengger 2004</xref>
and
<xref ref-type="bibr" rid="ref77">Burke 2005b</xref>
. This topic will be the subject of a panel discussion at ISA 2007, entitled ‘Jean Bethke Elshtain’s Just War Against Terror: The Response from the Academy’, and a special section of
<italic>International Relations</italic>
(forthcoming: 2007).</p>
</fn>
<fn id="fn6_3">
<label>3</label>
<p>Interestingly, Johnson’s treatment of vindicative justice is modelled on Thomas Aquinas’s response to the question ‘Is War always a Sin?’ See:
<xref ref-type="bibr" rid="ref20">Aquinas 2002</xref>
: 241.</p>
</fn>
<fn id="fn6_4">
<label>4</label>
<p>It is not, of course, the only defining feature of recent just war thought – a willingness to present war as a force for good in the world is another – but it is perhaps the most prevalent one.</p>
</fn>
<fn id="fn6_5">
<label>5</label>
<p>The recent writings of scholars such as Fernando Tesón (
<xref ref-type="bibr" rid="ref509">2005</xref>
), Whitley Kaufman (
<xref ref-type="bibr" rid="ref299">2005</xref>
), Allen Buchanan and Robert Keohane (
<xref ref-type="bibr" rid="ref73">2004</xref>
), Anne-Marie Slaughter and Lee Feinstein (
<xref ref-type="bibr" rid="ref183">2004</xref>
), Anthony F. Lang Jr (
<xref ref-type="bibr" rid="ref319">2004</xref>
), Neta Crawford (
<xref ref-type="bibr" rid="ref134">2003a</xref>
;
<xref ref-type="bibr" rid="ref135">2003b</xref>
), Anthony Burke (
<xref ref-type="bibr" rid="ref75">2004</xref>
;
<xref ref-type="bibr" rid="ref76">2005</xref>
), George R. Lucas Jr (
<xref ref-type="bibr" rid="ref335">2003</xref>
), and Christian Reus-Smit (
<xref ref-type="bibr" rid="ref426">2005</xref>
) have all explored the possibility that a broader right to war is emerging in international society. They have treated, in no particular order, the matters of anticipatory war, punitive war, wars of democratization, the constabulary use of force, and an extended right to humanitarian war. Not all of these scholars support these ventures, but the fact that they examine them within the frame of the just war tradition is significant in its own right.</p>
</fn>
<fn id="fn6_6">
<label>6</label>
<p>Bush spoke about evil on 319 separate occasions, between the moment he took office and June 2003 (Singer 2003: 2). With respect to Bush’s predilection to refer to divine providence, the clearest example is his address to a Joint Session of Congress and the American People on 20 September 2001: ‘Freedom and fear, justice and cruelty, have always been at war, and we know that God is not neutral between them. Fellow citizens, we’ll meet violence with patient justice – assured of the rightness of our cause, and confident of the victories to come. In all that lies before us, may God
<xref id="page_105" ref-type="page"></xref>
grant us wisdom, and may he watch over the USA’ (
<xref ref-type="bibr" rid="ref82">Bush 2001</xref>
). For more on Bush’s invocation of Christian tropes, see
<xref ref-type="bibr" rid="ref317">Lafeber 2002</xref>
.</p>
</fn>
<fn id="fn6_7">
<label>7</label>
<p>The question of anticipation is taken up in the next chapter by Alex J. Bellamy. Specifically, Bellamy examines the vexed matter of pre-emption in the context of the war on terror. I have dealt with the representation of the war on terror as a punitive war and struggle against evil elsewhere. See:
<xref ref-type="bibr" rid="ref400">O’Driscoll 2006</xref>
.</p>
</fn>
<fn id="fn6_8">
<label>8</label>
<p>Though of course Grotius had his disagreements with how Vitoria and Suárez addressed this matter. See Grotius’ treatment of punishment in Book II, Chapter 20 of: Grotius 2005. For more on Vitoria and Suarez, see:
<xref ref-type="bibr" rid="ref233">Hamilton 1963</xref>
.</p>
</fn>
<fn id="fn6_9">
<label>9</label>
<p>We might think of the distinction set out by Hedley Bull between different historical conceptions of the use of force in international politics: ‘The rules and institutions which international society has evolved reflect the tension between the perception of war as a threat to international society which must be contained and the perception of it as an instrumentality which international society can exploit to achieve its purpose’ (
<xref ref-type="bibr" rid="ref74">Bull 1977</xref>
: 188).</p>
</fn>
<fn id="fn6_10">
<label>10</label>
<p>For example, consider India’s tortuous justification for its intervention in East Pakistan (Bangladesh) in 1971. India claimed that it deployed forces in East Pakistan in response to ‘refugee aggression’, rather than pursuing a more straightforward humanitarian justification for their actions (
<xref ref-type="bibr" rid="ref545">Wheeler 2000</xref>
: 62).</p>
</fn>
</fn-group>
</notes>
</back>
</book-part>
<book-part book-part-type="chapter" book-part-number="7" id="chapter7">
<book-part-meta>
<title-group>
<title>
<xref id="page_106" ref-type="page"></xref>
Pre-empting terror</title>
<alt-title alt-title-type="running-head-verso">Pre-empting terror</alt-title>
<alt-title alt-title-type="running-head-recto">Alex J. Bellamy</alt-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<given-names>Alex J.</given-names>
<surname>Bellamy</surname>
</name>
</contrib>
</contrib-group>
</book-part-meta>
<body>
<p>The right to use force in self-defence has been described as a ‘fundamental principle’ of international law and is also the bedrock of the natural law tradition’s just causes for war (
<xref ref-type="bibr" rid="ref459">Schwarzenberger 1955</xref>
: 195). Traditionally, Just War scholars have admitted that the right to self-defence comprises a right to respond with force to both actual and imminent attacks. The ambiguous place of pre-emptive self-defence in Article 51 of the UN Charter gave rise to a debate between ‘restrictionists’ who call for a literal interpretation of the Charter (thus ruling out the use of force prior to an armed attack) and ‘counter-restrictionists’ who argue that the UN Charter does not override a state’s inherent right of pre-emptive self-defence. Since 9/11, these debates have become more pointed. Many scholars and policy-makers began to insist that the ability of terrorists and ‘rogue states’ to inflict mass casualties at short notice required a less restrictive way of thinking about self-defence. The so-called ‘Bush doctrine’ (
<xref ref-type="bibr" rid="ref380">National Security Council (NSC) 2002</xref>
), described by one leading writer as the new American ‘grand strategy’ (
<xref ref-type="bibr" rid="ref266">Ikenberry 2004</xref>
: 44), claimed a right for the US to act pre-emptively against terrorists, states harbouring terrorists and other ‘rogue’ regimes. According to at least two commentators, it amounts to claiming an ‘unlimited’ right of self-defence (
<xref ref-type="bibr" rid="ref376">Myjer and White 2002</xref>
: 5).</p>
<p>This chapter takes up the challenge to re-examine the right of self-defence in the wake of 9/11. It accepts the view that self-defence needs to be rethought to take account of the fact that massive threats may emerge more rapidly and quietly than before. Though appealing for its simplicity, a restrictionist view that there is and should be no right of pre-emptive self-defence against terrorists and those harbouring them is flawed on at least two counts. First, a ‘right’ of self-defence that does not permit states to use force to pre-empt attacks is not much of a right. As Abraham Sofaer (
<xref ref-type="bibr" rid="ref488">1986</xref>
: 53) put it, if the restrictionists were correct, it would mean that ‘international law would serve to insulate the perpetrators of international violence for any control or punishment for their crimes’. Second, in the contemporary context, denying the global hyperpower the right to pre-empt attacks is only likely to encourage that power to reject the normative restraints on recourse to force. On the other hand, however, there are at least two good reasons for avoiding an entirely permissive order. First, a permissive rule of self-defence could encourage states to abuse that right. In the modern era, almost every war
<xref id="page_107" ref-type="page"></xref>
has been justified in terms of self-defence by both sides (see
<xref ref-type="bibr" rid="ref375">Mullerson 1991</xref>
). Second, a permissive right of pre-emption would blur the distinction between aggression and defence.</p>
<p>This chapter aims to develop a new way of thinking about pre-emptive self-defence to take account of the threat of terrorism. The first section outlines the traditional view on self-defence found in the Just War tradition and positive international law. It shows that both permit a limited right of pre-emption where such acts are justified by necessity, the temporal imminence of the threat and proportionality. These ideas were articulated between 1837 and 1842 during a dispute between the US and UK over the sinking of the
<italic>Caroline.</italic>
The
<italic>Caroline</italic>
case remains a good guide to the limits of pre-emptive self-defence, not because it was singularly important in its own right but because it reflected, and still reflects, the position of both Just War thinking and positive international law. The second section details recent American attempts to redesign the right of self-defence. It identifies three broad schools of thought. The first, sometimes referred to as ‘new liberals’, holds that a liberal state’s duty to protect the fundamental right to life of its citizens should override its duty to respect the sovereign inviolability of others in cases where the two principles collide. The second, which I label ‘new realists’, insists that the legal and moral rules limiting the right to self-defence have been broken so often since 1945 that they simply no longer apply. Both these approaches, I will argue, are flawed in important respects. The third approach, one signalled by the United States’ 2002
<italic>National Security Strategy</italic>
(hereafter referred to as the
<italic>Strategy</italic>
), holds that whilst traditional concepts of self-defence should remain largely intact, the concepts of ‘imminence’ and ‘necessity’ require reformulation. I will adopt this approach and attempt to articulate a concept of pre-emptive self-defence that permits application against terrorists and those that harbour them whilst guarding against the perils of creating a too permissive regime.</p>
<p>Although the essence of my approach is similar to that articulated in the
<italic>Strategy,</italic>
it is important to note three important differences. First, the
<italic>Strategy</italic>
does not elaborate a new concept of ‘imminence’, a cornerstone of the approach taken here. Second, whilst the
<italic>Strategy</italic>
talks about a limited right of pre-emption, in practice and in its rhetoric the Bush administration has adopted a strategy of
<italic>prevention.</italic>
In contrast to pre-emption, prevention attempts to remove a potential threat before it has emerged, something expressly ruled out here (
<xref ref-type="bibr" rid="ref196">Freedman 2004a</xref>
: 83–4). Third, unlike the
<italic>Strategy,</italic>
my approach insists that the threat be demonstrable. It is not enough for a state to simply convince itself that it confronts a threat in order for it to claim a right to pre-empt: it also has to persuade as many others as possible. The basic idea here is that the greater the number of states and other actors that validate a decision to act pre-emptively, the greater the level of legitimacy the action should be accorded (see
<xref ref-type="bibr" rid="ref193">Franck 2002</xref>
: 185), particularly when that validation is a product of free and open dialogue.</p>
<sec id="sec7_1">
<title>
<xref id="page_108" ref-type="page"></xref>
Self-defence and the legitimacy of war</title>
<sec id="sec7_1_1">
<title>The just war tradition</title>
<p>The Just War tradition’s justification of killing in certain circumstances is based on an extrapolation of the individual’s right to use violence to defend herself from attack (
<xref ref-type="bibr" rid="ref537">Walzer 1977</xref>
: 127;
<xref ref-type="bibr" rid="ref19">Anscombe 1961</xref>
;
<xref ref-type="bibr" rid="ref203">Fullinwinder 1975</xref>
). Each of the tradition’s variants recognised self-defence as the primary just cause for war. For many writers, sovereigns had not only a right but also a
<italic>duty</italic>
to defend their communities. As Vattel (
<xref ref-type="bibr" rid="ref532">1916</xref>
: 246) put it, ‘self-defence against an unjust attack is not only a right which every nation has, but it is a duty, and one of the most sacred duties’. Both Suárez (
<xref ref-type="bibr" rid="ref500">1944a</xref>
: 4) and Wolff (
<xref ref-type="bibr" rid="ref554">1934</xref>
: 804) supported this view. This obligation derived from the sovereign’s responsibility to protect his or her subjects.</p>
<p>There was a similar level of consensus about pre-emption. On the whole, writers tended to permit a limited right of pre-emption in the face of an imminent threat but expressly rejected the morality of preventive war, viewing it as tantamount to aggression. Grotius listed as the first ‘just cause’ of war ‘an injury not yet done which menaces body or goods’. In cases where one is ‘menaced by present force with danger of life not otherwise evitable, war is lawful, even to the slaying of the aggressor … as a matter of self-protection’ (1913: 172). This right, however, was limited by necessity: ‘the right of self-defence exists only when necessary: where the danger can be avoided, delay is proper to allow recourse to other remedies’ (see
<xref ref-type="page" rid="page_210">p. 210</xref>
). The danger, Grotius argued, must be ‘immediate and imminent in point of time’ (p. 549). Lest there be any doubt about the limits of this right, Grotius went on to specifically reject the legality of preventive war as an ‘intolerable doctrine’ (pp. 224–5). Importantly, for our purposes, Grotius supplemented his argument by noting that ‘advantage does not confer the same right as necessity … For in order that self-defence may be lawful, it must be necessary, and it is not necessary unless we are certain, not only regarding the power of our neighbour but also regarding his intention’ (p. 549).</p>
<p>Likewise, Samuel Pufendorf agreed that a man may kill an aggressor once ‘the aggressor, showing clearly his desire to take my life, and equipped with the capacity and the weapons for his purpose’ and ‘has gotten into the position where he can in fact hurt me’ (1994: 264). Like Grotius, Pufendorf also sought to limit the right, insisting that force could only be used in the absence of viable alternatives (such as escape). Emmerich de Vattel was a little more permissive than the others insisting that:</p>
<disp-quote>
<p>When once a state has given proofs of injustice, rapacity, pride, ambition, or an imperious thirst of rule, she becomes an object of suspicion to her neighbours, whose duty it is to stand on their guard against her … [O]n occasions where it is impossible or too dangerous to wait for an absolute certainty, we may justly act on a reasonable presumption.</p>
<attrib>(1916: 308)</attrib>
</disp-quote>
<p>
<xref id="page_109" ref-type="page"></xref>
However, he insisted that if there were reasonable doubts about these proofs, states should take care ‘not to act upon vague and doubtful suspicions lest it should run the risk of becoming itself the aggressor’ (see
<xref ref-type="page" rid="page_130">p. 130</xref>
). Although Vattel accepted the idea that a state may pre-emptively attack another without knowing for certain that the other is close to attacking it, he expressly forbade preventive war. The fact that a state increases its power was not enough grounds for war, Vattel argued, because ‘we must have good grounds to think ourselves threatened … before we can have recourse to arms’ (p. 308).</p>
</sec>
<sec id="sec7_1_2">
<title>Positive international law</title>
<p>These views found their way into positive international law. The 1928 Kellogg-Briand pact, whose signatories renounced the use of force in their international relations, nevertheless reserved a state’s right to use force in self-defence. That right, it was widely conceded, included the right to pre-emption. According to Frank Kellogg, the US Secretary of State who co-wrote the pact, the right of self-defence was ‘inherent in every sovereign state and is implicit in every treaty. Every nation is free at all times and regardless of treaty provisions to defend its territory from attack or invasion and it alone is competent to decide whether circumstances require recourse to war in self-defence’ (
<xref ref-type="bibr" rid="ref303">Kellogg 1928</xref>
: 142).</p>
<p>Article 51 of the UN Charter also grants states an inherent right of self-defence, though the status of pre-emption is a little murkier in relation to Charter law. It declares that:</p>
<disp-quote>
<p>Nothing in the present Charter shall impair the inherent right of individual or collective self-defence if an armed attack occurs against a member of the United Nations, until the Security Council has taken measures necessary to maintain international peace and security. Measures taken by members in the exercise of this right shall be immediately reported to the Security Council and shall not in any way affect the authority and responsibility of the Security Council under the present Charter to take at any time such action as it deems necessary in order to maintain or restore international peace and security.</p>
</disp-quote>
<p>It is worth noting that in the French version of this article, the phrase ‘inherent right’ is rendered
<italic>droit naturale</italic>
(natural right) (
<xref ref-type="bibr" rid="ref157">Dinstein 1988</xref>
: 169).</p>
<p>Interpretations of Article 51 have tended to fall into one of two camps, what I label ‘restrictionist’ and ‘counter-restrictionist’. Two issues in particular have separated them: what constitutes an ‘armed attack’ and do states have a right to act pre-emptively? Restrictionists argue for a narrow interpretation of the Charter on both counts (e.g.
<xref ref-type="bibr" rid="ref125">Combacau 1986</xref>
;
<xref ref-type="bibr" rid="ref148">Delbrück 2002</xref>
). The question of what constitutes an armed attack was first raised in 1948 when the USSR intervened in Czechoslovakia to overthrow the government because it expressed a wish to participate in the Marshall Plan. Despite Czechoslovak pleas to the contrary, the Security Council did not see this intervention as an ‘armed attack’. Likewise, in the same year, whilst the UN sent monitors to observe alleged border incursions by
<xref id="page_110" ref-type="page"></xref>
Yugoslav communists into Greece it stopped short of identifying an armed attack. These experiences led restrictionists to claim that an ‘armed attack’ was limited to cases of actual invasion and not limited incursions. This view was supported by the ICJ in its judgment in the
<italic>US v. Nicaragua</italic>
case (1986). Whilst finding that the sending of armed bands into another state may constitute an armed attack, the Court insisted that it was ‘necessary to distinguish the most grave forms of the use of force (those constituting an armed attack) from other less grave forms’.
<sup>
<xref ref-type="fn" rid="fn7_1">1</xref>
</sup>
Restrictionists therefore argue that an armed attack should be understood as limited to those instances involving the direct use of conventional military force. In cases of sabotage or state-sponsored terrorism, the victim state does not enjoy a right to use force against the host state in self-defence (
<xref ref-type="bibr" rid="ref72">Brownlie 1963</xref>
: 275–80).</p>
<p>Restrictionists also insist that Article 51 expressly rules out pre-emptive selfdefence, arguing that states have a right to use force in self-defence only
<italic>after</italic>
an armed attack has occurred. Hans Kelsen (
<xref ref-type="bibr" rid="ref304">1948</xref>
: 792) concluded that Article 51 only applied ‘in case of an armed attack’ and that the right could not be exercised to protect states against the violation of any of their other rights. In the
<italic>Nicaragua v. US</italic>
case, the ICJ supported this interpretation, ruling that, ‘for one state to use force against another … is regarded as lawful, by way of exception, only when the wrongful act provoking the response was an armed attack … In the view of the Court, under international law in force today – whether customary international law or that of the United Nations system – states do not have a right of ‘collective’ armed response to acts which do not constitute an “armed attack”.
<sup>
<xref ref-type="fn" rid="fn7_2">2</xref>
</sup>
Restrictionists argue, not implausibly, that if these limits to the exercise of self-defence were loosened, states would be encouraged to abuse the right to self-defence and the distinction between aggression and defence would be eroded (see
<xref ref-type="bibr" rid="ref107">Cassesse 1986</xref>
: 515–16).</p>
<p>Although there is evidence that the Charter’s drafters intended Article 51 to provide only a limited right of self-defence, the idea that a state should wait to be attacked before taking measures to defend its citizens has been widely criticised by counter-restrictionists. Sir Humphrey Waldock insisted that ‘it would be a travesty of the purposes of the Charter to compel a defending state to allow its assailant to deliver the first, and perhaps fatal blow … to read Article 51 literally is to protect the aggressor’s right to the first strike’ (in
<xref ref-type="bibr" rid="ref433">Roberts 1999</xref>
: 483 and 513). Myers McDougal (
<xref ref-type="bibr" rid="ref343">1963</xref>
: 599) insists that there is no evidence in the Charter’s
<italic>traveaux preparatoire</italic>
that the drafters intended to place new limits on states’ pre-Charter right to self-defence. As a result, most scholars insist that Article 51 does not override the customary rights and responsibilities of states identified earlier. Simma (
<xref ref-type="bibr" rid="ref478">2002</xref>
: 51), for instance, argued that Article 51 merely outlined one situation in which the inherent right of self-defence might be used.</p>
<p>Counter-restrictionists argue that the definition of an ‘armed attack’ should be understood more broadly and that Article 51 does not erode a state’s right to pre-emptive self-defence. On the first issue, counter-restrictionists insist that if the phrase ‘armed attack’ means what it says, it must therefore mean all ‘armed attacks’ regardless of their scale (
<xref ref-type="bibr" rid="ref316">Kunz 1947</xref>
: 848). Once again, in the
<italic>Nicaragua vs. US</italic>
case the ICJ put forward a restrictionist view, arguing that the provision of
<xref id="page_111" ref-type="page"></xref>
arms, logistics and other support to terrorists did not constitute an ‘armed attack’. Most scholars and many states disagreed with this view. For them, state support for terrorism does constitute an armed attack so long as the level of violence reaches (or threatens to reach) what the General Assembly’s ‘Definition of Aggression’ labelled ‘sufficient gravity’ (e.g.
<xref ref-type="bibr" rid="ref108">Cassim
<italic>et al.</italic>
1975</xref>
;
<xref ref-type="bibr" rid="ref60">Blum 1976</xref>
).</p>
<p>Counter-restrictionists also argue that Article 51 does not diminish a state’s inherent right to pre-emptive self-defence. There are at least two justifications for this view. First, it is implied in the Charter’s language. Article 51 explicitly endorses a state’s
<italic>inherent</italic>
right to self-defence; its
<italic>natural</italic>
right in the French version. That inherent right clearly included a right to pre-emptive self-defence. Moreover, if Article 51 is read as permitting the use of force against breaches of Article 2(4), then this also permits pre-emption because Article 2(4) prohibits both the ‘threat’ and ‘use’ of force (
<xref ref-type="bibr" rid="ref67">Bowett 1958</xref>
: 191–2).</p>
<p>The second justification for a broader reading of Article 51 is customary practice. Since 1945, states have tended to judge instances of pre-emptive selfdefence on the merits of each case. On some occasions, where the threat is demonstrably imminent, international society has shown itself willing to tolerate pre-emption. The paradigmatic case of this was the world’s reaction to Israel’s 1967 pre-emptive attack on Egypt. In that case, although some states condemned Israel, many others accepted that an invasion was imminent and whilst desisting from commending Israel also chose not to condemn it (
<xref ref-type="bibr" rid="ref219">Gray 2000</xref>
: 112–13). More recently,
<italic>Operation Enduring Freedom</italic>
in Afghanistan also provides a compelling case in that the overwhelming majority of states supported the US right to overthrow the Taliban regime in Afghanistan in order to prevent further Al-Qaeda attacks. In other cases, however, states criticised as precipitate the use of force for ostensibly pre-emptive purposes. For example, when Israel launched an air strike against the Osirak nuclear reactor in Iraq in 1981, it was ‘strongly condemned’ by the UN Security Council even though counter-restrictionist lawyers supported Israel’s case (e.g.
<xref ref-type="bibr" rid="ref342">McCormack 1996</xref>
: 297–302). States found that the reactor did not pose an imminent threat and that Israel had resorted to force as a first not last resort. What this demonstrates is that states and scholars are prepared to make judgements about the legitimacy of pre-emptive force on a case-by-case basis, lending support to the counter-restrictionist claim that there is a theoretical right of pre-emption.</p>
<p>It seems clear from this that – restrictionist concerns notwithstanding – the right of self-defence permits the pre-emptive use of force in some cases but forbids ‘preventive’ attacks. The questions now are first, in what situations is the pre-emptive use of force justifiable? And second, where do we draw the line between pre-emption and prevention? We can begin to answer these questions by considering the exchange of diplomatic notes between the UK and US concerning the sinking of the
<italic>Caroline</italic>
in 1837. Although relatively insignificant as a case in its own right, the
<italic>Caroline</italic>
case is important as a basis for understanding when the right of pre-emptive self-defence can be invoked for three reasons. First, the fact that the wording of the right to pre-emption in US Secretary of State, Daniel Webster’s communication with the British was accepted without
<xref id="page_112" ref-type="page"></xref>
question by both sides and has not been challenged by states since suggest that it is an accurate reflection of international society’s consensus on this matter (e.g.
<xref ref-type="bibr" rid="ref10">Alexandrov 1996</xref>
: 20). Second, the case provides an example of applying the broad right to pre-emption to a specific case. Third, Webster’s formula, outlined in the
<italic>Caroline</italic>
case, has been frequently cited in legal cases since (see
<xref ref-type="bibr" rid="ref511">Travalio and Altenberg 2003</xref>
: 114). For example, it was cited in the Nuremberg trials to reject German claims that the invasion of Norway constituted a legitimate act of self-defence.</p>
<p>In 1837, the UK and US were in a state of peace. However, there was an armed insurrection (the ‘Mackenzie rebellion’) against British rule in Canada. The rebels began using an American owned ship, the
<italic>Caroline,</italic>
to carry supplies from the American side of the Niagara River. On 29 December 1837, Canadian troops loyal to Britain boarded the ship, killed several Americans, set the ship alight and allowed it to drift over the Niagara Falls. At the time of the attack the
<italic>Caroline</italic>
was docked on the US side of the border not in its usual port on the Canadian side of the border. The US protested against the attack, claiming that it violated its sovereignty, but the British insisted that they were exercising their right to selfdefence.</p>
<p>The debate began with a note from US Secretary of State John Forsyth to the British Minister in Washington on 5 January 1938.
<sup>
<xref ref-type="fn" rid="fn7_3">3</xref>
</sup>
Forsyth demanded a full explanation from the British and labelled the attack an ‘extraordinary outrage’. The British minister responded by blaming the Americans for failing to prevent the use of its territory by the Canadian rebels and justifying the attack as ‘a necessity of self-defence and self-preservation’ against a ‘piratical’ vessel (
<xref ref-type="bibr" rid="ref496">Stevens 2004</xref>
: 24–5). On further investigation in London, the British government concluded that as the
<italic>Caroline</italic>
was aiding and abetting the rebels it was a legitimate target regardless of which side of the border it was docked. Not surprisingly, the US rejected this argument disputing both the labelling of the
<italic>Caroline</italic>
as ‘piratical’ and Britain’s claim to a right of ‘hot pursuit’ across the border. Instead, it argued that the level of threat that could justify hot pursuit must be ‘imminent, and extreme, and involving impending destruction’ (
<xref ref-type="bibr" rid="ref496">Stevens 2004</xref>
: 35).</p>
<p>The debate was reinvigorated in late 1840 when a former British soldier was arrested in New York and charged with arson and murder in relation to the
<italic>Caroline.</italic>
The US government invited the British government to apologise for the incident and pay compensation in return for the dismissal of charges against the soldier. The British Minister agreed immediately and despatched a note to the US government apologising. In an 1842 reply to the British, the American Secretary of State, Daniel Webster explained that for the claim of self-defence to be justifiable, Britain was required to ‘show a necessity of self-defence, instant, overwhelming, leaving no choice of means, and no moment for deliberation’.
<sup>
<xref ref-type="fn" rid="fn7_4">4</xref>
</sup>
The action taken must also involve ‘nothing unreasonable or excessive; since the act, justified by the necessity of self-defence, must be limited by that necessity and kept clearly within it’.
<sup>
<xref ref-type="fn" rid="fn7_5">5</xref>
</sup>
In order to invoke a right of pre-emptive self-defence, therefore, a state has to demonstrate the imminence of an attack, the necessity of pre-emption and the proportionality of its intended response. Interestingly, Webster argued that the
<xref id="page_113" ref-type="page"></xref>
principles of necessity and proportionality were the most important and went into some detail in explaining what necessity entailed:</p>
<disp-quote>
<p>It must be demonstrated that it [Britain] did nothing unreasonable or excessive; since the act justified by the necessity of self-defence, must be limited by that necessity, and kept clearly within it. It must be shown that admonition or remonstrances to the persons on board the ‘Caroline’ was impracticable or would have been unavailing; it must be shown that daylight could not be waited for; that there could be no discrimination, between the innocent and the guilty; that it would not have been enough to seize and detain the vessel; but that it was a necessity, present and inevitable.</p>
<attrib>(
<xref ref-type="bibr" rid="ref541">Webster 1983</xref>
[1842]: 67–8)</attrib>
</disp-quote>
<p>The
<italic>Caroline</italic>
case helps to overcome the political problem caused by Article 51’s insistence that a right of self-defence can only be claimed
<italic>after</italic>
an armed attack has taken place. However, in light of Article 51, state practice since 1945, and the ICJ’s position, the three cornerstones of the Webster formula – imminence, necessity and proportionality – at best constitute a limited right of pre-emptive self-defence. There are therefore good grounds for arguing that contemporary positive international law permits a limited right of pre-emption that extends beyond Article 51 but is nevertheless covered by customary international law owing to the
<italic>Caroline</italic>
case and state practice since.</p>
<p>Between them, Just War thinking and positive international law grant states a limited right of pre-emptive self-defence in cases that satisfy the usual
<italic>jus ad bellum</italic>
criteria (all recourse to force must satisfy those criteria) plus the criteria of imminence (the attack must be demonstrably imminent) and necessity (the use of force must be the only reasonable measure available). According to this view, acts that do not satisfy all of these criteria are illegal and unjust. Jurists worry, with good reason, that expanding the right beyond that of the
<italic>Caroline</italic>
formula would significantly increase the likelihood of abuse by states and make it harder for observers to evaluate the legitimacy of a state’s claims. For instance, if we remove the obligation for a state to demonstrate that an attack is imminent, it becomes impossible to judge whether or not the claim to be acting in self-defence is valid or not.</p>
<p>The problem, however, comes in defining what ‘imminence’ means if the threat comes from terrorists and rogue states that have the ability launch instant mass casualty attacks on urban centres. As George W. Bush put it, in the post-September 11 context ‘we have every reason to assume the worst, and we have an urgent duty to prevent the worst from happening … [we] cannot wait for the final proof – the smoking gun – that could come in the form of a mushroom cloud’ (
<xref ref-type="bibr" rid="ref83">Bush 2002a</xref>
). It is for this reason that three revisionist schools of thought have come to the fore: ‘new liberals’ who call for a re-ordering in the relationship between states’ rights and individuals’ rights in international law; ‘new realists’ who argue that international law and ethics do not, and should not, constrain a state from using force to defend itself; and those who adopt a position similar
<xref id="page_114" ref-type="page"></xref>
to the
<italic>Strategy</italic>
that the traditional doctrine of self-defence continues to hold up but that the concepts of ‘imminence’ and ‘necessity’ need to be rethought to take account of the new threats.</p>
</sec>
</sec>
<sec id="sec7_2">
<title>Revisionist arguments</title>
<p>The idea that the concept of self-defence requires rethinking in the wake of September 11 is widely accepted. In light of what we now know about how far terrorists are prepared to go, there are at least four good reasons to rethink pre-emptive self-defence. It is important to stress that these four reasons provide a case for rethinking pre-emption to respond to the threat of international
<italic>terrorism.</italic>
They do not constitute a case for rethinking pre-emption in relation to
<italic>conventional</italic>
threats from states. By
<italic>conventional</italic>
threat I mean both threats of conventional war and the conventional use of WMD for deterrence and self-defence by states.</p>
<p>First, on prudential grounds, there is a good argument that prevention is better than cure. In hindsight, Clinton’s decision not to take firmer action against Osama bin Laden between 1996 and 1998 was a bad misjudgement (see
<xref ref-type="bibr" rid="ref121">Clarke 2004</xref>
: 101–204). By this logic, the norm of pre-emptive self-defence must be refashioned to place fewer costs on political leaders who wish to take earlier action against would-be terrorists. Second, whereas conventional wars are preceded by clear warnings, most obviously troop mobilisations and deployments, such clear indicators do not usually precede mass casualty terrorist attacks. It is virtually impossible for a liberal democracy to guard against terrorism at all times and in all places. There is widespread agreement, therefore, that the best way to reduce the threat of terrorism is to take the offensive and adopt a proactive strategy (e.g.
<xref ref-type="bibr" rid="ref52">Betts 2002</xref>
;
<xref ref-type="bibr" rid="ref147">David 2003</xref>
). Third, the potential for mass casualty terrorism renders a reactive strategy imprudent at best. If one accepts Vattel’s insistence that selfdefence is the sacred duty of states, a reactive strategy in the face of such a threat may even be immoral. Finally, although deterrence still has an important role to play in world politics – particularly in relation to so-called ‘rogue states’ – its ability to constrain the type of terrorism witnessed on September 11 in the short-term is limited. The challenge to rethink the concept of pre-emptive self-defence has been taken up by at least three groups.</p>
<sec id="sec7_2_1">
<title>‘New liberals’</title>
<p>‘New liberals’ argue that the world can be refashioned through law (and force) into a stable and orderly society that guarantees the rights of individuals. They insist that liberal states are more likely to resolve their disputes peacefully and through legal mechanisms (
<xref ref-type="bibr" rid="ref480">Slaughter 1995</xref>
: 503). As such, they are committed to spreading democracy, protecting democracies that are under attack from anti-democratic forces, and creating more robust forms of enforcement to strengthen international law. Some, such as Fernando Tesón (
<xref ref-type="bibr" rid="ref508">1998</xref>
: 62–3), insist that liberal states may use war against illiberal states as a means of realising this ambition, whilst others argue that the process of liberalisation should be slower and
<xref id="page_115" ref-type="page"></xref>
predominantly non-violent (
<xref ref-type="bibr" rid="ref481">Slaughter 2000</xref>
: 240). Such debates aside, the ‘new liberals’ agree that international law should be changed to make the world safer for liberal democracies.</p>
<p>The starting point for the ‘new liberal’ call to reform pre-emptive self-defence is recognition that international law is a vital tool for regulating the behaviour of states and individuals but that it must be refashioned to meet the challenges of the post-September 11 era (
<xref ref-type="bibr" rid="ref482">Slaughter 2003</xref>
). Feinstein and Slaughter (
<xref ref-type="bibr" rid="ref183">2004</xref>
) therefore suggested a new principle to guide action: ‘the duty to prevent’. The new principle, they argue, is warranted by the fact that ‘we live in a world of old rules and new threats’ (see
<xref ref-type="page" rid="page_138">p. 138</xref>
). Although the Security Council is the most appropriate forum for dealing with these new threats, they argue that the burden of proof needs to be shifted from the suspicious states to nations suspected of WMD proliferation and collusion with terrorists. In such cases, waiting for pre-emption in the traditional sense ‘is usually impractical because suspected facilities are often difficult to spot or hit’ (see
<xref ref-type="page" rid="page_147">p. 147</xref>
). They continue, ‘this is not to suggest that the use of [pre-emptive] force should be discounted as ineffective but that the most effective action is preventive’ (see
<xref ref-type="page" rid="page_147">p. 147</xref>
). Preventive action may involve the use of force, and that use of force may even be unilateral so long as the intervener attempts multilateral avenues (the UN, regional organisations) first (see
<xref ref-type="page" rid="page_148">p. 148</xref>
<xref ref-type="page" rid="page_9">9</xref>
).</p>
<p>There are a number of problems with this proposal. First, it conflates the threat of terrorism with that of WMD proliferation by states. Whilst there are good grounds for rethinking pre-emptive self-defence in response to terrorism, there is no evidence to suggest that by itself WMD proliferation by states poses a new and unusual threat. WMD programmes and states’ intentions can be monitored and when a state has the ability and intention to launch a WMD attack, the traditional doctrine of self-defence permits pre-emptive action. Second, the right of prevention it seeks to create would blur the distinction between aggression and defence. The targets of such actions, and other significant portions of global society, would undoubtedly see such ‘preventive’ wars as acts of aggression. Moreover, in a case where a state chooses to follow Feinstein and Slaughter’s path to legitimation (try the UN first, then a regional organisation and if that fails launch a unilateral attack), the failure to secure multilateral agreement would surely indicate that the rest of the world does not share the concerned states’ threat perception. As we noted earlier, to use a ‘threat’ as a justification for war, it is imperative that the threat is demonstrable. Third, a doctrine of prevention often leads to empire when potential future threats are removed and the obligations of governance fall on those who have effected ‘regime change’ (
<xref ref-type="bibr" rid="ref487">Snyder 2003</xref>
). Fourth, given the widespread consensus that preventive war is both immoral and illegal, recourse to prevention risks undermining the rule of law that the ‘new liberals’ insist is imperative in the struggle against tyranny.</p>
</sec>
<sec id="sec7_2_2">
<title>‘New realists’</title>
<p>A second school of thought, the ‘new realists’, insists that international law on self-defence is simply irrelevant and that states, particularly the US, should be
<xref id="page_116" ref-type="page"></xref>
guided by their own interests in deciding whether or not to use pre-emptive or preventive force. According to two Republican hawks, the US should not bind itself to either positive law or commonly agreed ethical rules by restricting its pre-emptive strikes to cases where there is demonstrable imminent threat. Instead, ‘where intelligence is uncertain, prudent leaders will inevitably minimize risks by erring on the side of the worst plausible assumption. And rightly so’ (
<xref ref-type="bibr" rid="ref200">Frum and Perle 2004</xref>
: 27). This assertion of America’s right to decide for itself when and where it will act pre-emptively is based on a three-pronged critique of the rules governing self-defence.</p>
<p>The first prong is a denunciation of Article 51 of the UN Charter. ‘New realists’ argue that the Article 51 regime is redundant because it does not permit the use of force against those who aid and abet terrorists; it rules out forcible ‘regime change’ in states that provide safe havens for terrorists; and does not permit a right of pre-emptive or preventive self-defence (
<xref ref-type="bibr" rid="ref210">Glennon 2002</xref>
). The second angle of attack is a rejection of the Security Council’s relevance and its ability to protect states from attack. ‘New realists’ point to the Security Council’s ‘paralysis’ during the Cold War and its ‘failure’ to sanction military force in Kosovo (1999) or Iraq (2003) as proof of its inability to protect international peace and security (
<xref ref-type="bibr" rid="ref211">Glennon 2003</xref>
;
<xref ref-type="bibr" rid="ref559">Yoo 2004</xref>
: 740). The third line of argument is to insist that the UN Charter’s rules regulating the use of force have been broken so many times that the rules themselves are invalid. As Glennon (
<xref ref-type="bibr" rid="ref210">2002</xref>
: 540) put it in an oft-quoted passage, ‘between 1945 and 1999, two-thirds of the members of the United Nations – 126 out of 189 – fought 291 interstate conflicts in which over 22 million people were killed’. The ‘upshot’ of all this, Glennon concludes, is that the Charter’s use of force regime has ‘all but collapsed’ and that the Just War alternatives are little more than ‘archaic notions of universal truth’ (2003: 19). As a result, the traditional view of self-defence outlined in the first part of this chapter should not act as a guide to responsible state behaviour. Instead, the US should make its own decisions about how best to defend itself and the US administration need only justify itself to the American public.</p>
<p>‘New realism’ is problematic for a number of reasons. First, the claim that the UN Charter’s rules on the use of force are defunct is not credible. Rule-breaking only has the effect of altering the law if the rule-breakers justify their actions by articulating a new principle and other states validate that justification. In the cases of NATO’s intervention in Kosovo and the US-led invasion of Iraq did states did not consistently claim a new right (in the Kosovo case, only Belgium and the UK levelled legal defences of their actions; in the case of Iraq the legal justification insisted that the invasion was authorised by the Security Council) and there is certainly no indication that other states recognised a change in the law (
<xref ref-type="bibr" rid="ref96">Byers 2003a</xref>
). Second, Glennon’s claim that the Security Council is irrelevant and ineffectual is not supported by the Iraq case. The Council was the hub of the debate about using force against Iraq. Third, ‘new realism’ fails the reciprocity test and offers a self-fulfilling prophecy instead. It is highly unlikely that any US government would tolerate others having the freedom of manoeuvre that the ‘new realists’ claim for the US. Moreover, if other states were to behave in the way
<xref id="page_117" ref-type="page"></xref>
they prescribe, that would almost certainly bring about the collapse of the legal and moral constraints on recourse to force. Finally, the ‘new realists’ ignore the warnings of earlier realists such as E.H. Carr and Hans Morgenthau by erroneously equating US interests with universal good and suggesting that what is good for the US must be good for the whole world.</p>
</sec>
<sec id="sec7_2_3">
<title>The national security strategy</title>
<p>In its 2002
<italic>Strategy,</italic>
the US government offered a third avenue for rethinking pre-emptive self-defence. It is predicated on the view, put forward by former Defence Secretary Donald Rumsfeld (
<xref ref-type="bibr" rid="ref443">2001</xref>
) that, ‘the problem with terrorism is that there is no way to defend against the terrorists at every place and every time against every conceivable technique. Therefore, the only way to deal with the terrorist network is to take the battle to them’. The
<italic>Strategy</italic>
insisted that:</p>
<disp-quote>
<p>[G]iven the goals of rogue states and terrorists, the United States can no longer solely rely on a reactive posture as we have in the past. The inability to deter a potential attacker, the immediacy of today’s threat, and the magnitude of potential harm that could be caused by our adversaries’ choice of weapons, do not permit that option. We cannot let our enemies strike first. (see
<xref ref-type="page" rid="page_15">p. 15</xref>
)</p>
</disp-quote>
<p>Unlike the ‘new liberals’ and ‘new realists’, the
<italic>Strategy</italic>
advocated neither a radical reformulation of the law nor rule-breaking behaviour. Instead, it situated the new doctrine firmly within customary international law and argued for the revision of one of the three elements of Webster’s test outlined during the
<italic>Caroline</italic>
affair: imminence. Thus, it insisted that, ‘for centuries, international law recognized that nations need not suffer an attack before they can lawfully take action to defend themselves’ (see
<xref ref-type="page" rid="page_15">p. 15</xref>
). However, it argued that the concept of ‘imminent threat’ required reform to permit action ‘even if uncertainty remains as to the time and place of the enemy’s attack. To forestall or prevent such hostile acts by our adversaries, the United States will, if necessary, act pre-emptively’ (see
<xref ref-type="page" rid="page_15">p. 15</xref>
). Such an approach was justified because the US could not wait until a terrorist threat was ‘fully-formed’ (see
<xref ref-type="bibr" rid="ref96">Byers 2003a</xref>
: 11).</p>
<p>The
<italic>Strategy</italic>
has been widely criticised for stretching the concept of ‘armed attack’ to such an extent that it loses any legal meaning and for being deliberately misleading in labelling what is in essence a strategy of
<italic>prevention</italic>
as pre-emption (
<xref ref-type="bibr" rid="ref287">Johnstone 2004</xref>
: 832). The problem though is not so much what the
<italic>Strategy</italic>
itself says but with the Bush administration’s rhetoric and actions. Indeed, a few states including Russia and India responded favourably to the document (
<xref ref-type="bibr" rid="ref98">Byers 2004</xref>
: 541). There is an important disjuncture between the
<italic>Strategy</italic>
and US rhetoric (see
<xref ref-type="bibr" rid="ref99">Byers 2005</xref>
: 72–83). Recall that the
<italic>Strategy</italic>
only permits doubt about the time and place of the attack. According to this document, the enemy target must still be shown to have both the
<italic>intent</italic>
and
<italic>means</italic>
to attack. In practice, Bush’s rhetoric has been much less nuanced. In a speech to the German parliament in May 2002, Bush argued that the US would be prepared to use force against ‘rogues’, whether
<xref id="page_118" ref-type="page"></xref>
or not those rogues had displayed a specific intent to attack the US or its allies and
<italic>before</italic>
they acquired the means of doing so (in
<xref ref-type="bibr" rid="ref232">Halper and Clarke 2004</xref>
: 140). A month later, he told a West Point graduation ceremony that ‘we must take the battle to the enemy and confront the worst threats before they emerge’ telling the graduates to prepare for ‘pre-emptive action’ (
<xref ref-type="bibr" rid="ref83">Bush 2002a</xref>
). Thus, in its public statements, the US administration certainly implied that it supports a right of preventive war, not the more limited right of expanded pre-emption claimed in the
<italic>Strategy.</italic>
According to the rhetoric, a potential target need possess neither an intention nor the means of attacking the US and its allies.</p>
<p>Furthermore, the Bush administration’s efforts to justify the 2003 invasion of Iraq as an act of pre-emptive self-defence has helped to solidify the view that the US has actually adopted a strategy of prevention. However, the US administration was clearly divided on the issue. When asked whether Iraq was an example of the
<italic>Strategy</italic>
in practice, Secretary of State Colin Powell emphatically replied ‘no, no, no’ (
<xref ref-type="bibr" rid="ref544">Weisman 2003</xref>
: B1). Instead, Powell preferred to argue that the war was justifiable because it was authorised by UN Security Council resolutions. However, Vice-President Dick Cheney, consistently justified the war in terms of the need to
<italic>prevent</italic>
Iraq acquiring WMD and since the war Bush himself has fallen back on the argument that ‘America is safer’ as a result of it (see
<xref ref-type="bibr" rid="ref138">Daalder and Lindsay 2003</xref>
: 127).</p>
<p>Thus, although the
<italic>Strategy</italic>
itself offers a reasonable starting point for rethinking the concept of pre-emptive self-defence, it is important to bear in mind that in both its rhetoric and practice the Bush administration has deviated considerably from it and has equated prevention with pre-emption.</p>
</sec>
</sec>
<sec id="sec7_3">
<title>A new right of pre-emption?</title>
<p>How, then, should pre-emptive self-defence be reconceptualised to meet the threat of terrorism? There are two important caveats to begin with. First, as with every type of war, those engaging in pre-emptive self-defence must satisfy the
<italic>jus ad bellum</italic>
criteria. What is offered here is a framework for assessing whether claims of pre-emptive self-defence count as a ‘just cause’ in particular circumstances. If the other criteria are not satisfied, especially proportionality of ends, the resort to force cannot be justified. Second, the expanded concept of pre-emptive self-defence offered here only applies to the threat of terrorism (be that from states or non-state actors). If the nature of the threat is conventional, the
<italic>Caroline</italic>
criteria continue to apply.</p>
<p>As I noted earlier, the two central concepts of pre-emptive self-defence are ‘imminence’ and ‘necessity’. According to the
<italic>Strategy,</italic>
it is only the concept of ‘imminence’ that needs rethinking. Traditionally, both the Just War tradition and positive international law have defined ‘imminence’ in temporal terms. A threat is imminent only immediately before the hammer is about to fall. An attack is imminent when the enemy has displayed an intention to attack, has armed itself, has deployed its forces into an offensive formation and is about to strike. The problem, of course, is that if the planned attack is a mass casualty terrorist attack, it
<xref id="page_119" ref-type="page"></xref>
is usually too late to respond at this point. This is an unreasonable expectation. We cannot overlook the fact that the existence of such a tight definition of imminence derived from the
<italic>Caroline</italic>
case may be due, at least in part, to the fact that the two parties to the dispute were liberal states with reasonably good relations (
<xref ref-type="bibr" rid="ref489">Sofaer 2003</xref>
: 219). In cases where mutual mistrust is considerably higher, and doubt and mistrust is seldom higher than when confronting terrorism, a wider concept of imminence ought to be conceded to provide states with realistic means of preventing terror attacks against their citizens.</p>
<p>The need for a more flexible concept of imminence has been recognised by the ICJ. In 1997, the Court ruled that:</p>
<disp-quote>
<p>‘Imminence’ is synonymous with ‘immediacy’ or ‘proximity’ and goes far beyond the concept of ‘possibility’ … the ‘extremely grave and imminent peril’ must ‘have been a threat to the interest at the time’. That does not exclude, in the view of the Court, that a ‘peril’ appearing in the long term might be held to be ‘imminent’ as soon as it is established, at the relevant point in time, that the realization of that peril, however far off it might be, is not thereby any less certain and inevitable.
<sup>
<xref ref-type="fn" rid="fn7_6">6</xref>
</sup>
</p>
</disp-quote>
<p>In other words, the ICJ recognised that an imminent threat could be temporally distant yet nevertheless imminent depending on the likelihood of realisation and the gravity of the peril. In situations where a state can demonstrate that an actor has the intention and means to launch terrorist attacks against it or its allies, it is reasonable to suggest that the ‘imminence’ test is satisfied. The
<italic>demonstrability</italic>
of the intent and the means is critical. It is not enough for a government to convince itself of the threat. It must present reliable and accurate evidence both to its own citizens, other states and global civil society. Others will evaluate the evidence to decide whether, on a case-by-case basis, the pre-emptive attack was legitimate by reference to the demonstrable gravity of the threat, the known intentions of the potential terrorists and their ability to satisfy those intentions. The more actors that validate the action, the more legitimate it can be considered. In some cases it is not always appropriate for a state to reveal what it knows
<italic>before</italic>
it launches a pre-emptive attack, because doing so risks informing the terrorists of what it knows and losing the opportunity to strike them, but the burden of proof falls squarely on those that use pre-emptive force to demonstrate its case either before or immediately afterwards.</p>
<p>The second criterion that must be satisfied is necessity. According to Webster, necessity required that the threat be ‘instant, overwhelming, leaving no choice of means and no moment for deliberation’. State practice itself has recognised that this sets the bar too high. Neither Israel’s 1967 attack on Egypt nor the 2001 invasion of Afghanistan by the US and its allies would satisfy these criteria because of the possibility of deliberation. Nevertheless, international society legitimated both instances to a greater or lesser extent. Writing in 1961, McDougal and Feliciano (
<xref ref-type="bibr" rid="ref344">1961</xref>
: 231) offered a more appropriate understanding of necessity. For them, the necessity criterion is satisfied when the degree of imminence is ‘so high
<xref id="page_120" ref-type="page"></xref>
as to preclude effective resort by the intended victim to non-violent modalities of response’ a view supported by Bowett (
<xref ref-type="bibr" rid="ref67">1958</xref>
: 53) who insisted that the necessity requirement was fulfilled when there were no reasonable alternative means of protection. Pre-emptive self-defence is warranted when the use of force is the only reasonable way in which the threat can be averted. It does not require that all other means be exhausted first, but we are entitled to ask whether those that use pre-emptive force had reasonable alternatives. For instance, in most though not all instances of pre-emptive attacks against terrorists we might expect the state using force to explore options with the state whose territory it is using force in beforehand. At very least, we would expect a government using pre-emptive force in this way to be able to demonstrate that it seriously considered other, non-violent, options and for it to explain its reasons for not choosing these other courses of action.</p>
<p>This leaves the thorny question of whether it is only the intended victim that enjoys a right to act pre-emptively? I suggested that it was not necessary to know with certainty either the target or time of the intended terrorist attack. This approach therefore permits states that are not the intended target to use force pre-emptively if the twin conditions of imminence and necessity, as well as the other
<italic>jus ad bellum</italic>
conditions, are satisfied. This expansion of the right can be justified on three grounds. First, such acts could be interpreted as collective self-defence, which is expressly permitted by the UN Charter. Unless the actual intended target is a suicidal state, we can safely presume that it would welcome a pre-emptive strike by a third party that removed an impending threat. Second, terrorism can be viewed as a universal crime with a global jurisdiction. As such, states have a moral right to pre-empt terrorism globally. Finally, mass casualty terrorism represents such an affront to natural law that it grants states a moral right to use force to pre-empt it everywhere.</p>
<p>Although this expanded concept of pre-emption helps to meet the strategic challenge posed by terrorism, it creates three potential problems that positive law attempted to overcome by setting such a high threshold. The first is the problem of abuse. Making the concept of pre-emptive self-defence more flexible blurs important moral distinctions and creates avenues for political leaders to justify aggressive wars in terms of pre-emption. Henry Kissinger (
<italic>Financial Times,</italic>
27 September 2002), for example, observed in relation to the
<italic>Strategy</italic>
that ‘it cannot be either in American national interests or the world’s interest to develop principles that grant every nation an unfettered right of pre-emption against its own definition of threats to its security’. The principal barrier to abuse is accountability. Governments are obliged to demonstrate their case to their own citizens, other states and global civil society.</p>
<p>The second problem is that by adding further ambiguity to the application of the right of pre-emptive self-defence this revised doctrine places greater emphasis on the factual elements of each case (see
<xref ref-type="bibr" rid="ref96">Byers 2003a</xref>
: 182). Assessments of factual evidence are never free of values and politics and the emphasis on facts gives the powerful an opportunity to sway others by bringing financial, military and political pressure to bear. As Byers argues, this means that ‘it is more likely that
<xref id="page_121" ref-type="page"></xref>
the criterion of imminence would be regarded satisfied when the United States wished to act militarily than when others wished to do the same’ (see
<xref ref-type="page" rid="page_182">p. 182</xref>
). It is certainly the case that weak states, and states that are out of favour in the West, would have a much more difficult time persuading the most powerful members of international society of their cause than the US and its allies. That is not to say that the US claims will always be generally accepted, as the Iraq case demonstrates. Moreover, as with the ethics of war in general, the powerful have much more room for manoeuvre than the weak. Rule breaking always imposes costs, but the powerful are better able to bear those costs than the weak, at least in the short-term.</p>
<p>The third problem is that a more permissive doctrine of self-defence may significantly increase the potential for error (
<xref ref-type="bibr" rid="ref134">Crawford 2003a</xref>
: 35). In a more permissive normative context states may be encouraged to use force precipitately based on flawed intelligence or misperceptions about threat. There are no sure ways of eliminating this problem. It stands to reason that the earlier a state acts to pre-empt a perceived threat the more likely the chances for error and misperception, and vice-versa: a state that waits longer will be more certain of its case but risks waiting too long. The problem can be moderated but not resolved by the requirement of
<italic>demonstrability.</italic>
The more perspectives that are brought to bear on a particular problem, the less likely the chances of error and misperception. A government is required to be sure of its case when it acts pre-emptively and it must demonstrate that it has taken every reasonable step to verify its evidence. If a state fails to demonstrate due care, it acts unjustly.</p>
<p>It is therefore important to limit this expanded right to pre-emptive self-defence. This expanded right is limited to cases where the anticipated threat is terrorist. There are no good grounds for reforming the traditional concept of self-defence in response to perceived conventional threats from so-called ‘rogue states’. To claim the expanded right, a state must satisfy the
<italic>jus ad bellum</italic>
criterion plus the revised requirements of imminence and necessity outlined above. On top of all that, a state claiming this right must make itself accountable by presenting its case for others to evaluate either before or immediately after the pre-emptive attack and it must be able to demonstrate that it has shown due care in order to reduce the likelihood of error or misperception.</p>
<p>The expanded right of pre-emption poses only two tests: imminence and necessity. To satisfy the first test, those invoking the expanded right must demonstrate that a group or state has both the intention and means to conduct terrorist attacks against it or its allies. However, unlike the traditional concept, under the expanded concept it is not necessary to know with certainty precisely when or where the terrorists will strike. To satisfy the second, it must demonstrate that the use of force is necessary: that is, it is the only way that the threat can be addressed.</p>
</sec>
<sec id="sec7_4">
<title>
<xref id="page_122" ref-type="page"></xref>
Acknowledgements</title>
<p>This chapter draws its argument and some of its text from (
<xref ref-type="bibr" rid="ref42">Bellamy 2006</xref>
). Thanks to Richard Devetak, Roland Bleiker, Nick Wheeler, Paul D. Williams and especially Sara E. Davies for helpful comments and suggestions on earlier drafts.</p>
</sec>
</body>
<back>
<notes>
<title>Notes</title>
<fn-group>
<fn id="fn7_1">
<label>1</label>
<p>
<italic>Case Concerning Military and Paramilitary Activities in and against Nicaragua</italic>
(Merits) [1986], ICJ Report, p. 103.</p>
</fn>
<fn id="fn7_2">
<label>2</label>
<p>
<italic>Case Concerning Military and Paramilitary Activities in and against Nicaragua</italic>
(Merits) [1986], ICJ Report, p. 14.</p>
</fn>
<fn id="fn7_3">
<label>3</label>
<p>The following discussion draws on (
<xref ref-type="bibr" rid="ref496">Stevens 2004</xref>
).</p>
</fn>
<fn id="fn7_4">
<label>4</label>
<p>
<italic>The Caroline.</italic>
Letter from Mr Webster to Mr Fox (24 April 1841),
<italic>British and Foreign State Papers,</italic>
1129, 1138.</p>
</fn>
<fn id="fn7_5">
<label>5</label>
<p>
<italic>The Caroline.</italic>
Letter from Mr Webster to Mr Fox (24 April 1841),
<italic>British and Foreign State Papers,</italic>
1129, 1138.</p>
</fn>
<fn id="fn7_6">
<label>6</label>
<p>
<italic>Case concerning the Gabcikovo–Nagymaros Project (Hungary vs. Slovakia)</italic>
, 1997.</p>
</fn>
</fn-group>
</notes>
</back>
</book-part>
</body>
</book-part>
<book-part book-part-type="part" book-part-number="III" id="partIII">
<book-part-meta>
<title-group>
<title>
<xref id="page_123" ref-type="page"></xref>
Fighting terror
<xref id="page_124" ref-type="page"></xref>
</title>
</title-group>
</book-part-meta>
<body>
<book-part book-part-type="chapter" book-part-number="8" id="chapter8">
<book-part-meta>
<title-group>
<title>
<xref id="page_125" ref-type="page"></xref>
Failures, rogues and terrorists</title>
<subtitle>States of exception and the North/South divide</subtitle>
<alt-title alt-title-type="running-head-verso">Failures, rogues and terrorists</alt-title>
<alt-title alt-title-type="running-head-recto">Richard Devetak</alt-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<given-names>Richard</given-names>
<surname>Devetak</surname>
</name>
</contrib>
</contrib-group>
</book-part-meta>
<body>
<p>The foreign policy and security discourses of the North have increasingly come to focus on two types of states: failed and rogue states. Failed states signify the descent into lawless violence, a kind of post-sovereign nightmare within the territorial boundaries of an erstwhile state. Rogue states, by contrast, denote the wilful defiance by a sovereign state of international law’s rules and norms. While the former type of state calls for international assistance, the latter demands punishment. Failed and rogue states thus represent two different problems and two different responses. But for all the differences exhibited by the two types of state, there are some significant commonalities in the way the North views these states, largely because they are identified with the South. This chapter seeks to elaborate some of the distinctive features that characterize how the North views the South.</p>
<p>I begin by offering a sketch of changes introduced by the Cold War’s close. In particular, I want to show how the North began to see the South essentially as a
<italic>distant problem.</italic>
Let me dwell on that emphasised noun and accompanying adjective for just a moment. A ‘problem’ because the South came to represent enduring social, economic and political crises: from chronic famine and massive refugee flows to ‘new wars’ and ‘complex emergencies’. If the North represented a model of social, economic and political development, the South came to embody the continuing lack of all the North’s virtues and achievements. ‘Distant’ in the sense that the North felt safely removed from the violence associated with the South, spatially and temporally. I will elaborate this point below. Next, I will briefly comment on how the September 11 terrorist attacks called for a rethinking of this conception of the North–South relationship. To put it bluntly, no longer a distant problem, the South became the North’s problem. I’m even tempted to say a problem ‘internal’ to the North.</p>
<p>The remainder of the chapter will elaborate some of the political rationalities and practices that govern the North’s conception and interaction with the South. This will revolve primarily around the North’s dealings with rogue and failed states. I shall use some ideas from Italian philosopher, Giorgio Agamben, to explain how the North’s security practices have increasingly revolved around states of exception which cast the South into a kind of ‘no-man’s land’ beyond the protection of the international legal order. In essence, I argue, the North has
<xref id="page_126" ref-type="page"></xref>
come to see the South as a direct and immediate source of threats to its own well-being, though without acknowledging its complicity in the South’s problems or acknowledging how it too has come to exhibit some of the traits it condemns in rogues and failures. In particular, the North has come to associate the South with terrorism, of both state and non-state varieties. I think that is the reason why the North no longer sees the South as a distant problem, but a pressing and adjacent one, requiring either forcible intervention (in the case of rogues) or governance assistance (in the case of failures).</p>
<sec id="sec8_1">
<title>Changes in strategic cartography: from the end of the Cold War to September 11</title>
<p>The end of the Cold War and the September 11 terrorist attacks are obvious markers in the transformation of the international security agenda as conceived by states of the North. I think we need to understand the post-Cold War changes before grafting the post-September 11 changes onto them. In this section I will provide a brief overview of these changes with the intention of outlining the conditions that govern how the North views the South. The North’s image of the South is politically important because it shapes how the North interacts with and acts towards the South. It also helps reinforce the idea that the planet can be neatly divided between distinct zones of war and peace.</p>
<p>To outline the shifting contours of international security I will draw attention to the changing strategic cartographies that reshape how the North views the South. While political upheavals and events may widen or narrow the physical or geographical distance between North and South, the North’s perception of its civilizational distance ahead of the South remains unchanged. The point will be to show that the changing cartography modifies the North’s strategic vision, changing the way it perceives and responds to threats, but all the while retaining enduring assumptions about its civilizational superiority.</p>
<sec id="sec8_1_1">
<title>Widening the North–South gap: after the Cold War’s collapse</title>
<p>An exhaustive description of the post-Cold War security agenda is out of the question here. But we can briefly point to several key factors that characterized post-Cold War geopolitics. First, the strategic rivalry that defined the Cold War came to an end. Between the breaching of the Berlin Wall in late 1989 and the collapse of the Soviet Union in 1991, the US was deprived of its enemy, thereby dissolving the bipolar system. Second, the ‘Third World’, as the South was previously known, declined in strategic significance as great powers disengaged (
<xref ref-type="bibr" rid="ref529">Van Evera 1990</xref>
). Capitals in the North could dispense with containment in the South now that the Soviet Union was dead. Third, perceptions grew of the USA’s hegemony and invulnerability. Fourth, in the developed world of the North, while geopolitics never disappeared, it certainly appeared according to many liberals to diminish in importance
<italic>vis-à-vis</italic>
‘geo-economics’. Fifth, in the underdeveloped world of the South the phenomena of ‘complex emergencies’ and ‘new wars’ multiplied.</p>
<p>
<xref id="page_127" ref-type="page"></xref>
In this context, and with the implosion of the East-West conflict, commentators and scholars increasingly came to view the world split between a pacified core and a conflict-riddled periphery. James Goldgeier and Michael McFaul (
<xref ref-type="bibr" rid="ref215">1992</xref>
), for example, tell a ‘tale of two worlds’. In one world the major powers converge around an agreed set of norms, by contrast, in the other, no such consensus exists or is foreseeable and violent conflict is prevalent.</p>
<p>Differences between states in the core (or North) and periphery (or South) were said to revolve around the goals and the behaviour of states. Goldgeier and McFaul (
<xref ref-type="bibr" rid="ref215">1992</xref>
) asserted that core states would not need to remain ‘essentially war making machines’, to use Robert Gilpin’s words. They could put wealth ahead of power in pursuit of the national interest. By contrast, peripheral states would persist in their preference for power over wealth. To put it differently, geopolitics would retain its primacy over geo-economics. In the core, realist theory was said to have lost its power as an explanation because Northern states were thought to have moved beyond war. In the periphery, by contrast, where the security dilemma was still central, realism was said to be as powerful as ever because wars continued unabated.</p>
<p>By the late 1990s, however, even the continuing violence in the periphery was thought to be beyond realism’s account. Mary Kaldor (
<xref ref-type="bibr" rid="ref293">1999</xref>
) made a strong case for seeing the violence in the periphery as novel and a departure from the violent conflicts associated with the Cold War. She identified several characteristics of the ‘new wars’ which, again, I simply list. First, conflicts seemed to be bereft of the decisive battle between state military forces that Clausewitz envisaged. Second, and again allegedly outside Clausewitz’s imaginary, war declarations and peace treaties were said to be absent. Third, many of these conflicts seemed to involve the deliberate targeting of civilians. Practices of ethnic cleansing and genocide were common across wars in the Balkans and Africa. Fourth, the rise of non-state violent actors such as mercenaries, warlords and terrorists, seemed to augur the waning of the state’s monopoly over the instruments of violence. Fifth, these ‘new wars’ often produced humanitarian catastrophes that, conveyed via global news media, shocked the consciences of humankind. Sixth, the cruelty and inhumanity in these ‘new wars’ sparked calls for humanitarian intervention.
<sup>
<xref ref-type="fn" rid="fn8_1">1</xref>
</sup>
</p>
<p>The purpose of Kaldor’s argument was to mark a temporal break between the Cold War and post-Cold War period on the basis of the transformation of organized violence. Interestingly, this ‘new wars’ discourse may be seen to reinforce the sense of distance between North and South. Even humanitarian intervention could be interpreted as a means by which the North reaffirmed the gap between itself and the South. Dispatching troops to far away places would help confirm the image of an orderly, civilized North pacifying a chronically underdeveloped and violent South.</p>
<p>There are three points I wish to make about the post-Cold War discourses. First, that as Anne McClintock (
<xref ref-type="bibr" rid="ref341">1995</xref>
: 40) observes in her analysis of nineteenth-century imperialism, ‘Geographical difference across
<italic>space</italic>
is figured as a historical difference across
<italic>time’.</italic>
The zones of war/chaos are figured as ‘anachronistic spaces’, zones which are ‘perpetually out of time in modernity, marooned and
<xref id="page_128" ref-type="page"></xref>
historically abandoned’ (
<xref ref-type="bibr" rid="ref341">McClintock 1995</xref>
: 41). In Fukuyama’s Hegelian terms, they remain ‘mired in history’, as opposed to the West/North which has reached history’s end. The point is, spatial distance is converted into temporal progress. Second, the North perceives itself as essentially a spectator watching tragedies unfold in the South’s zones of chaos. Though it occasionally participates in the South’s politics, it does so through selective humanitarian intervention only, thus preserving its sense of distance, and of course its sense of moral and military superiority. Third, the ‘tale of two worlds’ narrative allowed the North to reproduce a dual pattern of international order whose historical purpose, as Edward Keene (
<xref ref-type="bibr" rid="ref301">2002</xref>
) brilliantly demonstrates, was simultaneously to promote co-existence and toleration among legal equals in Europe, and to promote civilization in the extra-European world by introducing or imposing European norms and institutions.</p>
<p>All of this has helped to create a sense of distance between the North and South – both physical and civilizational. The North assumed itself to be secure against the South’s problems, safe from the dangers of its anachronism. The strategic and economic imperatives of the North were thought to be unconnected to political dynamics in the South. The South’s problems, often viewed as chronic – think for example of enduring ‘Afro-pessimism’ – were relegated to the bottom of the security agenda. The North’s civilizational ascendancy was thought to reinforce its physical separation, making its prosperity and security safe from the South’s privation and insecurity.</p>
</sec>
<sec id="sec8_1_2">
<title>Collapsing the North–South gap: after September 11</title>
<p>The September 11 terrorist attacks however caused a dramatic upheaval of this assumption. The world’s strongest military and economic power was struck in its greatest city, New York, and in its capital, Washington. The US was, it turned out, more vulnerable than at first thought. Most importantly for my purposes here, the strategic cartography was profoundly re-ordered. In words taken from ‘The Failed States Index’, ‘Failed states have made a remarkable odyssey from the periphery to the very center of global politics’ (
<xref ref-type="bibr" rid="ref191">Foreign Policy and Fund for Peace 2005</xref>
: 57). The distance between North and South has narrowed considerably since that day in September 2001; the US, and the North more generally, became mired in history, wounded by the South’s violent anachronism.</p>
<p>This collapsing of distance is crucial in understanding why the ‘failed states’ and ‘rogue states’ discourses have become so central to defence and foreign policy discussions today in the North. As Michael Ignatieff (
<xref ref-type="bibr" rid="ref264">2003</xref>
: 21) remarks, ‘Terror has collapsed distance, and with this collapse has come a sharpened focus in imperial capitals on the necessity of bringing order to the barbarian zones’. If previously the North was content to neglect the South, the rise of global terrorism seems to have provoked a rethink. Globalization makes it possible for political violence to overcome distance, impacting in locations far removed from the origin (see Devetak and Hughes forthcoming). In the words of USAID’s
<italic>Fragile States Strategy</italic>
(
<xref ref-type="bibr" rid="ref527">2005</xref>
: 1), ‘the events of September 11, 2001, profoundly demonstrated the global reach of state failure and focused attention on their drivers and products
<xref id="page_129" ref-type="page"></xref>
– weak governance, poverty, and violent conflict’. And it is not just aid agencies making this argument. The White House in its 2002 and 2006 National Security Strategy papers emphasizes the dangerous spillover effects generated by failing or failed states. ‘Regional conflicts do not stay isolated for long and often spread or devolve into humanitarian tragedy or anarchy’, the 2006 NSS reports. This is why it asserts that ‘even if the United States does not have an direct stake in a particular conflict, [its] interests are likely to be affected over time’ (
<xref ref-type="bibr" rid="ref382">NSC 2006</xref>
: 14).</p>
<p>While the North could rest content with occasional and selective humanitarian interventions into the South during the 1990s, western capitals, especially in Washington, London and Canberra, came to the conclusion after September 11 that their own security could no longer be abstracted from the South. Under conditions of globalization geographical distance presented less of an obstacle to those intent on harming westerners, western interests or western cities. The North was no longer an external observer or spectator of events in the South – instead, it became a participant. We might say that the North was drawn into the South’s orbit, perhaps even became part of the South insofar as problems associated with the South now penetrate the North. But, as we shall see, this is a reality that the North seeks to resist vigorously. Its response to September 11 has been to try and restore as much distance between itself and the South as possible through two particular strategies that I outline below. For the moment, however, I simply wish to identify one of the key functions performed by this cartography, which is to spatialize the sources of violence and, in particular, terrorism. The flipside of this spatialization of violence is the identification of civilization with the North. It is for precisely this point that President Bush (
<xref ref-type="bibr" rid="ref82">2001</xref>
speech) repeatedly equates the ‘war on terror’ with ‘a war to save civilization’.</p>
<p>Many post-Cold War analyses of international relations, as we have noted, divided the world into zones of peace and war, a division that was intended to coincide with the distinction between liberal and non-liberal states. Liberal states resided in the North, whilst the South’s zones of chaos are coterminous for the most part with non-liberal states. Liberal theorists such as Anne-Marie Slaughter (
<xref ref-type="bibr" rid="ref480">1995</xref>
) believe that liberal theories actually demand discrimination between states based on their liberal democratic credentials. ‘The most distinctive aspect of Liberal international relations theory’, she says, ‘is that it permits, indeed mandates, a distinction between types of states, based on their domestic political structure and ideology’ (1995: 504).</p>
<p>The zones of chaos comprise at least two types of states: failed and rogue. In the following section I want to focus on the ways that liberal and neo-conservative discourses of international relations tend to identify the sources of terrorism with failed and rogue states in such a way that the North’s preferred strategic cartography and the moral assumptions it entails remain fundamentally unaltered. As we shall see, the ‘failed states’ and ‘rogue states’ discourses are intended to reinforce distinctions between the ‘civilized’ and the ‘barbaric’. However, the intentions are ultimately outflanked by the contradictions between ideals and reality. The North’s credentials as the repository of civilization, liberalism and even democracy are arguably undermined by the foreign policy strategies it adopts.</p>
</sec>
</sec>
<sec id="sec8_2">
<title>
<xref id="page_130" ref-type="page"></xref>
States of exception: from Schmitt to Agamben</title>
<p>In this section I want to introduce some of Giorgio Agamben’s key ideas in
<italic>Homo Sacer</italic>
(
<xref ref-type="bibr" rid="ref7">1998</xref>
) and
<italic>State of Exception</italic>
(
<xref ref-type="bibr" rid="ref8">2005</xref>
). I cannot do justice to the historical richness and theoretical complexity of his arguments here, but I do want to sketch some of the ways his thought may be turned to an analysis of rogue and failed states. In short, I suggest that Agamben’s writings can help us see how the North’s ‘war on terror’ has established spaces of exception where the North can subjectively apply law and violence to states it deems rogue or failing.</p>
<p>To understand Agamben’s argument, however, we must first revisit Carl Schmitt’s argument about sovereignty and the political. For Schmitt, sovereignty and the political are inseparable; neither can be understood independently of the other. Schmitt (1996: 26), it should be recalled, believed that the essence of politics lies in the fundamental distinction between friend and enemy. It defines the political, Schmitt thought, in the same way that right and wrong define law, and beautiful and ugly define aesthetics. The ‘intense and extreme antagonism’ (
<xref ref-type="bibr" rid="ref458">Schmitt 1996</xref>
: 29) that interposes itself between groups, making violent confrontation an ever-present possibility between friend and enemy, makes politics what it is, to Schmitt’s mind.</p>
<p>Schmitt (
<xref ref-type="bibr" rid="ref456">1985</xref>
: 5) argued that ‘Sovereign is he who decides on the exception’.
<sup>
<xref ref-type="fn" rid="fn8_2">2</xref>
</sup>
Sovereignty denotes the power and authority to make ultimate political decisions and to declare a state of exception, that is, suspend the normal workings of the constitution. A few words on the exception are worthwhile here. A state of exception refers to situations in which a government responds to a crisis or emergency by temporarily suspending the normal legal order. Most constitutions provide governments with the power to declare a state of exception so as to defeat a threat faced by the state. The purpose of this authority, as Ferejohn and Pasquino (
<xref ref-type="bibr" rid="ref184">2004</xref>
: 210) explain, is to preserve the state and its constitutional or legal order. Such a suspension is meant to be exceptional and provisional; that is, it is only meant to be invoked when the state faces an existential threat, and normalcy is meant to be restored as soon as the threat disappears. Agamben (
<xref ref-type="bibr" rid="ref8">2005</xref>
: 1) believes states of exception to be paradoxical in that they are ‘juridical measures that cannot be understood in legal terms’; that is to say, they are the result of a
<italic>political</italic>
decision to suspend the normal legal order.</p>
<p>The purpose behind suspending the law is, as counter-intuitively as it may sound, to conserve the state in the face of a crisis or threat so severe that it imperils the state’s continued existence. ‘What characterizes an exception’, says Schmitt (
<xref ref-type="bibr" rid="ref456">1985</xref>
: 12), ‘is principally unlimited authority, which means the suspension of the entire existing order’. Political theorist, Clinton Rossiter (
<xref ref-type="bibr" rid="ref440">1949</xref>
), made a similar case from mid-twentieth century USA. In fact, he defended what he calls ‘constitutional dictatorship’ as the most effective and legitimate, albeit temporary, response to a case of existential peril. Returning to the German jurist, Schmitt’s thought operates around a distinction between the norm and the exception. In normal situations the state’s legal order can function on the basis of norms. But in times of emergency, exceptional measures are required; measures that may be
<xref id="page_131" ref-type="page"></xref>
outside the powers normally granted to the sovereign by the constitution.
<sup>
<xref ref-type="fn" rid="fn8_3">3</xref>
</sup>
The sovereign suspends the law in the exception because the normal application of the law is inadequate; because, as Schmitt (
<xref ref-type="bibr" rid="ref456">1985</xref>
: 13) says, ‘[t]here exists no norm that is applicable to chaos’. To Schmitt’s way of thinking, that would be like trying to regulate the ‘unregulatable’. It would be futile at best, dangerous at worst, because it would put the state’s existence at risk. That is why he counterposes his view to Kant’s liberal constitutionalism which, he thinks, tries to regulate the exception (
<xref ref-type="bibr" rid="ref456">Schmitt 1985</xref>
: 14), and in so doing fails to meet the threat.</p>
<p>Agamben makes two main departures from Schmitt. First, he argues, contra Schmitt, that the key distinction in Western political metaphysics is not between friend and enemy, but between ‘bare life’ and political life. Indeed, Agamben (
<xref ref-type="bibr" rid="ref7">1998</xref>
: 7) avers, the originary exclusion of bare life is what constitutes the political. Aristotle and the classical Greek thinkers distinguished between
<italic>zoē</italic>
and
<italic>bios,</italic>
natural and political life. Natural life, for the Greeks, was outside or excluded from the
<italic>polis.</italic>
The politically qualified life was opposed to and elevated above the simple biological fact of living. The political life (
<italic>bios politikos</italic>
) concerned, or presupposed, speech as the pre-eminent instrument of power, the capacity to communicate, to engage in open dialogue, to negotiate, to respect rules and to disagree without resort to violence.
<sup>
<xref ref-type="fn" rid="fn8_4">4</xref>
</sup>
It involved relations among equals, and it was aimed at achieving the good life. In Arendt’s (
<xref ref-type="bibr" rid="ref21">1958</xref>
: 26) words, ‘To be political … meant that everything was decided through words and persuasion and not through force and violence’. Bare life, on the other hand, was about survival, mere existence, bodily and species reproduction. It generally involved relations of domination; between a man and his wife, a parent and child, a master and slave. In bare life, where necessity governs, force and violence are justified ‘because they are the only means to master necessity’ (
<xref ref-type="bibr" rid="ref21">Arendt 1958</xref>
: 31).</p>
<p>Though the Greeks sought to maintain the separation of bare or ‘natural’ life and political life, Agamben follows both Hannah Arendt (
<xref ref-type="bibr" rid="ref21">1958</xref>
) and Michel Foucault (
<xref ref-type="bibr" rid="ref192">1978</xref>
) in noting the way ‘natural life’ has intruded upon political life. In fact, whereas Arendt and Foucault tend to see this as a largely modern development, Agamben sees it as extending back to the ancient Greeks themselves. Additionally, Agamben (
<xref ref-type="bibr" rid="ref7">1998</xref>
: 7–8) wants to emphasize that the exclusion of bare life is also an inclusion, or in his words, ‘an inclusive exclusion’. Bare life remains included in politics insofar as it takes the form of the state of exception. Agamben’s purpose is to highlight the unavoidable intersection or ‘zone of indistinction’ between bare life and political life. That is why he retains Foucault’s term, ‘biopower’. But if Foucault thought biopower defined a mode of government that succeeds sovereignty, Agamben insists that sovereignty has always rested on a form of biopower; that bare life has always been politicized. In other words, sovereign power is always already biopower, and is always already producing bare life and its defining but ambivalent figure, the outcast
<italic>homo sacer</italic>
(sacred or accursed man).
<italic>Homo sacer</italic>
was a figure of Roman antiquity who could be killed but not sacrificed (
<xref ref-type="bibr" rid="ref7">Agamben 1998</xref>
: 83), the Latin
<italic>sacer</italic>
meaning sacred or damned. Banned from the political community and confined to bare life,
<italic>homo sacer</italic>
is less than a full political being; that is why his killing qualifies as neither murder
<xref id="page_132" ref-type="page"></xref>
nor sacrifice. He is ‘the one with respect to whom all men act as sovereigns’ (
<xref ref-type="bibr" rid="ref7">Agamben 1998</xref>
: 84).
<sup>
<xref ref-type="fn" rid="fn8_5">5</xref>
</sup>
</p>
<p>Second, Agamben adapts and further develops Schmitt’s thinking about the exception by linking it to bare life and the production of
<italic>homines sacri.</italic>
The state of exception thus has a biopolitical significance that Agamben wishes to elaborate. He argues that the state of exception ‘binds and, at the same time, abandons the living being to law’ (
<xref ref-type="bibr" rid="ref8">Agamben 2005</xref>
: 1).
<italic>Homo sacer</italic>
is abandoned or excluded insofar as he is denied a political voice and legal equality, but included insofar as he is punishable by the law. Hence Agamben’s (1985: 17–18) insistence that the exception is
<italic>‘a kind</italic>
of exclusion [my emphasis]’. It is only a qualified exclusion because what it excludes is still, in important ways, included in the law, subject to the force of law. At any rate,
<italic>homines sacri</italic>
will always be subject to the sovereign power’s monopoly to decide the exception, and will always live under the threat of its force. That is why Agamben employs the notion of ‘zones of indistinction’, because it ‘is literally not possible to say whether the one who has been banned is outside or inside the juridical order’ (Agamben 1985: 28–9).</p>
<p>I want to suggest that the post-Cold War and post-September 11 discourses reproduce ‘zones of indistinction’, spaces of exception where life and politics, law and violence pass incessantly into one another. In these international spaces of exception, rogue and failed states are neither clearly outside nor clearly inside the law. The rogue state is like the
<italic>wargus</italic>
or ‘wolf-man’, German and Scandanavian antiquity’s name for the bandit or outlaw that Agamben (
<xref ref-type="bibr" rid="ref7">1998</xref>
: 104–6) describes and links to Hobbes’s state of nature. The failed state is like the
<italic>homo sacer,</italic>
less than a complete political being, concerned with ‘mere’ survival. Both are posited as variations of
<italic>homo sacer</italic>
and located in or cast out (
<italic>ex-capere</italic>
) into a space of exception by sovereign power.
<sup>
<xref ref-type="fn" rid="fn8_6">6</xref>
</sup>
They are therefore always vulnerable to a decision to enforce the law, even though they have been banished to the exterior of international society.</p>
</sec>
<sec id="sec8_3">
<title>Failures, rogues and terrorists</title>
<p>In this final section of the chapter I want to suggest that Agamben’s analysis may be usefully applied to the study of the North’s view of the South. Both rogue states and failed states, we shall see, are situated
<italic>outside</italic>
politics by the North, they are both marked as ‘bare life’. Rogue states lack political language; failed states reduce politics to bare life. Each instance evokes a different response from the North. In the case of rogue states, a more Schmittean response is developed – one that suspends the rule of law and operates in a state of exception. Rogue states are deemed incorrigible; incapable of being civilized, they must therefore be eliminated. They are ‘hopeless cases’ to use Barry Hindess’s (
<xref ref-type="bibr" rid="ref242">2001</xref>
) terms from another context. In the case of failed states, the North applies biopolitical governmental practices developed around health, wealth, poverty, security, migration and structures of governance – in short, ‘good governance’. These states are, in contrast to rogues, redeemable. They are what Hindess (
<xref ref-type="bibr" rid="ref242">2001</xref>
) would call ‘subjects of improvement’, capable of being civilized as long as they are subjected to the North’s disciplinary
<xref id="page_133" ref-type="page"></xref>
measures designed to foster life. Both rogue and failed states are rendered external to the political realm, outside international society.</p>
<sec id="sec8_3_1">
<title>Rogue states as/and terrorists</title>
<p>In this section I want to outline the way that rogue states are cast outside international society only to be subjected to the law’s force. Rogue states are deemed to exist outside the political because they stand accused of rejecting international society’s rules and norms. They represent a threat not just to regional or global security, and not just to their own citizens, but to international law. They are serial law-breakers, dangerous recidivists, ‘hopeless cases’ incapable of being reformed. Nevertheless, they are still subject to the punishing force of law.</p>
<p>This was President Bush’s (
<xref ref-type="bibr" rid="ref85">2002c</xref>
) point in his infamous State of the Union address where he invoked the ‘axis of evil’. Rogue states were condemned for sponsoring terrorism and/or committing terrorist acts against their own citizens. Iraq under Saddam Hussein was, of course, the rogue state
<italic>par excellence.</italic>
In the words of the USA’s Department of Defense’s (DOD)
<italic>National Defense Strategy</italic>
(
<xref ref-type="bibr" rid="ref518">United States Department of Defense 2005</xref>
: 2), Saddam was ‘a tyrant who used WMD, supported terrorists, terrorized his population, and threatened his neighbors’. Even the Clinton administration saw Saddam’s Iraq as cast out into a space of exception. Assistant Secretary of State Martin Indyk said, ‘Iraq, under Saddam Hussein, remains dangerous, unreconstructed, defiant, and isolated’. It would ‘never be able to be rehabilitated or reintegrated into the community of nations’ while Saddam was ruler (quoted in
<xref ref-type="bibr" rid="ref291">Kagan 2003</xref>
: 44).</p>
<p>I do not intend to get into detailed discussion of what makes a state a rogue, suffice to say that consensus on the criteria remains elusive. Rather, I simply want to highlight the political function of the adjective ‘rogue’; a word which can function as either an attribute or a substantive. Jacques Derrida remarks that the adjective ‘rogue’ can sometimes be applied to a subject who is occasionally, rather than substantively, a rogue (
<xref ref-type="bibr" rid="ref152">Derrida 2005</xref>
: 79). We might then speak of someone acting the rogue, or we may even refer to someone as a ‘loveable rogue’.
<sup>
<xref ref-type="fn" rid="fn8_7">7</xref>
</sup>
‘Rogueness’ here is an aspect of the subject’s identity, though it does not determine or define it; it is one among many attributes.</p>
<p>On the other hand, ‘rogueness’ may be a quality that defines a subject’s identity through and through. To name someone or something rogue here is to make an accusation or denunciation, and thence prepare the way for, and justify, some kind of sanction. A rogue state will need to be ‘punished, contained, rendered harmless, reduced to a harmless state, if need be by the force of law [
<italic>droit</italic>
] and the right [
<italic>droit</italic>
] of force’ (
<xref ref-type="bibr" rid="ref152">Derrida 2005</xref>
: 79). This is, of course, precisely the manner in which ‘rogue state’ has come to be used in contemporary international relations. It leads to the conclusion, to ‘the armed conclusion’, as Derrida says, ‘to use force to confront them, in the name of a presumed right and the reason of the strongest’ (
<xref ref-type="bibr" rid="ref152">Derrida 2005</xref>
: 80).</p>
<p>It has the effect of not just characterizing the other state as substantively rogue, but suggesting, if only by implication, that the denouncing state is substantively
<xref id="page_134" ref-type="page"></xref>
<italic>not</italic>
rogue. Roland Bleiker (
<xref ref-type="bibr" rid="ref58">2003</xref>
: 732) makes a similar point, showing how the concept of rogue state draws upon a Manichean distinction between good and evil. Moreover, ‘the rhetoric of evil moves the concept of rogue states into the realm of irrationality. “Evil” is in essence a term of condemnation for a phenomenon that can neither be fully comprehended nor addressed other than through militaristic forms of dissuasion and retaliation’ (
<xref ref-type="bibr" rid="ref58">Bleiker 2003</xref>
: 732). The implication is that reason is beyond the rogues’ capabilities. Rogues cannot be persuaded by reasoned argument, and they will not be reasonable. That is why they are seen as incorrigible, ‘hopeless cases’, who must be dealt with differently from all others.</p>
</sec>
<sec id="sec8_3_2">
<title>Responding to rogues: from speech to the language of force</title>
<p>In this section I suggest that the North’s response to rogue states follows a Schmittean understanding of politics. Abandoning the ancient Greek and democratic pre-eminence given to speech and equality, the North, led by the US, has arrogated to itself the position of sovereign power, free to decide unilaterally the use of force.</p>
<p>Rogue states, it is commonly said, understand only one thing, the use of force. On 4 February, 1999, just prior to the Rambouillet meeting on Kosovo, US Secretary of State Madelaine Albright said: ‘we learned in Bosnia, and we have seen in Kosovo, that President Milosevic understands only the language of force. Nothing less than strong engagement from NATO will focus the attention of both sides; and nothing less than firm American leadership will ensure decisive action’.
<sup>
<xref ref-type="fn" rid="fn8_8">8</xref>
</sup>
Assigning rogue status to another state thus opens the path to the use of force. In this way, states such as Serbia under Milosevic or Iraq under Saddam are said to differ from liberal democracies, which value civility, dialogue, and the peaceful resolution of conflict. Liberal democratic states can therefore legitimately suspend their commitment to liberal democratic principles and the rule of law because rogue states signal an exception.</p>
<p>Interestingly, but perhaps not surprisingly, the same view about the language of force finds expression in Osama bin Laden. A month after September 11, in a filmed interview given on 20 October, 2001, he says: ‘Bush and Blair … don’t understand any language but the language of force. Every time they kill us, we kill them, so the balance of terror can be achieved’.
<sup>
<xref ref-type="fn" rid="fn8_9">9</xref>
</sup>
</p>
<p>Such assertions as these uttered by Albright and bin Laden rest on a notion that force is a kind of language. Diplomacy, language, communication, though apparently favoured by liberal democracies, are thought to be useless in dealing with rogues. Their stubborn refusal to understand their interlocutor means that negotiations will always break down. Patient diplomacy and conventional communication will never succeed in negotiations with rogue states, as President Bush (
<xref ref-type="bibr" rid="ref88">2004</xref>
) has emphasised. Where missives fail however, missiles work. Unlike words, which always carry the potential for misunderstanding, weapons are thought to be devoid of ambiguity; they cannot be misinterpreted, not even by rogue states.</p>
<p>
<xref id="page_135" ref-type="page"></xref>
The view of language expressed by the assertion that rogue states ‘only understand the use of force’, is that force is itself actually a language too. It communicates. In fact, it communicates effectively, especially to rogue states who are inveterately unable or unwilling to engage in dialogue. In a sense, force is a pure language of communication, according to this viewpoint. While weapons may sometimes miss their intended target, as we know, their meaning is thought never to be in doubt, unlike words. This point of view ‘leaves no room for equivocation, confusion, misunderstanding; no room for any others at all, for any back and forth, for exchange, for the delays and relays of a dialogue or a conversation’ (
<xref ref-type="bibr" rid="ref300">Keenan 2004</xref>
).</p>
<p>Indeed, this view of force as language reflects what American realist Stephen Van Evera (
<xref ref-type="bibr" rid="ref530">2006</xref>
: 32) calls ‘the Bush administration’s macho approach to foreign policy’. This macho foreign policy presumes that ‘reasoning with others is … pointless’ since they are ‘immoral cowards who understand only the threat of force’; and that ‘[p]ublic diplomacy is for wimps’ (ibid.). As Stefan Halper and Jonathan Clarke (
<xref ref-type="bibr" rid="ref232">2004</xref>
: 13) point out in their comprehensive analysis of neoconservatism’s influence over the Bush administration’s foreign and defence policies, neo-conservatives are suspicious of confidence-building, dialogue and consensus. Indeed, they are even suspicious of stability and normalcy (ibid.). Their attraction to nationalism, war culture, and use of maximum force (
<xref ref-type="bibr" rid="ref208">George 2005</xref>
: 181) naturally makes them averse to international rules and institutions that may restrain them (
<xref ref-type="bibr" rid="ref266">Ikenberry 2004</xref>
: 9; see also
<xref ref-type="bibr" rid="ref291">Kagan 2003</xref>
: 27–40). This is entirely consistent with a Schmittean conception of politics. To use force is, to use the title of Tom Keenan’s fascinating paper, ‘to speak in a language that needs no translation’, an act of pure communicative force unburdened by the impurities of diplomatic dialogue, negotiation and compromise – that is to say, unburdened by the stuff of politics from Aristotle to Arendt.</p>
<p>Adopting this viewpoint has the effect, quite deliberately, of avoiding and indeed censuring dialogue and negotiation. Rogue states, because they are evil and because they misunderstand or distort normal communication are cast into the space of exception. Outside the law, they can only be communicated with by force. However, as Bleiker shows, a residual belief in the capacity of rogue states to understand normal communication persists. Though Bush sees North Korea firmly lined on the ‘axis of evil’, he does not preclude the possibility of engaging it in dialogue. ‘Indeed, the assumption is that threats will induce dialogue’ (
<xref ref-type="bibr" rid="ref58">Bleiker 2003</xref>
: 732). Once the threat of force has communicated the point to the rogue, the rogue will thenceforth be able and willing to negotiate with the US. This marks a slight twist on the original supposition that rogue states only understand the language of force: after the deployment of force,
<italic>après coup,</italic>
normal communication can be resumed and they can return to the fold. Indeed, it is not quite right that rogue states reside entirely outside the law, for they are still punishable under the force of law asserted by the North.</p>
<p>All of this simply functions to reinforce the strategic cartographies I elaborated earlier. The barbarians and animals (recall Hobbes’s
<italic>homo hominibus lupus</italic>
– man is a wolf to other men), those beyond the North’s frontiers, mired in history and the
<xref id="page_136" ref-type="page"></xref>
zone of chaos, do not speak
<italic>our</italic>
language. They speak only the language of force, not our native (liberal democratic) tongue; but, as the US has made clear, even the North is capable of speaking the language of force when necessity demands. This ‘bilingualism’ bespeaks an ambivalence in the North’s identity – it is capable of being both rogue and, when necessity demands, non-rogue. For all the differences that exist between, say, the US and Iraq, rogueness will not provide a stable or reliable criterion for distinguishing them.</p>
</sec>
</sec>
<sec id="sec8_4">
<title>Failed states as incubators of terrorism</title>
<p>In this section I want to show how failed states too have become closely aligned with the terrorist threat. In short, they have come to be viewed as ‘incubators’ or ‘breeding grounds’ of terrorism. This is a point made by leading scholars such as Stephen Krasner, Robert Rotberg and Stephen Van Evera as well as politicians from George W. Bush to John Howard. Once again, an ‘inclusive exclusion’ casts failed states out of international society whilst simultaneously including them as reformable subjects, capable of re-entering international society on condition of restoring the political through ‘good governance’.</p>
<p>Rotberg, one of the leading scholars on the subject, defines failed states as ‘incapable of projecting power and asserting authority within their borders, leaving their territories governmentally empty’ (2002: 128). Various economic and political factors lead to state failure, but I shall not discuss them here. I merely want to point to the consequences. As violent conflict and lawlessness escalate, human insecurity deepens; a kind of Hobbesian
<italic>bellum omnium contra omnes</italic>
develops, or at least a war of some against some. As Rotberg explains, the humanitarian disasters generated by failed states, including large-scale human rights violations, human displacement, and continuing violence, have created critical difficulties for international society. But the critical difficulties are not simply reducible to humanitarian disaster. ‘In the wake of September 11, the threat of terrorism has given the problem of failed nation-states an immediacy and importance that transcends its previous humanitarian dimension’ (
<xref ref-type="bibr" rid="ref441">Rotberg 2002</xref>
: 127).</p>
<p>Failed states have become critical features of the new strategic imperatives governing the North. ‘In less interconnected eras, state weakness could be isolated and kept distant. Failure had fewer implications for peace and security. Now, these states pose dangers not only to themselves and their neighbors but also to peoples around the globe’ (
<xref ref-type="bibr" rid="ref441">Rotberg 2002</xref>
: 127). But the key proposition is this: ‘Failed states have come to be feared as “breeding grounds of instability, mass migration, and murder” (in the words of Stephen Walt), as well as reservoirs and exporters of terror’ (
<xref ref-type="bibr" rid="ref441">Rotberg 2002</xref>
: 128).</p>
<p>Krasner and Pascual rehearse the same argument. Echoing Rotberg’s claim about the changed strategic environment, Krasner and Pascual (
<xref ref-type="bibr" rid="ref313">2005</xref>
: 153) say, ‘In today’s increasingly interconnected world, weak and failed states pose an acute risk to US and global security’. They also believe that, ‘When chaos prevails, terrorism, narcotics trade, weapons proliferation, and other forms of organized crime can flourish’ (
<xref ref-type="bibr" rid="ref313">Krasner and Pascual 2005</xref>
: 153). Afghanistan, they say, was
<xref id="page_137" ref-type="page"></xref>
a prime example of a failed state generating a terrorist problem for the US. ‘Left in dire straits, subject to predation, and denied access to basic services, people become susceptible to the exhortations of demagogues and hatemongers’ (
<xref ref-type="bibr" rid="ref313">Krasner and Pascual 2005</xref>
: 153).</p>
<p>In a withering attack on the Bush administration’s handling of the ‘war on terror’, Van Evera (
<xref ref-type="bibr" rid="ref530">2006</xref>
) makes the same argument, arguing that failed states pose a much greater threat to the US than authoritarian but otherwise stable states like Iraq or Syria. ‘Al-Qaeda and other terror groups grow and thrive in failed states, using them as havens in which they can establish secure bases to mass-produce trained, motivated killers’, he claims (
<xref ref-type="bibr" rid="ref530">Van Evera 2006</xref>
: 34). Despite US success in deposing the Taliban, ungoverned zones have emerged in the southern and eastern parts of Afghanistan and northwestern parts of Pakistan that have allowed al-Qaeda to re-establish a foothold from which they can train operatives and prepare attacks. In Van Evera’s (
<xref ref-type="bibr" rid="ref530">2006</xref>
: 34) words, this ‘terrorist cauldron’ demonstrates the dangers of allowing failed states to develop unhindered, and illustrates ‘that state failure can be dangerously contagious’, spreading relatively freely across sovereign borders.</p>
<p>Such arguments are not confined to academia. George W. Bush in his Preface to the
<italic>National Security Strategy of the United States of America</italic>
(
<xref ref-type="bibr" rid="ref380">NSC 2002</xref>
) observed: ‘The events of September 11, 2001, taught us that weak states, like Afghanistan, can pose as great a danger to our national interests as strong states. Poverty does not make poor people into terrorists and murderers. Yet, poverty, weak institutions, and corruption can make weak states vulnerable to terrorist networks and drug cartels within their borders’.
<sup>
<xref ref-type="fn" rid="fn8_10">10</xref>
</sup>
The NSC (
<xref ref-type="bibr" rid="ref380">2002</xref>
) bluntly declares, ‘America is now threatened less by conquering states than we are by failing ones’.</p>
<p>The same argument is employed by the DOD and US Agency for International Development (USAID). ‘The absence of effective governance in many parts of the world creates sanctuary for terrorists, criminals, and insurgents. Many states are unable, and in some cases unwilling, to exercise effective control over their territory or frontiers, thus leaving areas open to hostile exploitation’ (
<xref ref-type="bibr" rid="ref518">United States Department of Defense 2005</xref>
: 3). ‘Weak states tend to be the vector for these destabilizing forces, manifesting the dark side of globalization, and pose a very difficult kind of national security challenge’ (
<xref ref-type="bibr" rid="ref527">USAID 2005</xref>
: v).
<sup>
<xref ref-type="fn" rid="fn8_11">11</xref>
</sup>
</p>
<p>The Australian government has adopted a very similar set of assumptions regarding the threat failed states pose to national and international security. Prime minister John Howard (
<xref ref-type="bibr" rid="ref279">2005</xref>
) declared that September 11 ‘told us in no uncertain terms that weak and failing states can act as breeding grounds for disorder, chaos and misery – and, ultimately, security threats. The erosion of state capacity is related to almost every class of threat we now face – from terrorism to transnational crime, civil wars to infectious disease’. Alexander Downer, Australia’s foreign minister, says the threats Australia faces today ‘are generated by much more than disputes between nation states and are not readily confined by state borders. Transnational terrorism, threats posed by the proliferation of weapons of mass destruction, increased intra-state conflict and the weakening of
<xref id="page_138" ref-type="page"></xref>
states by poor governance demonstrate this’ (2005: 7). Elsewhere he explained that two key challenges confront the world today: global poverty and global insecurity. The latter comprises, according to Downer (
<xref ref-type="bibr" rid="ref159">2004</xref>
), three elements: ‘the murderous fanaticism of international terrorism, the nightmarish potential of the proliferation of weapons of mass destruction, [and] the incubators of future threats in failed states’. ‘We cannot afford to ignore those societies that have ceased to function through a failure of political order, economic growth or social cohesion. Terrorism has underlined the threat to international security posed by weak and failed states’.</p>
<p>I do not want to dwell on the validity of these claims here, so much as reflect on their political uses. Suffice to say, however, that several scholars and analysts have cast doubts on the idea that failed states offer the right environment for terrorists. Ken Ross (
<xref ref-type="bibr" rid="ref439">2003</xref>
), Beth Greener-Barcham and Manuhuia Barcham (
<xref ref-type="bibr" rid="ref222">2006</xref>
), Ken Menkhaus (
<xref ref-type="bibr" rid="ref356">2004</xref>
) and Stewart Patrick (
<xref ref-type="bibr" rid="ref408">2006</xref>
) and have all expressed reservations about the premise that failed states breed terrorism. Commenting on the Pacific Islands, Ross (
<xref ref-type="bibr" rid="ref439">2003</xref>
: 694) observes that this type of argument simply reprises Cold War concerns that weak states in the region would make them vulnerable to communism. ‘It is a seriously misjudged perspective’, he says, ‘for these [Pacific Island] states lack the necessary oxygen for would-be terrorists, for whom the concept “terror is theatre” is all important. This region lacks the facilities’. Greener-Barcham and Barcham (
<xref ref-type="bibr" rid="ref222">2006</xref>
: 74) express the same doubts about the ‘failed states-terrorism connection’ in the South Pacific, arguing that ‘the possibilities for terrorist activity are arguably lessened in the Pacific as it is characterized by a lack of land borders and soft targets, and by small-scale closely knit and predominantly rural societies where everybody knows everyone else’s business. Menkhaus (
<xref ref-type="bibr" rid="ref356">2004</xref>
: 71) offers a similar assessment: ‘In fact, transnational criminals and terrorists have found zones of complete state collapse like Somalia to be relatively inhospitable territory out of which to operate’. And so too does Patrick (
<xref ref-type="bibr" rid="ref408">2006</xref>
: 33–6). The connection between these states and terrorism is far more tenuous. As he explains, ‘not all weak and failed states are afflicted by terrorism’, nor is the terrorism that may arise there necessarily transnational (ibid.: 35). These analysts dispute the contention that failing or failed states are hotbeds of terrorism. In fact, if terrorists are to find any states congenial to their cause, preparations and operations, it is more likely to be functional or semi-functional states like Pakistan.</p>
<p>There is, however, one erstwhile rogue state that seems to have become much more important to global terrorism, Iraq. Though US-led invasion of Iraq was intended to eliminate Iraq’s links with terrorism, it seems instead to have created them where none previously existed. It is now a weak or failing state where lawlessness has escalated and terrorism is rife. In this respect, Iraq has been transformed by the ‘coalition of the willing’ from a rogue state to a genuine failing state. In any case, it is still cast out into a space of exception.</p>
<sec id="sec8_4_1">
<title>
<xref id="page_139" ref-type="page"></xref>
Responding to failed states: good governance</title>
<p>I suggest, in this section, that the North’s preferred response to failed states differs from its response to rogues. While it still treats the South as residing in a space of exception, it foregoes the use of force, favouring the imposition of a complex mix of political and economic measures to promote not just human security but state security.</p>
<p>In July 2004 the US Department of State established the Office of the Coordinator for Reconstruction and Stabilization (S/CRS) to respond to threats ‘failing and post-conflict societies’ pose to their own citizens, neighbouring populations and to the US. Its mission is to ‘lead, coordinate and institutionalize US government civilian capacity to prevent or prepare for post-conflict situations, and to help stabilize and reconstruct societies in transition from conflict or civil strife, so they can reach a sustainable path towards peace, democracy and a market economy’.
<sup>
<xref ref-type="fn" rid="fn8_12">12</xref>
</sup>
The S/CRS will work to ensure that US governmental agencies, NGOs and foreign governments coordinate their responses to the complex emergencies thrown up by failing or failed states. This was subsequently supplemented by the Presidential Directive on US Efforts for Reconstruction and Stabilization whose purpose is to empower the Secretary of State in working together ‘with other countries and organizations, to anticipate state failure, avoid it whenever possible, and respond quickly and effectively when necessary and appropriate to promote peace, security, development, democratic practices, market economies, and the rule of law’.
<sup>
<xref ref-type="fn" rid="fn8_13">13</xref>
</sup>
</p>
<p>These ideas are not exactly new; aid and development have always been susceptible to security and foreign policy interests, but the precise instruments and the mode of operation have changed. Global liberal governance has been subsumed by a
<italic>biopolitics</italic>
which finds its organizing principles in the administration and production of life, rather than in threatening death/violence. It operates on populations and seeks to promote conditions intended to secure liberty and security by investing life through and through. Biopolitics thus becomes a means of strategically ordering the periphery, of bringing order to the zones of chaos.</p>
<p>Mark Duffield and Nicholas Waddell (
<xref ref-type="bibr" rid="ref164">2006</xref>
: 3) argue that human security represents the fusion of security and development. Most importantly, in the present context development is increasingly understood
<italic>through</italic>
security imperatives. Insofar as development is granted importance in the post-9/11 context, it is always mediated through security frames. ‘Among other things, development criteria are being reprioritized towards the rebuilding of toppled states and, in order to stem terrorist recruitment, towards addressing popular disaffection in strategically defined areas’ (
<xref ref-type="bibr" rid="ref164">Duffield and Waddell 2006</xref>
: 3).</p>
<p>Mark Duffield’s idea of ‘the securitization of development’ seems useful here. By this phrase, Duffield (
<xref ref-type="bibr" rid="ref162">2001</xref>
: 312) means that the security concerns of the core states have merged with the socio-economic concerns of aid agencies. ‘If poverty and institutional malaise in the borderlands encourage conflict and undermine international stability, then the promotion of development with its intention of eliminating these problems simultaneously operates as a
<italic>security strategy’</italic>
(
<xref ref-type="bibr" rid="ref162">Duffield 2001</xref>
: 312). This approach is evident in the growing amount
<xref id="page_140" ref-type="page"></xref>
of aid the US has committed to development. The US aid budget has tripled since 2002, having risen from $12.9 billion to $33.2 billion. The bulk of this aid flows to strategically important countries in the Middle East such as Israel, Egypt, Jordan, and Iraq, as well as countries in or on the edge of the zones of chaos: Afghanistan, Pakistan, and Uzbekistan (
<xref ref-type="bibr" rid="ref555">Woods 2005</xref>
: 397). Interestingly though, only about $2 billion of this aid has come through the standard appropriations process, most instead comes through supplemental appropriations (ibid.). But the US has explicitly recognized the link between development and security in many of the documents examined here, including the NSS of 2002 and 2006. It cannot be stated more clearly than this: ‘Helping the world’s poor is a strategic priority and a moral imperative’ (
<xref ref-type="bibr" rid="ref382">NSC 2006</xref>
: 31).</p>
<p>Humanitarian aid agencies are thus being integrated into strategies designed to bring order to the so-called ‘zones of chaos’. Aid has become a ‘technology of security’, according to Duffield (
<xref ref-type="bibr" rid="ref163">2002</xref>
: 154), as networks joining governments, NGOs, and UN agencies have been established to deliver development and humanitarian assistance where states fail. These networks are part of a broader framework of emerging global governance that sees the sources of economic failure, social instability, and ethnic conflict largely in the absence of a functioning market economy and democratically governed polity. The development malaise thus requires remedial treatment in the form of ‘good governance’. This is an argument advanced by scholars such as Krasner as well as governments like Australia, for whom ‘good governance is now the largest sectoral focus of Australia’s aid program’ (
<xref ref-type="bibr" rid="ref149">Department of Foreign Affairs and Trade 2002</xref>
: Overview).</p>
</sec>
<sec id="sec8_5">
<title>Conclusion</title>
<p>The argument presented here is that the North has tended to see the South as comprised of failed states and rogue states, both of which are identified as sources of terrorism. The association of the South with terrorism is prepared through a strategic cartography whereby a boundary is firmly inscribed between North and South, one which by and large assigns civilization to the North and barbarism to the South. More specifically, the South is associated with spaces of exception, where threats emanate from the very nature of the states – states conceived as
<italic>homines sacri.</italic>
Rogues and failures occupy the ‘zone of indistinction’ insofar as they are neither fully inside nor fully outside international society. They are outside to the extent that they do not conform to legitimate state behaviour, yet they are inside insofar as the North asserts the right to punish these states according to international society’s rules.</p>
<p>Although the distance between North and South has undergone change as a consequence of the Cold War’s end and the terrorist attacks of September 11, one thing has remained unchanged. The North continues to spatialize the sources of terrorist violence in such a manner that its origins appear to be exclusive to the spaces of exception inhabited by the South. This helps shore up a deeper assumption held by the North – that it remains the sole source of good governance and civilization, and that it alone is authorized to declare the exception.</p>
</sec>
</sec>
</body>
<back>
<notes>
<title>
<xref id="page_141" ref-type="page"></xref>
Notes</title>
<fn-group>
<fn id="fn8_1">
<label>1</label>
<p>For thoughtful critical engagements with the ‘new wars’ thesis see: Bellamy (
<xref ref-type="bibr" rid="ref41">2002</xref>
), Berdal (
<xref ref-type="bibr" rid="ref46">2003</xref>
) and Newman (
<xref ref-type="bibr" rid="ref389">2004</xref>
). See Devetak (forthcoming) for my own account of the ‘new wars’.</p>
</fn>
<fn id="fn8_2">
<label>2</label>
<p>We might note the ambiguity of this formulation. It remains unclear whether the sovereign attains this status on account of being able to decide the exception, or whether the sovereign is able to decide the exception on account of being sovereign.</p>
</fn>
<fn id="fn8_3">
<label>3</label>
<p>Rossiter (
<xref ref-type="bibr" rid="ref440">1949</xref>
: 399) makes the same point specifically about constitutional democracies: ‘the complex system of government of the democratic, constitutional state is essentially designed to function under normal, peaceful conditions, and is often unequal to the exigencies of a great national crisis’. Still, Rossiter (
<xref ref-type="bibr" rid="ref440">1949</xref>
: 410) diverges from Schmitt in believing that it is possible to codify the limits of presidential power during a state of exception.</p>
</fn>
<fn id="fn8_4">
<label>4</label>
<p>See Vernant (
<xref ref-type="bibr" rid="ref533">1982</xref>
: 49–50) on the importance of speech (
<italic>lexis</italic>
) to ancient Greece. Arendt (
<xref ref-type="bibr" rid="ref21">1958</xref>
:
<xref ref-type="book-part" rid="chapter4">Chapters 4</xref>
<xref ref-type="book-part" rid="chapter5">5</xref>
) adds action (
<italic>praxis</italic>
) as the other vital aspect of political life.</p>
</fn>
<fn id="fn8_5">
<label>5</label>
<p>See Butler (
<xref ref-type="bibr" rid="ref91">2004</xref>
:
<xref ref-type="book-part" rid="chapter3">Chapter 3</xref>
) for a powerful exploration of Guantanamo detainees are produced as
<italic>homo sacer</italic>
under the US program of ‘infinite detention’.</p>
</fn>
<fn id="fn8_6">
<label>6</label>
<p>Agamben (
<xref ref-type="bibr" rid="ref7">1998</xref>
: 18) tells us that exception’s etymological root is
<italic>taken outside</italic>
(
<italic>excapere</italic>
), and not simply excluded.</p>
</fn>
<fn id="fn8_7">
<label>7</label>
<p>I am indebted to Gavin Mount for reminding me of the ‘loveable rogue’.</p>
</fn>
<fn id="fn8_8">
<label>8</label>
<p>This quote can be found in Linda Kozarin, ‘Albright Says Kosovo Matters to United States’, American Forces Information Service, News Articles, US Department of Defense, available at
<uri xlink:href="http://www.defenselink.mil/news/Feb1999/n0208199_9902084.html">http://www.defenselink.mil/news/Feb1999/n0208199_9902084.html</uri>
.</p>
</fn>
<fn id="fn8_9">
<label>9</label>
<p>See #66 in the dossier put together by the British government
<italic>, Responsibility for the Terrorist Atrocities in the United States, 11 September 2001 – An Updated Account,</italic>
available at
<uri xlink:href="http://www.number-10.gov.uk/output/page3682.asp">http://www.number-10.gov.uk/output/page3682.asp</uri>
.</p>
</fn>
<fn id="fn8_10">
<label>10</label>
<p>The point is repeated in the
<xref ref-type="bibr" rid="ref382">NSS 2006</xref>
: 33.</p>
</fn>
<fn id="fn8_11">
<label>11</label>
<p>James Kelly (US Assistant Secretary of State for East Asia and Pacific Affairs) warned, on 24 August 2004, that South Pacific island states could be ‘soft targets’ for terrorists. Although he knew of no evidence suggesting that Jemaah Islamiyya was active in the Pacific, he advised that ‘we must be constantly alert’ because they ‘are not far in time or space from the Pacific’ (
<xref ref-type="bibr" rid="ref417">Port Vila Presse 2004</xref>
).</p>
</fn>
<fn id="fn8_12">
<label>12</label>
<p>See the S/CRS’s website:
<uri xlink:href="http://www.state.gov/s/crs/c12936.htm">http://www.state.gov/s/crs/c12936.htm</uri>
. See also the 20 Oct 2004 speech by Ambassador Carlos Pascual, Coordinator for Reconstruction and Stabilization, on ‘Strengthening US Reconstruction and Stabilization capabilities’ at
<uri xlink:href="http://www.state.gov/s/crs/rls/rm/37430.htm">http://www.state.gov/s/crs/rls/rm/37430.htm</uri>
.</p>
</fn>
<fn id="fn8_13">
<label>13</label>
<p>See the Presidential Directive at
<uri xlink:href="http://www.whitehouse.gov/news/releases/2005/12/20051214.html">http://www.whitehouse.gov/news/releases/2005/12/20051214.html</uri>
.</p>
</fn>
</fn-group>
</notes>
</back>
</book-part>
<book-part book-part-type="chapter" book-part-number="9" id="chapter9">
<book-part-meta>
<title-group>
<title>
<xref id="page_142" ref-type="page"></xref>
US bioterrorism policy</title>
<alt-title alt-title-type="running-head-verso">US bioterrorism policy</alt-title>
<alt-title alt-title-type="running-head-recto">Christian Enemark</alt-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<given-names>Christian</given-names>
<surname>Enemark</surname>
</name>
</contrib>
</contrib-group>
</book-part-meta>
<body>
<p>On 18 September 2001, two letters laced with
<italic>B anthracis</italic>
bacteria, addressed to
<italic>NBC Nightly News</italic>
and the
<italic>New York Post,</italic>
were postmarked from Trenton, New Jersey. On 3 October, photo editor Robert Stevens was diagnosed with pulmonary anthrax and placed on a respirator. Two days later, he became the first anthrax death in the United States in 25 years. On 9 October, two more anthrax-laced letters, addressed to US Senate Majority Leader Tom Daschle and Senator Patrick Leahy, were again postmarked from Trenton. In the weeks that followed, a total of five Americans died of anthrax and 17 more were infected. Although this set of events and the attacks of 11 September 2001 on the Pentagon and World Trade Center were almost certainly of separate origin, in combination they generated intense fears in the United States of a future biological attack causing mass casualties. The US government had been aware of the increasing potential for biotechnology to be misused long before the anthrax envelope attacks, and the Clinton administration had begun bolstering US biodefence capabilities in the late 1990s. In the ‘post-9/11’ atmosphere, however, annual federal government spending on biodefence programmes has increased enormously – from US$434 million in FY2001 to US$5.2 billion in FY2007. For the years FY2002–FY2007, the average amount spent on biodefence annually was around US$5.3 billion (
<xref ref-type="bibr" rid="ref318">Lam
<italic>et al.,</italic>
2006</xref>
: 114).</p>
<p>US biodefence was once exclusively the domain of military agencies and was aimed at protecting battlefield troops against state-run biological weapons (BW) programmes. Today, it is engaged in and promoted by a variety of government agencies contemplating acts of ‘bioterrorism’ by non-state actors, and it is aimed principally at protecting the American civilian population by pharmaceutical and other means. However, current US policy arguably imposes opportunity costs as regards public health and basic scientific research, and it has the potential to generate national and international security risks. To explore this proposition, it is useful to examine three issues: first, whether and to what extent pharmaceutical defences can counter the threat of BW; second, the implications for public health of prioritising research on pathogens thought to be of BW concern; and third, the international legal status and security significance of BW threat assessment projects carried out by national biodefence programmes. The United States is singled out for critical analysis not because its policy on bioterrorism is necessarily the most
<xref id="page_143" ref-type="page"></xref>
problematic, but rather because it is the most conspicuous. It is possible that many of the challenges highlighted in this chapter are relevant also in countries which are less open and to which fewer scholars have turned their attention.</p>
<sec id="sec9_1">
<title>Pharmaceutical defence</title>
<p>In a conflict situation, troops can be protected against BW by well-designed protective gear and reliable detection and diagnostic equipment. Protecting civilians is different; however grave the threat of biological attacks, protective suits are not about to be distributed to every American citizen. For the purposes of protecting the US population, the ‘battlefield’ during a deliberately-caused (or naturally-occurring) infectious disease outbreak would be the human body itself. Biodefence is therefore primarily about researching, developing, producing and administering pharmaceutical treatments, and vaccines in particular. The idea is that, by limiting the efficacy of biological agents, prophylactic and therapeutic drugs would reduce the attractiveness of the BW option to would-be aggressors and thereby offer some means of deterrence (and defence if deterrence fails).</p>
<p>Technological innovation in the area of pharmaceutical protection is the centrepiece of biodefence under the administration of President George W. Bush. Project Bioshield allocates around US$6 billion over 10 years to create a market for private companies to develop and sell to the US government the necessary vaccines and drugs to treat Americans in the event of a BW attack. Accompanying legislation is designed to expedite bureaucratic processes to do with drug research, such as hiring personnel and securing facilities and supplies. It also allows the Food and Drug Administration (FDA) to make experimental treatments available in emergencies (
<xref ref-type="bibr" rid="ref420">Quirk, 2004</xref>
: 540). In the absence of this extraordinary government intervention, it is almost certain that market forces would not have led to the current significant increases in vaccine research and development. For companies which are interested in infectious disease treatments, it takes an estimated US$300 million to US$1 billion to bring a single vaccine to market (
<xref ref-type="bibr" rid="ref255">Hoyt and Brooks, 2004</xref>
: 135). An indication of the decline in interest is that in 1967 there were 26 companies licensed by the FDA to manufacture vaccines, compared to just 12 in 2002 (
<xref ref-type="bibr" rid="ref150">D’Esopo and Nuzzo, 2004</xref>
: 134). At present, the commercial incentives are greater to produce drugs to treat ongoing, non-infectious health problems such as cancer and heart disease, rather than those related to uncertain BW threats.</p>
<p>The assumption behind a technology-driven policy like Project Bioshield, and biodefence in general, is that it would in fact be possible to protect populations against an adversary bent on using biological agents. In the United States, this assumption is coupled with a strong belief that scientific research into vaccines and antimicrobial drugs can defeat every known BW agent and the genetic permutations of each, and perhaps achieve defences applicable to entire categories of diseases (
<xref ref-type="bibr" rid="ref229">Guillemin, 2005</xref>
: 199). However, even dramatic technological advances cannot surmount the inherent asymmetry between offence and defence. With regard to deliberately-caused infectious disease threats, it is problematic for at least four reasons to rely on pharmaceutical protection, and on vaccines especially.</p>
<p>
<xref id="page_144" ref-type="page"></xref>
First, BW vaccines would only be useful in the highly unlikely event that the identity of the biological agent was known with certainty in advance of its use, and protecting civilians against a surprise attack is virtually impossible due to the wide variety of biological agents that could be used. At a congressional committee hearing in June 2005, Deputy Assistant Defense Secretary Dale Klein acknowledged that ‘[i]t’s very difficult for us to come up with specific antidotes, pills and vaccines for everything the terrorists might throw at us’. (
<xref ref-type="bibr" rid="ref187">Fiorill, 2005</xref>
). Moreover, the diversity of potential BW agents available expands greatly when one contemplates genetic engineering methods being used to create pathogens capable of evading existing drug treatments. For example, at around the time the US government was stockpiling 300 million doses of vaccine to defend against a smallpox attack, an Australian experiment with the mousepox virus showed how the smallpox vaccine could likely be circumvented (
<xref ref-type="bibr" rid="ref117">Chyba and Greninger, 2004</xref>
: 153,
<xref ref-type="bibr" rid="ref273">Jackson
<italic>et al.,</italic>
2001</xref>
).</p>
<p>Second, it takes considerable time to research, develop and manufacture appropriate drug treatments. In a letter to the editors of
<italic>Biosecurity and Bioterrorism,</italic>
Ken Alibek and Charles Bailey claimed that achievements in the development of BW are up to 30 years ahead of the possible defences against them. It took Soviet scientists 3–4 years to engineer a drug-resistant or more virulent pathogen, whereas it takes 10–15 years to develop a vaccine and have it approved by the FDA (
<xref ref-type="bibr" rid="ref12">Alibek and Bailey, 2004</xref>
: 132). The US Department of Defense Chemical and Biological Defense Program (CBDP) does not expect to have licensed new therapeutics for exposure to plague, anthrax and smallpox until 2008–2011. In an attempt to overcome this limitation, the CBDP is also working towards broad-spectrum treatments; a ‘multiple pathogen–single countermeasure’ approach. However, such therapies are not expected to be licensed until 2012–2021 (
<xref ref-type="bibr" rid="ref109">CBDP, 2005</xref>
: 52).</p>
<p>Third, to be effective, a vaccine would have to be widely administered well in advance of the attack – the latency period between vaccination and the human immune response may be as long as several weeks. As Alibek and Bailey have argued, if a BW attack has already taken place it would generally be too late to vaccinate against the disease (
<xref ref-type="bibr" rid="ref12">Alibek and Bailey, 2004</xref>
: 132). Moreover, few people are likely to volunteer for advance vaccination if they do not believe that a particular BW threat is sufficiently real or serious. For example, in December 2002 the US government announced an unprecedented campaign advocating ‘preevent’ mass vaccinations against smallpox (a disease which no longer exists in nature) to be carried out in two phases – 500,000 military personnel and 500,000 health workers in phase one, and up to 10 million emergency response personnel in phase two. Ultimately, fewer than 8 per cent of targeted health professionals participated, and the Centers for Disease Control and Prevention (CDC) reported 145 serious adverse events associated with smallpox vaccinations among civilians, including at least three deaths (
<xref ref-type="bibr" rid="ref123">Cohen
<italic>et al.,</italic>
2004</xref>
: 1668).</p>
<p>Fourth, even if the agent used in a biological attack was known in advance, the efficacy of a vaccine-based defence might not. Ethical prohibitions on human testing of vaccines against infectious diseases that pose no
<italic>current</italic>
public health
<xref id="page_145" ref-type="page"></xref>
threat might mean their adverse health effects are inadequately understood. In addition, an immunization strategy might fail because: first, the vaccine is not offered to or accepted by everyone exposed to the BW agent; second, individuals exposed might have underlying conditions, such as immune deficiency, that prevent immunization from being fully effective; and/or third, the dose of biological agent to which an individual is exposed during a BW attack might be large enough to overcome the protection offered by immunization (
<xref ref-type="bibr" rid="ref476">Sidel, 2002</xref>
: 78).</p>
<p>Nevertheless, despite the shortcomings of pharmaceutical protection, pathogen research and drug development still have an important part to play in mitigating BW risks. A 2004 report by the British Medical Association (BMA) argued that</p>
<disp-quote>
<p>though it is clearly impossible to cover all possible biological weaponry attacks that might occur as the revolution in modern biology progresses, there is every reason to make sensible preparation for dealing with relatively containable attacks using known agents.</p>
<attrib>(
<xref ref-type="bibr" rid="ref61">BMA, 2004</xref>
: 69)</attrib>
</disp-quote>
<p>Beyond the development of vaccines against specific agents, there is hope that advances in biotechnology might soon allow for the rapid development of vaccines against
<italic>any</italic>
agent. Such technology could be applied against both naturally-occurring and deliberately-caused disease threats – for example, a newly-emerged strain of human influenza or a novel BW agent. In addition, there is a case for shifting research priorities away from vaccines and towards new emergency prophylaxes and therapies for treating people in the late stages of infection (
<xref ref-type="bibr" rid="ref12">Alibek and Bailey, 2004</xref>
: 133).</p>
<p>To conclude, it appears that pharmaceutical protection could work in some BW situations against some pathogenic micro-organisms. As such, it would be a mistake to abandon research and development in this area on the grounds that medical treatments would never be available against all possible BW threats. However, to the extent that pharmaceutical protection is worth pursuing, pathogen research conducted for the purpose of countering bioterrorism must be commissioned and conducted in a way that poses as few risks as possible to public health and safety, and to national and international security. These risks are discussed in the remaining sections on biodefence research priorities and the security significance of defensive BW programmes.</p>
</sec>
<sec id="sec9_2">
<title>Opportunity costs and security risks</title>
<p>In 2003 the journal
<italic>Nature</italic>
reported that US government scientists had developed a single-shot vaccine that protects monkeys from Ebola virus and which could eventually be used to protect humans (
<xref ref-type="bibr" rid="ref502">Sullivan
<italic>et al.,</italic>
2003</xref>
). In another experiment, scientists at the US Army Medical Research Institute for Infectious Diseases (USAMRIID) gave an experimental drug to monkeys that had been deliberately infected with Ebola. The disease is usually 100 per cent fatal in monkeys, but the drug caused one-third of the monkeys to survive
<xref id="page_146" ref-type="page"></xref>
(
<xref ref-type="bibr" rid="ref207">Geisbert
<italic>et al.,</italic>
2003</xref>
). US government sponsorship of Ebola research is part of a broader policy (driven by security concerns) of promoting research on pathogens which, while dangerous, are not of ongoing importance for American public health. For example, on 9 May 2005 the National Institute for Allergy and Infectious Diseases (NIAID) announced its first grants under Project Bioshield – approximately US$27 million was allocated to 10 institutions to develop new therapeutics and vaccines against anthrax, botulinum toxin, Ebola, pneumonic plague, smallpox and tularaemia (
<xref ref-type="bibr" rid="ref391">NIH, 2005</xref>
). Although such grants bring the potential for greater scientific understanding of these diseases, prioritising research in the field of potential BW agents also generates opportunity costs and security risks for the United States.</p>
<p>On 30 September 2003, Boston University and the University of Texas were each awarded US government grants of US$120 million to build a Biosafety Level 4 (BSL-4) maximum containment laboratory. In announcing the awards, Health and Human Services Secretary Tommy Thompson described them as ‘a major step towards being able to provide Americans with effective therapies, vaccines and diagnostics for diseases caused by agents of bioterror as well as for naturally occurring emerging infections such as SARS and West Nile virus’ (
<xref ref-type="bibr" rid="ref391">NIH, 2003</xref>
). Once built, the new laboratories will be capable of supporting research into emerging infectious disease agents, but there is little doubt that they will focus overwhelmingly on BW threats. The CDC presently designates 82 disease-causing micro-organisms as ‘select agents’ that could be used maliciously against humans, animals and plants. These are divided into three categories (A, B and C) based on assessments of ease of dissemination or transmission, mortality and public health impact, ability to cause panic and social disruption, and special requirements for public health preparedness. The list of Category A select agents (which are thought to pose the greatest BW danger) includes, for example, the micro-organisms that cause smallpox, anthrax and plague in humans (
<xref ref-type="bibr" rid="ref111">CDC, 2005</xref>
).</p>
<p>It is a matter for debate within the United States whether the new money allocated to address potential BW threats agents is ultimately to the betterment of US public health. On the one hand, it is highly doubtful that the extra billions of dollars would have gone into infectious disease research anyway. According to NIAID director Anthony Fauci, biodefence research spending to jumpstart the invention of new vaccines, antibiotics and technologies for early diagnosis of disease has come on top of existing health budgets (
<xref ref-type="bibr" rid="ref177">Enserink and Kaiser, 2005</xref>
: 1396). On the other hand, the prioritisation of research on select agents over basic research on model micro-organisms like
<italic>E coli</italic>
bacteria may well be hindering more valuable scientific breakthroughs. It is more difficult to work with select agents, not just because researchers are far less familiar with them, but also because they need to be handled in high-containment laboratories subject to strict safety and security measures.</p>
<p>In early 2005, 750 of the 1,143 scientists then in receipt of funding from the US National Institutes of Health (NIH) wrote an open letter to the agency’s head, Elias Zerhouni. They alleged that the NIH emphasis on biodefence research since 2002 had diverted researchers away from potential breakthroughs in basic research, and
<xref id="page_147" ref-type="page"></xref>
that research on select agents was crowding out research on micro-organisms that already pose a significant disease threat. The scientists claimed to be on the verge of making major breakthroughs in basic research on bacteria, which could then be transferred to more obscure pathogens such as select agents. They described as a misdirection of NIH priorities the ‘diversion of research funds from projects of high public-health importance to projects of high biodefence but low publichealth importance’ and called on the NIH to create a new funding category for basic microbial science (
<xref ref-type="bibr" rid="ref325">Letter, 2005</xref>
). In reply to this letter, an editorial in the
<italic>Washington Post</italic>
disagreed with the scientists’ judgement on public health:</p>
<disp-quote>
<p>Security officials have stated repeatedly their belief that al Qaeda and others continue to search for more lethal bioweapons. Surely that makes biodefense projects of ‘high public-health importance’. That this is not more widely understood means that there is still too little contact between the scientific community and national security and intelligence agencies.</p>
<attrib>(
<xref ref-type="bibr" rid="ref168">Editorial, 2005</xref>
)</attrib>
</disp-quote>
<p>The latter view presently has the ascendancy in the United States because of heightened domestic concerns about ‘terrorism’ and a prevailing official assumption that non-state use of BW is a mass-casualty threat. The danger, however, is that concentrating on select agent research may, in the longer term, diminish US capacity to resist infectious disease threats of deliberate or natural origin. Federal regulations require any laboratory that possesses one or more select agents to enforce and adhere to specific security measures. These include: facility registration and designation of a responsible official; risk assessments for individuals with access to listed agents; biosecurity plans; agent transfer rules; safety and security training and inspections; notification after theft, loss, or release of a listed agent; and record maintenance (
<xref ref-type="bibr" rid="ref205">Gaudioso and Salerno, 2004</xref>
). Moreover, the Public Health Security and Bioterrorism Preparedness Act 2002 requires authorities at research and medical facilities to report work with select agents, and to submit the names of employees with a legitimate need for access to pathogens to the Health and Human Services Secretary and the Attorney General. These names are checked against criminal, immigration, and national security databases for possible ‘restricted person’ status (US Code, Title 18,
<xref ref-type="book-part" rid="chapter10">Chapter 10</xref>
, section 175b(b)(2)).</p>
<p>Although such precautions appear sensible and worthwhile, an important lesson from the US experience is that biosecurity regulation must strike a balance between maximising security benefits while doing the least amount of harm to legitimate research. The biotechnology sector is simultaneously a potential locus of disease-based security threats and a crucial ally for governments seeking to resist such threats. The sector performs basic research on pathogenic micro-organisms, produces vaccines and other drugs, and instructs health professionals on how to use them. Too much biosecurity regulation might cripple commercial and academic enterprise in the biological sciences and thereby diminish the ability of the public health system – particularly its diagnostic and patient care elements
<xref id="page_148" ref-type="page"></xref>
– to respond to an infectious disease outbreak. Many US scientists have decided to discontinue or not pursue research on regulated agents, rather than bear the associated financial and administrative burdens. Scientists at Stanford University, for example, destroyed or transferred collections of
<italic>F tularensis</italic>
(tularaemia) and
<italic>Y pestis</italic>
(plague) because they believed the burdens of the select agent regulations outweighed the scientific need to maintain stocks on campus (
<xref ref-type="bibr" rid="ref205">Gaudioso and Salerno, 2004</xref>
).</p>
<p>In addition to generating opportunity costs in terms of public health, research priorities for US biodefence increase the risk of infectious disease outbreaks inside the United States itself. More laboratories for investigating pathogens and potential therapies might reduce the vulnerability of Americans to disease threats of deliberate or natural origin, but they also pose risks to health, safety and security. At present there are four fully-operational BSL-4 laboratories in the United States engaged in biodefence research: at the CDC in Atlanta, Georgia; at USAMRIID in Frederick, Maryland; at the Southwest Foundation for Biomedical Research in San Antonio, Texas; and at the NIH at Bethesda, Maryland. NIAID has allocated funds to construct two National Biocontainment Laboratories, which will contain BSL-4 facilities designed for studying the most dangerous pathogens, and it plans to build two BSL-4 laboratories for its own purposes. The US Army and Department of Homeland Security also plan to construct additional high-containment laboratories (
<xref ref-type="bibr" rid="ref386">Nelson, 2004</xref>
).</p>
<p>Supporters of this expansion argue that the anthrax attacks of 2001 exposed a shortage of the specialised, high-containment laboratory space needed to conduct research on micro-organisms that could be used as weapons, as well as on potential vaccines and therapies. However, a major concern is that the expansion of laboratory research is taking place too quickly, with insufficient trained staff to operate all the new laboratories, and without adequate safeguards. Plans to expand the number of high-containment laboratories inside the United States have already generated widespread community consternation that this could result in more laboratory-acquired infections and accidental releases of pathogens into the environment (
<xref ref-type="bibr" rid="ref275">James, 2004</xref>
;
<xref ref-type="bibr" rid="ref292">Kaiser, 2004</xref>
). A study by the Sunshine Project found that 97 per cent of principal investigators who received NIAID grants from 2001 to 2005 to study six pathogens (anthrax, brucellosis, glanders, plague, melioidosis, or tularaemia) were newcomers to such research. Critics argue that giving work to these so-called ‘bug jockeys’ increases the risks of accidental pathogen release (
<xref ref-type="bibr" rid="ref460">Schwellenbach, 2005</xref>
).</p>
<p>There are also inherent security risks associated with having large numbers of scientists engaged in pathogen research, notwithstanding the US government’s stated policy that the increase in such work is intended for defensive purposes. More than 11,000 individuals and over 300 laboratories in the United States have reportedly received government approval to conduct experiments involving select agents. The number of NIH grants for projects involving anthrax rose from 28 in 2000 to 253 in 2003. And in 2000, 25 projects mentioned ‘bioterrorism’ and related words, compared to 665 in 2003 (
<xref ref-type="bibr" rid="ref462">Shane, 2004</xref>
). With so many people and places involved in biodefence, there is an increased chance that pathogens might
<xref id="page_149" ref-type="page"></xref>
be deliberately misused by a scientist. In 2004 the National Academy of Sciences called for greater security measures because it regarded biodefence research as ‘precisely the sort of research likely to pose the most severe dual use dilemmas’ (
<xref ref-type="bibr" rid="ref377">NAS, 2004</xref>
: 3). With an increasing number of Americans being granted access to dangerous pathogens and instruction on how to handle them, the danger is that the United States could be inadvertently creating its own training ground for would-be perpetrators of biological attacks.</p>
<p>In most discussion of ‘biosecurity’, the emphasis tends to be on diversion threats posed by outsiders – that is, non-laboratory workers with malign intent who might break into a research facility. This is consistent with the political rhetoric prevalent since 11 September 2001 of ‘WMD falling into the hands of terrorists’. It is important, however, not to overlook the threat from insiders – trusted members of staff with access to pathogens and who are familiar with laboratory security procedures and equipment. A rhetorical tag for such a threat might be ‘people with WMD deciding to become terrorists’. It is highly likely, for example, that an expert insider with laboratory experience was the perpetrator of the most sophisticated BW attack in history. Analyses of the anthrax spores used in the envelope attacks of 2001 revealed that they were examples of the Ames strain of
<italic>B anthracis</italic>
– a highly virulent strain originally developed in powder form by USAMRIID for testing biological defence systems (
<xref ref-type="bibr" rid="ref421">Read
<italic>et al.,</italic>
2002</xref>
). The anthrax used in the envelope attacks was also reportedly ‘weapons-grade’ – exceptionally free of bacterial residue, of uniform particle size, treated with silica to reduce particle clumping, and dispersed easily. Its high concentration (one trillion spores per gram) and purity gave rise to suggestions that the attacks had links to a sophisticated government biodefence programme (
<xref ref-type="bibr" rid="ref353">Matsumoto, 2003</xref>
).</p>
<p>Federal Bureau of Investigation (FBI) psychological profilers settled on ‘a disaffected American loner’ as the most likely perpetrator of the attacks (
<xref ref-type="bibr" rid="ref228">Gugliotta, 2002</xref>
). And because so much of the evidence pointed to a plot hatched and executed within the United States, law enforcement officials concentrated on biodefence specialists; in particular on scientists familiar with weaponising pathogens. The FBI investigation focused on US Army scientists at Fort Detrick – the very ones responsible for protecting the United States from biological attack. In the course of the investigation (dubbed ‘Amerithrax’), US Attorney General John Ashcroft labelled Steven Hatfill a ‘person of interest’. Hatfill came under suspicion partly because he formerly worked as a medical researcher at USAMRIID (
<xref ref-type="bibr" rid="ref364">Miller, 2003</xref>
). Although Hatfill has not been convicted of or charged with involvement in the 2001 anthrax attacks, his designation by the FBI as a ‘person of interest’ supports the proposition that personnel inside a biodefence facility are a potentially serious avenue for pathogen diversion.</p>
<p>Beyond generating research opportunity costs and national security risks, particular US biodefence priorities also pose risks to international security. The following section concentrates on pathogen research carried out for ‘threat assessment’ purposes; its status under international law, and its implications for BW proliferation.</p>
</sec>
<sec id="sec9_3">
<title>
<xref id="page_150" ref-type="page"></xref>
International law and security</title>
<p>Most biodefence projects are purely defensive and clearly benign in nature – for example, biological detection systems, filtration and protection systems, decontaminants, training for first responders, provision of medical facilities, interagency communication and coordination, and epidemiological surveillance systems. Such technologies bring the direct, practical benefit of reducing (and possibly avoiding) the human damage that would result from the use of BW. Of particular concern, however, are biodefence projects conducted for ‘threat assessment’ purposes. Under the 1972 Biological Weapons Convention (BWC), a grey area between prohibited offensive activity and permitted defensive activity is the exploration of the potential of pathogens to be used as weapons in order to develop appropriate countermeasures. Although US biodefence policy is almost certainly peaceful in its intent, some forms of threat assessment nevertheless risk breaching international law and stimulating ‘defensive’ BW proliferation in other countries. The main challenge for the United States is to pursue biodefence in a way that does not endanger the international norms and laws against deliberate disease – any lowering of the moral and legal threshold would make biological attacks more likely.</p>
<p>At the Los Alamos National Laboratory in New Mexico, US scientists have built elaborate computer models of cities and then simulated the fallout from a hypothetical ‘terrorist’ attack. Findings from simulations of a smallpox release in a major city have been useful, for example, by contributing to the debate in the United States over whether targeted vaccinations or mass vaccination of the entire country is preferable. In July 2005 a scientist on the smallpox simulation project, James Smith, told the
<italic>Washington Post</italic>
‘[w]e’re trying to be the best terrorists we can be. Sometimes we finish and we’re like, “We’re glad we’re not terrorists.”’ If ever the simulations got into the wrong hands, Smith said, ‘[i]t would be a terrorist recipe for doing something terrible’ (
<xref ref-type="bibr" rid="ref113">Cha, 2005</xref>
). Computer modelling of a smallpox event does not contravene international law, although the Los Alamos example illustrates how information obtained in the interests of defence could be used for offensive purposes.</p>
<p>Research and development projects on BW threat assessment involve experimenting with the offensive applications of pathogens so as to determine appropriate countermeasures – a practice known as ‘red teaming’. In order to develop defences against a putative BW agent, it is necessary to understand: the underlying mechanisms for pathogenicity, including infectivity and virulence; the way in which a micro-organism evades the human immune system or acquires resistance to antibiotics; and the ways in which the agent may be dispersed, and its infectivity by each route. However, an understanding of these factors is also exactly what would be required for the development of BW.</p>
<p>Article I of the BWC prohibits development, production and stockpiling of BW, but it is silent on the question of research. In accordance with National Security Decision Memorandum 35, issued by National Security Advisor Henry Kissinger on 25 November 1969, the United States interprets its responsibilities under the
<xref id="page_151" ref-type="page"></xref>
BWC as permitting ‘research into those offensive aspects of bacteriological/ biological agents necessary to determine what defensive measures are required’. (
<xref ref-type="bibr" rid="ref306">Kissinger, 1969</xref>
). The memorandum did not specify what types of research were justified for defensive purposes. On 23 December 1975 National Security Advisor Brent Scowcroft issued a second memorandum authorising ‘vulnerability studies’ as permissible under the BWC, but there was no express authority for the creation of novel pathogens or weaponisation techniques for threat assessment purposes (
<xref ref-type="bibr" rid="ref17">Anonymous, 2002</xref>
). In May 1989, however, in testimony before the US Senate Committee on Government Affairs, USAMRIID commander David Huxsoll stated that research to produce more virulent biological agents, to stabilise agents, and on dissemination methods, was prohibited by the BWC (
<xref ref-type="bibr" rid="ref323">Leitenberg, 2003</xref>
: 242).</p>
<p>Such comments by a U.S military officer today would not reflect the apparent attitude of his or her government regarding what constitutes defensive work. At present, a number of US government agencies are undertaking or plan to undertake research in exactly the areas cited by Huxsoll. Most prominent among these is the National Biodefense Analysis and Countermeasures Center (NBACC). Due to be completed in 2008, it is intended to provide the United States with highcontainment laboratory space for biological threat characterisation and bioforensic research. NBACC will form part of the National Interagency Biodefense Campus at Fort Detrick, Maryland, alongside existing USAMRIID facilities. Its programmes will investigate the infectious properties of biological agents, the effectiveness of countermeasures, decontamination procedures, and forensic analysis. Part of NBACC is the Biological Threat Characterization Center, which will conduct laboratory experiments aimed at assessing current and ‘future’ biological threats. The centre will also assess vulnerabilities, conduct risk assessments, and determine potential impacts in order to guide the development of countermeasures such as detectors, vaccines, drugs, and decontamination technologies (
<xref ref-type="bibr" rid="ref156">DHS, 2005</xref>
). The CIA has reportedly assigned to NBACC at least one member of the ‘Z-Division’, a group jointly operated with Lawrence Livermore National Laboratory that specialises in analysing and duplicating weapons systems of potential adversaries (
<xref ref-type="bibr" rid="ref540">Warrick, 2006</xref>
).</p>
<p>Many of the activities to be undertaken by NBACC could readily be interpreted by outsiders as the development of BW under the guise of threat assessment. In particular, weaponisation projects and the construction of novel pathogens arguably constitute breaches of the BWC. In a February 2004 presentation, George Korch, Deputy Director of NBACC, revealed that one of the centre’s research units intended to pursue a range of topics including ‘aerosol dynamics’, ‘novel packaging’, ‘novel delivery of threat’, ‘genetic engineering’, and ‘red teaming’. At one point in his presentation, Korch summarised the threat assessment task areas as: ‘Acquire, Grow, Modify, Store, Stabilize, Package, Disperse’ (
<xref ref-type="bibr" rid="ref310">Korch, 2004</xref>
). Such language is identical to that which would describe the functions of an offensive BW programme.</p>
<p>A 1998 report by the US Under Secretary of Defense for Acquisition and Technology stated: ‘Stabilization and dispersion are [BW] proliferation concerns because these technologies increase the efficacy of biological agents’ (Anonymous,
<xref id="page_152" ref-type="page"></xref>
1998: II-3-7). And in light of the planned NBACC activities described by Korch, a 2005 State Department report which assessed that ‘China maintains some elements of an offensive BW capability in violation of its BWC obligations’ appeared to reflect an American double standard when it warned that:</p>
<disp-quote>
<p>From 1993 to the present, [Chinese] military scientists have published in open literature the results of studies of aerosol stability of bacteria, models of infectious virus aerosols, and detection of aerosolized viruses using polymerase chain reaction technology. Such advanced biotechnology techniques could be applicable to the development of offensive BW agents and weapons.</p>
<attrib>(
<xref ref-type="bibr" rid="ref18">Anonymous, 2005</xref>
)</attrib>
</disp-quote>
<p>By comparison, the 2006 Report to Congress by the CBDP revealed that facilities at the US Army Edgewood Chemical Biological Center include: ‘Aerosol simulation chambers and the Aerodynamic Research Laboratory, comprising approximately 11,000 ft
<sup>2</sup>
of experimental aerodynamic facilities that include four wind tunnels for component and materials tests’. In addition, the US Army Dugway Proving Ground has a Life Sciences Test Facility with multiple live biological agent test chambers with aerosolisation capability, and an Ambient Breeze Tunnel for biological simulant system tests (
<xref ref-type="bibr" rid="ref110">CBDP, 2006</xref>
: 69–70). Such facilities could likewise be ‘applicable to the development of offensive BW agents and weapons’.</p>
<p>In November 2002 a group of non-government organisations drafted recommendations for a code of conduct for biodefence programmes and distributed them to national delegations attending the Fifth BWC Review Conference in Geneva. Of particular relevance to BW threat assessment projects, the draft code included the following statements:</p>
<disp-quote>
<p>The Convention’s stated goal is to preclude the use of biological weapons under any circumstances; therefore it is not permissible, even for defensive purposes, to construct delivery mechanisms designed for (i.e., having a design that is appropriate for) hostile use, whether or not hostile use is intended at the time of construction.</p>
<p>Aerosolization or other dissemination of active biological agents should be performed only in fully-contained bench-scale environments and only for the purposes of detection, prophylaxis or medical treatment.</p>
<attrib>(
<xref ref-type="bibr" rid="ref181">FAS, 2002</xref>
)</attrib>
</disp-quote>
<p>In the area of scientific endeavour to counter bioterrorism, a key challenge for the United States is to pursue defences in a way that does not endanger the norm against deliberate disease, as embodied in the BWC. On 4 September 2001 the
<italic>New York Times</italic>
revealed the existence of three classified US biodefence projects. From 1997 to 2000 Project Clear Vision involved building and testing a Soviet-model bomblet for dispersing bacteria. In 1999–2000 Project Bacchus investigated whether a would-be ‘terrorist’ using commercially available materials
<xref id="page_153" ref-type="page"></xref>
and equipment could assemble an anthrax production facility undetected by the US and foreign governments. And in early 2001 Project Jefferson involved the reproduction of a vaccine-resistant strain of anthrax bacteria (
<xref ref-type="bibr" rid="ref365">Miller
<italic>et al.,</italic>
2001</xref>
).</p>
<p>If similar projects had been carried out inside a designated ‘rogue state’, it is highly likely that they would have been viewed by the United States and other Western countries as violations of the BWC. For this reason, the latter cannot afford to be complacent about non-Western perceptions of ostensibly defensive BW activities. As the BMA acknowledged in 2004, ‘some countries may not view the West as benign in general and some biotechnology work being carried out in the West as necessarily above suspicion’ (
<xref ref-type="bibr" rid="ref61">BMA, 2004</xref>
: 112). It is also worth noting the possibility that the former Soviet Union maintained its BW programme after signing the BWC in 1972 because it believed the United States intended to do likewise, notwithstanding President Richard Nixon’s 1969 renunciation of biological warfare. In his 1999 memoir
<italic>Biohazard,</italic>
Soviet defector Ken Alibek reflected:</p>
<disp-quote>
<p>We didn’t believe a word of Nixon’s announcement. Even though the massive US biological munitions stockpile was ordered to be destroyed, and some twenty-two hundred researchers and technicians lost their jobs, we thought the Americans were only wrapping a thicker cloak around their activities.</p>
<attrib>(
<xref ref-type="bibr" rid="ref11">Alibek, 1999</xref>
: 234)</attrib>
</disp-quote>
<p>The difficulty of determining BWC compliance lies in the extent to which it comes down to perceptions of a given state’s intent. And because intent is difficult to gauge reliably, states naturally err on the side of caution by focusing on the capabilities of potential adversaries. Allaying BW suspicions therefore requires as much transparency as possible regarding such capabilities as is consistent with national security. The importance of transparency was recognised in 1986 at the Second BWC Review Conference when member states agreed to specific confidence-building measures (CBMs). These were extended and elaborated at the Third BWC Review Conference in 1991. The CBMs include:</p>
<list list-type="unorder">
<list-item>
<p>exchange of data on research centres and high-containment laboratories;</p>
</list-item>
<list-item>
<p>exchange of data on and descriptions of national biological defence programmes and associated facilities;</p>
</list-item>
<list-item>
<p>declarations on vaccine production facilities;</p>
</list-item>
<list-item>
<p>exchange of information on unusual infectious disease outbreaks;</p>
</list-item>
<list-item>
<p>encouragement of publication of experiment results and promotion of use of knowledge;</p>
</list-item>
<list-item>
<p>active promotion of scientific contacts through international conferences, symposia, seminars and other forums for exchange; and</p>
</list-item>
<list-item>
<p>declaration of legislation, regulations and other BWC implementation measures.</p>
<p>(
<xref ref-type="bibr" rid="ref94">BWC, 1991</xref>
)</p>
</list-item>
</list>
<p>
<xref id="page_154" ref-type="page"></xref>
A world leader on transparency is Canada’s Biological and Chemical Defence Review Committee which oversees relevant research, development and training activities undertaken by the Department of National Defence to ensure that they are defensive in nature. The Committee publishes its annual reports on its website (
<xref ref-type="bibr" rid="ref39">BCDRC, 2005</xref>
).</p>
<p>Beyond the legal issue of BWC compliance, transparency is also important for strategic reasons. Since the end of the Cold War, and beginning with the Clinton administration, the United States has shifted its focus away from the problem of state-run BW programmes and towards concerns about biological attacks perpetrated by non-state actors. However, the dynamics of proliferation by states are still important today. For at least three reasons, the very existence of the US biodefence programme might induce other countries to imitate it – BW proliferation in a defensive guise.</p>
<p>First, in the eyes of a suspicious adversary, the development of pharmaceutical defences might constitute an attempt to acquire protection for a nation’s own military forces against a biological agent that the nation intends to use in a BW ‘first strike’. Prior to the 1991 Gulf War, for example, one of the reported reasons why the US military became concerned about the use of
<italic>B anthracis</italic>
was the discovery that Iraqi soldiers captured in a covert pre-war operation had immunity against anthrax (
<xref ref-type="bibr" rid="ref69">Broad, 1998</xref>
). Second, any close association between defensive BW work and existing military programmes can create nervousness in an outside observer. For example, the conduct of classified biodefence research at the Lawrence Livermore and Los Alamos National Laboratories might cause other countries to be concerned about possible US offensive intent because these facilities have historically been used for nuclear weapons development (
<xref ref-type="bibr" rid="ref302">Kelley and Coghlan, 2003</xref>
). And third, the risk of BW proliferation is exacerbated by US threat assessment projects. In particular, rival nations might be concerned that American exploration of novel BW threats could generate scientific breakthroughs that put them at a strategic disadvantage (
<xref ref-type="bibr" rid="ref512">Tucker, 2004</xref>
: 14). The result could be a BW arms race.</p>
</sec>
<sec id="sec9_4">
<title>Conclusion</title>
<p>Since the anthrax envelope attacks of 2001, US policy on countering bioterrorism has seen billions of extra dollars invested in biodefence. Pharmaceutical countermeasures, a major pillar of this policy, are unlikely to offer protection against the vast range of pathogens that could be used in a biological attack. Nevertheless, the possibility that broad-spectrum treatments could be developed means pathogen research is an important pursuit. For the United States, the challenge is to protect its citizens from BW threats in a way that does not generate disproportionate risks and opportunity costs. Other, ongoing threats to human health compete with agents of BW concern for government research funding, so US policy needs to avoid being counterproductive from a public health standpoint. And although the planned expansion of laboratory capacity could yield a net increase in research on infectious diseases, this raises concerns over safety and the security risk that
<xref id="page_155" ref-type="page"></xref>
individual scientists might divert or misuse pathogenic micro-organisms. From an international security perspective, US defensive work on pathogenic agents needs to be conducted in a manner more sensitive to how that work may be perceived by others. There is a particular danger that current and planned US projects on BW threat assessment could be seen as breaches, actual or potential, of the BWC. Absent appropriate transparency measures, the development of offensive capabilities for defensive purposes poses a serious security risk of undermining the international norm against BW. This in turn would exacerbate and accelerate the problem of BW proliferation. It would be tragically ironic if US measures for countering bioterrorism served to increase the level of threat.</p>
</sec>
</body>
</book-part>
<book-part book-part-type="chapter" book-part-number="10" id="chapter10">
<book-part-meta>
<title-group>
<title>
<xref id="page_156" ref-type="page"></xref>
Ethics and intelligence in the age of terror</title>
<alt-title alt-title-type="running-head-verso">Ethics and intelligence in the age of terror</alt-title>
<alt-title alt-title-type="running-head-recto">Hugh Smith</alt-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<given-names>Hugh</given-names>
<surname>Smith</surname>
</name>
</contrib>
</contrib-group>
</book-part-meta>
<body>
<p>Intelligence is the business of collecting information, analysing it and providing assessments to government for policy-making in relation to national security. Most studies of intelligence focus on topics such as operations, changing technology, and the kind of threats agencies must deal with. Few discuss ethical aspects in any depth (
<xref ref-type="bibr" rid="ref288">Jones: 1989</xref>
).
<sup>
<xref ref-type="fn" rid="fn10_1">1</xref>
</sup>
But intelligence by its nature pushes the bounds of legality and propriety, and perhaps routinely oversteps them. This chapter looks at ethical issues surrounding the gathering of information. The moral dilemmas faced by those who analyse information and advise governments deserve separate treatment (
<xref ref-type="bibr" rid="ref416">Pillar 2006</xref>
).</p>
<p>Gathering information by governments must be seen in its context of international politics where national security, perhaps national survival, is at stake. Very different views exist about whether morality or law can exist at all among sovereign states, and about the character of such law and morality if they do exist. Here we briefly examine arguments that bear on the collection of intelligence. The rest of the chapter looks at information gathering before 9/11 and at how the ‘war on terror’ has affected this process. Key factors include: the nature of the contemporary struggle against terrorism, the importance of the interrogation of individuals, the circumstances which make ethical behaviour in this arena difficult, and the challenge of developing effective rules.</p>
<p>Ethics is concerned with both general ideas and practical action. Many rules, laws, principles, conventions and so on relate to intelligence in general, some of which have legal form. Here the principal focus is not on the legal debate but on the moral rules that may (or may not) underlie black letter law. Law, said US Chief Justice Earl Warren, floats on a sea of ethics. But ethics is also concerned with individual behaviour in concrete situations. How far can interrogators go, for example, in seeking to gain information from prisoners? It is no accident that both general and specific issues of this kind have come to the fore in public debate since 9/11.</p>
<sec id="sec10_1">
<title>Ethical objections</title>
<p>For some ‘ethical espionage’ is an oxymoron on a par with ‘military intelligence’. In 1929 US Secretary of State Henry L. Stimson closed a code-breaking unit,
<xref id="page_157" ref-type="page"></xref>
known as the Black Chamber, as soon as he learnt of its existence, later saying of this decision: ‘Gentlemen do not read each other’s mail’. For him spying and code-breaking were inherently dishonourable at a personal level. Stimson, in short, saw ethical behaviour as more important than short-term advantage to his country. By 1940, when he was Secretary of War, he had changed his views and advocated the use of code-breaking to counter Japan’s growing power – too late, critics argue, to prevent Pearl Harbor (
<xref ref-type="bibr" rid="ref473">Shulsky 1993</xref>
: 187–8).</p>
<p>A more philosophical critique of the intelligence business is that it is unethical since it inevitably entails deception and lying. Thus for Immanuel Kant these activities are wrong since they diminish another person’s capacity to act morally by positively deceiving him or at least by depriving him of full information. They also make mutual confidence among states impossible since they are practices that cannot be universalised i.e. followed by everyone. Kant condemned in particular the instigation and use of ‘treachery’ in dealing with other states.</p>
<p>The democratic objection to intelligence focuses on problems of accountability (
<xref ref-type="bibr" rid="ref337">Lustgarten and Leigh 1994</xref>
). In order to be effective many activities of intelligence agencies must occur covertly and remain hidden from the public, even from elected legislators. Neither armed forces nor the police are given such latitude. Their activities take place largely in the public view, often in the presence of national and international media, and are subject to extensive legal regulation and legislative review. Nor is the judiciary well-placed to act as a check on intelligence agencies since relevant cases only rarely find their way to court. If intelligence agencies are to be kept accountable, prime responsibility must fall on the executive government.</p>
<p>It is also problematic from the ethical point of view that obtaining information often takes place in situations inherently liable to lead to abuse as a consequence of great disparities of power. Information, it has been argued, is more easily gained from the weak, the vulnerable and the innocent (
<xref ref-type="bibr" rid="ref212">Godfrey 1978</xref>
: 629). Holding a person prisoner, above all, seems to create a natural temptation to use violence to extract information. Lord Acton’s warning – ‘power corrupts, absolute power corrupts absolutely’ – applies not just in the political arena but also in the interrogation room.</p>
</sec>
<sec id="sec10_2">
<title>Ethical justifications</title>
<p>The most common justification for intelligence gathering is that it contributes to the security of the state. Like war, it is a continuation of policy by other means and can be defended in the same way that Machiavelli justified war in
<italic>The Prince:</italic>
‘that war is just that which is necessary’. Whatever it takes to secure the state and its citizens is justified regardless of who gets hurt in the process, innocent or otherwise, and of the means employed. The end justifies any (necessary) means.</p>
<p>Machiavelli accepted the existence of morality among individuals but distinguished between political and personal obligations. A prince is not like an ordinary citizen since he has an overriding duty to protect his state. He must therefore overcome personal ethical qualms about what he has to do. A prince
<xref id="page_158" ref-type="page"></xref>
must ‘learn to be bad’ in order to protect his state. Actions can be justified for national security even though they may leave the ruler (or the intelligence agent) with a sense of having ‘dirty hands’ (
<xref ref-type="bibr" rid="ref536">Walzer 1973</xref>
). This goes with the job.</p>
<p>Hobbes sees no place at all for ethical qualms in international politics. Since there is no sovereign authority among states, there can be no law and no morality.
<italic>Leviathan</italic>
describes this as a ‘state of nature’ in which sovereigns have ‘their eyes fixed on one another; that is, their forts, garrisons and guns upon the frontiers of their kingdoms; and continual spies upon their neighbours; which is a posture of war’. Preparing for war and spying on neighbours are not so much justified as simply part of the struggle for survival.</p>
<p>Though Hobbes’ ethical nihilism and Machiavelli’s ethical relativism are common philosophies, states have in practice sought to identify certain moral and legal principles that are widely enough shared to guide their behaviour in some measure. The clash of military forces, in particular, is governed by the law of armed conflict which sets out rules of conduct that have found widespread, though far from total, observance. Where intelligence activities are concerned, however, moral and legal principles are much thinner on the ground.</p>
<p>Some black-letter rules nonetheless exist. The 1984 Convention Against Torture, for example, expressly prohibits such methods for collecting information. Other ‘rules’ tend to be unwritten, informal and unclear. Thus in wartime, enemy spies do not qualify as prisoners of war if captured and may be subject to the death penalty, but in practice are often treated with some leniency. During the Cold War the US and USSR on occasion exchanged captured spies. Reciprocity and the view that spies are simply doing their job help explain this pattern. As Geoffrey Best observes: ‘[t]he spy remains in his curious legal limbo; whether his work is honourable or dishonourable, none can tell’ (
<xref ref-type="bibr" rid="ref51">Best 1994</xref>
: 291).</p>
</sec>
<sec id="sec10_3">
<title>Intelligence before the ‘war on terror’</title>
<p>Prior to 9/11 the security of states was seen to depend primarily on the balance of military strength among rivals so that intelligence collection focused on such matters as the size and nature of military arsenals, new weapons technology, and military plans and deployments. Specific states could be identified as potential enemies and intelligence efforts targeted accordingly. In this context the moral questions central to intelligence gathering could be summed up as: ‘who is fair game?’ and ‘what methods of collection are justifiable?’</p>
</sec>
<sec id="sec10_4">
<title>Who is fair game?</title>
<p>Who can justifiably be targeted in the gathering of information? This question is important because it suggests that the business of intelligence collection might be confined to the players ‘on the field’ rather than involving innocent or unwitting spectators. The same moral principle of discrimination in the law of armed conflict seeks to limit killing as far as possible to military forces. Where the military generally focus on more specific threats, however, intelligence for
<xref id="page_159" ref-type="page"></xref>
national security has always sought to identify long-term and short-term threats of many different kinds. This requires information from numerous sources about a great range of future developments. Targets will be more diverse and difficult to identify than those in military operations, and there is in principle almost no limit to the people who may be targeted in the quest for information.</p>
<sec id="sec10_4_1">
<title>States and organisations</title>
<p>In the first instance, targets can be considered in terms of states and organisations as opposed to individuals. Enemy states easily qualify since they threaten our security. In time of war, hot or cold, we need information about them and can assume they are spying on us. In peacetime ‘enemies’ may be more difficult to identify since there is often a competitive rivalry even among allies. Britain, for example, bugged the French embassy in London from 1960 to 1963 in order to monitor France’s position on negotiations over the Common Market, a policy, which R.V. Jones believed, should be abandoned on moral grounds (
<xref ref-type="bibr" rid="ref288">Jones 1989</xref>
: 35–6). Can, say, Australia assume that none of its close allies spy on it? Should it refrain from spying against its allies? Is this a betrayal of trust or does a basic commonality of interests make espionage in this context more acceptable because it is less harmful?</p>
<p>Gaining useful information from neutral states is problematic on different grounds. Respect for neutrality may carry some weight though fear of antagonising neutrals, if caught out, is perhaps a greater factor. Spying on international organisations such as the United Nations raises other questions. In 2004, for example, a former British cabinet minister, Clare Short, expressed outrage that the UK should engage in spying on the UN Secretary General in the lead up to the Iraq war (
<xref ref-type="bibr" rid="ref35">BBC News Online 2004</xref>
). As an organisation designed to promote peace, the UN can claim a certain immunity from such practices – in the same way that the Red Cross enjoys protected status. Nor does reciprocity apply since the UN does not spy on its members, if only because it is incapable of doing so.</p>
<p>Different issues arise when information gathering is directed against transnational terrorist groups. The difficulty is that such organisations usually operate across several countries and the governments concerned often cannot or will not take effective action against them. Regardless of the general rule of non-intervention in internal affairs, it may be legitimate self-defence for a state under threat to gather information about terrorist groups or even take military action in another state if violent attack is imminent.</p>
</sec>
<sec id="sec10_4_2">
<title>Individuals</title>
<p>Individuals as targets of information gathering vary in ethical terms according to one principal criterion, namely the degree of their involvement in security matters (
<xref ref-type="bibr" rid="ref413">Pfaff and Tiel 2004</xref>
). Most legitimate are those agents of another state, military and civilian, who have information relevant to another state’s security. Such people in fact may be identified by the state they work for through the granting of
<xref id="page_160" ref-type="page"></xref>
security clearances; in the same way military uniforms identify legitimate targets in time of war. Of course, it is not always apparent who has clearances so that many people may have to be checked to determine their status.</p>
<p>More problematic as targets are individuals who are not part of a security establishment but who have knowledge that is essential to another state’s security. Doctors may know about diseases relevant to biological warfare, engineers about nuclear power generation relevant to nuclear weapons production. ‘Dual-use technology’ means dual-status citizens. In some cases these individuals may not know of their potential vulnerability in security terms and their own government may have an obligation to inform them accordingly.</p>
<p>Using the family or friends of particular individuals to secure information is most difficult to justify. Such individuals may be involved purely by chance of birth, marriage or friendship. Indeed, they may have no idea that they are likely targets, kept in the dark by the target himself for security reasons. Ethical considerations might suggest they should be off limits – like civilians in war – though their value as sources of information make this unlikely in practice.</p>
</sec>
</sec>
<sec id="sec10_5">
<title>What methods of collection are justifiable?</title>
<p>Intelligence agencies have always employed a wide range of methods to collect information. As will be seen, these vary along several dimensions of relevance to ethical judgement:</p>
<list list-type="alpha-lower">
<list-item>
<p>the extent of intrusion into the privacy of others;</p>
</list-item>
<list-item>
<p>the degree of harm inflicted or threatened;</p>
</list-item>
<list-item>
<p>the nature of any deception involved;</p>
</list-item>
<list-item>
<p>the moral harm incurred by the agent (because of the nature of the acts he or she performs);</p>
</list-item>
<list-item>
<p>the extent to which a target renders himself open to exploitation; and arguably</p>
</list-item>
<list-item>
<p>the extent to which all states employ certain methods and expect to have them used against themselves (reciprocity).</p>
</list-item>
</list>
<p>The first two amount to what R.V. Jones calls a principle of ‘minimum trespass’ on the rights of individuals (
<xref ref-type="bibr" rid="ref289">Jones 1995</xref>
: 5). It equates to the military doctrine of using only the minimum force necessary to achieve a (legitimate) objective. The second two focus on actors who are involved either actively or as bystanders – what moral harm do they suffer? The final pair deal with the target and his state – to what extent are they active and equal participants in the struggle? Different methods of collection in a debatable order of harmfulness can be assessed against these criteria.</p>
<sec id="sec10_5_1">
<title>
<xref id="page_161" ref-type="page"></xref>
Open sources</title>
<p>Open sources, notably the World Wide Web, provide most information for intelligence agencies – some estimates put it at 90 per cent. This does not create dilemmas except those of judging the reliability and significance of such data. It does raise the question whether open sources should be used in preference to more covert or harmful means of gathering information. The latter methods, however, may be valuable in confirming or disproving open source information.</p>
</sec>
<sec id="sec10_5_2">
<title>Observation</title>
<p>As Yogi Berra said: ‘You can observe a lot just by watchin’’. Simple observation of others by legal means does no significant or immediate harm though it may entail a minor invasion of privacy. Much electronic eavesdropping is no more than listening to transmissions in the ether. Most states engage in such activities and expect others to do so. Targets may or may not be aware that it is occurring.</p>
<p>During the Cold War mutual observation by satellites became acceptable as both superpowers relied on so-called ‘national technical means of verification’ to verify the other’s compliance with arms control agreements. These methods, it has been suggested, did ‘only minimal damage to the ethical standards of the operators and processors’ (
<xref ref-type="bibr" rid="ref212">Godfrey 1978</xref>
: 637). But if satellites are acceptable, spy-planes in another nation’s airspace are not – witness the international crises that followed the downing of an American U-2 aircraft over the Soviet Union in 1960 and of a Korean Airlines 747 suspected of spying on Soviet defences in 1983.</p>
</sec>
<sec id="sec10_5_3">
<title>Deception</title>
<p>Deception entails the use of cover or disguise to obtain information, for example, pretending to be a journalist, trade official, representative of an NGO or an agent of a different country. Long-term ‘sleepers’ or ‘moles’ disguise themselves as ordinary citizens or workers. Such deception in itself does not seriously hurt individuals but has great potential to harm the target nation. These forms of deception resemble
<italic>ruses de guerre</italic>
such as camouflage and ambush that are permitted in warfare. Many states engage in them and all states expect them to happen.</p>
<p>Some deceptions, however, unfairly harm organisations that are falsely represented. The impartial reputation of the Red Cross is at risk, for example, if an individual purports to be one of its officials in order to secure information. The notion of perfidy in the law of armed conflict similarly prohibits abuse of Red Cross symbols. Other organisations falling into this protected category include the UN and perhaps certain other international bodies.</p>
</sec>
<sec id="sec10_5_4">
<title>Invasion of privacy</title>
<p>This takes such forms as theft of documents, breaking and entering, interception of communications and computer hacking. Electronic eavesdropping may involve
<xref id="page_162" ref-type="page"></xref>
secretly placing bugs in government buildings or private premises. Efforts are usually made to act covertly so that the target does not know an invasion of privacy has taken place, or to disguise actions as something else, e.g. as burglary for private gain.</p>
<p>Such methods are likely to be illegal under an agent’s national laws, under the target’s national laws and possibly under international law (which, for example, protects diplomatic immunity). While minimum harm is done to the target, especially if unsuspecting, great harm may be done to his nation’s security. Those in the game, of course, expect such activity and take active steps to prevent it and nullify the consequences.</p>
</sec>
<sec id="sec10_5_5">
<title>Persuasion</title>
<p>Persuasion seeks information from a person by convincing him of the justice of one’s cause. Defectors in the Cold War mostly acted out of genuine conviction – for or against communism. Attempts to win over such people can be seen as a natural part of political struggle. This is usually quite lawful on the part of the recruiter, but those recruited generally find themselves in breach of their nation’s laws. A clever, if morally questionable, ruse is ‘false-flag recruitment’ of agents who are deceived as to which country they will be working for (
<xref ref-type="bibr" rid="ref410">Perry 1995</xref>
: 96)</p>
<p>Those who betray their country out of genuine belief or idealism (even if naïve) nonetheless attract a certain moral aura. The West naturally praised those who abandoned Soviet Russia. But even those who went over to communism were sometimes seen as in a way admirable in taking great personal risks for the sake of an ideal. If those who betray their own government are caught, however, they are treated as less deserving of protection than foreign nationals caught spying for their government. Treason is regarded as a heinous crime almost everywhere and often carries the death penalty, even if capital punishment is otherwise unused.</p>
</sec>
<sec id="sec10_5_6">
<title>Entrapment</title>
<p>Entrapment relies on offers of money, sex, drugs, status or some personal benefit in return for providing information on a one-off or continuing basis. Unlike persuasion on ideological grounds it exploits the target’s baser motives. After the Cold War, it may be noted, money rather than ideology became the dominant motivation of nationals won over to spy against their country (
<xref ref-type="bibr" rid="ref507">Taylor and Snow 1997</xref>
: 102–3).</p>
<p>Initial requests for information may be minor in order to induce a target to compromise himself. Once money or a bribe of some sort has changed hands, the target is ‘on the hook’ because of the threat, spoken or unspoken, to reveal their treachery. Alternatively, a target may already have something to hide – illegal or immoral behaviour – that invites blackmail. It is often difficult to ignore threats of exposure though some individuals have sufficient moral courage to report the situation to their organisation.</p>
</sec>
<sec id="sec10_5_7">
<title>
<xref id="page_163" ref-type="page"></xref>
Coercion</title>
<p>Here violence is used or threatened against an individual – or perhaps members of his family – in order to secure information (the case of those held in captivity is considered later). Threats may be explicit or implicit and will usually be illegal (even if the threat is not carried out). Clearly, those threatened experience strong psychological pressure to cooperate. If a threat is carried out, physical harm also enters the picture – with the threat of more to come.</p>
<p>There are obvious moral and legal objections to making and carrying out threats of harm. The principal argument for the legitimacy of such actions is that targets may be security agents working for their government (and may carry out similar actions against their targets). Such people, it can be argued, are as much open to coercion as soldiers in uniform are open to being killed by opposing forces. It is also the case that they and their agency will be taking defensive and perhaps offensive counter-measures. Not all targets, of course, fall into this category.</p>
</sec>
</sec>
<sec id="sec10_6">
<title>Intelligence gathering post-9/11</title>
<p>The traditional security focus on military capabilities and intentions has not disappeared since 9/11 though it has been displaced in some measure by wider concerns such as environmental, economic and health security and greatly overshadowed by the demands of the ‘war on terror’. The attacks of 9/11 and the Western response to them have meant significant changes in the type of threat perceived and in the responses to them. During the Cold War the ‘intelligence-to-force ratio’ was relatively low – what mattered most was military capability – but the ‘war on terror’ has demanded a high ‘intelligence-to-force ratio’ (Reveron 2000: 455). What counts now is accurate intelligence about the personnel, plans and activities of terrorist groups, rather than the weapons they have (with the exception of weapons of mass destruction).</p>
<p>Several characteristics of intelligence gathering in the ‘war on terror’ can be identified, all of which point towards greater difficulty in creating or observing any limits on targets or on methods of collection. First, threats originate not just from enemy armies and arsenals, but from any group of people anywhere in the world. The US, above all, sees terrorism as global and transnational, rather than as national and local. Once anyone, including a country’s own nationals, is a potential terrorist, the range of people from whom and about whom information can be sought is unlimited.</p>
<p>Second, critical information is no longer focused primarily on the major weapons held by an opponent, but on an enormous range of weapons and tactics that a terrorist might use – from Kalashnikovs to kidnapping, from home-made explosives to stolen computer codes, from ground-to-air missiles to hijacked aircraft. Where nuclear espionage was the epitome of Cold War rivalry, a huge variety of possible threats now attracts the interest of security organisations. To the extent that terrorists might seek WMD, this at least provides a focus for information gathering.</p>
<p>
<xref id="page_164" ref-type="page"></xref>
Third, the means of collecting intelligence have become much more complex. In the Cold War, satellites, seismographs and listening devices provided the great powers (and still do) with much of the information they needed about each other’s nuclear and conventional capabilities. In the ‘war on terror’ there are no easy methods. For one thing, information is not easily collected by technical means. Vast amounts of data can be sucked up from emails, mobile phones, financial transfers and the like, but identifying specific terrorist activities among billions of transactions requires immense effort and complex assessments. What is needed now above all is that most challenging form of information gathering – human intelligence.</p>
<p>Finally, the importance of individuals as sources of information is greater than before 9/11. Nuclear spies and defectors certainly played a useful role during the Cold War but the ‘war on terror’ has put a premium on securing information from captured individuals who might provide actionable intelligence that could prevent attacks or reduce terrorist capabilities. As President Bush himself put it in September 2006: ‘In this war, the most important source of information on where the terrorists are hiding and what they are planning is the terrorists themselves’ (
<xref ref-type="bibr" rid="ref547">White House 2006a</xref>
).</p>
<p>The ‘war on terror’ is part of a broad political struggle between contending ideas but it manifests itself through actions at the individual level. While conventional war takes the form of battles and campaigns, the key engagements in the clash between terrorists and their opponents are rather different. On the one hand is the terrorist attack itself – often conducted by individuals or a small group and usually involving the asymmetrical use of force against unarmed civilians. On the other is the similarly asymmetrical pursuit, capture (or killing) and interrogation of suspected terrorists. Though referring specifically to torture, Karen Greenberg observes that this form of engagement has ‘enabled the act of war to be personal again’ and has restored, ‘albeit ironically and perversely, the human side of warfare’ (
<xref ref-type="bibr" rid="ref221">Greenberg 2006</xref>
: 5). In both types of engagement the scope for abuse of human rights is prominent (inherent in the case of terrorist attack, while the interrogator may well seek to strike terror in the heart of his antagonist). In short, one of the key battlegrounds in the ‘war on terror’ is the interrogation of detainees.</p>
</sec>
<sec id="sec10_7">
<title>Pressures to expand the means of collecting information</title>
<p>The term ‘war on terror’ invokes the historical precedent that executive governments are granted extraordinary powers in time of war or national emergency. But it is also presented by President Bush and his Administration as a ‘new type of war’ in which the enemy is believed utterly determined to attack – to the point of suicide. A religious element on both sides adds to the perceived intensity of the struggle. States must therefore be prepared to use ‘every resource’ for the ‘destruction and defeat of the global terrorist network’ (
<xref ref-type="bibr" rid="ref66">Bowker 2006</xref>
: 183–4). As a CIA official put it to a Congressional committee, ‘[a]fter 9/11 the gloves came off’ (Cofer Black in
<xref ref-type="bibr" rid="ref28">Ayres 2005</xref>
: 33).</p>
<p>
<xref id="page_165" ref-type="page"></xref>
The search for security against terrorism has led to increased constraints on civil liberties and to greater freedom for security organisations to engage in activities such as assassination, covert operations, the detention of suspects and their interrogation. In this context developing rules faces two particular difficulties.</p>
<p>First is minimal public knowledge about intelligence collection. There are legitimate reasons for security agencies to operate clandestinely, not least the desire to protect individuals as well as methods and sources of information. Governments, indeed, may be justified in deliberately misleading others in this regard, including their own nationals (and arguably their own legislatures). It may be advantageous, for example, to keep out of the public domain the very fact that a suspect has been detained. Again, a government may state that information leading to the capture of a terrorist resulted from a confession by an existing captive when in reality it derived from infiltration of a terrorist organisation by an agent (
<xref ref-type="bibr" rid="ref65">Bowden 2003</xref>
: 5). Deceiving opponents may involve deceiving friends.</p>
<p>A second factor undermining restraint is the inherent uncertainty and complexity in judgements about the value of information gained. In defending harsh methods of interrogation, for example, governments are prone to inflate the value of information they have obtained (
<xref ref-type="bibr" rid="ref143">Danchev 2007</xref>
: 98). Claims after the event that the information allowed an atrocity to be prevented are always hypothetical and often unprovable. (The information provided about plans may have been incorrect or, if true, other means of prevention might have been found.) The scope for exaggeration and misinformation in attempting to justify extreme measures is clear.</p>
</sec>
<sec id="sec10_8">
<title>Neither war nor crime</title>
<p>A central problem of finding rules in the ‘war on terror’ is that it does not sit easily either in the category of war or in the category of crime. The established laws and practices of war and of policing seem inadequate or inappropriate, not least where interrogation is concerned. The dilemma is clearly illustrated in the case of the detainees at Guantanamo Bay where the US finds itself pursuing three partly contradictory goals. It seeks to detain them (like prisoners of war) for as long as they may return to fight in a particular war, to convict at least some of them as criminals, and to subject them to rigorous interrogation as part of the ‘war on terror’.</p>
<p>With regard to prisoners of war the law of armed conflict strictly limits the information they must supply to their captors and prohibits mistreatment, but detention may continue until the end of the war concerned. The law also provides that those who break the rules lose the protections due to lawful combatants. While they must not be treated contrary to international law, combatants who are deemed not to be ‘lawful’ must by and large take their chances with whichever state captures them. This gap in the law, some argue, is deliberate, intended to dissuade belligerents from straying outside the rules (
<xref ref-type="bibr" rid="ref28">Ayres 2005</xref>
: 43–4). Observance of the law of armed conflict is aided in part by the pressure
<xref id="page_166" ref-type="page"></xref>
of reciprocity – abuse by one side may provoke retaliation by the other – and in part by the relatively limited value of the information most captured soldiers are likely to have.</p>
<p>In the ‘war on terror’, however, the information to be gained from captives promises to be highly useful while strict adherence to the rules of war in questioning captives is unlikely to secure the information desired, especially if prisoners know they will not be subject to mistreatment. The threat of terrorism, moreover, may continue indefinitely, creating a reluctance ever to release captured suspects. Nor is treating captured terrorists according to the law of armed conflict likely to encourage terrorist organisations to treat their captives any more decently. The kidnapping, torture and murder of captives is essentially part of the asymmetric warfare used by terrorists that they cannot abandon (
<xref ref-type="bibr" rid="ref560">Yoo 2006</xref>
: 35). Reciprocity simply does not work.</p>
<p>Dealing with suspected terrorists through a criminal process also has major drawbacks. Though terrorists plan and commit criminal acts, police forces have very different approaches compared with security agencies. First, police serve the judicial system which demands respect for the rights of anyone under arrest e.g. remaining silent, presence of a lawyer, contact with family, and limits to the period of detention without charge. Failure to observe proper procedures can mean failure to convict. Security agencies, by contrast, serve the executive government, enjoying greater freedom to act in matters of security and operating largely outside the public gaze, or indeed that of the judiciary or the legislature. Many methods employed by security agencies clearly do not meet the standards of evidence required by courts, a difference that can cause significant problems in the sharing of information between police and security agencies.</p>
<p>Second, police generally focus on crimes already committed, seeking information that will prove an individual has committed a crime to the satisfaction of a court of law where the burden of proof is on the prosecution. Though naturally concerned also to prevent future crime, most of their activity is reactive to past crime. Security agencies, by contrast, are directly focused on future threats and search actively for possible conspiracies. For them merely suspicious behaviour may constitute actionable intelligence.</p>
<p>Third, the consequences of failure are different. If police do not secure adequate evidence to convict a person who has committed a crime, an injustice occurs. The victim feels aggrieved, the criminal may re-offend and public confidence in the police is undermined. While these consequences are unfortunate, society may not see them as dire. The widely accepted principle that it is better for ten guilty people to go free than for one innocent person to be convicted suggests that failure to punish a crime is by no means totally unacceptable. In practical terms, moreover, the victim is no worse off while the lucky criminal may end up in prison because of other offences or may simply not re-offend.</p>
<p>An intelligence failure, on the other hand, can mean a major loss of life (in contrast to most non-terrorist murders) and a highly visible atrocity likely to engender widespread public fears (such as occurs with only a few more notorious crimes). The public are manifestly worse off than if a past crime goes unpunished.
<xref id="page_167" ref-type="page"></xref>
Political reactions are also likely to be vigorous and agencies blamed, fairly or unfairly, for apparent incompetence or negligence.</p>
</sec>
<sec id="sec10_9">
<title>Intelligence collection in the war on terror</title>
<p>The question of how to treat detainees who are believed to pose a security risk and to possess information that may prevent future terrorist attacks is thus a complex one with no ready rules available. As a result dealing with captured terrorists takes place in a kind of ethical and legal limbo that lacks clear guidelines. The use of Guantanamo Bay, which is beyond the reach of American law as far as detainees are concerned, is symbolic as well as convenient. This indeterminacy is also evident in the language sometimes used to refer to captives, namely ‘persons under US control’ – the aim being to create a ‘bureaucratic blank spot where prisoners could reside temporarily without entering any official database’ (
<xref ref-type="bibr" rid="ref346">Mackey 2004</xref>
: 250).</p>
<p>The great disparity of physical power, moreover, allows the captor to treat a prisoner as he chooses. This asymmetric relationship can be used not only to hurt and intimidate the prisoner but also to send a message to anyone else who might become a captive (
<xref ref-type="bibr" rid="ref246">Holmes 2006</xref>
: 130). But the interrogator is not without handicaps. He may well have no clear idea of what information the captive has, or whether he has any at all. Nor can he be sure whether the victim has yielded all the information that may be useful, or confident that the information secured is accurate.</p>
<p>For their part, those held physically captive are not entirely without assets. One may be their psychological strength, perhaps reinforced by a strong ideological or religious belief. Training to resist interrogation may also be useful. Another asset is the possession of information that can be withheld (
<xref ref-type="bibr" rid="ref407">Paskins 1976</xref>
: 141). Once this is given up, however, the captive has lost his best asset and perhaps his sense of self-worth as well.</p>
<p>Though seemingly one-sided, interrogation is a thus a complex clash of individual wills. Everything from scrupulous observance of the prisoner’s rights to sustained torture up to the point of death can be and has been tried. Are any moral principles to be found in this murky area? A range of approaches will be considered in approximate order of justifiability though it is clear that all save the first raise profound moral uncertainties.</p>
<sec id="sec10_9_1">
<title>Kid gloves</title>
<p>This approach seeks information without the use of threats, coercion, humiliation and the like, though questioning may be incisive, probing and discomforting. Strict rules may be spelt out in national codes, especially those adopted by military forces. The moral basis for such an approach is that it maximises respect for human rights, encourages trust in official institutions and protects interrogators from demeaning practices. It may even pay immediate dividends. Mackey recounts how one prisoner in Afghanistan decided after lengthy but restrained interrogation
<xref id="page_168" ref-type="page"></xref>
to assist the US on the grounds that if ‘this was the worst the Americans were going to do’ he would change sides (
<xref ref-type="bibr" rid="ref346">Mackey 2004</xref>
: 426).</p>
<p>Even within strict guidelines for interrogation, however, prisoners are inevitably under some pressure. They may not know the length of their confinement; they may be anxious about family and friends; they may fear mistreatment in the future despite assurances to the contrary. Another grey area is the manipulation of privileges: all prisoners may be treated according to minimum standards but those who cooperate may come to expect preferential treatment. Can interrogators play on these concerns without overstepping the mark?</p>
</sec>
<sec id="sec10_9_2">
<title>Surgical gloves</title>
<p>This approach works on the mind of the prisoner but amounts to rather more than probing for information. It entails working on the thought processes of the captive, whether creating psychological discomfort at some level by such means as humiliation, accusations of homosexuality or promoting anxieties about families or friends, and/or by creating a (false) sense of security through, say, flattering the ego or pretending to cultivate a friendship. Cultural or religious values can also be manipulated to create psychological pressure, e.g. sexual flaunting in front of prisoners and abuse of the Koran.</p>
<p>Some methods do involve very limited force against the person but it is employed not to produce pain but rather a psychological effect. Examples include gentle poking, putting dog collars on prisoners, shaving their hair or making males wear a bra. Other practices, if limited in time and extent, can be used chiefly for psychological effect, including solitary confinement, blindfolding, hooding, loud noise and denial of sleep. Related methods involve calculated deceptions such as posing as agents of another country, exploiting forged documents or pretending that other prisoners have given information (
<xref ref-type="bibr" rid="ref346">Mackey 2004</xref>
: 88–9, 97).</p>
<p>Similar, too, is the use of drugs to extract information, a process that entails minor physical hurt but which is principally intended to change the way an individual thinks. Though the effectiveness of a so-called ‘truth serum’ is debated, some argue that it is both morally more acceptable than physical coercion as well as being permitted under US law (
<xref ref-type="bibr" rid="ref153">Dershowitz 2002</xref>
: 247–8 note 6). Mood-changing drugs can also be given, say in food, without the captive’s knowledge. Also of interest is compelling the victim to take a drug which he believes to be a ‘truth serum’ but which is in fact a placebo. The result is that the prisoner may feel he has an acceptable ‘excuse’ to provide information (
<xref ref-type="bibr" rid="ref65">Bowden 2003</xref>
: 15).</p>
<p>Of course, alcohol is another mood-changing drug that may lead a prisoner to provide information he did not intend to divulge. If taken voluntarily, however, this method might be better classified as ‘kid gloves’ treatment.</p>
</sec>
<sec id="sec10_9_3">
<title>Velvet gloves</title>
<p>Here information is sought through deliberate threats of violence, whether implicit or explicit. Fear is created that the ‘iron fist’ hidden in the velvet glove could be
<xref id="page_169" ref-type="page"></xref>
used. The ‘good cop, bad cop’ routine often produces this uncertainty – what if the bad cop loses control or gets to interrogate me alone? Human rights and dignity are abused, and persistent or extreme threats of violence can cause severe psychological harm to the captive even if never actually carried out.</p>
<p>Another example is the threat of execution or arbitrary murder – as distinct from warnings that certain behaviour could lead to the death penalty through a legal process. In Russian roulette the threat is randomised in that life or death depends on a chance process rather than on a deliberate decision by the threatener. Russian roulette played without a bullet in the gun – a fact not known to the prisoner – is equally frightening but may be less morally objectionable. The presence of dogs also creates an uncertainty in the mind of the captive about what physical harm he might suffer.</p>
<p>A complex moral issue here is whether one may legitimately
<italic>threaten</italic>
to do something that is wrong in order to achieve a good outcome. Threats of physical pain, for example, may elicit information even if an interrogator has no intention of carrying them out. The same dilemma is found in other situations where the threatener prefers not to carry out the threat. In the Cold War, for example, some strategists argued that nuclear deterrence could succeed even if a state – secretly – had no intention of responding with nuclear weapons in the event of a first-strike by an opponent.</p>
</sec>
<sec id="sec10_9_4">
<title>Boxing gloves</title>
<p>In what is sometimes called ‘coercive interrogation’ or ‘torture lite’ physical harm is inflicted (beatings, burns, suffocation, cutting, etc.), or psychological distress is sought by painful physical routines (stress positions, prolonged standing, etc.). Implicitly or explicitly there is a threat of more to come. Hurt is imposed directly by physical means – hence the analogy with boxing gloves which are designed to inflict pain without reaching the extreme (bare knuckles or torture). This category includes hurting a third party such as a relative or colleague in order to manipulate the prisoner. The latter is clearly more objectionable ethically in that pain is deliberately caused to a person known not to have the information desired, and perhaps known to be quite innocent.</p>
<p>There is room for much debate over whether measures of this kind short of torture are all permissible, all impermissible, or somewhere in-between. A critical issue is determining the point at which such measures do become torture (see below). US treatment of its detainees in Afghanistan, Iraq and Guantanamo Bay has been characterised by attempts to distinguish between what is acceptable and what is not. However, it is difficult to discern clear moral guidelines behind US practice apart from the idea that the shorter the time pain is inflicted and the shorter the period of recovery the better. In practice, the matter comes down to what decision-makers have considered reasonable, perhaps taking into account also the likely reaction of public opinion.</p>
<p>Given that in practice some techniques will be permitted, or at least not prohibited, much depends on the interrogators, their immediate superiors and
<xref id="page_170" ref-type="page"></xref>
the general atmosphere in an interrogation (and detention) centre. Individuals vary greatly in their attitudes. Some are keen to use violence, and Mackey cites a colleague: ‘Just two minutes. Give me just two minutes alone with him’ (
<xref ref-type="bibr" rid="ref346">Mackey 2004</xref>
: 95). Others work out rules of thumb for what is acceptable. Mackey himself, for example, kept prisoners awake only for as long as he as an interrogator could stay awake. (
<xref ref-type="bibr" rid="ref346">Mackey 2004</xref>
: 95;
<xref ref-type="bibr" rid="ref560">Yoo 2006</xref>
: 191).
<sup>
<xref ref-type="fn" rid="fn10_2">2</xref>
</sup>
More homely rules mentioned include: ‘what if my actions were reported on the front page of the newspapers?’ and ‘what would my mother think?’ (
<xref ref-type="bibr" rid="ref463">Shane 2006</xref>
).</p>
<p>In the same vein, it is sometimes suggested that methods used in training one’s own soldiers are permissible (
<xref ref-type="bibr" rid="ref346">Mackey 2004</xref>
: 350). Australian soldiers at risk of enemy capture, for example, are subjected to harsh Resistance To Interrogation training which includes being blindfolded and stripped naked, as well as stress positions, sleep deprivation, intense questioning and sexual humiliation. This particular argument, however, overlooks the fact that trainees are volunteers, that training is of limited duration and for the benefit of the trainee, and that it is carried out under strict controls.</p>
</sec>
<sec id="sec10_9_5">
<title>Gloves off</title>
<p>Both critics and defenders of torture see it as an extreme, as something in a category of its own. Indeed, there is a clear parallel with terrorism which is also generally regarded as an extreme action – either never justifiable or permitted only in desperate circumstances (
<xref ref-type="bibr" rid="ref246">Holmes 2006</xref>
: 129). The International Convention Against Torture of 1984, for example, distinguishes torture from other forms of cruel, inhuman and degrading treatment, outlawing it directly while enjoining signatories to prohibit lesser forms of brutality. It also denies states the right to resort to torture even in the extremities of war or public emergency. Decisions in British, European, Israeli and US courts have also drawn a line, albeit in varying places, between torture and other treatment that might still be cruel, inhuman or degrading.</p>
<p>Both terror and torture also encounter the problem of definition. Though a universally agreed general definition remains elusive, terrorism is outlawed in specific forms such as aircraft hijacking and bombing in public places. Torture has been defined in general terms but much uncertainty remains about its precise nature and scope. The Convention Against Torture refers to ‘severe pain or suffering, whether physical or mental’ that is ‘intentionally inflicted’. But how severe must the pain be? Can lesser pain inflicted for a long period become severe? Are physical and mental suffering to be judged in the same way? Who is to judge severity – the torturer, the victim or a third party?</p>
<p>Torture has been employed for centuries for a variety of contentious purposes, including repression of political opponents, the saving of human souls, the extraction of confessions to secure punishment, the gaining of information for the public good as well as sheer cruelty. Debate about its moral value has revived since 9/11 as the desire of governments to prevent terrorist outrages has attracted attention to the interrogation of captives. There is no need here to go into the
<xref id="page_171" ref-type="page"></xref>
debate at length (
<xref ref-type="bibr" rid="ref153">Dershowitz 2002</xref>
;
<xref ref-type="bibr" rid="ref265">Ignatieff 2004</xref>
). The key dispute is between absolutists who argue that torture is inherently wrong and never justifiable (the deontological view), and pragmatists who argue that torture can be justified as a last resort when the ends are sufficiently great as to outweigh objections to the means (the consequentialist view).</p>
<p>The pragmatic approach has won a degree of support in recent years as the perceived threat of terrorism has grown. In earlier decades an attack might kill a few dozen people, at most a hundred or two on board an aircraft. Now, it is clear that a single terrorist act can kill 3,000 people or even more, perhaps 3 million if weapons of mass destruction are employed. The greater the evil to be prevented, it is argued, the greater the justification for extreme means in preventing it. The threat, moreover, is very real, coming from extremists and zealots prepared to stop at nothing and resistant to other methods of persuasion and deterrence.</p>
<p>A second leg of the ethical argument for torture is that it is a preventive measure for the public good. It envisages cases where information secured by torture genuinely allows authorities to prevent a looming atrocity, namely information can be secured, and sufficient time and suitable means are available, to disarm a ‘ticking bomb’. In other words, the motives for torture are public-spirited, not political, punitive or personal. Safeguards can also be put in place – such as approval by an independent judiciary – in order to ensure that torture is only approved when pre-conditions are met and that it is only employed rarely and with reluctance.</p>
<p>A third type of defence focuses on the presumed character of the victim of torture. A captive known to be a terrorist who has no regard for ordinary law or morality has, some argue, lost the right to certain protections. Most ‘deserving’ of torture is the person who has actually placed a ‘ticking bomb’ or has committed outrages in the past. Perhaps he or she retains a right to life, but not necessarily the right to security from serious physical or psychological harm. Terrorists are ‘at war’ with society and hence lose their immunity (
<xref ref-type="bibr" rid="ref407">Paskins 1976</xref>
: 141–2). On this view, terrorists are the modern equivalent of pirates, once deemed
<italic>hostes humani generis</italic>
– enemies of humankind who could be hunted down and killed by law-abiding citizens.</p>
<p>Finally, there are pragmatic arguments for permitting torture. One is that it is going to happen anyway, even if formally prohibited, so that setting up strict legal and political controls is more satisfactory than an ineffective ban that drives it underground (
<xref ref-type="bibr" rid="ref153">Dershowitz 2002</xref>
). Moreover, if terrorists know that their captors will not use torture, they will be more likely to hold out against robust interrogation, especially if they have been trained to resist and know that interrogators are working within rules (
<xref ref-type="bibr" rid="ref339">MacDonald 2006</xref>
: 85–6). The assumptions behind such arguments may be questioned but any rejection of torture in principle needs to at least consider the real-world consequences of such a position.</p>
<p>Among opponents of torture, the absolutist position argues that no human being is ever justified in deliberately inflicting extreme pain on another (save in emergency medical situations). Torture is always wrong, even if it actually prevents
<xref id="page_172" ref-type="page"></xref>
a greater evil. The lesser evil is not an option. Legalising torture, moreover, would produce what opponents see as an abhorrent consequence – society would in effect license certain people as torturers. Who would carry it out? How would they be trained? Any claim to protect human rights or to support the rule of law by the state concerned would lose all credibility.</p>
<p>A second type of argument against permitting torture is pragmatic. There is a ‘slippery slope’ in that once torture is permitted its use will naturally and inevitably widen even if well-intentioned safeguards are put in place (
<xref ref-type="bibr" rid="ref334">Luban 2006</xref>
: 52–5;
<xref ref-type="bibr" rid="ref560">Yoo 2006</xref>
: 193–4).
<sup>
<xref ref-type="fn" rid="fn10_3">3</xref>
</sup>
Torture will be carried out by agencies operating outside public scrutiny and there will be temptation to use it in the hope it will yield useful information. Once started, there is no natural time limit to torture – apart from death – for the torturer may well believe that more information can be gained, even if the victim has already talked. One success with torture, indeed, is likely to encourage more torture. There is also a slippery upward slope – if less painful interrogation techniques do not produce results, harsher treatment will follow and eventually torture will be employed. Only a total and unequivocal ban will keep coercive interrogation from crossing the boundary into torture.</p>
<p>A final criticism of torture challenges the assumptions underlying the ‘ticking bomb’ argument, arguing that they will rarely, if ever, obtain in practice. How can there be certainty in advance that a prisoner has the information concerned, that he or she will provide it in time, and that securing it will actually enable prevention of an atrocity? Arguments for torture often rely on extreme and hypothetical situations but ‘artificial cases make bad ethics’ (
<xref ref-type="bibr" rid="ref472">Shue 1978</xref>
: 141).</p>
<p>Critics and supporters of torture take various positions on whether torture actually works. The former often argue that it simply does not work. Some individuals will simply not have the information sought. Some will resist even extreme pain indefinitely or to the death. Most likely, people under torture will provide information that is untrue or unreliable but which victims think the torturer wants to hear. By its nature torture seems designed to make victims confess to acts they have not committed. But even if torture occasionally produces results, the absolutist will remain opposed. For their part, supporters of torture claim that in some cases it has in fact saved innocent lives (
<xref ref-type="bibr" rid="ref153">Dershowitz 2002</xref>
: 138). Yet even if this were not so, there is benefit in retaining the option against some future scenario when it may be needed.</p>
<p>Finally, one can take a wider view. Supporters of torture claim that it will send a powerful message to opponents, demonstrating determination to defend one’s position and possibly deterring resort to terror. Critics of torture argue that even if it saves innocent lives, it will create more terrorists (
<xref ref-type="bibr" rid="ref143">Danchev 2007</xref>
: 107). It may also provoke more intense opposition and a greater willingness among opponents to fight to the death.</p>
</sec>
</sec>
<sec id="sec10_10">
<title>Ethical guidelines</title>
<p>At the bottom of the scale, ‘kid gloves’ interrogation is unlikely to be seriously opposed on ethical grounds (though detention without charge may be). At the
<xref id="page_173" ref-type="page"></xref>
other end, torture has provoked strong and principled objection, though it does not lack defenders either. Can lines be drawn somewhere?</p>
<p>It is apparent that there are few, if any, ‘bright lines’ – the term used by John Yoo in defending US Department of Justice memoranda that sought to provide clear guidance about what was definitely torture. The aim was clarity even if blunt language was used and sensibilities offended (
<xref ref-type="bibr" rid="ref560">Yoo 2006</xref>
: 175).
<sup>
<xref ref-type="fn" rid="fn10_4">4</xref>
</sup>
Clear rules also make it more difficult for those in authority to evade responsibility by claiming that subordinates engaging in torture broke the official guidelines. It is all too easy for those in authority to condemn practices in general terms without defining them closely and providing detailed rules.</p>
<p>Yet the benefits of clear lines can also be challenged, particularly if there is disagreement about the scope of an activity to be prohibited. Thus banning torture that is too widely defined invites widespread non-observance and encourages interrogators to keep dubious activities hidden from outside scrutiny, perhaps even from their superiors. On the other hand, defining an activity too narrowly will permit a great deal of undesirable behaviour or even encourage it because it is not expressly prohibited.</p>
<p>If the line between torture and coercive interrogation is slippery, so too is that between psychological pressure (surgical gloves) and physical pain (boxing gloves). There are certainly arguments that manipulation through, say, ‘[a]nxiety, humiliation, loneliness, and pride’ is far more effective than physical pain (
<xref ref-type="bibr" rid="ref410">Perry 1995</xref>
: 101). This goes to effectiveness, and suggests that physical pain is unnecessary. But is there any ethical distinction in principle between the two? A certain natural squeamishness causes many to react more strongly against physical coercion (perhaps because it can more easily be imagined) but both methods hurt the victim and both can cause long-lasting harm.</p>
<p>This points to the further problem in that individuals respond differently to pain, whether physical or mental. Identical treatment applied to different people could inflict very different levels of harm, both short and long term. Should rules of interrogation reflect the degree to which a prisoner can tolerate hurt? Is more permitted against someone who has had training to resist coercive methods? The difficulties in predicting a person’s response are also evident, not least because an assessment must be made before coercion is applied. A further problem is that methods that might seem bearable for a short period of time could prove very harmful if used in the long term. Keeping a prisoner awake for two hours beyond normal bed-time is quite different from depriving him of sleep for two weeks.</p>
<p>If judgement by the impact on the victim offers no easy answers, nor does judgement by results. As already argued with regard to torture, success or failure cannot be known in advance for a number of reasons. Rules of conduct, however, are only useful if they provide guidance in advance on what can or cannot be done.</p>
<p>Perhaps, then, it comes down to the character or integrity of those seeking information – to what has been termed ‘virtue ethics’. They alone know all or most of the circumstances and might be trusted to decide what methods are reasonable.
<xref id="page_174" ref-type="page"></xref>
People with moral character will come up with defensible guidelines as to how far they can decently go. As a former CIA operative put it: ‘Interrogation is such a dirty business that it should be done only by people of the cleanest character. Anyone with sadistic tendencies should not be in the business’ (William Johnson cited in
<xref ref-type="bibr" rid="ref410">Perry 1995</xref>
: 101).</p>
<p>But many would argue that those in the business of interrogation, especially the more coercive forms, cannot be relied on to make dispassionate judgements. Even practitioners disagree as to whether they can maintain their personal integrity while working in a job that requires lies and deception, threatening and harming (
<xref ref-type="bibr" rid="ref410">Perry 1995</xref>
: 107). There are also obvious difficulties in creating a professional code of conduct and ethical principles for security agents along the same lines as established professions which rely on strongly internalised values and strict self-regulation.</p>
<p>For such reasons military professionals who live and die by rules and discipline normally reject torture or coercive interrogation as part of their duties and see it as simply incompatible with professionalism (
<xref ref-type="bibr" rid="ref276">James 2005</xref>
: 27). Colin Powell, a former four-star general, insisted as Secretary of State that the US military must follow ‘the highest standards of conduct’ in the ‘war on terror’, a stance that prompted President Bush’s order to treat prisoners ‘humanely’ even if the law of armed conflict did not apply (
<xref ref-type="bibr" rid="ref560">Yoo 2006</xref>
: 40–1).</p>
<p>Other professions, notably doctors and psychologists, can also be drawn into the business of interrogation. Can or should a doctor help determine what is severe pain? Or whether a prisoner will suffer permanent injury or trauma as a result of coercive methods? Or actually help in devising such methods? There are also claims that doctors have falsified death certificates when prisoners in US custody have died as a result of coercive interrogation or brutal treatment by guards (
<xref ref-type="bibr" rid="ref361">Miles 2006</xref>
). At the other extreme, many doctors would refuse to have any connection with practices that harm individuals, even if it is a matter of setting limits to such harm or undoing the harm already done (on the grounds that it encourages further mistreatment).</p>
</sec>
<sec id="sec10_11">
<title>Ethics and responsibility</title>
<p>This analysis has focused on the interrogator, but responsibility for the treatment or mistreatment of detainees is always far wider. Abuse of prisoners at Abu Ghraib, for example, was primarily by jailers and not necessarily connected with interrogation. At worst, there may be a deliberate policy by guards of ‘softening up’ prisoners in advance of interrogation, but even at best detainees are likely to draw their own conclusion: cooperating with interrogators will reduce the risk of harsh treatment. Can interrogators ethically take advantage of this situation? Can interrogators avoid taking advantage of such a situation?</p>
<p>Ethical interrogation clearly needs more than just ethical interrogators. Governments bear overall responsibility for the actions of organisations and personnel involved directly and indirectly in interrogation. Many of the cases of mistreatment of detainees, an official US report conceded, were due to factors
<xref id="page_175" ref-type="page"></xref>
such as lack of planning, insufficient resources (especially interpreters), failure by superiors to respond to indications of problems and missed opportunities for detailed guidance on interrogation techniques (
<xref ref-type="bibr" rid="ref115">Church 2005</xref>
).</p>
<p>In political, if not ethical, terms governments can seek to diffuse responsibility for mistreatment by employing private contractors rather than using their own agents. ‘Failures’ can then be blamed on the company or its employees – despite the supposed best efforts of government. It is fair to observe, however, that employees of private contractors may well be skilled and experienced interrogators, often ex-military, who do not need to rely on more coercive methods.</p>
<p>The most cynical device for shifting responsibility is that of ‘extraordinary rendition’ – transferring prisoners for interrogation in other states where it is possible, or even expected, that torture will be used. The practice is contrary to the Convention Against Torture but allows a government to deny (accurately) that it engages in torture. If the matter becomes public, blame can be placed on the receiving state. Similar considerations apply to states that agree to hand over battlefield detainees to another power as Australia did in relation to the wars in Afghanistan and Iraq (
<xref ref-type="bibr" rid="ref374">Muggleton 2006</xref>
: 10–11). The law of armed conflict requires the transferring state to be satisfied that prisoners will be treated appropriately, an obligation that remains as long as their detention continues.</p>
<p>Information-gathering for intelligence purposes faces an environment unfavourable to the development of clear ethical principles and strong ethical practices. Lack of transparency and accountability, the high stakes involved, disparities of power, the difficulties of judgement about legitimate targets and legitimate methods – all conspire to starve ethical principles of oxygen. Is there any prospect for ethical rules and practices? Mark Bowden, for example, concludes that</p>
<disp-quote>
<p>Candor and consistency are not always public virtues. Torture is a crime against humanity, but coercion is an issue that is rightly handled with a wink, or even a touch of hypocrisy; it should be banned but also quietly practiced.</p>
<attrib>(
<xref ref-type="bibr" rid="ref65">Bowden 2003</xref>
: 23)</attrib>
</disp-quote>
<p>Bowden also suggests that governments are wise to avoid public discussion of such matters. This is certainly a realist view but it is also perhaps too cynical a conclusion. Human conscience, a certain respect for human rights and a sense of professionalism, together with increased public interest during the ‘war on terror’, may help sustain some ethical principles in ‘the great game’. Something can be expected, but not too much.</p>
</sec>
</body>
<back>
<notes>
<title>Notes</title>
<fn-group>
<fn id="fn10_1">
<label>1</label>
<p>R.V. Jones identifies several ethical dilemmas but usually observes that he was fortunate not to have to face them himself.</p>
</fn>
<fn id="fn10_2">
<label>2</label>
<p>US Secretary of Defense Rumsfeld took a similar line when he observed that since he stood for hours on end while working, there could be no objection to making prisoners stand.</p>
</fn>
<fn id="fn10_3">
<label>3</label>
<p>
<xref id="page_176" ref-type="page"></xref>
Yoo argues that there is no evidence this occurs in the UK or Israel.</p>
</fn>
<fn id="fn10_4">
<label>4</label>
<p>Yoo argues that an explicit definition of torture put forward by the Office of Legal Counsel in 2002, using a concept of ‘severe pain’ based on existing US law relating to ‘health benefits for emergency medical conditions’, had to be re-written in 2004 in much vaguer terms simply to avoid offence.</p>
</fn>
</fn-group>
</notes>
</back>
</book-part>
<book-part book-part-type="chapter" book-part-number="11" id="chapter11">
<book-part-meta>
<title-group>
<title>
<xref id="page_177" ref-type="page"></xref>
The international campaign to counter the financing of terrorism</title>
<alt-title alt-title-type="running-head-verso">Campaign to counter fi nancing of terrorism</alt-title>
<alt-title alt-title-type="running-head-recto">J. C. Sharman</alt-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<given-names>J. C.</given-names>
<surname>Sharman</surname>
</name>
</contrib>
</contrib-group>
</book-part-meta>
<body>
<p>Immediately after the terrorist attacks of September 2001 President Bush declared: ‘Money is the lifeblood of terrorist operations. We’re asking the world to stop payment’ (‘Looking in the Wrong Places’,
<italic>Economist,</italic>
20 October 2005). The notion that terrorist organisations could be disrupted, or even defeated, by attacking their financial underpinnings has exercised a powerful hold on policy-makers’ imaginations. Although the international effort to counter the financing of terrorism was born before September 2001, it was vastly expanded after the attacks on the United States.</p>
<p>Any expectations of a quick victory over al-Qaeda and related terrorist groups brought about by financial sanctions have now dissipated. But in Washington and other allied capitals the same ambitious goals remain: that terrorist organisations can and will be organisationally strangled, and thus their attacks prevented, by denying them monetary support. While the counter-terrorist measures affecting banks and the rest of the financial industry may have lacked the public profile of other developments, for example in airport security, they are regarded as being one of the few ways the United States and other governments can ‘take the fight to the enemy’.</p>
<p>This chapter seeks to trace the development of the international campaign to block terrorist finance. It describes the important policy shifts that have taken place since 2001, the consequences for terrorists, but also the impact these developments have had on the legitimate financial services industry. It is argued that despite the scope and intensity of the response, the nature of terrorist financing means that it is largely invulnerable to the sort of counter-measures now being deployed.</p>
<p>In policy terms the effort to counter the finance of terrorism shows much more of a balance between US unilateralism and genuine multilateralism than has been the case in many other facets of the Bush administration’s national security and foreign policies. There has certainly been a muscular assertion of United States (US) national power in the financial front of the ‘War on Terror’. This can be seen in particular in the extra-territorial features included in the USA Patriot Act passed in October 2001. But the US has also worked within international organisations, and in important instances deferred to these bodies, rather than relying on
<italic>ad hoc</italic>
‘coalitions of the willing’ familiar from the invasion and occupation in Iraq.</p>
<p>
<xref id="page_178" ref-type="page"></xref>
Furthermore, as much as the shock of September 11 threw open the policy agenda and radically broadened the scope of potential measures deemed acceptable, countering the financing of terrorism (CFT) is in some ways most notable for its generic nature and derivative solutions. The specific measures taken to interdict terrorists’ money replicate almost exactly those put in place from the late 1980s onwards to combat money laundering as part of the ‘War on Drugs’. Although the difficulty of amassing evidence makes a conclusive judgement impossible, it seems that the first set of policy instruments to hand, anti-money laundering regulations, are not especially well suited to tackle the distinct problem of terrorist finance.</p>
<p>The structure of this chapter is as follows. The first section presents an overview of international cooperation to counter the financing of terrorism, while the second section surveys the US response to the same problem, particularly as embodied in the USA Patriot Act. The third looks at the specifics of policies to counter the financing of terrorism, and in particular the almost complete similarity between current measures to disrupt terrorists’ finance and standards earlier developed to attack the laundering of money derived from the international drug trade. The fourth section argues that despite this emphasis on the similarities between money laundering and terrorist finance in the policy response, there are important differences between the two. The last section gives a preliminary and necessarily tentative verdict on the success of efforts so far.</p>
<sec id="sec11_1">
<title>Overview of the international response</title>
<p>Efforts to strike at terrorism by ‘following the money’ were not born in 2001, although interest in the issue has increased exponentially since that point. Britain had a long running campaign to halt the flow of funds to the Irish Republican Army from sympathisers in the US. Often transferred through what were at least ostensibly charities, the United States authorities extended little cooperation in shutting down these flows. Similarly, the Liberation Tigers of Tamil Eelam have long raised funds amongst the Tamil diaspora, with the Sri Lankan government appealing to third countries to block this fund-raising activity.</p>
<p>The Council of Europe, one of the first international organisations to use the term ‘money laundering’, did so in 1980 in connection with the fight against leftwing terrorists in West Germany and Italy (
<xref ref-type="bibr" rid="ref415">Pieth 2002</xref>
). The United Nations (UN) had even gone so far as to draw up an International Convention for the Suppressing of Financing Terrorism in 1999, though an indicator of the low priority accorded to this issue is the fact that only four countries had signed up previous to September 2001 (
<xref ref-type="bibr" rid="ref430">Rider 2004</xref>
: 62); by April 2004 this number had increased to 117 (
<xref ref-type="bibr" rid="ref132">Council of Foreign Relations 2004</xref>
: 9). Relating to al-Qaeda specifically UN Security Council Resolution 1267 (15 October 1999) obliged members to freeze assets of the organisation’s members or individuals associated with it.</p>
<p>After the initial shock of the September 11 terrorist attacks, there was a stampede of international organisations looking to become involved in advancing international cooperation to stop terrorist finance. The G7 finance ministers’
<xref id="page_179" ref-type="page"></xref>
meeting issued a statement on the need to combat the financing of terrorism on 25 September 2001. Despite being barred from either a security or a criminal justice role, both the World Bank and International Monetary Fund began incorporating anti-money laundering and anti-terrorist finance components in their reviews of the adequacy of member states’ financial supervision and regulation. Other bodies like the UN Office on Drugs and Crime, the Commonwealth and the Council of Europe began incorporating an anti-terrorist aspect into their existing anti-money laundering programmes. Indeed, it is almost easier to specify those international organisations that did
<italic>not</italic>
weigh in on the subject from September 2001 than listing all those that did.</p>
<p>On 28 September 2001 the UN Security Council passed Resolution 1373 which first created a Counter Terrorism Committee to oversee the UN’s work on this topic. In turn, the Committee required all states to pass legislation making the finance of terrorism a crime in and of itself. It further required that all states set up Financial Intelligence Units or equivalent bodies to link law enforcement authorities with banks and other private financial intermediaries. States are asked to ensure that they have the legal mechanisms in place to freeze suspected terrorist funds. The Committee instituted regular reporting obligations to gauge members’ progress in this area, which has elicited a highly unusual degree of almost perfect compliance. By mid-2004 the Counter Terrorism Committee had fielded requests for technical assistance in this area from 160 countries (
<xref ref-type="bibr" rid="ref132">Council for Foreign Relations 2004</xref>
: 11).</p>
<p>However the institution that was able to lay the leading claim in standard setting and monitoring in this area was the Financial Action Task Force (FATF). The FATF was founded to co-ordinate the fight against money laundering with particular reference to the drug trade in the wake of the 1989 G7 heads of government summit. Its membership includes most of the OECD countries as well as certain ‘strategically important’ developing states. The FATF’s small secretariat is hosted by the OECD in Paris. The most notable product of the FATF has been the 40 Recommendations, first released in 1990, and revised periodically since then. Reflecting the expanding scope of the anti-money laundering regime, from 1996 the FATF devoted itself to combating money laundering associated with all serious crimes, not just drug-related offences.</p>
<p>The FATF 40 Recommendations now constitute internationally-accepted best practice for the control of money laundering (see
<xref ref-type="page" rid="page_9">page 9</xref>
for details). Rather than working by binding international law, the FATF at first worked to raise standards among its members by a process of peer review and mutual evaluation (
<xref ref-type="bibr" rid="ref326">Levi and Gilmore 2002</xref>
). Later, however, a more coercive approach was adopted, as from June 2000 the organisation created the Non-Cooperative Countries and Territories blacklist for non-member jurisdictions adjudged to be derelict in their anti-money laundering (AML) duties (
<xref ref-type="bibr" rid="ref280">Johnson 2001</xref>
).</p>
<p>In October 2001 the FATF drew up the Eight Special Recommendations on the financing of terrorism, with an extra recommendation on bulk cash smuggling added shortly thereafter. However the June 2002 initial deadline for applying pressure against non-members who failed to comply had to be dropped after
<xref id="page_180" ref-type="page"></xref>
almost all FATF member states themselves, including the US, realised that they would not meet their own deadline (‘Follow the Money’,
<italic>Economist,</italic>
30 May 2002). Since that time the FATF has included terrorist financing issues in its regular series of assessments of both member and non-member states.</p>
<p>The Special Recommendations call for states to ratify the UN convention against terrorist financing and to criminalise this practice, as well as extending the use of anti-money laundering measures like suspicious transaction reporting and mutual legal assistance to terrorist finance. Special Recommendations 6, 8 and 9 are the most ambitious.</p>
<p>Recommendation 6 calls for practitioners of alternative remittance systems to be brought within the coverage of existing AML procedures relevant to banks and other financial institutions. Alternative remittance systems such as the South Asian hawalah or Chinese chop are trust-based systems of cash transfer often used among ethnic diasporas. Being cheap and reliable, hawalah and its equivalents provide a highly economical means by which, for example, Indian workers in the Persian Gulf can remit money to their families at home. The fees for using these alternative systems are typically significantly lower than wire transfer companies such as Western Union, and in addition their coverage may extend to regions outside formal banking networks, like Somalia.</p>
<p>But because there is little formal accounting and no electronic transfers, the lack of a paper trail and consequent anonymity is seen as providing a means by which terrorists can compensate for being shut out of international banking networks. Given the informal nature of such operations, the weak government presence in countries where alternative remittance schemes are strongest, and the lack of affordable alternatives in the formal banking system, this recommendation poses serious implementation challenges. Although in the immediate aftermath of the 2001 attacks there was talk of trying to shut down alternative remittance systems completely, given their crucial legitimate economic role in the developing world this extreme response (which once more would have been very difficult to implement) was dropped. Currently the goal is to draw these schemes into the formal economy, and thus into official record-keeping and reporting systems.</p>
<p>Reflecting concerns about Islamic charities, Special Recommendation 8 calls for non-profit organisations to be regulated to ensure they are not abused as fronts for terrorist organisations. Once again this tends to presage a further expansion of the institutions subject to the reporting requirements drawn up initially to fight drug trafficking. Saudi Arabia in particular has been on the receiving end of strong US pressure in relation to this issue (
<xref ref-type="bibr" rid="ref131">Council of Foreign Relations 2002</xref>
,
<xref ref-type="bibr" rid="ref132">2004</xref>
). But like alternative remittance systems, regulating charities represents a substantial implementation headache.</p>
<p>The last Special Recommendation seeks to halt the undeclared flow of bulk cash across borders. Cash smuggling has been a concern in Western countries in relation to drug traffickers (the weight and bulk of cash generated by drug sales may exceed the weight and bulk of the drugs themselves). But the recent emphasis on bulk cash transfers reflects the realisation that developing economies
<xref id="page_181" ref-type="page"></xref>
are far more cash-dependent than those of the average FATF member state, where electronic transfers are the norm.</p>
</sec>
<sec id="sec11_2">
<title>The United States’ unilateral response</title>
<p>The overall aim pronounced by President Bush after signing the executive order to freeze al-Qaeda assets was clear: ‘We will starve the terrorists of funds’ (
<xref ref-type="bibr" rid="ref379">
<italic>9/11 Investigations</italic>
2004</xref>
: 506). As noted earlier, although the fight against terrorist finance has to some extent been unusual in the degree to which the US has been willing to work through formal multilateral organisations, this has been complemented by a robust series of unilateral measures. The most important of these are contained in the USA Patriot Act. But rather than proceeding in parallel, there have been important intersections and complementarities in the US unilateral and multilateral efforts. International organisations like the FATF have benefited from the suspicion that compliance with its standards not only confers international legitimacy, but also provides some protection against the threat of being singled out for punitive action by the US government. Thus in defying the FATF the tiny Pacific state of Nauru ultimately came into conflict with the US. Conversely, the US has incorporated the language and standards of international organisations in its domestic legislation, as well as delegating important national policy prerogatives to such bodies.</p>
<p>The rather unlikely case of Nauru came to the attention of the FATF because of its shell banks. Desperate for a source of economic viability after the collapse of its phosphate industry, the government of Nauru turned to selling offshore banking licences with few if any checks on the customers. Though these banks had no physical presence beyond a plastic name plate on the wall of a small shed in Nauru, the licence did grant purchasers access to correspondent banking accounts through which money could be transferred all over the world. About 400 such licences were sold, though because a large proportion of the US$7,500 fee per bank was stolen by individual government employees, it is impossible to determine the exact number. From 1999 there were well-publicised accusations that these shell banks had been purchased by criminals in order to laundering money. The Russian Central Bank (no paragon of financial rectitude itself) claimed that up to US$70 billion had been laundered through Nauru’s banks. As a result, Nauru was placed on the first issue of the FATF’s Non-Cooperative Countries and Territories list in June 2000.</p>
<p>Nauru’s government was unimpressed by international efforts to compel it to abolish its offshore sector. The Prime Minister demanded US$10 million as compensation, and when this sum was not forthcoming indicated that there was no prospect of compliance. Pressure mounted sharply in October 2002, however, when immediately after the Bali bombings US Secretary of State Colin Powell stated that Nauru’s offshore banks and its practice of selling its passports both created a terrorist risk. It was alleged that members of an Islamic terrorist group had been apprehended in the possession of Nauruan passports. Citing the FATF’s listing, the US placed Nauru under a financial embargo by unplugging it from the
<xref id="page_182" ref-type="page"></xref>
network used to process electronic banking transactions. Once this had happened, money could only be brought into or out of the country by physically carrying it. Because of the stigma of being on the FATF’s blacklist, most foreign financial institutions had already decided that the reputational risk of processing transactions coming from, going to, or routed through Nauru were simply not worth it.</p>
<p>In March 2003 Nauru’s government buckled, and abolished both the offshore banking licence regime and the economic citizenship programme (
<xref ref-type="bibr" rid="ref531">Van Fossen 2003</xref>
). Third countries were quick to draw the lesson that rather than being an irrelevant talk shop, the FATF was backed by the financial power of the US. This realisation also extended to financial matters only tenuously related to the financing of terrorism, as many tax havens became distinctly more willing to exchange information on tax matters (
<xref ref-type="bibr" rid="ref466">Sharman 2006</xref>
).</p>
<p>The USA Patriot Act (or to give it its full name, the Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act) contained a series of measures affecting US domestic institutions. Many of the clauses related to banks and other financial intermediaries collecting information on their customers for the benefit of the government had been unsuccessfully suggested by the Federal Deposits Insurance Commission as the Know Your Customer regulation from 1998. This earlier regulation had foundered after opposition based on privacy concerns, and complaints from the banking industry that the requirements would be excessively costly and burdensome. But it is the extra-territorial reach of the Act that is most noteworthy, allowing it to generate international ‘cooperation’, if of a less than spontaneous kind.</p>
<p>Section 311 of the Act empowers the Treasury Secretary to require all US institutions with correspondent relations with foreign banks in jurisdictions ‘of primary money laundering concern’ (with money laundering in this context including the financing of terrorism) to either collect more information on those using the correspondent accounts, or even sever these accounts altogether. US banks having correspondent relations with foreign banks have to establish the ownership of these foreign banks, and find out which other banks the foreign bank in question has correspondent accounts with. Furthermore, the Act prohibits relations with shell banks, i.e. those like in the case of Nauru that have no physical presence – no office and no employees. As a result of these changes, many US banks have simply refused to deal with transactions that come from foreign jurisdictions that, for one reason or another, have come under a cloud of suspicion, even when they are not formally listed as being of primary money laundering concern.</p>
<p>The most radical aspect, however, is section 319. This provision empowers US authorities to confiscate the assets of foreign banks maintained in the US if funds subject to seizure under American law are deposited with these banks anywhere in the world. There is no requirement that the actual money seized in the US be associated with the crime, or even that the bank was aware of the crime. Foreign banks sustaining correspondent relations with a US institution must also hand over information on foreign customers of interest to the US government, or else have those correspondent relations cut. This requirement applies even when the
<xref id="page_183" ref-type="page"></xref>
foreign bank would be breaking the laws of its home country to hand over such information (
<xref ref-type="bibr" rid="ref418">Preston 2002</xref>
).</p>
<p>It is worth noting that the USA Patriot Act is by no means the only source of enhanced powers to collect information from foreign jurisdictions in contravention of local laws. From late 2001 the US Treasury’s Office of Foreign Asset Control acting on behalf of the Central Intelligence Agency issued secret administrative subpoenas to the Society for Worldwide Interbank Financial Telecommunications (SWIFT) for details of inter-bank transactions. On an average day the Belgium-based SWIFT handles 10 million instructions on transfers worth US$6 trillion to and from almost every country in the world. After the programme was made public by the media in 2006 (‘Bank Data is Sifted in Secret by US to Block Terror’,
<italic>New York Times,</italic>
22–23 June 2006), it was found to be illegal under Belgian and European Union law, as well as contravening privacy regulations in other third countries. As in the case of ‘extraordinary renditions’, however, it is unclear whether allied governments did not know or merely turned a blind eye to this use of SWIFT data.</p>
<p>If the example of Nauru shows how an international organisation benefited from the power of the US, there are also examples where the US has depended on the expertise of international organisations. The most important of these is in deciding which jurisdictions qualify as being ‘of primary concern’ in relation to money laundering and terrorist finance. In making this crucial judgement, the Patriot Act defers to the authority of ‘credible international organizations or multilateral groups of experts’(section 5318A), in practice especially the FATF.</p>
<p>The US has so far been reluctant to use the full force of its new powers, instead preferring to rely on the potent threat these new legal prerogatives represent. Indeed, the mere possibility of ending up on the wrong side of the Patriot Act provisions has secured widespread cooperation from foreign jurisdictions. But the Council on Foreign Relations (
<xref ref-type="bibr" rid="ref131">2002</xref>
,
<xref ref-type="bibr" rid="ref132">2004</xref>
) has been critical of the Bush administration for being too slow to use the punitive provisions, particularly against Saudi Arabia. These same critics seem oblivious to the very patchy record the US has itself on meeting international standards to counter money laundering and terrorist finance. It is now easier to establish anonymous corporate vehicles and associated bank accounts which obscure the true owner in certain US states than in almost any foreign tax haven (
<xref ref-type="bibr" rid="ref526">US Treasury 2005</xref>
;
<xref ref-type="bibr" rid="ref218">Government Accounting Office 2006</xref>
).</p>
</sec>
<sec id="sec11_3">
<title>Anti-money laundering laws in the war on terror</title>
<p>The specific policy measures designed to counter the finance of terrorism are almost a direct copy of measures developed since the mid-1980s to counter money laundering. The relevant policy-making bodies at the national level, but even more so among international organisations active in the area, have explicitly acted on the assumption that money laundering and terrorist finance essentially share the same nature. Following from this logic, the dominant belief has been that the two problems demand essentially identical policy responses.
<xref id="page_184" ref-type="page"></xref>
So closely have money laundering and terrorist finance been identified that they are generally known in combination by the unlovely acronym: AML/CFT (Anti-Money Laundering/Countering the Finance of Terrorism). Thus despite the way that terrorist financing burst onto the agenda as a policy problem in 2001, the regulatory regime drawn up as a result is remarkable for the degree of continuity exhibited with the global anti-money laundering regime that had evolved over the preceding two decades.</p>
<p>Money laundering occurs after a predicate offence has brought money into the hands of criminals. Predicate offences such as robbing a bank, selling heroin or people trafficking are motivated by criminals’ desire for profits, but may leave the offenders with the problem of re-introducing large sums of money into the legitimate financial system without arousing the suspicions of law enforcement activities.</p>
<p>The first international institution founded specifically to counter money laundering, the FATF, once again grew out of a concern with the ‘War on Drugs’. The organisation was founded after the 1989 G7 heads of government summit. An intensive process of meetings between government officials and regulators followed in late 1989 and early 1990. Aside from the G7 members, participation was soon extended to the other OECD member states, though the FATF has since been very reluctant to expand beyond a few more ‘strategically important’ developing countries.</p>
<p>Despite its tiny secretariat and its lack of formal legal standing, the FATF has had a far-reaching influence by way of its 40 Recommendations (
<xref ref-type="bibr" rid="ref209">Gilmore 1995</xref>
;
<xref ref-type="bibr" rid="ref475">Sica 2000</xref>
). Revised in 1996 and 2002, in combination the Recommendations place primary emphasis on requiring private financial intermediaries to collect information on their customers. Authorities must legislate in order that they can find, freeze and ultimately confiscate the illicit funds that are the proceeds of crime, as well as its working capital.</p>
<p>The most basic requirement of the Recommendations is that countries criminalise money laundering, following the lead of the US which was the first country to do so in 1986. Much of the burden of stripping away the veil of secrecy that aids criminal enterprises falls on private institutions which must adopt ‘Know Your Customer’ requirements. This refers to such practices as specifying that all new customers must provide photo identification before opening a bank account. Where more complex financial activity is involved, such as setting up a company or trust, financial intermediaries must search for information on their clients’ backgrounds, and ensure they are not on any of the various national or international blacklists of terrorists. Intermediaries must establish the identity of the ultimate beneficial owners of all such corporate vehicles, possibly requiring a process of working back through a chain of corporations</p>
<p>Private firms must also report all instances of suspicious transactions to law enforcement authorities, or more usually a dedicated Financial Intelligence Unit linking the financial sector and law enforcement bodies. Suspicious transactions might include banking large amounts of cash, moving funds rapidly though a large number of accounts for no apparent purpose, or transacting with suspicious
<xref id="page_185" ref-type="page"></xref>
persons, firms or jurisdictions. At first limited to banks, the duty to report suspicious transactions has steadily been expanded to include accountants, stockbrokers, insurance providers, lawyers engaged in financial dealings and even casinos and jewellers. In each case these intermediaries face criminal prosecution if they either fail to report a suspicious transaction when they reasonably ought to have done so, or if they tip off their customer that they have submitted such a report.</p>
<p>In keeping with the borderless nature of the underlying problem, a key priority of the 40 Recommendations is to facilitate international cooperation in the pursuit of financial crime. Thus governments are enjoined to legislate to remove obstacles that may prevent the free flow of all this extra information from one country to another, usually via their Financial Intelligence Units. The key features that comprise the heart of AML measures (‘Know Your Customer’, suspicious transaction reporting obligations, freezing and confiscating funds, blacklists) now also define CFT standards in the same way.</p>
</sec>
<sec id="sec11_4">
<title>Differences between money laundering and terrorist finance</title>
<p>Despite the tendency to adopt policies designed to counter money laundering almost unchanged in fighting the war against terrorist financing, there are important differences between the two activities. Recalling that AML policies themselves were created to stop drug trafficking, the logic was that money provides both the means (operational capital) and even more so the motive (profit) for crime. As such, it was calculated that efforts to disrupt criminal finance should be effective in reducing the incidence of crime over all. Yet both of these points are problematic when applied to terrorism. Although terrorists are sometimes sensitive to their pay and material rewards (
<xref ref-type="bibr" rid="ref464">Shapiro 2006</xref>
), terrorism is clearly not a profit-driven activity in the way the illegal sale of drugs or arms is. Few terrorists live in luxury, if anything their illicit activity will make their lives much less, rather than more, comfortable.</p>
<p>Clearly there is a fundamental similarity between the two activities, in that both are premised on avoiding the gaze of law-enforcement and intelligence agencies. But it is not clear that this common imperative outweighs the other features that differentiate the role of money in terrorism from its role in drug trafficking and other criminal enterprises.</p>
<p>Terrorism is cheap. Even the September 11 attacks were funded on something like US$500,000, an essentially trivial sum of money. The coordinated bombings in Bali, Madrid and London cost only one-tenth of this amount. Suicide bombings like those in Israel and Iraq may cost as little as US$1000–3000. Terrorists only need very small sums of money to continue their activities, and thus they are generally insensitive to anything less than a near 100 per cent effective financial cut-off. Such a result is very unlikely to be achieved under current or any conceivable future AML/CFT laws.</p>
<p>The small sums of money also make detection particularly difficult, for the unsurprising reason that they have the same profile as most other kinds of financial transactions. Thus in the run-up to the September 11 attacks, the hijackers stayed
<xref id="page_186" ref-type="page"></xref>
in cheap motels, prepared their own food and washed their own clothes to save money (
<xref ref-type="bibr" rid="ref384">Naylor 2004</xref>
). The major expenses were air travel and pilot training. Their funds came through the rather mundane channels of legal cheque and credit card accounts held with local US banks. Mohammed Atta did receive US$70,000 via wire-transfer from the United Arab Emirates (UAE), and a Suspicious Transaction Report was lodged but never read. Other funds from the UAE were sent via wire offices by al-Qaeda associates in Düsseldorf and Hamburg.</p>
<p>A further basic difference between money laundering and the financing of terrorism is that the former by definition involves the proceeds of a criminal offence, whereas the latter does not. Laundering money is hiding the criminal origins of that money. Although terrorist activities may also be funded by the proceeds of crime, much and perhaps most (there is a lack of evidence) of the money sustaining terrorist movements comes from legitimate sources. It is widely suspected that al-Qaeda and other Islamic terrorist groups are funded via donations to charities, though again conclusive evidence is lacking. The donors and charities may or may not be aware of the nature of the final recipients. Because the money is freely donated there is no predicate offence. Aside from donations by individuals and charitable foundations, Shapiro identities further legal sources of finance for terrorist groups in state sponsorship and profits from legitimate business activities (2006: 6).</p>
<p>Putting these differences between the two kinds of crime to one side, however, there are prominent concerns about the effectiveness of anti-money laundering techniques even on their own terms. A widely-cited UN report on the subject notes that money laundering is ‘an area usually characterized by criminal successes and law enforcement failures’ (
<xref ref-type="bibr" rid="ref59">Blum
<italic>et al.</italic>
1998</xref>
: 3). Judging by the small number of convictions, the meagre totals of assets confiscated, and the continuing problem of drug trafficking and other manifestations of organised crime, many other analysts have portrayed anti-money laundering policies as suffering from serious shortcomings at best, and at worst being entirely useless (
<xref ref-type="bibr" rid="ref137">Cuellar 2003</xref>
;
<xref ref-type="bibr" rid="ref384">Naylor 2004</xref>
;
<xref ref-type="bibr" rid="ref415">Pieth 2002</xref>
;
<xref ref-type="bibr" rid="ref430">Rider 2004</xref>
).</p>
</sec>
<sec id="sec11_5">
<title>The results so far</title>
<p>In the second half of September 2001 some of the first responses from the US government to the attacks were financial, as assets belonging to or more usually associated with al-Qaeda and the Taliban were frozen. The UN’s al-Qaeda and Taliban Sanctions Committee reported the freezing of $110 million worth of assets. However, the same committee also noted that as a response to this pressure al-Qaeda had largely moved out of the formal banking system and was instead relying on cash couriers and alternative remittance systems. Even though cash reporting requirements are an important component of the standard AML/CFT package of policies, in general these policies were drawn up with modern electronic banking systems in mind. Given that the OECD countries initially drew up these policies and standards, it is not surprising that they reflect the assumptions and features common to first world financial systems. But these same assumptions
<xref id="page_187" ref-type="page"></xref>
render AML/CFT regulations of dubious value when applied in the developing world, where credit cards and electronic transactions are rare, banks are distrusted, and transactions are generally conducted using cash or barter.</p>
<p>Aside from the inherently secretive nature of terrorists themselves, the selective nature of publicity concerning the campaign against the financing of terrorism is also an obstacle to assessing its effectiveness. There is a common tendency for more or less spectacular accusations to be made or reported, but the subsequent disconfirmations to be ignored. Arrests have often received widespread coverage, but when those taken into custody are prosecuted on lesser charges unrelated to terrorism (such as immigration violations), the media has moved on, and the authorities have little incentive to publicise their mistakes. Thus the median sentence of those convicted in ‘international terrorism’ cases in the United States since 2001 is only 20–28 days (‘Study Finds Sharp Drop in Number of Terrorism Cases Prosecuted’,
<italic>New York Times,</italic>
4 September 2006). But because the initial sensational allegations have been cited back and forth so many times they are often then taken to be established facts.</p>
<p>Thus in the immediate aftermath of the September 11 attacks there was widespread speculation that al-Qaeda had profited from selling shares in airline and insurance companies only days before it struck, but these allegations turned out to be unfounded. Naylor details a long list of supposed al-Qaeda financing operations, said to involve diamonds, tanzanite, gold, cigarettes and other commodities, that generally turned out to be the product of unrelated crime, or were completely baseless (2004; compare with
<xref ref-type="bibr" rid="ref172">Ehrenfeld 2003</xref>
: 33–70).</p>
<p>Further muddying the waters, governments all over the world have been keen to ‘find’ an al-Qaeda presence, financial or physical, to demonstrate their commitment to the cause and to smear domestic opponents. The ultimate example of such was the Macedonian government’s admission in May 2004 that two years previously its police had kidnapped and executed seven refugees, framing the victims as al-Qaeda members in league with local ethnic Albanian separatists, in order to burnish the country’s anti-terrorist credentials (‘ “Terrorists” Killed to Impress US’,
<italic>Daily Telegraph,</italic>
1 May 2004).</p>
<p>Meanwhile, in the West a massive private industry has grown up to assist firms in complying with the slew of new regulatory requirements in this area. Private firms have had to take on new staff to ensure compliance, as well as re-training existing staff. Firms must gather, store and exchange more information on their clients, as well as purchasing expensive new software. The author of a report on the impact of these new regulations for accounting firm KPMG holds that as a result: ‘The cost to our global economy is so large, [terrorists have] already had the effect they wanted. The increasing costs of compliance and technology are a form of terrorism. We’re damaging ourselves’ (‘Looking in the Wrong Places’,
<italic>Economist,</italic>
20 October 2005; see also
<xref ref-type="bibr" rid="ref312">KPMG 2004</xref>
).</p>
<p>In this vein, there is a growing suspicion amongst both policy-makers and private banking and financial services firms that the regulations designed to make life harder for the financiers of terrorism are imposing disproportionate costs on the public purse, private firms and individual citizens. But the fear of being cast as
<xref id="page_188" ref-type="page"></xref>
‘soft on terrorism’ has tended to stifle criticism that might otherwise have broken forth.</p>
<p>Small and developing states are increasingly adopting the same expensive CFT regulatory regime rushed through by OECD members from September 2001. These reforms entail hiring and training staff in central banks, Financial Intelligence Units, insurance supervisory offices, finance ministries, company registrars, and so on. Private sector firms also must acquire the necessary complement of Money Laundering Reporting Officers and data-monitoring processes. The combined public and private burden of this new apparatus imposes significant costs on countries whose resources are already stretched meeting other pressing challenges (
<xref ref-type="bibr" rid="ref466">Sharman and Mistry 2006</xref>
).</p>
<p>One unequivocal result of the ratcheting up of requirements has been the greatly increased number of suspicious transactions reported. Yet this may create problems of information overload, as analysts seek to sift through the mountain of data to establish meaningful patterns. After all, it is worth remembering that the transactions to Mohammed Atta from the UAE in the lead up to the 2001 attacks were reported as suspicious, but such was the number of reports that this one was not processed until after the attacks.</p>
<p>Disappointing results in disrupting terrorist finance have conventionally been portrayed as necessitating a re-doubling of efforts. The basic model, however, has not been challenged in policy-making circles. Instead, the Financial Intelligence Units and other related bodies responsible for prosecuting this fight have received consistent and significant budget increases as well as expanded statutory powers. Financial counter-measures are still seen as being one of the few areas in which the West can take an offensive posture towards terrorists, rather than merely relying on passive counter-measures or responding to attacks.</p>
<p>All this is not to say that the effort expended by international organisations and state authorities has failed to yield any results. The extra information has proved very helpful in building up a picture of terrorist operations after attacks have occurred (
<xref ref-type="bibr" rid="ref552">Winer 2002</xref>
: 276). Bank transfers and credit card receipts enable law enforcement bodies to discern the planning and preparation process in the lead-up to attacks. But this is still far from the goal of being able to prevent such attacks from being carried out in the first place. It is still the belief that the appropriate criterion for evaluating the success of CFT measures is in their pre-emptive effects, and only secondarily in aiding the apprehension and prosecution of terrorists after the fact. Yet it is probably unrealistic to hold CFT policies to such a demanding standard.</p>
<p>It is possible to venture some tentative predictions about the future shape of efforts to counter terrorism by starving terrorist groups of the funds they require to mount attacks against civilians and ensure organisational survival. Policy solutions designed in the West and imposed globally will continue to use the template of anti-money laundering to respond to the financing of terrorism, despite the important differences between the two activities described above. The key to fighting both sorts of crime is seen as being the collection of ever-greater quantities of information, though a more risk-based approach may lead to some
<xref id="page_189" ref-type="page"></xref>
kinds of data, involving certain countries, particular patterns of transactions, and specific individuals, receiving much higher priority than others. Increased financial transparency will continue to be the overarching aim. Despite only modest tactical and even less strategic success, anti-terrorist efforts in this areas will become increasingly costly, with most of the burden borne by the private sector and citizens rather than the state. Despite regulatory and technological advances in the US and across the globe, the modest financial flows that may constitute the lifeblood of terrorism are likely to continue to circulate for many years to come.</p>
</sec>
</body>
</book-part>
<book-part book-part-type="chapter" book-part-number="12" id="chapter12">
<book-part-meta>
<title-group>
<title>
<xref id="page_190" ref-type="page"></xref>
Conclusion</title>
<alt-title alt-title-type="running-head-verso">Conclusion</alt-title>
<alt-title alt-title-type="running-head-recto">Sara E. Davies and Richard Devetak</alt-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<given-names>Sara E.</given-names>
<surname>Davies</surname>
</name>
</contrib>
<contrib contrib-type="author">
<name>
<given-names>Richard</given-names>
<surname>Devetak</surname>
</name>
</contrib>
</contrib-group>
</book-part-meta>
<body>
<p>This conclusion seeks to develop the various ideas about terrorism and the war on terror set out in the previous chapter by analysing how the security context that emerged in the 1990s has been altered again by the terrorist attacks of September 11, 2001. It will suggest that realist approaches at the end of the Cold War proved limited in their capacity to address the full range of security issues that arose at that time. This led to a greater appreciation of critical approaches that questioned why insecurity existed, who was most insecure, how those insecurities might be ameliorated and how best to understand and explain security and insecurity. We look at this period to demonstrate that, since 9/11, there has been a marked tendency to fall back on the assumptions that were made during the Cold War: that there is an ‘us’ fighting against a ‘them’, that what threatens us must threaten everyone else, and that the application of military force is the primary tool for mitigating the threat. As this book has demonstrated, the flaw with current conceptions of security in the ‘war on terror’ is that it is not clear what victory would look like. How would we achieve victory over this elusive ‘enemy’? How do we know when victory is achieved? And, are the policies we produce improving or threatening our own security?</p>
<p>Classical realism, like liberalism, constructivism and critical security theory, provides a setting for powerful critical insights based on practical wisdom for understanding the relationships within international society. However, as the contributors to this volume have demonstrated only too well, the foreign and security policies of the US, UK and Australia post-9/11 has reflected more a pursuit of realist ‘reactionism’ rather than a critical reflection. September 11 and the tragedies since then have manifested a number of different social, political, legal and violent responses. Whether these responses were proportionate and whether we are safer today because of them was a core question that this book sought to explore. In profiling the responses and their consequences, we have sought to create a new impetus for those facing policy choices regarding terrorism and those in the academy seeking to explain and understand our current predicament.</p>
<p>This conclusion presents three positions based on observations drawn from this volume. First, the war on terror, as it is currently conceptualised, is flawed because of its inappropriate use of realist underpinnings and as a result will have further destablising effects on global security. Second, the democratic ‘fight for
<xref id="page_191" ref-type="page"></xref>
ideals’ is emerging more as an ‘ideological conquest’ which could be taking the West into battles that it cannot win through the application of power. Finally, for every action there is a reaction. Foreign policy by powerful states influences the world at large and as a result there is a greater need for responsibility, leadership and prudence amongst those states. We conclude with Morgenthau’s warning that powerful states cannot escape from the power that they wield or from the consequences that arise when it is not wielded wisely.</p>
<sec id="sec12_1">
<title>The changing security context: from the Cold War to September 11</title>
<p>The end of the Cold War and the rise of globalisation seemed to many, including US President George H. Bush, to herald a ‘new world order’, one that promised both peace and prosperity for more and more people around the globe. Prospects for international peace and security seemed bright as ideological enmity dissipated, leaving states to focus on wealth and welfare. The implosion of the Soviet Union left the US as the sole superpower, or, as coined by the then-French foreign minister Hubert Védrine, a ‘hyperpower’. US power across the spectrum – from military and economic to political and cultural power – was unmatched. In the absence of the Soviet Union no other state could challenge the US, not even a rising China.</p>
<p>This new geopolitical context seemed to afford the US and its allies enhanced security. Having emerged triumphant from the Cold War, the West’s territorial integrity and political institutions were now safer from serious threat than they had been for nearly a century. This at least was the more optimistic view propounded by liberals in the early 1990s (e.g.
<xref ref-type="bibr" rid="ref201">Fukuyama 1992</xref>
). Realists of the time were still sceptical that the Cold War’s end would enhance international security. Bipolarity, to their way of thinking, was one of the keys to stabilising the international system and containing security threats (e.g.
<xref ref-type="bibr" rid="ref354">Mearsheimer 1990</xref>
). Unipolarity or multipolarity, depending on how you viewed the post-Cold War order, promised greater instability as rising and revisionist powers would, in seeking to improve their position in the international system, pose threats to neighbouring states and regions. Ultimately, the UN notwithstanding, responsibility for ensuring international peace and security would lie with the US and its willingness to lead. Realists have long held to the belief that hegemonic powers stabilised the international system through effective leadership, which would necessarily include coercive diplomacy and war as vital instruments. The fact that the Cold War ended without an actual engagement of military conflict between the two key enemies – US and USSR – did not deter realists from holding to their beliefs in the nature of war and states.</p>
<p>Though the 1990s bore witness to many bloody conflicts, Rwanda and Bosnia being only two of the most prominent, neither liberal nor realist perspectives seemed inclined to rethink their basic assumptions about security, particularly state-centrism and reliance on military force. Many of the conflicts, dubbed by Mary Kaldor as ‘new wars’, arose far away from Washington, London and Paris.
<xref id="page_192" ref-type="page"></xref>
The dissolution of Yugoslavia and the protracted war in Bosnia posed a slightly different problem for the West, as they erupted on the fringes of Western Europe. Europe felt susceptible to the side-effects of these nearby conflicts – refugee flows, illicit arms trading, transnational criminal networks and so on. The imperative to intervene there was therefore more directly related to traditional security concerns but necessitated by ‘non-traditional’ security threats, and as a result the civil wars and genocides taking place further afield did not create an impetus to address the insecurity of those in Africa.</p>
<p>Two developments in security studies have taken place in response to this changing context. First, the security agenda was broadened to accommodate new or non-traditional threats. Second, ‘critical security studies’ emerged to reassess assumptions that underpinned ‘traditional’ security discourse.</p>
<p>The collapse of the bipolar system together with the rise of globalisation seemed to transform the international security agenda. A ‘new security dilemma’ was purported to exist, one where subnational and transnational flows of violence rendered interstate balances of power less effective mechanisms in regulating international relations (
<xref ref-type="bibr" rid="ref112">Cerny 1998</xref>
). New threats arose that neither originated in states nor put the state’s survival at risk. These included environmental degradation, economic instability and societal insecurity in the face of growing levels of transnational people movement. Critics questioned the appropriateness of forcing these concerns into the framework of security. Doing so restricted the terms of debate and led discussion away from the specifics of the issue and more generally away from normative issues. The problem, in short, was that turning all these issues into security problems tended towards ‘depoliticisation’ by searching for instrumental solutions where they were not always appropriate and emptying them of normative content.</p>
<p>The 9/11 terrorist attacks also forced a broadening of the security
<italic>agenda,</italic>
but it did not force a broadening of the White House
<italic>response</italic>
to this new form of insecurity. Though terrorism was by no means new, the scale and spectacular nature of al-Qaeda’s devastating attacks on Washington and New York immediately led to its domination of Washington’s security agenda. Research into the global networked, non-hierarchical character of the so-called ‘new’ terrorism was suddenly considered crucial to our very existence (
<xref ref-type="bibr" rid="ref44">Benjamin and Simon 2005</xref>
); as has been research into the links between Islamism and terrorism (
<xref ref-type="bibr" rid="ref446">Sageman 2004</xref>
;
<xref ref-type="bibr" rid="ref245">Holmes 2005</xref>
;
<xref ref-type="bibr" rid="ref33">Barkawi and Laffey 2006</xref>
).</p>
<p>Such is the level of anxiety amongst new terrorism experts and some western governments, 9/11 enshrined the moment where a new ‘enemy’ was defined that we all had to secure ourselves against – security became redefined as meaning ‘safe from terrorism’ rather than simply ‘safe from threats’. In other words, the realist understanding of security – ‘us’ against ‘them’ – returned to the fore. In the immediate aftermath of the attacks it appeared to many, including President George W. Bush, that the world had changed. The ‘age of terror’ was said to be upon us, but we were to face it by mobilising the techniques and attitudes of Cold War. Most scholars and practitioners tended to be sceptical of such hyperbole, but agree that even if the world did not change, for the USA and its remaining allies the
<xref id="page_193" ref-type="page"></xref>
world
<italic>has</italic>
changed. As soon as September 12, 2001, the use of force was justified against anyone who was not ‘with us’ (
<xref ref-type="bibr" rid="ref82">Bush 2001</xref>
). Dangers were to be squashed before they became real. ‘Rogue states’ would be transformed to make way for freedom, democracy and the rule of law so that regional and international security could be enhanced. All these ideas were enunciated before it was clear whether any state had actually directly assisted in the 9/11 attacks. Unilateralism, pre-emption and ‘regime change’ became the principal tenets of the highly controversial Bush Doctrine in the US-led ‘war on terror’. They marked a deliberate departure from the traditional realist logic of containment which was alleged to be irrelevant to the new ‘age of terror’, but retained a realist understanding of threat and the belief that the source of threat could be traced to states seeking power, rather than a normative endeavour by radical fundamentalists that do not align themselves with or build their power through state-centred structures.</p>
<p>There can be no doubt that terrorism is a real and present danger, but there is a need to be much more specific about the scale and character of the threat if effective responses are to be devised. Greater clarification is therefore needed not just of terrorism’s sources, but of the way that terrorism alters, or should alter, the way we think about security. This is not simply a matter of adding terrorism to a growing list of threats that states must deal with; and it is certainly not a matter of simplistically equating terrorism either with poverty or with Islam. In any case, the study of global terrorism requires examination of conventional security assumptions and with this entails inquiry into possible alternative approaches to seeking security.</p>
<p>The debates over the usefulness of subsuming various issue areas under the heading of security partly led to the rise of critical security studies (CSS). But a deeper spur was the tendency to leave certain fundamental assumptions unquestioned in security analysis. Krause and Williams (
<xref ref-type="bibr" rid="ref314">1996</xref>
: 242) explain that critical approaches to security question the notions that security is an objective condition, that threats are simply material forces correctly perceived as dangerous, or that the referent (that is, the thing to be made secure) is historically fixed. Instead, CSS poses ‘questions about
<italic>how</italic>
the object to be secured (nation, state, or other group) is constituted, and how particular issues (economic well-being, the risk of violence, environmental degradation) are placed under the “sign of security”’ (
<xref ref-type="bibr" rid="ref314">Krause and Williams 1996</xref>
: 242–3). That terrorism should be placed under the ‘sign of security’ is hardly controversial. But answers about how best to balance prevention with pre-emption, crime-fighting with war-fighting and intelligence-gathering powers with due process are far from self-evident.</p>
</sec>
<sec id="sec12_2">
<title>Fighting the war on terror</title>
<p>The ‘war on terror’ has come to dominate security studies after 9/11. But from the outset it caused difficulties because it was a deterritorialised non-state actor unleashing the violence against states. Traditional security analysis, especially during the Cold War, assumed states as the primary protagonists. The problem, as revealed in the US’s response to 9/11, was that America and its allies were
<xref id="page_194" ref-type="page"></xref>
ill-prepared to defend themselves against non-state threats. The only way that the US could conceptualise an ‘enemy’ that it could fight against was to very quickly shift its focus back to states. As Dick Cheney is reported to have said in National Security Council (NSC) meetings, it is much easier to target states than terrorists, which is why the President enlarged his target to include so-called ‘rogue states’ that harbour terrorists. That the White House and its closest allies saw the fight against terrorism in primarily military terms is clear in the very name
<italic>‘war</italic>
on terror’.</p>
<p>Daniel Benjamin and Steven Simon (
<xref ref-type="bibr" rid="ref44">2005</xref>
: 139–40) argue that the White House’s perception of the terrorist threat through state-centric and militarist lenses represents a mistaken security policy, ‘[T]he Bush team’s commitment to a worldview focused on states … and its determination to rely on military force in the fight against terror, have wrought lasting damage to America’s strategic position’. Casting terrorism as a derivative problem of ‘rogue states’, they say, was a serious error, since state sponsorship of terrorism had declined markedly over the past several years (
<xref ref-type="bibr" rid="ref44">Benjamin and Simon 2005</xref>
: 151). Nevertheless, the US focused its post-September 11 security strategy on states, rogue or failed (
<xref ref-type="bibr" rid="ref85">Bush 2002c</xref>
). Failed and rogue states were placed at the centre of the US ‘war on terror’, but it was to be the ‘rogue state’ of Iraq that became the centrepiece of US strategy, and possibly its nadir.</p>
</sec>
<sec id="sec12_3">
<title>Selling war: from Afghanistan to Iraq</title>
<p>The war against Afghanistan (which commenced in November 2001) became the first major episode of the open-ended ‘war on terror’. The US military was able to topple the Taliban regime without much trouble, but they had greater difficulty trying to ‘smoke out’ and eliminate al-Qaeda. Nevertheless, the US was able to build on enormous and widespread international goodwill in the immediate aftermath of 9/11 to launch this war.</p>
<p>No such good will was to be extended to the US when it decided to invade Iraq – the second major episode in the ‘war on terror’. After protracted and ill-tempered discussions amongst members of the UN Security Council (UNSC), it failed to deliver the resolution Bush and Blair were hoping for, but Iraq was invaded nonetheless. The war could not be ‘sold’ to France, Russia, China, nor several other UNSC members despite attempts by the US and the UK. First and foremost, the US and UK failed to persuade others that war against Iraq was justified. The US also oscillated between different justifications for war, including accusations of links between Iraq and al-Qaeda, and allegations that Iraq was continuing to develop weapons of mass destruction in defiance of various UNSC resolutions. In both cases, evidence was shaky to say the least. Moreover, the inspections, which were intended to provide certainty, were incomplete and inconclusive. By refusing to allow the inspections process to run its course the US appeared overzealous in its resort to war (
<xref ref-type="bibr" rid="ref197">Freedman 2004b</xref>
).</p>
<p>Making a case for war on the basis of so much tendentious speculation is hardly conducive to accurate threat assessment which is central to good security
<xref id="page_195" ref-type="page"></xref>
strategy. But that was, in many respects, beside the point. The war’s proponents were simply engaging in ‘a classic case of
<italic>suppressio veri</italic>
and
<italic>suggestio falsi’</italic>
(
<xref ref-type="bibr" rid="ref140">Danchev 2004</xref>
: 443) – withholding the truth and positing in its place something less than the full story – in order to strengthen the case for what they believed was necessary action, despite the lack of a compelling justification. Classic
<italic>raison d’état,</italic>
we might say. This same pattern of tendentious interpretation of intelligence to support a pre-determined policy was in evidence in the UK too. Alex Danchev (
<xref ref-type="bibr" rid="ref140">2004</xref>
) notes the way Downing Street redrafted a memo from the Joint Intelligence Committee, deleting the word ‘may’ so as to heighten the sense of urgency. The final version read: ‘The Iraqi military
<italic>is able to</italic>
deploy these [chemical and biological] weapons within 45 minutes of a decision to do so’ (cited in Danchev
<xref ref-type="bibr" rid="ref140">2004</xref>
: 446, emphasis added).</p>
<p>The decision to invade Iraq and unseat Saddam Hussein must be seen in the context of 9/11. Even if it is true that neo-conservatives in Washington viewed deposing the Iraqi dictator as ‘unfinished business’ after the first Gulf War, it was the sense of post-9/11 fear that spurred the White House into action and imparted to it a veneer of legitimacy. After the terrorist attacks, neo-conservatives knew a more amenable domestic environment had been created to drum up support for war against Iraq. If Halper and Clark (
<xref ref-type="bibr" rid="ref232">2004</xref>
: 230) are correct, it was a kind of post-9/11 ‘neurosis’, which shaped the context in which these ‘disparate and uncorroborated fragments of information about Iraq [were] formed into a mosaic of specific threats and dangers’. Here we see the reaction to 9/11 being mired in the need for a collective enemy to locate and defeat. The consequence has been that the identification of home-grown terrorists, such as we saw in the July 2005 London bombings, do not fit within this ‘enemy’ profile. In addition, as we have seen with the regrouping of Al-Qaeda on the Pakistan-Afghanistan borders, the chance to defeat an insidious organisation was lost when precious troops from the US and UK were deployed to Iraq rather than remaining in Afghanistan (
<xref ref-type="bibr" rid="ref4">ABC 2002</xref>
).</p>
</sec>
<sec id="sec12_4">
<title>Winning the war on terror?</title>
<p>In this section we review the state of play in the ‘war on terror’. We argue that the ‘war on terror’ as presently understood in Washington, London and Canberra misconstrues the problem and consequently adopts a flawed strategy in dealing with global terrorism. Most prominently, it has led the ‘coalition of the willing’ into a complex war from which it will be difficult to extricate itself, and which has unwittingly exacerbated the problem of terrorism, both within Iraq and possibly beyond.</p>
<p>Forty-two days after the war against Iraq commenced, on 1 May 2003, President Bush stood aboard USS
<italic>Abraham Lincoln</italic>
in front of a massive banner declaring ‘Mission accomplished’. ‘The tyrant has fallen, and Iraq is free’, he proudly announced. There can be no doubt that the removal of a brutal dictator like Saddam Hussein is a great political good, but this does not extinguish the
<xref id="page_196" ref-type="page"></xref>
normative and prudential doubts expressed over the war and future efforts to intervene to prevent human rights atrocities in other states.</p>
<p>Four years after Bush’s confident pronouncement that ‘Major combat operations in Iraq have ended’, we may now be in a better position to judge the extent to which the Iraq war has assisted the ‘war on terror’. Military operations to topple Saddam Hussein were indeed effective and swift. But the battle to establish the peace continues to be much more protracted and difficult. Iraq is now in chaos; violence is a daily reality. Over 3,000 US troops and tens of thousands of Iraqis have been killed.
<sup>
<xref ref-type="fn" rid="fn12_1">1</xref>
</sup>
The insurgency has progressively grown in regularity and deadliness.</p>
<p>Many also believe the Iraq war is fuelling global terrorism. Daniel Benjamin and Steven Simon (
<xref ref-type="bibr" rid="ref44">2005</xref>
: 42) write that,</p>
<disp-quote>
<p>Iraq has given violent Islamists more than an arena in which to dramatize their cause and bravery: It has provided them with a country-sized training ground and a laboratory for innovating the tactics and operations of the future. The loss of Afghanistan and its camps hurt the jihadists badly, but the on-the-job training they have received in Iraq has more than made up for that setback.</p>
</disp-quote>
<p>Declassified assessments from the National Intelligence Estimates reveal that America’s intelligence agencies have arrived at the same conclusion. Their view is that ‘the Iraq jihad is shaping a new generation of terrorist leaders and operatives’, and that Iraq had ‘become the “cause celebre” for jihadists, breeding a deep resentment of US involvement in the Muslim world and cultivating supporters for that global jihadist movement’ (cited in
<xref ref-type="bibr" rid="ref144">Danner 2004</xref>
: 84–5).</p>
</sec>
<sec id="sec12_5">
<title>Conclusion</title>
<p>The academic mood since 9/11 has been as divided as the policy experts at the Pentagon, the State Department and the White House have been (
<xref ref-type="bibr" rid="ref68">Boyle 2007</xref>
). To condemn the ‘coalition of the willing’ for their invasion into Iraq, their attempts at post-conflict reconstruction and call for troop withdrawal is, some allege, dangerous speculation that only fuels and justifies further terrorism (
<xref ref-type="bibr" rid="ref251">Howard 2007</xref>
). Nevertheless, the political climate that international society finds itself in nearly six years since that tragic event on 9/11 deserves review. This book has unapologetically analysed the effects of a ‘war on terror’ being waged on a number of actors to assess whether security has been enhanced. Rather than demonstrating ‘Western self-loathing’, our analysis was born out of a desire to understand contemporary world politics and develop better ways of protecting Westerners and non-Westerners from further terror, mass violence and tragedy.</p>
<p>Hans Morgenthau (
<xref ref-type="bibr" rid="ref370">1962</xref>
) remarked that the attempt to ‘escape from power’ can manifest in four different types of ‘escape’: scientism, dual moral standards, perfectionism and totalitarianism. The first, scientism, is born of a faith that the social world is susceptible to the same kind of analysis and control as the natural world. The second, dual moral standards, supposes that different moral standards
<xref id="page_197" ref-type="page"></xref>
apply to the private and public spheres. The last two, we conclude, are particularly relevant to today. Perfectionism and totalitarianism present two different ways of dealing with the gap between political ideals and political realities. Perfectionism acknowledges political realities as they exist, but holds the conviction that transformation is possible by determined acts of will. ‘Once democracy, brought to all countries of the earth either by force of arms or preferably by education and exhortation, has been universally accepted, the evils of politics will have been made an end to, and reason will rule over domestic and international society’ (
<xref ref-type="bibr" rid="ref370">Morgenthau 1962</xref>
: 315). Perfectionism thus tries to close the gap between ideal and reality by bending reality to the ideal.</p>
<p>Totalitarianism moves in the opposite direction, ‘tearing the ideal down to the level of the brutal facts of political life’ (
<xref ref-type="bibr" rid="ref370">Morgenthau 1962</xref>
: 317). As used by Morgenthau, totalitarianism refers to ‘a state of mind’, rather than the historical phenomenon (
<xref ref-type="bibr" rid="ref370">Morgenthau 1962</xref>
: 316). ‘What is, is good because it is, and power is to the totalitarian not only a fact of social life with which one must come to terms but also the ultimate standard for judging human affairs and the ideal source of all human values’ (
<xref ref-type="bibr" rid="ref370">Morgenthau 1962</xref>
: 316). Morgenthau (
<xref ref-type="bibr" rid="ref370">1962</xref>
: 17) concludes that the totalitarian state of mind is the most dangerous mode of escapism,</p>
<disp-quote>
<p>for, while here the political facts as facts are recognized, their moral significance is obscured. Power is glorified as the source of all material and moral good, and those transcendent concepts by which power must be tamed, restrained, and transformed are denied an independent existence.</p>
</disp-quote>
<p>It remains unclear whether the Bush Doctrine (as manifested in its ‘war on terror’) commits perfectionism or totalitarianism. Arguably, it is perfectionist in its attempt to lift political realities to the level of ideals in pursuing democratic transformation. Perfectionism would be applaudable if accomplished through means of distributive justice, rights-based approaches and cooperative enticements. But the laudable aspiration to spread democracy and the rule of law has been contradicted by means fundamentally at odds with democracy and the rule of law. The use of torture, extraordinary rendition and the denial of due process and other non-derogatory rights, together with dubious justifications for war in states unconnected to the event that triggered this ‘escape’ in the first place, may end up delivering more collective insecurity.</p>
<p>It is no doubt an uncomfortable thought to consider the Bush presidency’s ‘state of mind’ as totalitarian, but on Morgenthau’s definition, a strong case can be made for reaching just such a conclusion. The Bush Doctrine tends to equate US military might with moral superiority; and – as Sara E. Davies pointed out in relation to Guantanamo Bay – it has also worked hard to ensure that its war on terror is not judged against normal moral and legal standards. Indeed, the defence of moral and political ideals is often dismissed by Washington and its supporters in the press and the academy, as delusional. When fighting against an enemy who has dispensed with the rules, the only option is to be prepared to do the same when necessary, so it is argued.</p>
<p>
<xref id="page_198" ref-type="page"></xref>
What made 9/11 so truly terrifying, so devastating was that, as was noted in the Introduction, it shattered the security of citizens within Western states. Seeing death on a large scale in Africa, even Asia, is not beyond collective comprehension. These individuals live daily with the threat of death hanging over them due to disease, famine, disaster or war. In the West, there has been a feeling of security, of safety within its borders. September 11 removed that, and it changed how individuals understand and pursue security within a liberal democratic state. Ultimately this book sought to assess whether the United States and its allies have responded to the challenge of 9/11 in ways that have restored faith in the ability of states to secure the physical survival and deeply-held values of their citizens or further contributed – whether consciously or not – to many more experiencing greater levels of insecurity. Answers to these questions raised a number of troubling conclusions that point to the need for academics and policy makers to do better to respond to the challenge of 9/11.</p>
</sec>
</body>
<back>
<notes>
<title>Note</title>
<fn-group>
<fn id="fn12_1">
<label>1</label>
<p>Iraq Body Count (IBC) estimates that somewhere between 55,794 and 61,507 Iraqis have been killed as of 9 February 2007. See
<uri xlink:href="http://www.iraqbodycount.net">www.iraqbodycount.net</uri>
. As of the same date, the US Department of Defense has confirmed 3,102 US troop casualties. 54,910 ‘non-mortal casualties’ are also reported. See
<uri xlink:href="http://www.icasualties.org/oif/">www.icasualties.org/oif/</uri>
.</p>
</fn>
</fn-group>
</notes>
</back>
</book-part>
</body>
</book-part>
</body>
<back>
<ref-list>
<title>
<xref id="page_199" ref-type="page"></xref>
References</title>
<ref id="ref1">
<mixed-citation publication-type="other">
<string-name>
<given-names>Rasul v.</given-names>
<surname>Bush</surname>
</string-name>
,
<year>2004</year>
,
<article-title>Supreme Court of the United States</article-title>
.</mixed-citation>
</ref>
<ref id="ref2">
<mixed-citation publication-type="other">
<string-name>
<given-names>Hamdan v.</given-names>
<surname>Rumsfeld</surname>
</string-name>
,
<year>2006</year>
,
<article-title>Supreme Court of the United States</article-title>
.</mixed-citation>
</ref>
<ref id="ref3">
<mixed-citation publication-type="book">
<collab>9/11 Commission</collab>
(
<year>2004</year>
)
<source>Final report of the National Commission on Terrorist Attacks upon the United States</source>
,
<publisher-loc>New York</publisher-loc>
:
<publisher-name>Norton</publisher-name>
.</mixed-citation>
</ref>
<ref id="ref4">
<mixed-citation publication-type="web">
<collab>ABC</collab>
<year>2002</year>
,
<source>Al Qaeda regrouping in Afghanistan: UN</source>
,
<article-title>The World Today</article-title>
,
<day>19</day>
<month>December</month>
, viewed
<date-in-citation>26 March 2007</date-in-citation>
<
<uri xlink:href="http://www.abc.net.au/worldtoday/stories/s750864.htm">www.abc.net.au/worldtoday/stories/s750864.htm</uri>
>.</mixed-citation>
</ref>
<ref id="ref5">
<mixed-citation publication-type="web">
<collab>ABC</collab>
<year>2006</year>
,
<source>Hicks’ return not so simple, says Ruddock</source>
, viewed
<date-in-citation>9 December 2006</date-in-citation>
<
<uri xlink:href="http://www.abc.net.au/cgi-bin/common/printfriendly.pl?http://www.abc.net.au/news/new">http://www.abc.net.au/cgi-bin/common/printfriendly.pl?http://www.abc.net.au/news/new</uri>
>.</mixed-citation>
</ref>
<ref id="ref6">
<mixed-citation publication-type="web">
<string-name>
<surname>Abdela</surname>
,
<given-names>L.</given-names>
</string-name>
<year>2005</year>
,
<source>Iraq’s war on women, Open Democracy</source>
,
<day>18</day>
<month>July</month>
, viewed
<date-in-citation>26 April 2007</date-in-citation>
<
<uri xlink:href="http://www.opendemocracy.net/conflict-iraq-conflict/women_2681.jsp">http://www.opendemocracy.net/conflict-iraq-conflict/women_2681.jsp</uri>
>.</mixed-citation>
</ref>
<ref id="ref7">
<mixed-citation publication-type="book">
<string-name>
<surname>Agamben</surname>
,
<given-names>G.</given-names>
</string-name>
<year>1998</year>
,
<source>Homo sacer: sovereign power and bare life</source>
,
<publisher-name>Stanford University Press</publisher-name>
,
<publisher-loc>Stanford, CA</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref8">
<mixed-citation publication-type="book">
<string-name>
<surname>Agamben</surname>
,
<given-names>G.</given-names>
</string-name>
<year>2005</year>
,
<source>State of exception</source>
,
<publisher-name>University of Chicago Press</publisher-name>
,
<publisher-loc>Chicago, IL</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref9">
<mixed-citation publication-type="book">
<string-name>
<surname>Ahmed</surname>
,
<given-names>S.</given-names>
</string-name>
<year>2004</year>
,
<source>The cultural politics of emotion</source>
,
<publisher-name>Edinburgh University Press</publisher-name>
,
<publisher-loc>Edinburgh</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref10">
<mixed-citation publication-type="book">
<string-name>
<surname>Alexandrov</surname>
,
<given-names>S.A.</given-names>
</string-name>
<year>1996</year>
,
<source>Self-defense against the use of force in international law</source>
,
<publisher-name>Kluwer Law International</publisher-name>
,
<publisher-loc>The Hague</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref11">
<mixed-citation publication-type="book">
<string-name>
<surname>Alibek</surname>
,
<given-names>K.</given-names>
</string-name>
<year>1999</year>
,
<source>Biohazard</source>
,
<publisher-name>Arrow</publisher-name>
,
<publisher-loc>London</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref12">
<mixed-citation publication-type="journal">
<string-name>
<surname>Alibek</surname>
,
<given-names>K.</given-names>
</string-name>
and
<string-name>
<surname>Bailey</surname>
,
<given-names>C.</given-names>
</string-name>
<year>2004</year>
, ‘
<article-title>Letter to the Editor: BioShield or BioGap</article-title>
’,
<source>Biosecurity and Bioterrorism</source>
, vol.
<volume>2</volume>
, no.
<issue>2</issue>
, pp.
<fpage>132</fpage>
<lpage>3</lpage>
.</mixed-citation>
</ref>
<ref id="ref13">
<mixed-citation publication-type="web">
<collab>Amnesty International</collab>
<year>2005</year>
,
<source>Iraq: decades of suffering, now women deserve better</source>
,
<month>February</month>
, viewed
<date-in-citation>26 April 2007</date-in-citation>
<
<uri xlink:href="http://web.amnesty.org/library/Index/ENGMDE140012005">http://web.amnesty.org/library/Index/ENGMDE140012005</uri>
>.</mixed-citation>
</ref>
<ref id="ref14">
<mixed-citation publication-type="web">
<collab>Amnesty International Australia</collab>
<year>2006</year>
,
<article-title>Hundreds of ‘war on terror’ detainees in US custody</article-title>
, viewed
<date-in-citation>1 December 2006</date-in-citation>
<
<uri xlink:href="http://www.amnesty.org.au/Act_now/action_centre/featuredaction/guantanamo_bay_ac">http://www.amnesty.org.au/Act_now/action_centre/featuredaction/guantanamo_bay_ac</uri>
>.</mixed-citation>
</ref>
<ref id="ref15">
<mixed-citation publication-type="journal">
<string-name>
<surname>Andres</surname>
,
<given-names>R.B.</given-names>
</string-name>
,
<string-name>
<surname>Wills</surname>
,
<given-names>C.</given-names>
</string-name>
and
<string-name>
<surname>Griffith</surname>
,
<given-names>T.E.</given-names>
,
<suffix>Jr</suffix>
</string-name>
<year>2005</year>
, ‘
<article-title>Winning with Allies: The Strategic Value of the Afghan Model</article-title>
’,
<source>International Security</source>
, vol.
<volume>30</volume>
, no.
<issue>3</issue>
, pp.
<fpage>124</fpage>
<lpage>60</lpage>
.</mixed-citation>
</ref>
<ref id="ref16">
<mixed-citation publication-type="book">
<collab>Anonymous</collab>
<year>1998</year>
,
<source>Military critical technologies List (MCTL), part 2: weapons of mass destruction technologies</source>
,
<chapter-title>Office of the Under Secretary of Defense for Acquistion and Technology</chapter-title>
,
<publisher-loc>Washington, DC</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref17">
<mixed-citation publication-type="other">
<collab>Anonymous</collab>
<year>2002</year>
, ‘
<article-title>The Scowcroft Memorandum</article-title>
’,
<source>CBW Convention Bulletin</source>
, vol.
<volume>57</volume>
, no.
<issue>2</issue>
.</mixed-citation>
</ref>
<ref id="ref18">
<mixed-citation publication-type="web">
<collab>Anonymous</collab>
<year>2005</year>
,
<source>Adherence to and compliance with arms control, nonproliferation and disarmament agreements and commitments</source>
,
<article-title>US Department of State Online</article-title>
, viewed
<date-in-citation>22 December 2005</date-in-citation>
<
<uri xlink:href="http://www.state.gov/t/vci/rls/rpt/51977.htm">http://www.state.gov/t/vci/rls/rpt/51977.htm</uri>
>.</mixed-citation>
</ref>
<ref id="ref19">
<mixed-citation publication-type="book">
<string-name>
<surname>Anscombe</surname>
,
<given-names>E.</given-names>
</string-name>
<year>1961</year>
, ‘
<chapter-title>War and Murder</chapter-title>
’, in
<string-name>
<given-names>W</given-names>
<surname>Stein</surname>
</string-name>
(ed.),
<source>Nuclear weapons and Christian conscience</source>
,
<publisher-name>Merlin Press</publisher-name>
,
<publisher-loc>New York</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref20">
<mixed-citation publication-type="book">
<xref id="page_200" ref-type="page"></xref>
<string-name>
<surname>Aquinas</surname>
,
<given-names>T.</given-names>
</string-name>
(ed.
<string-name>
<surname>Dyson</surname>
,
<given-names>R.W.</given-names>
</string-name>
)
<year>2002</year>
,
<source>Aquinas: political writings</source>
,
<publisher-name>Cambridge University Press</publisher-name>
,
<publisher-loc>Cambridge</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref21">
<mixed-citation publication-type="book">
<string-name>
<surname>Arendt</surname>
,
<given-names>H.</given-names>
</string-name>
<year>1958</year>
,
<source>The human condition</source>
,
<publisher-name>University of Chicago Press</publisher-name>
,
<publisher-loc>Chicago, IL</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref22">
<mixed-citation publication-type="book">
<string-name>
<surname>Armon-Jones</surname>
,
<given-names>C.</given-names>
</string-name>
<year>1991</year>
,
<source>Varieties of affect</source>
,
<publisher-name>Harvester Wheatsheaf</publisher-name>
,
<publisher-loc>New York</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref23">
<mixed-citation publication-type="book">
<string-name>
<surname>Aron</surname>
,
<given-names>R.</given-names>
</string-name>
<year>1986</year>
,
<source>Clausewitz: philosopher of war</source>
,
<publisher-name>Simon and Schuster</publisher-name>
,
<publisher-loc>New York</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref24">
<mixed-citation publication-type="book">
<string-name>
<surname>Augustine</surname>
</string-name>
,
<collab>Bishop of Hippo</collab>
<year>1998</year>
,
<source>The city of God against the pagans</source>
,
<chapter-title>Cambridge Texts in the History of Political Thought</chapter-title>
,
<publisher-name>Cambridge University Press</publisher-name>
,
<publisher-loc>Cambridge</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref25">
<mixed-citation publication-type="book">
<string-name>
<surname>Augustine</surname>
</string-name>
,
<collab>Bishop of Hippo</collab>
<year>2001</year>
, ‘
<chapter-title>Letter to Count Boniface</chapter-title>
’, in
<string-name>
<given-names>E.M.</given-names>
<surname>Atkins</surname>
</string-name>
and
<string-name>
<given-names>R.J.</given-names>
<surname>Dodaro</surname>
</string-name>
(eds),
<source>Augustine: –.political writings</source>
,
<publisher-name>Cambridge University Press</publisher-name>
,
<publisher-loc>Cambridge</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref26">
<mixed-citation publication-type="book">
<string-name>
<surname>Augustine</surname>
</string-name>
,
<collab>Bishop of Hippo</collab>
(ed.
<string-name>
<surname>Dyson</surname>
,
<given-names>R.W.</given-names>
</string-name>
)
<year>2001</year>
,
<source>Augustine: political writings</source>
,
<publisher-name>Cambridge University Press</publisher-name>
,
<publisher-loc>Cambridge</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref27">
<mixed-citation publication-type="web">
<collab>Australian Government Law Reform Commission</collab>
<year>2006</year>
,
<source>Media release: are sedition laws necessary and affective</source>
, viewed
<date-in-citation>20 March 2006</date-in-citation>
<
<uri xlink:href="http://www.alrc.gov.au">www.alrc.gov.au</uri>
>.</mixed-citation>
</ref>
<ref id="ref28">
<mixed-citation publication-type="journal">
<string-name>
<surname>Ayres</surname>
,
<given-names>T.E.</given-names>
</string-name>
2005, ‘
<article-title>“Six Floors” of Detainee Operations in the Post-9/11 World</article-title>
’,
<source>Parameters</source>
, vol.
<volume>35</volume>
, no.
<issue>3</issue>
, pp.
<fpage>33</fpage>
<lpage>53</lpage>
.</mixed-citation>
</ref>
<ref id="ref29">
<mixed-citation publication-type="book">
<string-name>
<surname>Bailes</surname>
,
<given-names>A.J.K.</given-names>
</string-name>
<year>2006</year>
, ‘
<chapter-title>Introduction: The World of Security and Peace Research in 40-Year Perspective</chapter-title>
’, in
<collab>Stockholm International Peace Research Institute (SIPRI)</collab>
(ed.),
<source>SIPRI Yearbook 2006</source>
,
<publisher-name>Oxford University Press</publisher-name>
,
<publisher-loc>Oxford</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref30">
<mixed-citation publication-type="book">
<string-name>
<surname>Barbalet</surname>
,
<given-names>J.M.</given-names>
</string-name>
<year>2001</year>
,
<source>Emotion, social theory and social structure: a macrosociological approach</source>
,
<publisher-name>Cambridge University Press</publisher-name>
,
<publisher-loc>Cambridge</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref31">
<mixed-citation publication-type="journal">
<string-name>
<surname>Barkawi</surname>
,
<given-names>T.</given-names>
</string-name>
<year>2004</year>
, ‘
<article-title>On the Pedagogy of “Small Wars’</article-title>
’’,
<source>International Affairs</source>
, vol.
<volume>80</volume>
, no.
<issue>1</issue>
, pp.
<fpage>19</fpage>
<lpage>37</lpage>
.</mixed-citation>
</ref>
<ref id="ref32">
<mixed-citation publication-type="book">
<string-name>
<surname>Barkawi</surname>
,
<given-names>T.</given-names>
</string-name>
<year>2006</year>
,
<source>Globalization and war</source>
,
<publisher-name>Rowman and Littlefield</publisher-name>
,
<publisher-loc>Lanham, MD</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref33">
<mixed-citation publication-type="journal">
<string-name>
<surname>Barkawi</surname>
,
<given-names>T.</given-names>
</string-name>
and
<string-name>
<surname>Laffey</surname>
,
<given-names>M.</given-names>
</string-name>
<year>2006</year>
, ‘
<article-title>The Postcolonial Moment in Security Studies</article-title>
’,
<source>Review of International Studies</source>
, vol.
<volume>32</volume>
, no.
<issue>4</issue>
, pp.
<fpage>329</fpage>
<lpage>52</lpage>
.</mixed-citation>
</ref>
<ref id="ref34">
<mixed-citation publication-type="web">
<collab>BBC</collab>
(
<year>2001</year>
) ‘
<article-title>Cherie Blair Attacks Taleban “Cruelty</article-title>
”’,
<day>19</day>
<month>November</month>
, viewed
<date-in-citation>6 April 2007</date-in-citation>
<
<uri xlink:href="http://news.bbc.co.uk/1/hi/uk_politics/1663300.stm">http://news.bbc.co.uk/1/hi/uk_politics/1663300.stm</uri>
>.</mixed-citation>
</ref>
<ref id="ref35">
<mixed-citation publication-type="web">
<collab>BBC News Online</collab>
<year>2004</year>
,
<source>Bin Laden video threatens America</source>
, viewed
<date-in-citation>6 March 2007</date-in-citation>
<
<uri xlink:href="http://news.bbc.co.uk/2/hi/middle_east/3966741.stm">http://news.bbc.co.uk/2/hi/middle_east/3966741.stm</uri>
>.</mixed-citation>
</ref>
<ref id="ref36">
<mixed-citation publication-type="web">
<collab>BBC News Online</collab>
<year>2004</year>
,
<article-title>UK ‘Spied on UN’s Kofi Annan’</article-title>
, viewed
<date-in-citation>15 March 2007</date-in-citation>
<
<uri xlink:href="http://news.bbc.co.uk/2/hi/uk_news/politics/3488548.stm">http://news.bbc.co.uk/2/hi/uk_news/politics/3488548.stm</uri>
>.</mixed-citation>
</ref>
<ref id="ref37">
<mixed-citation publication-type="web">
<collab>BBC News Online</collab>
<year>2006</year>
,
<source>Al Qaeda to avenge Israel deeds</source>
, viewed
<date-in-citation>6 March 2007</date-in-citation>
<
<uri xlink:href="http://news.bbc.co.uk/2/hi/middle_east/5220162.stm">http://news.bbc.co.uk/2/hi/middle_east/5220162.stm</uri>
>.</mixed-citation>
</ref>
<ref id="ref38">
<mixed-citation publication-type="web">
<collab>BBC News Online</collab>
<year>2006</year>
,
<source>Blair’s concerns over face veils</source>
, BBC News,
<day>17</day>
<month>October</month>
, viewed
<date-in-citation>26 April 2007</date-in-citation>
<
<uri xlink:href="http://news.bbc.co.uk/1/hi/uk_politics/6058672.stm">http://news.bbc.co.uk/1/hi/uk_politics/6058672.stm</uri>
>.</mixed-citation>
</ref>
<ref id="ref39">
<mixed-citation publication-type="web">
<collab>BCDRC</collab>
<year>2005</year>
,
<source>Annual report</source>
,
<article-title>Biological and Chemical Defence Review Committee Online</article-title>
, viewed
<date-in-citation>25 October 2006</date-in-citation>
<
<uri xlink:href="http://www.vcds.forces.gc.ca/bcdrc/annual_e.html">http://www.vcds.forces.gc.ca/bcdrc/annual_e.html</uri>
>.</mixed-citation>
</ref>
<ref id="ref40">
<mixed-citation publication-type="web">
<string-name>
<surname>Beaumont</surname>
,
<given-names>P.</given-names>
</string-name>
<year>2006</year>
, ‘
<article-title>Hidden victims of a brutal conflict: Iraq’s women</article-title>
’,
<source>The Observer</source>
,
<day>8</day>
<month>October</month>
, viewed
<date-in-citation>26 April 2007</date-in-citation>
<
<uri xlink:href="http://observer.guardian.co.uk/world/story/0,,1890260,00.html">http://observer.guardian.co.uk/world/story/0,,1890260,00.html</uri>
>.</mixed-citation>
</ref>
<ref id="ref41">
<mixed-citation publication-type="journal">
<string-name>
<surname>Bellamy</surname>
,
<given-names>A.J.</given-names>
</string-name>
<year>2002</year>
, ‘
<article-title>The Great Beyond: Rethinking Military Responses to New Wars and Complex Emergencies</article-title>
’,
<source>Defence Studies</source>
, vol.
<volume>2</volume>
, no.
<issue>1</issue>
, p.
<fpage>25</fpage>
.
<lpage>50</lpage>
.</mixed-citation>
</ref>
<ref id="ref42">
<mixed-citation publication-type="book">
<string-name>
<surname>Bellamy</surname>
,
<given-names>A.J.</given-names>
</string-name>
<year>2006</year>
,
<source>Just wars: from Cicero to Iraq</source>
,
<publisher-loc>Polity, Cambridge, UK; Malden, MA</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref43">
<mixed-citation publication-type="book">
<string-name>
<surname>Bendelow</surname>
,
<given-names>G.</given-names>
</string-name>
and
<string-name>
<surname>Williams</surname>
,
<given-names>S.J.</given-names>
</string-name>
<year>1998</year>
,
<source>Emotions in social life: critical themes and contemporary issues</source>
,
<publisher-name>Routledge</publisher-name>
,
<publisher-loc>London</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref44">
<mixed-citation publication-type="book">
<string-name>
<surname>Benjamin</surname>
,
<given-names>D.</given-names>
</string-name>
and
<string-name>
<surname>Simon</surname>
,
<given-names>S.</given-names>
</string-name>
<year>2005</year>
,
<source>The next attack: the failure of the war on terror and a strategy for getting it right</source>
,
<publisher-name>Hodder and Stoughton</publisher-name>
,
<publisher-loc>London</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref45">
<mixed-citation publication-type="web">
<string-name>
<surname>Bennett</surname>
,
<given-names>B.</given-names>
</string-name>
<year>2006</year>
,
<source>Stolen away</source>
, Time,
<day>23</day>
<month>April</month>
, viewed
<date-in-citation>26 April 2007</date-in-citation>
<
<uri xlink:href="http://www.time.com/time/magazine/printout/0,8816,1186558,00.html">http://www.time.com/time/magazine/printout/0,8816,1186558,00.html</uri>
>.</mixed-citation>
</ref>
<ref id="ref46">
<mixed-citation publication-type="journal">
<xref id="page_201" ref-type="page"></xref>
<string-name>
<surname>Berdal</surname>
,
<given-names>M.</given-names>
</string-name>
<year>2003</year>
, ‘
<article-title>How “New” Are “New Wars”’ Global Economic Change and the Study of Civil War</article-title>
’,
<source>Global Governance</source>
, vol.
<volume>9</volume>
, no.
<issue>4</issue>
, pp.
<fpage>477</fpage>
<lpage>502</lpage>
.</mixed-citation>
</ref>
<ref id="ref47">
<mixed-citation publication-type="book">
<string-name>
<surname>Berezin</surname>
,
<given-names>M.</given-names>
</string-name>
<year>2001</year>
,
<chapter-title>‘Emotions and Political Identity: Mobilizing Affection for the Polity’</chapter-title>
, in
<string-name>
<given-names>J.</given-names>
<surname>Goodwin</surname>
</string-name>
,
<string-name>
<given-names>J.M.</given-names>
<surname>Jasper</surname>
</string-name>
and
<string-name>
<given-names>F.</given-names>
<surname>Polletta</surname>
</string-name>
(eds),
<source>Passionate politics: emotions and social movements</source>
,
<publisher-name>University of Chicago Press</publisher-name>
,
<publisher-loc>Chicago, IL</publisher-loc>
, pp.
<fpage>83</fpage>
<lpage>98</lpage>
.</mixed-citation>
</ref>
<ref id="ref48">
<mixed-citation publication-type="book">
<string-name>
<surname>Berezin</surname>
,
<given-names>M.</given-names>
</string-name>
<year>2002</year>
, ‘
<chapter-title>Secure States: Towards a Political Sociology of Emotion</chapter-title>
’, in
<string-name>
<given-names>J.M.</given-names>
<surname>Barbalet</surname>
</string-name>
(ed.),
<source>Emotions and sociology</source>
,
<publisher-name>Blackwell Publishing/The Socological Review</publisher-name>
,
<publisher-loc>Oxford; Malden, MA</publisher-loc>
, pp.
<fpage>33</fpage>
<lpage>52</lpage>
.</mixed-citation>
</ref>
<ref id="ref49">
<mixed-citation publication-type="book">
<string-name>
<surname>Bergen</surname>
,
<given-names>P.L.</given-names>
</string-name>
<year>2006</year>
,
<source>The Osama bin Laden I know: an oral history of al-Qaeda’s leader</source>
,
<publisher-name>Free Press</publisher-name>
,
<publisher-loc>New York</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref50">
<mixed-citation publication-type="book">
<string-name>
<surname>Berlant</surname>
,
<given-names>L.</given-names>
</string-name>
<year>2000</year>
, ‘
<chapter-title>The Subject of True Feeling: Pain, Privacy, Politics</chapter-title>
’, in
<string-name>
<given-names>J</given-names>
<surname>Dean</surname>
</string-name>
(ed.),
<source>Cultural studies and political theory</source>
,
<publisher-name>Cornell University Press</publisher-name>
,
<publisher-loc>Ithaca, NY</publisher-loc>
, pp.
<fpage>42</fpage>
<lpage>312</lpage>
.</mixed-citation>
</ref>
<ref id="ref51">
<mixed-citation publication-type="book">
<string-name>
<surname>Best</surname>
,
<given-names>G.</given-names>
</string-name>
<year>1994</year>
,
<source>War and law since 1945</source>
,
<publisher-name>Clarendon Press</publisher-name>
,
<publisher-loc>Oxford</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref52">
<mixed-citation publication-type="journal">
<string-name>
<surname>Betts</surname>
,
<given-names>R.K.</given-names>
</string-name>
<year>2002</year>
, ‘
<article-title>The Soft Underbelly of American Primacy: Tactical Advantages of Terror</article-title>
’,
<source>Political Science Quarterly</source>
, vol.
<volume>117</volume>
, no.
<issue>1</issue>
, pp.
<fpage>19</fpage>
<lpage>36</lpage>
.</mixed-citation>
</ref>
<ref id="ref53">
<mixed-citation publication-type="journal">
<string-name>
<surname>Biddle</surname>
,
<given-names>S.D.</given-names>
</string-name>
<year>2005</year>
, ‘
<article-title>Allies, Airpower, and Modern Warfare: The Afghan Model in Afghanistan and Iraq</article-title>
’,
<source>International Security</source>
, vol.
<volume>30</volume>
, no.
<issue>3</issue>
, pp.
<fpage>161</fpage>
<lpage>76</lpage>
.</mixed-citation>
</ref>
<ref id="ref54">
<mixed-citation publication-type="book">
<string-name>
<surname>Blair</surname>
,
<given-names>T.</given-names>
</string-name>
<year>1993</year>
, ‘
<chapter-title>Foreword</chapter-title>
’, in
<string-name>
<given-names>C.</given-names>
<surname>Bryant</surname>
</string-name>
(ed.),
<source>Reclaiming the ground: Christianity and socialism</source>
,
<collab>Spire and the Christian Socialist Movement</collab>
,
<publisher-loc>London</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref55">
<mixed-citation publication-type="web">
<string-name>
<surname>Blair</surname>
,
<given-names>T.</given-names>
</string-name>
<year>2001</year>
,
<source>Statement in response to terrorist attacks</source>
,
<date-in-citation>11 September 2001</date-in-citation>
, viewed
<date-in-citation>27 November 2006</date-in-citation>
<
<uri xlink:href="http://www.number-10.gov.uk/output/Page1596.asp">http://www.number-10.gov.uk/output/Page1596.asp</uri>
>.</mixed-citation>
</ref>
<ref id="ref56">
<mixed-citation publication-type="web">
<string-name>
<surname>Blair</surname>
,
<given-names>T.</given-names>
</string-name>
<year>2005</year>
,
<source>Our Third term will be our best yet</source>
, viewed
<date-in-citation>27 November 2006</date-in-citation>
<
<uri xlink:href="http://www.labour.org.uk/index.php?id=news2005&ux_news%5Bid%5D=tbnpf05&cHash=64dcd1591a">http://www.labour.org.uk/index.php?id=news2005&ux_news%5Bid%5D=tbnpf05&cHash=64dcd1591a</uri>
>.</mixed-citation>
</ref>
<ref id="ref57">
<mixed-citation publication-type="journal">
<string-name>
<surname>Bleiker</surname>
,
<given-names>R.</given-names>
</string-name>
<year>2000</year>
, ‘
<article-title>We Don’t Need Another Hero</article-title>
’,
<source>International Femininst Journal of Politics</source>
, vol.
<volume>2</volume>
, no.
<issue>1</issue>
, pp.
<fpage>30</fpage>
<lpage>57</lpage>
.</mixed-citation>
</ref>
<ref id="ref58">
<mixed-citation publication-type="journal">
<string-name>
<surname>Bleiker</surname>
,
<given-names>R.</given-names>
</string-name>
<year>2003</year>
, ‘
<article-title>A Rogue Is a Rogue Is a Rogue: US Foreign Policy and the Korean Nuclear Crisis</article-title>
’,
<source>International Affairs</source>
, vol.
<volume>79</volume>
, no.
<issue>4</issue>
, pp.
<fpage>719</fpage>
<lpage>37</lpage>
.</mixed-citation>
</ref>
<ref id="ref59">
<mixed-citation publication-type="other">
<string-name>
<surname>Blum</surname>
,
<given-names>Jack A.</given-names>
</string-name>
,
<string-name>
<surname>Levi</surname>
,
<given-names>M.</given-names>
</string-name>
,
<string-name>
<surname>Naylor</surname>
,
<given-names>R.T.</given-names>
</string-name>
and
<string-name>
<surname>Williams</surname>
,
<given-names>P.</given-names>
</string-name>
(
<year>1998</year>
)
<source>Financial havens, banking secrecy and money laundering</source>
.
<article-title>Prepared for the United Nations Office for Drug Control and Crime Prevention</article-title>
.</mixed-citation>
</ref>
<ref id="ref60">
<mixed-citation publication-type="other">
<string-name>
<surname>Blum</surname>
,
<given-names>Y.Z.</given-names>
</string-name>
<year>1976</year>
, ‘
<article-title>State Response to Acts of Terrorism</article-title>
’,
<source>German Yearbook of International Law</source>
, vol.
<volume>19</volume>
, pp.
<fpage>223</fpage>
<lpage>33</lpage>
.</mixed-citation>
</ref>
<ref id="ref61">
<mixed-citation publication-type="book">
<collab>BMA</collab>
<year>2004</year>
,
<source>Biotechnology, weapons and humanity</source>
,
<publisher-name>British Medical Association</publisher-name>
,
<publisher-loc>London</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref62">
<mixed-citation publication-type="book">
<string-name>
<surname>Booth</surname>
,
<given-names>K.</given-names>
</string-name>
, forthcoming,
<source>Theory of world security</source>
,
<publisher-name>Cambridge University Press</publisher-name>
,
<publisher-loc>Cambridge</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref63">
<mixed-citation publication-type="book">
<string-name>
<surname>Booth</surname>
,
<given-names>K.</given-names>
</string-name>
and
<string-name>
<surname>Dunne</surname>
,
<given-names>T.</given-names>
</string-name>
(eds)
<year>2002</year>
,
<source>Worlds in collision: terror and the future of global order</source>
,
<publisher-name>Palgrave</publisher-name>
,
<publisher-loc>Basingstoke</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref64">
<mixed-citation publication-type="book">
<string-name>
<surname>Bourke</surname>
,
<given-names>J.</given-names>
</string-name>
<year>2005</year>
,
<source>Fear: a cultural history</source>
,
<publisher-name>Virago</publisher-name>
,
<publisher-loc>London</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref65">
<mixed-citation publication-type="journal">
<string-name>
<surname>Bowden</surname>
,
<given-names>M.</given-names>
</string-name>
<year>2003</year>
, ‘
<article-title>The Dark Art of Interrogation</article-title>
’,
<source>Atlantic Monthly</source>
, vol.
<volume>292</volume>
, no.
<issue>3</issue>
, pp.
<fpage>51</fpage>
<lpage>76</lpage>
.</mixed-citation>
</ref>
<ref id="ref66">
<mixed-citation publication-type="book">
<string-name>
<surname>Bowker</surname>
,
<given-names>D.W.</given-names>
</string-name>
<year>2006</year>
, ‘
<chapter-title>Unwise Counsel: the War on Terrorism and the Criminal Mistreatment of Detainees in U.S. Custody</chapter-title>
’, in
<string-name>
<given-names>K.J.</given-names>
<surname>Greenberg</surname>
</string-name>
(ed.),
<source>The torture debate in America</source>
,
<publisher-name>Cambridge University Press, Cambridge</publisher-name>
;
<publisher-loc>New York</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref67">
<mixed-citation publication-type="book">
<string-name>
<surname>Bowett</surname>
,
<given-names>D.W.</given-names>
</string-name>
<year>1958</year>
,
<source>Self-defence in international law</source>
,
<publisher-name>Manchester University Press</publisher-name>
,
<publisher-loc>Manchester</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref68">
<mixed-citation publication-type="journal">
<string-name>
<surname>Boyle</surname>
,
<given-names>M.J.</given-names>
</string-name>
<year>2007</year>
, ‘
<article-title>America in Denial</article-title>
’,
<source>International Affairs</source>
, vol.
<volume>83</volume>
, no.
<issue>1</issue>
, pp.
<fpage>147</fpage>
<lpage>59</lpage>
.</mixed-citation>
</ref>
<ref id="ref69">
<mixed-citation publication-type="other">
<xref id="page_202" ref-type="page"></xref>
<string-name>
<surname>Broad</surname>
,
<given-names>W.</given-names>
</string-name>
<year>1998</year>
, ‘
<article-title>Book says pre-Gulf War discovery raised germ warfare fears</article-title>
’,
<source>New York Times</source>
,
<day>7</day>
<month>June</month>
, p.
<fpage>A6</fpage>
.</mixed-citation>
</ref>
<ref id="ref70">
<mixed-citation publication-type="book">
<string-name>
<surname>Brown</surname>
,
<given-names>S.</given-names>
</string-name>
<year>2003</year>
,
<source>The illusion of control: force and foreign policy in the twenty-first century</source>
,
<publisher-name>Brookings Institution Press</publisher-name>
,
<publisher-loc>Washington, DC</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref71">
<mixed-citation publication-type="book">
<string-name>
<surname>Brown</surname>
,
<given-names>W.</given-names>
</string-name>
<year>1995</year>
,
<source>States of injury: power and freedom in late modernity</source>
,
<publisher-name>Princeton University Press</publisher-name>
,
<publisher-loc>Princeton, NJ</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref72">
<mixed-citation publication-type="book">
<string-name>
<surname>Brownlie</surname>
,
<given-names>I.</given-names>
</string-name>
<year>1963</year>
,
<source>International law and the use of force by states</source>
,
<publisher-name>Oxford University Press</publisher-name>
,
<publisher-loc>Oxford</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref73">
<mixed-citation publication-type="journal">
<string-name>
<surname>Buchanan</surname>
,
<given-names>A.</given-names>
</string-name>
and
<string-name>
<surname>Keohane</surname>
,
<given-names>R.O.</given-names>
</string-name>
<year>2004</year>
, ‘
<article-title>The Preventive Use of Force: A Cosmopolitan Institutional Proposal</article-title>
’,
<source>Ethics and International Affairs</source>
, vol.
<volume>18</volume>
, no.
<issue>1</issue>
, pp.
<fpage>1</fpage>
<lpage>22</lpage>
.</mixed-citation>
</ref>
<ref id="ref74">
<mixed-citation publication-type="book">
<string-name>
<surname>Bull</surname>
,
<given-names>H.</given-names>
</string-name>
<year>1977</year>
,
<source>The anarchical society: a study of order in world politics</source>
,
<publisher-name>Columbia University Press</publisher-name>
,
<publisher-loc>New York</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref75">
<mixed-citation publication-type="journal">
<string-name>
<surname>Burke</surname>
,
<given-names>A.</given-names>
</string-name>
<year>2004</year>
, ‘
<article-title>Just War or Ethical Peace? Moral Discourses of Strategic Violence after 9/11</article-title>
’,
<source>International Affairs</source>
, vol.
<volume>80</volume>
, no.
<issue>2</issue>
, pp.
<fpage>329</fpage>
<lpage>53</lpage>
.</mixed-citation>
</ref>
<ref id="ref76">
<mixed-citation publication-type="journal">
<string-name>
<surname>Burke</surname>
,
<given-names>A.</given-names>
</string-name>
<year>2005</year>
a, ‘
<article-title>Against the New Internationalism</article-title>
’,
<source>Ethics and International Affairs</source>
, vol.
<volume>9</volume>
, no.
<issue>2</issue>
, pp.
<fpage>73</fpage>
<lpage>89</lpage>
.</mixed-citation>
</ref>
<ref id="ref77">
<mixed-citation publication-type="journal">
<string-name>
<surname>Burke</surname>
,
<given-names>A.</given-names>
</string-name>
<year>2005</year>
b, ‘
<article-title>Iraq: Strategy’s Burnt Offering</article-title>
’,
<source>Global Change, Peace and Security</source>
, vol.
<volume>17</volume>
, no.
<issue>2</issue>
, pp.
<fpage>191</fpage>
<lpage>213</lpage>
.</mixed-citation>
</ref>
<ref id="ref78">
<mixed-citation publication-type="book">
<string-name>
<surname>Burke</surname>
,
<given-names>A.</given-names>
</string-name>
<year>2006</year>
, ‘
<chapter-title>Critical Approaches to Security and Strategy</chapter-title>
’, in
<string-name>
<given-names>D.</given-names>
<surname>Ball</surname>
</string-name>
and
<string-name>
<given-names>R.</given-names>
<surname>Ayson</surname>
</string-name>
(eds),
<source>Strategy and security in the Asia Pacific</source>
,
<publisher-name>Allen and Unwin</publisher-name>
,
<publisher-loc>Sydney</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref79">
<mixed-citation publication-type="book">
<string-name>
<surname>Burke</surname>
,
<given-names>A.</given-names>
</string-name>
<year>2007</year>
,
<source>Beyond security, ethics and violence: war against the other</source>
,
<publisher-name>Routledge</publisher-name>
,
<publisher-loc>London; New York</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref80">
<mixed-citation publication-type="book">
<string-name>
<surname>Burkitt</surname>
,
<given-names>I.</given-names>
</string-name>
<year>1991</year>
,
<source>Social selves: theories of the social formation of personality</source>
,
<publisher-name>Sage Publications</publisher-name>
,
<publisher-loc>London</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref81">
<mixed-citation publication-type="web">
<string-name>
<surname>Bush</surname>
,
<given-names>G.W.</given-names>
</string-name>
<year>2000</year>
,
<source>The first Gore–Bush presidential debate</source>
, viewed
<date-in-citation>6 March 2007</date-in-citation>
<
<uri xlink:href="http://www.debates.org/pages/trans2000a.html">www.debates.org/pages/trans2000a.html</uri>
>.</mixed-citation>
</ref>
<ref id="ref82">
<mixed-citation publication-type="web">
<string-name>
<surname>Bush</surname>
,
<given-names>G.W.</given-names>
</string-name>
<year>2001</year>
,
<source>Address to a joint session of Congress and the American people</source>
,
<day>20</day>
<month>September</month>
, viewed
<date-in-citation>27 November 2006</date-in-citation>
<
<uri xlink:href="http://www.whitehouse.gov/news/releases/2001/09/print/20010920-8.html">www.whitehouse.gov/news/releases/2001/09/print/20010920-8.html</uri>
>.</mixed-citation>
</ref>
<ref id="ref83">
<mixed-citation publication-type="web">
<string-name>
<surname>Bush</surname>
,
<given-names>G.W.</given-names>
</string-name>
<year>2002</year>
a,
<source>Speech at Cincinnati</source>
,
<day>7</day>
<month>October</month>
, viewed
<date-in-citation>2 February 2005</date-in-citation>
<
<uri xlink:href="http://www.whitehouse.gov/news/releases/2002/10/20021007-8.html">www.whitehouse.gov/news/releases/2002/10/20021007-8.html</uri>
>.</mixed-citation>
</ref>
<ref id="ref84">
<mixed-citation publication-type="web">
<string-name>
<surname>Bush</surname>
,
<given-names>G.W.</given-names>
</string-name>
<year>2002</year>
b,
<source>Speech at the West Point graduation ceremony</source>
,
<day>1</day>
<month>June</month>
, viewed
<date-in-citation>5 February 2005</date-in-citation>
<
<uri xlink:href="http://www.whitehouse.gov/news/releases/2002/06/print/20020601-8html">www.whitehouse.gov/news/releases/2002/06/print/20020601-8html</uri>
>.</mixed-citation>
</ref>
<ref id="ref85">
<mixed-citation publication-type="book">
<string-name>
<surname>Bush</surname>
,
<given-names>G.W.</given-names>
</string-name>
<year>2002</year>
c,
<source>State of the union</source>
,
<publisher-name>Office of the Press Secretary</publisher-name>
,
<day>29</day>
<month>January</month>
, viewed
<date-in-citation>26 March 2007</date-in-citation>
<
<uri xlink:href="http://www.whitehouse.gov/news/releases/2002/01/20020129-11.html">http://www.whitehouse.gov/news/releases/2002/01/20020129-11.html</uri>
>.</mixed-citation>
</ref>
<ref id="ref86">
<mixed-citation publication-type="web">
<string-name>
<surname>Bush</surname>
,
<given-names>G.W.</given-names>
</string-name>
<year>2003</year>
a,
<source>President Bush announces major combat operations in Iraq Have Ended</source>
,
<day>1</day>
<month>May</month>
, viewed
<date-in-citation>27 November 2006</date-in-citation>
<
<uri xlink:href="http://www.whitehouse.gov/news/releases/2003/05/20030501-15.html">http://www.whitehouse.gov/news/releases/2003/05/20030501-15.html</uri>
>.</mixed-citation>
</ref>
<ref id="ref87">
<mixed-citation publication-type="web">
<string-name>
<surname>Bush</surname>
,
<given-names>G.W.</given-names>
</string-name>
<year>2003</year>
b,
<source>President delivers ‘State of the union’</source>
,
<day>28</day>
<month>January</month>
, viewed
<date-in-citation>27 November 2006</date-in-citation>
<
<uri xlink:href="http://www.whitehouse.gov/news/releases/2003/01/print/20030128-19.html">www.whitehouse.gov/news/releases/2003/01/print/20030128-19.html</uri>
>.</mixed-citation>
</ref>
<ref id="ref88">
<mixed-citation publication-type="web">
<string-name>
<surname>Bush</surname>
,
<given-names>G.W.</given-names>
</string-name>
<year>2004</year>
,
<source>Interview with President George W. Bush on NBC’s ‘Meet the press’</source>
, viewed
<date-in-citation>20 February 2007</date-in-citation>
<
<uri xlink:href="http://msnbc.msn.com/id/4179618">http://msnbc.msn.com/id/4179618</uri>
.>.</mixed-citation>
</ref>
<ref id="ref89">
<mixed-citation publication-type="web">
<string-name>
<surname>Bush</surname>
,
<given-names>G.W.</given-names>
</string-name>
<year>2005</year>
,
<source>President discusses Iraqi Constitution with press pool</source>
,
<day>23</day>
<month>August</month>
, viewed
<date-in-citation>26 April 2007</date-in-citation>
<
<uri xlink:href="http://www.whitehouse.gov/news/releases/2005/08/20050823.html">http://www.whitehouse.gov/news/releases/2005/08/20050823.html</uri>
>.</mixed-citation>
</ref>
<ref id="ref90">
<mixed-citation publication-type="web">
<string-name>
<surname>Bush</surname>
,
<given-names>L.</given-names>
</string-name>
<year>2001</year>
,
<source>Radio address by Laura Bush to the nation</source>
,
<day>17</day>
<month>November</month>
, viewed
<date-in-citation>26 April 2007</date-in-citation>
<
<uri xlink:href="http://www.whitehouse.gov/news/releases/2001/11/20011117.html">http://www.whitehouse.gov/news/releases/2001/11/20011117.html</uri>
>.</mixed-citation>
</ref>
<ref id="ref91">
<mixed-citation publication-type="book">
<string-name>
<surname>Butler</surname>
,
<given-names>J.</given-names>
</string-name>
<year>2004</year>
,
<source>Precarious life: the powers of mourning and violence</source>
,
<publisher-name>Verso</publisher-name>
,
<publisher-loc>London; New York</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref92">
<mixed-citation publication-type="book">
<xref id="page_203" ref-type="page"></xref>
<string-name>
<surname>Buzan</surname>
,
<given-names>B.</given-names>
</string-name>
<year>1991</year>
,
<source>People, states, and fear: an agenda for international security in the post-Cold War era</source>
,
<edition>2nd</edition>
edn,
<publisher-name>Lynne Rienner</publisher-name>
,
<publisher-loc>Boulder, CO</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref93">
<mixed-citation publication-type="journal">
<string-name>
<surname>Buzan</surname>
,
<given-names>B.</given-names>
</string-name>
<year>2006</year>
, ‘
<article-title>Will the “global war on terrorism” be the new Cold War?</article-title>
’,
<source>International Affairs</source>
, vol.
<volume>82</volume>
, no.
<issue>6</issue>
, pp.
<fpage>1101</fpage>
<lpage>18</lpage>
.</mixed-citation>
</ref>
<ref id="ref94">
<mixed-citation publication-type="book">
<collab>BWC</collab>
<year>1991</year>
,
<source>Annex to final declaration on confidence building measures, Third Review Conference of the States Parties to the Convention on the Prohibition of the Development, Production and Stockpiling of Bacteriological (Biological) and Toxin Weapons and on Their Destruction</source>
,
<publisher-loc>Geneva</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref95">
<mixed-citation publication-type="journal">
<string-name>
<surname>Byers</surname>
,
<given-names>M.</given-names>
</string-name>
<year>2002</year>
, ‘
<article-title>Terrorism, the Use of Force and International Law after 11 September</article-title>
’,
<source>International and Comparative Law Quarterly</source>
, vol.
<volume>51</volume>
, no.
<issue>2</issue>
, pp.
<fpage>401</fpage>
<lpage>14</lpage>
.</mixed-citation>
</ref>
<ref id="ref96">
<mixed-citation publication-type="journal">
<string-name>
<surname>Byers</surname>
,
<given-names>M.</given-names>
</string-name>
<year>2003</year>
a, ‘
<article-title>Preemptive Self-Defense: Hegemony, Equality and Strategies of Legal Change</article-title>
’,
<source>The Journal of Political Philosophy</source>
, vol.
<volume>11</volume>
, no.
<issue>2</issue>
, pp.
<fpage>171</fpage>
<lpage>90</lpage>
.</mixed-citation>
</ref>
<ref id="ref97">
<mixed-citation publication-type="journal">
<string-name>
<surname>Byers</surname>
,
<given-names>M.</given-names>
</string-name>
<year>2003</year>
b, ‘
<article-title>Letting the Exception Prove the Rule</article-title>
’,
<source>Ethics and International Affairs</source>
, vol.
<volume>17</volume>
, no.
<issue>1</issue>
, pp.
<fpage>9</fpage>
<lpage>16</lpage>
.</mixed-citation>
</ref>
<ref id="ref98">
<mixed-citation publication-type="other">
<string-name>
<surname>Byers</surname>
,
<given-names>M.</given-names>
</string-name>
<year>2004</year>
, ‘
<article-title>Policing the High Seas: The Proliferation Security Initiative</article-title>
’,
<source>American Journal of International Law</source>
, vol.
<volume>98</volume>
, no.
<issue>3</issue>
.</mixed-citation>
</ref>
<ref id="ref99">
<mixed-citation publication-type="book">
<string-name>
<surname>Byers</surname>
,
<given-names>M.</given-names>
</string-name>
<year>2005</year>
,
<source>War law: international law and armed conflict</source>
,
<publisher-name>Atlantic Books</publisher-name>
,
<publisher-loc>London</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref100">
<mixed-citation publication-type="book">
<string-name>
<surname>Calhoun</surname>
,
<given-names>C.J.</given-names>
</string-name>
<year>2001</year>
,
<chapter-title>‘Putting Emotions in Their Place’</chapter-title>
, in
<string-name>
<given-names>J.</given-names>
<surname>Goodwin</surname>
</string-name>
,
<string-name>
<given-names>J.M.</given-names>
<surname>Jasper</surname>
</string-name>
and
<string-name>
<given-names>F.</given-names>
<surname>Polletta</surname>
</string-name>
(eds),
<source>Passionate politics: emotions and social movements</source>
,
<publisher-name>University of Chicago Press</publisher-name>
,
<publisher-loc>Chicago, IL</publisher-loc>
, pp.
<fpage>45</fpage>
<lpage>58</lpage>
.</mixed-citation>
</ref>
<ref id="ref101">
<mixed-citation publication-type="journal">
<string-name>
<surname>Campbell</surname>
,
<given-names>D.</given-names>
</string-name>
<year>1994</year>
, ‘
<article-title>The Deterritorialization of Responsibility: Levinas, Derrida, and Ethics after the End of Philosophy</article-title>
’,
<source>Alternatives</source>
, vol.
<volume>19</volume>
, no.
<issue>4</issue>
, p.
<fpage>455</fpage>
.</mixed-citation>
</ref>
<ref id="ref102">
<mixed-citation publication-type="book">
<string-name>
<surname>Campbell</surname>
,
<given-names>D.</given-names>
</string-name>
<year>1998</year>
,
<source>National deconstruction: violence, identity, and justice in Bosnia</source>
,
<publisher-name>University of Minneapolis Press</publisher-name>
,
<publisher-loc>Minneapolis, MN</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref103">
<mixed-citation publication-type="journal">
<string-name>
<surname>Campbell</surname>
,
<given-names>D.</given-names>
</string-name>
<year>2005</year>
, ‘
<article-title>Beyond Choice: The Onto-Politics of Critique</article-title>
’,
<source>International Relations</source>
, vol.
<volume>19</volume>
, no.
<issue>1</issue>
, pp.
<fpage>127</fpage>
<lpage>34</lpage>
.</mixed-citation>
</ref>
<ref id="ref104">
<mixed-citation publication-type="book">
<string-name>
<surname>Carr</surname>
,
<given-names>E.H.</given-names>
</string-name>
<year>1946</year>
,
<source>The twenty years’ crisis, 1919–1939: an introduction to the study of international relations</source>
,
<edition>2nd</edition>
edn,
<publisher-name>Macmillan</publisher-name>
,
<publisher-loc>Basingstoke</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref105">
<mixed-citation publication-type="web">
<string-name>
<surname>Carter</surname>
,
<given-names>P.</given-names>
</string-name>
<year>2004</year>
,
<source>The road to Abu Ghraib</source>
,
<publisher-loc>Washington</publisher-loc>
Monthly,
<month>November</month>
, viewed
<date-in-citation>26 April 2007</date-in-citation>
<
<uri xlink:href="http://www.washingtonmonthly.com/features/2004/0411.carter.html">http://www.washingtonmonthly.com/features/2004/0411.carter.html</uri>
>.</mixed-citation>
</ref>
<ref id="ref106">
<mixed-citation publication-type="book">
<string-name>
<surname>Caruth</surname>
,
<given-names>C.</given-names>
</string-name>
<year>1995</year>
, ‘
<chapter-title>Recapturing the Past: Introduction</chapter-title>
’, in
<string-name>
<given-names>C</given-names>
<surname>Caruth</surname>
</string-name>
(ed.),
<source>Trauma: explorations in memory</source>
,
<publisher-name>Johns Hopkins University Press</publisher-name>
,
<publisher-loc>Baltimore, MD</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref107">
<mixed-citation publication-type="book">
<string-name>
<surname>Cassese</surname>
,
<given-names>A.</given-names>
</string-name>
<year>1986</year>
, ‘
<chapter-title>Return to Westphalia? Considerations on the gradual erosion of the charter system</chapter-title>
’, in
<string-name>
<given-names>A.</given-names>
<surname>Cassese</surname>
</string-name>
(ed.),
<source>The current legal regulation of the use of force</source>
,
<publisher-name>Martinus Nijhoff</publisher-name>
,
<publisher-loc>Leiden</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref108">
<mixed-citation publication-type="other">
<string-name>
<surname>Cassim</surname>
,
<given-names>V.</given-names>
</string-name>
, W, D, H, K and W, TT
<year>1975</year>
, ‘
<article-title>The Definition of Aggression</article-title>
’,
<source>Harvard International Law Journal</source>
, vol.
<volume>16</volume>
, no.
<issue>1</issue>
.</mixed-citation>
</ref>
<ref id="ref109">
<mixed-citation publication-type="book">
<collab>CBDP</collab>
<year>2005</year>
,
<source>Chemical and Biological Defense Program Annual Report to Congress</source>
,
<publisher-name>US Department of Defense</publisher-name>
.</mixed-citation>
</ref>
<ref id="ref110">
<mixed-citation publication-type="book">
<collab>CBDP</collab>
<year>2006</year>
,
<source>Chemical and Biological Defense Program Annual Report to Congress</source>
,
<publisher-name>US Department of Defense</publisher-name>
.</mixed-citation>
</ref>
<ref id="ref111">
<mixed-citation publication-type="web">
<collab>CDC</collab>
<year>2005</year>
,
<source>List of select biological agents and toxins, Centers for Disease Control and Prevention Online</source>
, viewed
<date-in-citation>5 July 2005</date-in-citation>
<
<uri xlink:href="http://www.cdc.gov/od/sap/docs/salist.pdf">http://www.cdc.gov/od/sap/docs/salist.pdf</uri>
>.</mixed-citation>
</ref>
<ref id="ref112">
<mixed-citation publication-type="journal">
<string-name>
<surname>Cerny</surname>
,
<given-names>P.</given-names>
</string-name>
<year>1998</year>
, ‘
<article-title>Neomedievalism, Civil War and the New Security Dilemma: Globalisation as Durable Disorder</article-title>
’,
<source>Civil Wars</source>
, vol.
<volume>1</volume>
, no.
<issue>1</issue>
, pp.
<fpage>36</fpage>
<lpage>64</lpage>
.</mixed-citation>
</ref>
<ref id="ref113">
<mixed-citation publication-type="other">
<string-name>
<surname>Cha</surname>
,
<given-names>A.E.</given-names>
</string-name>
<year>2005</year>
, ‘
<article-title>Computers simulate terrorism’s extremes</article-title>
’,
<source>Washington Post</source>
, p.
<fpage>A01</fpage>
.</mixed-citation>
</ref>
<ref id="ref114">
<mixed-citation publication-type="book">
<string-name>
<surname>Chan</surname>
,
<given-names>S.</given-names>
</string-name>
<year>2005</year>
,
<source>Out of evil: new international politics and old doctrines of war</source>
,
<publisher-name>I.B. Tauris</publisher-name>
,
<publisher-loc>London</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref115">
<mixed-citation publication-type="web">
<xref id="page_204" ref-type="page"></xref>
<string-name>
<surname>Church</surname>
,
<given-names>A.A.T.</given-names>
</string-name>
<year>2005</year>
,
<source>Executive Summary</source>
, viewed
<date-in-citation>15 March 2007</date-in-citation>
<
<uri xlink:href="http://www.defenselink.mil/news/Mar2005/d20050310exe.pdf">http://www.defenselink.mil/news/Mar2005/d20050310exe.pdf</uri>
>.</mixed-citation>
</ref>
<ref id="ref116">
<mixed-citation publication-type="journal">
<string-name>
<surname>Chyba</surname>
,
<given-names>C.F.</given-names>
</string-name>
<year>2004</year>
, ‘
<article-title>Biotechnology and Bioterrorism: An Unprecedented World</article-title>
’,
<source>Survival</source>
, vol.
<volume>46</volume>
, no.
<issue>2</issue>
, pp.
<fpage>143</fpage>
<lpage>62</lpage>
.</mixed-citation>
</ref>
<ref id="ref117">
<mixed-citation publication-type="journal">
<string-name>
<surname>Chyba</surname>
,
<given-names>C.F.</given-names>
</string-name>
and
<string-name>
<surname>Greninger</surname>
,
<given-names>A.L.</given-names>
</string-name>
(
<year>2004</year>
) ‘
<article-title>Biotechnology and Bioterrorism: An Unprecedented World</article-title>
,’
<source>Survival</source>
vol.
<volume>46</volume>
no.
<issue>2</issue>
<fpage>143</fpage>
<lpage>62</lpage>
.</mixed-citation>
</ref>
<ref id="ref118">
<mixed-citation publication-type="book">
<string-name>
<surname>Clark</surname>
,
<given-names>I.</given-names>
</string-name>
<year>2005</year>
,
<source>Legitimacy in international society</source>
,
<publisher-name>Oxford University Press, Oxford</publisher-name>
;
<publisher-loc>New York</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref119">
<mixed-citation publication-type="journal">
<string-name>
<surname>Clark</surname>
,
<given-names>P.A.</given-names>
</string-name>
<year>2006</year>
, ‘
<article-title>Medical Ethics at Guantanamo Bay and Abu Ghraib: The Problem of Dual Loyalty</article-title>
’,
<source>Journal of Law, Medicine and Ethics</source>
, vol.
<volume>34</volume>
, no.
<issue>3</issue>
, pp.
<fpage>570</fpage>
<lpage>80</lpage>
.</mixed-citation>
</ref>
<ref id="ref120">
<mixed-citation publication-type="book">
<string-name>
<surname>Clark</surname>
,
<given-names>W.K.</given-names>
</string-name>
<year>2004</year>
,
<source>Winning modern wars: Iraq, terrorism and the American Empire</source>
,
<publisher-name>Public Affairs</publisher-name>
,
<publisher-loc>New York</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref121">
<mixed-citation publication-type="book">
<string-name>
<surname>Clarke</surname>
,
<given-names>R.A.</given-names>
</string-name>
<year>2004</year>
,
<source>Against all enemies: inside America’s war on terror</source>
,
<publisher-name>Free Press</publisher-name>
,
<publisher-loc>New York</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref122">
<mixed-citation publication-type="book">
<string-name>
<surname>Clausewitz</surname>
,
<given-names>K. von</given-names>
</string-name>
,
<string-name>
<surname>Howard</surname>
,
<given-names>M.E.</given-names>
</string-name>
and
<string-name>
<surname>Paret</surname>
,
<given-names>P.</given-names>
</string-name>
<year>1976</year>
,
<source>On war</source>
,
<publisher-name>Princeton University Press</publisher-name>
,
<publisher-loc>Princeton, NJ</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref123">
<mixed-citation publication-type="journal">
<string-name>
<surname>Cohen</surname>
,
<given-names>H.W.</given-names>
</string-name>
,
<string-name>
<surname>Gould</surname>
,
<given-names>R.M.</given-names>
</string-name>
and
<string-name>
<surname>Sidel</surname>
,
<given-names>V.W.</given-names>
</string-name>
<year>2004</year>
, ‘
<article-title>The Pitfalls of Bioterrorism Preparedness: the Anthrax and Smallpox Experiences</article-title>
’,
<source>American Journal of Public Health</source>
, vol.
<volume>94</volume>
, no.
<issue>10</issue>
, pp.
<fpage>1667</fpage>
<lpage>71</lpage>
.</mixed-citation>
</ref>
<ref id="ref124">
<mixed-citation publication-type="journal">
<string-name>
<surname>Cohn</surname>
,
<given-names>C.</given-names>
</string-name>
<year>1987</year>
, ‘
<article-title>Sex and Death in the Rational World of Defense Intellectuals</article-title>
’,
<source>Signs: Journal of Women in Culture and Society</source>
, vol.
<volume>12</volume>
, no.
<issue>4</issue>
, p.
<fpage>687</fpage>
.</mixed-citation>
</ref>
<ref id="ref125">
<mixed-citation publication-type="book">
<string-name>
<surname>Combacau</surname>
,
<given-names>J.</given-names>
</string-name>
<year>1986</year>
, ‘
<chapter-title>The exception of self-defence in UN practice</chapter-title>
’, in
<string-name>
<given-names>A</given-names>
<surname>Cassese</surname>
</string-name>
(ed.),
<source>The current legal regulation of the use of force</source>
, Martinus Nijhoff, Dordrecht, pp.
<fpage>9</fpage>
<lpage>37</lpage>
.</mixed-citation>
</ref>
<ref id="ref126">
<mixed-citation publication-type="book">
<string-name>
<surname>Connolly</surname>
,
<given-names>W.E.</given-names>
</string-name>
<year>1995</year>
,
<source>The ethos of pluralization</source>
,
<publisher-name>University of Minnesota Press</publisher-name>
,
<publisher-loc>Minneapolis, MN</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref127">
<mixed-citation publication-type="book">
<string-name>
<surname>Connolly</surname>
,
<given-names>W.E.</given-names>
</string-name>
<year>2002</year>
,
<source>Neuropolitics: thinking, culture, speed</source>
,
<publisher-name>University of Minnesota Press</publisher-name>
,
<publisher-loc>Minneapolis, MN</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref128">
<mixed-citation publication-type="book">
<string-name>
<surname>Cooper</surname>
,
<given-names>R.</given-names>
</string-name>
<year>2004</year>
,
<source>The breaking of nations: order and chaos in the twenty-first century</source>
, revised and updated edn,
<publisher-name>Atlantic Books</publisher-name>
,
<publisher-loc>London</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref129">
<mixed-citation publication-type="other">
<string-name>
<surname>Coorey</surname>
,
<given-names>P.</given-names>
</string-name>
<year>2006</year>
, ‘
<article-title>Court grants urgent hearing on Hicks case</article-title>
’,
<source>Sydney Morning Herald</source>
,
<date-in-citation>7 December 2006</date-in-citation>
.</mixed-citation>
</ref>
<ref id="ref130">
<mixed-citation publication-type="web">
<string-name>
<surname>Cordesman</surname>
,
<given-names>A.H.</given-names>
</string-name>
<year>2006</year>
,
<source>Qana and the lessons for modern war, Center for Strategic and International Studies</source>
, viewed
<date-in-citation>6 March 2007</date-in-citation>
<
<uri xlink:href="http://www.csis.org/media/csis/pubs/060731_qana_commentary.pdf">http://www.csis.org/media/csis/pubs/060731_qana_commentary.pdf</uri>
>.</mixed-citation>
</ref>
<ref id="ref131">
<mixed-citation publication-type="book">
<collab>Council on Foreign Relations</collab>
<year>2002</year>
,
<source>Terrorist Financing</source>
,
<publisher-name>Council on Foreign Relations Press</publisher-name>
,
<publisher-loc>New York</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref132">
<mixed-citation publication-type="book">
<collab>Council on Foreign Relations</collab>
<year>2004</year>
,
<source>Update on the global campaign against terrorist financing</source>
,
<publisher-name>Council on Foreign Relations Press</publisher-name>
,
<publisher-loc>New York</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref133">
<mixed-citation publication-type="journal">
<string-name>
<surname>Crawford</surname>
,
<given-names>N.C.</given-names>
</string-name>
<year>2000</year>
, ‘
<article-title>The Passion of World Politics: Propositions on Emotion and Emotional Relationships</article-title>
’,
<source>International Security</source>
, vol.
<volume>24</volume>
, no.
<issue>4</issue>
, p.
<fpage>116</fpage>
.</mixed-citation>
</ref>
<ref id="ref134">
<mixed-citation publication-type="journal">
<string-name>
<surname>Crawford</surname>
,
<given-names>N.C.</given-names>
</string-name>
<year>2003</year>
a, ‘
<article-title>The Slippery Slope to Preventive War</article-title>
’,
<source>Ethics and International Affairs</source>
, vol.
<volume>17</volume>
, no.
<issue>1</issue>
, pp.
<fpage>30</fpage>
<lpage>6</lpage>
.</mixed-citation>
</ref>
<ref id="ref135">
<mixed-citation publication-type="journal">
<string-name>
<surname>Crawford</surname>
,
<given-names>N.C.</given-names>
</string-name>
<year>2003</year>
b, ‘
<article-title>Just War Theory and the US Counterterror War</article-title>
’,
<source>Perspectives on Politics</source>
, vol.
<volume>1</volume>
, no.
<issue>1</issue>
, pp.
<fpage>5</fpage>
<lpage>25</lpage>
.</mixed-citation>
</ref>
<ref id="ref136">
<mixed-citation publication-type="journal">
<string-name>
<surname>Cronin</surname>
,
<given-names>A.K.</given-names>
</string-name>
<year>2006</year>
, ‘
<article-title>How al-Qaida Ends: The Decline and Demise of Terrorist Groups</article-title>
’,
<source>International Security</source>
, vol.
<volume>31</volume>
, no.
<issue>1</issue>
, pp.
<fpage>7</fpage>
<lpage>48</lpage>
.</mixed-citation>
</ref>
<ref id="ref137">
<mixed-citation publication-type="book">
<string-name>
<surname>Cuellar</surname>
,
<given-names>M.-F.</given-names>
</string-name>
<year>2003</year>
,
<source>The tenuous relationship between the flight against money laundering and the disruption of criminal finance, Research paper 64</source>
,
<publisher-name>Stanford Law School</publisher-name>
,
<publisher-loc>Stanford</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref138">
<mixed-citation publication-type="book">
<xref id="page_205" ref-type="page"></xref>
<string-name>
<surname>Daalder</surname>
,
<given-names>I.H.</given-names>
</string-name>
and
<string-name>
<surname>Lindsay</surname>
,
<given-names>J.M.</given-names>
</string-name>
<year>2003</year>
,
<source>America unbound: the Bush revolution in foreign policy</source>
,
<publisher-name>Brookings Institution</publisher-name>
,
<publisher-loc>Washington, DC</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref139">
<mixed-citation publication-type="journal">
<string-name>
<surname>Dahlstrom</surname>
,
<given-names>E.K.</given-names>
</string-name>
<year>2003</year>
, ‘
<article-title>The Executive Policy Toward Detention and Trial of Foreign Citizens at Guantanamo Bay</article-title>
’,
<source>Berkeley Journal of International Law</source>
, vol.
<volume>21</volume>
, no.
<issue>3</issue>
, pp.
<fpage>662</fpage>
<lpage>82</lpage>
.</mixed-citation>
</ref>
<ref id="ref140">
<mixed-citation publication-type="journal">
<string-name>
<surname>Danchev</surname>
,
<given-names>A.</given-names>
</string-name>
(
<year>2004</year>
), ‘
<article-title>The Reckoning: Official Inquiries and the Iraq War</article-title>
’,
<source>Intelligence and National Security</source>
, vol.
<volume>19</volume>
no.
<issue>3</issue>
, pp.
<fpage>436</fpage>
<lpage>466</lpage>
.</mixed-citation>
</ref>
<ref id="ref141">
<mixed-citation publication-type="book">
<string-name>
<surname>Danchev</surname>
,
<given-names>A.</given-names>
</string-name>
<year>2005</year>
,
<chapter-title>‘Story Development, or, Walter Mitty, the Undefeated’</chapter-title>
, in
<string-name>
<given-names>A.</given-names>
<surname>Danchev</surname>
</string-name>
and
<string-name>
<given-names>J.</given-names>
<surname>MacMillan</surname>
</string-name>
(eds),
<source>The Iraq war and democratic politics</source>
,
<publisher-name>Routledge</publisher-name>
,
<publisher-loc>London</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref142">
<mixed-citation publication-type="journal">
<string-name>
<surname>Danchev</surname>
,
<given-names>A.</given-names>
</string-name>
<year>2006</year>
, ‘
<article-title>Like a Dog: Humiliation and Shame in the War on Terror</article-title>
’,
<source>Alternatives: Global, Local, Political</source>
, vol.
<volume>31</volume>
, no.
<issue>3</issue>
, pp.
<fpage>259</fpage>
<lpage>83</lpage>
.</mixed-citation>
</ref>
<ref id="ref143">
<mixed-citation publication-type="book">
<string-name>
<surname>Danchev</surname>
,
<given-names>A.</given-names>
</string-name>
<year>2007</year>
, ‘
<chapter-title>Human Rights and Human Intelligence</chapter-title>
’, in
<string-name>
<given-names>S.</given-names>
<surname>Tsang</surname>
</string-name>
(ed.),
<source>Intelligence and human rights in the era of global terrorism</source>
,
<publisher-name>Praeger</publisher-name>
,
<publisher-loc>Westport, CT</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref144">
<mixed-citation publication-type="other">
<string-name>
<surname>Danner</surname>
,
<given-names>M.</given-names>
</string-name>
<year>2004</year>
, ‘
<article-title>Torture and the truth</article-title>
’,
<source>New York Review of Books</source>
.</mixed-citation>
</ref>
<ref id="ref145">
<mixed-citation publication-type="book">
<string-name>
<surname>Dannreuther</surname>
,
<given-names>R.</given-names>
</string-name>
<year>2007</year>
,
<source>International security: the contemporary agenda</source>
,
<publisher-name>Polity Press</publisher-name>
,
<publisher-loc>Cambridge</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref146">
<mixed-citation publication-type="journal">
<string-name>
<surname>Darby</surname>
,
<given-names>P.</given-names>
</string-name>
<year>2006</year>
, ‘
<article-title>Security, Spatiality and Social Suffering</article-title>
’,
<source>Alternatives: Global, Local, Political</source>
, vol.
<volume>31</volume>
, no.
<issue>4</issue>
, pp.
<fpage>453</fpage>
<lpage>73</lpage>
.</mixed-citation>
</ref>
<ref id="ref147">
<mixed-citation publication-type="journal">
<string-name>
<surname>David</surname>
,
<given-names>S.R.</given-names>
</string-name>
<year>2003</year>
, ‘
<article-title>Israel’s Policy of Targeted Killing</article-title>
’,
<source>Ethics and International Affairs</source>
, vol.
<volume>17</volume>
, no.
<issue>1</issue>
, pp.
<fpage>111</fpage>
<lpage>26</lpage>
.</mixed-citation>
</ref>
<ref id="ref148">
<mixed-citation publication-type="other">
<string-name>
<surname>Delbrück</surname>
,
<given-names>J.</given-names>
</string-name>
<year>2002</year>
, ‘
<article-title>The Fight Against Global Terrorism: Self-Defense or Collective Security as International Police Action? Some Comments on the International Legal Implications of the “War Against Terrorism”</article-title>
’,
<source>German Yearbook of International Law</source>
, vol.
<volume>44</volume>
, pp.
<fpage>9</fpage>
<lpage>24</lpage>
.</mixed-citation>
</ref>
<ref id="ref149">
<mixed-citation publication-type="web">
<collab>Department of Foreign Affairs and Trade</collab>
<year>2002</year>
,
<source>Advancing the national interest: Australia’s foreign and trade policy white paper</source>
, viewed
<date-in-citation>20 February 2007</date-in-citation>
<
<uri xlink:href="http://www.dfat.gov.au/ani/">http://www.dfat.gov.au/ani/</uri>
>.</mixed-citation>
</ref>
<ref id="ref150">
<mixed-citation publication-type="journal">
<string-name>
<surname>D’Esopo</surname>
,
<given-names>M.</given-names>
</string-name>
and
<string-name>
<surname>Nuzzo</surname>
,
<given-names>J.</given-names>
</string-name>
<year>2004</year>
, ‘
<article-title>Go Figure</article-title>
’,
<source>Biosecurity and Bioterrorism</source>
, vol.
<volume>2</volume>
, no.
<issue>2</issue>
, pp.
<fpage>134</fpage>
<lpage>5</lpage>
.</mixed-citation>
</ref>
<ref id="ref151">
<mixed-citation publication-type="journal">
<string-name>
<surname>Der Derian</surname>
,
<given-names>J.</given-names>
</string-name>
<year>2003</year>
, ‘
<article-title>Decoding the National Security Strategy of the United States of America</article-title>
’,
<source>Boundary 2</source>
, vol.
<volume>30</volume>
, no.
<issue>3</issue>
, pp.
<fpage>19</fpage>
<lpage>27</lpage>
.</mixed-citation>
</ref>
<ref id="ref152">
<mixed-citation publication-type="book">
<string-name>
<surname>Derrida</surname>
,
<given-names>J.</given-names>
</string-name>
<year>2005</year>
,
<source>Rogues: two essays on reason</source>
,
<publisher-name>Stanford University Press</publisher-name>
,
<publisher-loc>Stanford, CA</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref153">
<mixed-citation publication-type="book">
<string-name>
<surname>Dershowitz</surname>
,
<given-names>A.M.</given-names>
</string-name>
<year>2002</year>
,
<source>Why terrorism works: understanding the threat, responding to the challenge</source>
,
<publisher-name>Yale University Press</publisher-name>
,
<publisher-loc>New Haven</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref154">
<mixed-citation publication-type="book">
<string-name>
<surname>Devetak</surname>
,
<given-names>R.</given-names>
</string-name>
, forthcoming, ‘
<chapter-title>Globalization’s Shadow: An Introduction to the Globalization of Political Violence</chapter-title>
’, in
<string-name>
<given-names>R.</given-names>
<surname>Devetak</surname>
</string-name>
and
<string-name>
<given-names>C.</given-names>
<surname>Hughes</surname>
</string-name>
(eds),
<source>The globalization of political violence: globalization’s shadow</source>
,
<publisher-name>Routledge</publisher-name>
,
<publisher-loc>London</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref155">
<mixed-citation publication-type="book">
<string-name>
<surname>Devetak</surname>
,
<given-names>R.</given-names>
</string-name>
and
<string-name>
<surname>Hughes</surname>
,
<given-names>C.</given-names>
</string-name>
forthcoming,
<source>The globalization of political violence: globalization’s shadow</source>
,
<publisher-name>Routledge</publisher-name>
,
<publisher-loc>London</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref156">
<mixed-citation publication-type="web">
<collab>DHS</collab>
<year>2005</year>
,
<source>Fact sheet: National Biodefense Analysis and Countermeasures Center</source>
,
<article-title>US Department of Homeland Security Online</article-title>
, viewed
<date-in-citation>13 April 2005</date-in-citation>
<
<uri xlink:href="http://www.dhs.gov/dhspublic/display?content=4336">http://www.dhs.gov/dhspublic/display?content=4336</uri>
>.</mixed-citation>
</ref>
<ref id="ref157">
<mixed-citation publication-type="book">
<string-name>
<surname>Dinstein</surname>
,
<given-names>Y.</given-names>
</string-name>
<year>1988</year>
,
<source>War, aggression and self-defence</source>
,
<publisher-name>Grotius Publications</publisher-name>
,
<publisher-loc>Cambridge</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref158">
<mixed-citation publication-type="journal">
<string-name>
<surname>Dodge</surname>
,
<given-names>T.</given-names>
</string-name>
<year>2006</year>
, ‘
<article-title>How Iraq Was Lost</article-title>
’,
<source>Survival</source>
, vol.
<volume>48</volume>
, no.
<issue>4</issue>
, pp.
<fpage>157</fpage>
-
<lpage>72</lpage>
.</mixed-citation>
</ref>
<ref id="ref159">
<mixed-citation publication-type="web">
<string-name>
<surname>Downer</surname>
,
<given-names>A.</given-names>
</string-name>
<year>2004</year>
,
<source>Meeting the challenges of a changing regional and global security outlook, speech to the World Affairs Council, Los Angeles</source>
, viewed
<date-in-citation>20 February 2007</date-in-citation>
<
<uri xlink:href="http://www.foreignminister.gov.au/speeches/2004/040119_global_security.html">http://www.foreignminister.gov.au/speeches/2004/040119_global_security.html</uri>
>.</mixed-citation>
</ref>
<ref id="ref160">
<mixed-citation publication-type="web">
<string-name>
<surname>Downer</surname>
,
<given-names>A.</given-names>
</string-name>
<year>2005</year>
a,
<source>Interview-ABC 702 David Hicks, Cronulla Disturbances</source>
, viewed
<date-in-citation>18 December 2006</date-in-citation>
<
<uri xlink:href="http://www.foreignminister.gov.au/transcripts/2005/051214_abc.html">http://www.foreignminister.gov.au/transcripts/2005/051214_abc.html</uri>
>.</mixed-citation>
</ref>
<ref id="ref161">
<mixed-citation publication-type="journal">
<xref id="page_206" ref-type="page"></xref>
<string-name>
<surname>Downer</surname>
,
<given-names>A.</given-names>
</string-name>
<year>2005</year>
b, ‘
<article-title>Securing Australia’s Interests – Australian Foreign Policy Priorities</article-title>
’,
<source>Australian Journal of International Affairs</source>
, vol.
<volume>59</volume>
, no.
<issue>1</issue>
, pp.
<fpage>7</fpage>
<lpage>12</lpage>
.</mixed-citation>
</ref>
<ref id="ref162">
<mixed-citation publication-type="journal">
<string-name>
<surname>Duffield</surname>
,
<given-names>M.</given-names>
</string-name>
<year>2001</year>
, ‘
<article-title>Governing the Borderlands: Decoding the Power of Aid</article-title>
’,
<source>Disasters</source>
, vol.
<volume>25</volume>
, no.
<issue>4</issue>
, pp.
<fpage>308</fpage>
<lpage>20</lpage>
.</mixed-citation>
</ref>
<ref id="ref163">
<mixed-citation publication-type="journal">
<string-name>
<surname>Duffield</surname>
,
<given-names>M.</given-names>
</string-name>
<year>2002</year>
, ‘
<article-title>War as a Network Enterprise: The New Security Terrain and Its Implications</article-title>
’,
<source>Journal for Cultural Research</source>
, vol
<volume>6</volume>
no.
<issue>1</issue>
, pp.
<fpage>153</fpage>
<lpage>65</lpage>
.</mixed-citation>
</ref>
<ref id="ref164">
<mixed-citation publication-type="journal">
<string-name>
<surname>Duffield</surname>
,
<given-names>M.</given-names>
</string-name>
and
<string-name>
<surname>Waddell</surname>
,
<given-names>N.</given-names>
</string-name>
<year>2006</year>
, ‘
<article-title>Securing Humans in a Dangerous World</article-title>
’,
<source>International Politics</source>
, vol.
<volume>43</volume>
no.
<issue>1</issue>
, pp.
<fpage>1</fpage>
<lpage>23</lpage>
.</mixed-citation>
</ref>
<ref id="ref165">
<mixed-citation publication-type="book">
<string-name>
<surname>Duffy</surname>
,
<given-names>H.</given-names>
</string-name>
<year>2005</year>
,
<source>The ‘war on terror’ and the framework of international law</source>
,
<publisher-name>Cambridge University Press</publisher-name>
,
<publisher-loc>New York</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref166">
<mixed-citation publication-type="other">
<string-name>
<surname>Dworkin</surname>
,
<given-names>R.</given-names>
</string-name>
<year>2004</year>
, ‘
<article-title>What the Court Really Said</article-title>
’,
<source>New York Review of Books</source>
, vol.
<volume>51</volume>
, no.
<issue>13</issue>
.</mixed-citation>
</ref>
<ref id="ref167">
<mixed-citation publication-type="other">
<string-name>
<surname>Dworkin</surname>
,
<given-names>R.</given-names>
</string-name>
<year>2005</year>
, ‘
<article-title>Military Necessity and Due Process: The Place of Human Rights in the War on Terror</article-title>
’, in
<string-name>
<given-names>D.</given-names>
<surname>Wippman</surname>
</string-name>
and
<string-name>
<given-names>M.</given-names>
<surname>Evangelista</surname>
</string-name>
(eds),
<source>New wars, new laws? Applying the laws of war in 21st century conflicts</source>
,
<publisher-name>Transnational Publishers, Ardley</publisher-name>
,
<publisher-loc>NY</publisher-loc>
, pp.
<fpage>53</fpage>
<lpage>74</lpage>
.</mixed-citation>
</ref>
<ref id="ref168">
<mixed-citation publication-type="other">
<collab>Editorial</collab>
<year>2005</year>
, ‘
<article-title>An Acidic Message</article-title>
’,
<source>Washington Post</source>
,
<day>10</day>
<month>March</month>
, p.
<fpage>A20</fpage>
.</mixed-citation>
</ref>
<ref id="ref169">
<mixed-citation publication-type="journal">
<string-name>
<surname>Edkins</surname>
,
<given-names>J.</given-names>
</string-name>
<year>2002</year>
, ‘
<article-title>Forget Trauma? Responses to September 11</article-title>
’,
<source>International Relations</source>
, vol.
<volume>16</volume>
, no.
<issue>2</issue>
, pp.
<fpage>243</fpage>
<lpage>56</lpage>
.</mixed-citation>
</ref>
<ref id="ref170">
<mixed-citation publication-type="book">
<string-name>
<surname>Edkins</surname>
,
<given-names>J.</given-names>
</string-name>
<year>2003</year>
,
<source>Trauma and the memory of politics</source>
,
<publisher-name>Cambridge University Press</publisher-name>
,
<publisher-loc>Cambridge, UK; New York</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref171">
<mixed-citation publication-type="journal">
<string-name>
<surname>Edkins</surname>
,
<given-names>J.</given-names>
</string-name>
<year>2004</year>
, ‘
<article-title>Ground Zero: Reflections on Trauma, In/distinction and Response</article-title>
’,
<source>Journal for Cultural Research</source>
, vol.
<volume>8</volume>
, no.
<issue>3</issue>
, pp.
<fpage>247</fpage>
<lpage>70</lpage>
.</mixed-citation>
</ref>
<ref id="ref172">
<mixed-citation publication-type="book">
<string-name>
<surname>Ehrenfeld</surname>
,
<given-names>R.</given-names>
</string-name>
<year>2003</year>
,
<source>Funding evil: how terrorism is financed-and how to stop it</source>
,
<publisher-name>Bonus Books</publisher-name>
,
<publisher-loc>Chicago</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref173">
<mixed-citation publication-type="book">
<string-name>
<surname>Elshtain</surname>
,
<given-names>J.B.</given-names>
</string-name>
<year>1992</year>
,
<source>Just war theory</source>
,
<publisher-name>Blackwell Press</publisher-name>
,
<publisher-loc>Oxford</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref174">
<mixed-citation publication-type="book">
<string-name>
<surname>Elshtain</surname>
,
<given-names>J.B.</given-names>
</string-name>
<year>2002</year>
,
<chapter-title>‘How to Fight a Just War’</chapter-title>
, in
<string-name>
<given-names>K.</given-names>
<surname>Booth</surname>
</string-name>
and
<string-name>
<given-names>T.</given-names>
<surname>Dunne</surname>
</string-name>
(eds),
<source>Worlds in collision: terror and the future of global order</source>
,
<publisher-name>Palgrave Macmillan</publisher-name>
,
<publisher-loc>Basingsoke and New York</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref175">
<mixed-citation publication-type="book">
<string-name>
<surname>Elshtain</surname>
,
<given-names>J.B.</given-names>
</string-name>
<year>2004</year>
,
<source>Just war against terror: the burden of American power in a violent world</source>
,
<publisher-name>Basic Books</publisher-name>
,
<publisher-loc>New York</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref176">
<mixed-citation publication-type="book">
<string-name>
<surname>Elster</surname>
,
<given-names>J.</given-names>
</string-name>
<year>1999</year>
,
<source>Alchemies of the mind: rationality and the emotions</source>
,
<publisher-name>Cambridge University Press</publisher-name>
,
<publisher-loc>Cambridge, UK; New York</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref177">
<mixed-citation publication-type="journal">
<string-name>
<surname>Enserink</surname>
,
<given-names>M.</given-names>
</string-name>
and
<string-name>
<surname>Kaiser</surname>
,
<given-names>J.</given-names>
</string-name>
<year>2005</year>
, ‘
<article-title>Has Biodefense Gone Overboard?</article-title>
<source>Science</source>
, vol.
<volume>307</volume>
, no.
<issue>5714</issue>
, pp.
<fpage>1396</fpage>
<lpage>8</lpage>
.</mixed-citation>
</ref>
<ref id="ref178">
<mixed-citation publication-type="book">
<string-name>
<surname>Euben</surname>
,
<given-names>R.L.</given-names>
</string-name>
<year>1999</year>
,
<source>Enemy in the mirror: Islamic fundamentalism and the limits of modern rationalism</source>
,
<publisher-name>Princeton University Press</publisher-name>
,
<publisher-loc>Princeton, NJ</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref179">
<mixed-citation publication-type="journal">
<string-name>
<surname>Euben</surname>
,
<given-names>R.L.</given-names>
</string-name>
<year>2002</year>
, ‘
<article-title>Killing (for) Politics: Jihad, Martyrdom and Political Action</article-title>
’,
<source>Political Theory</source>
, vol.
<volume>30</volume>
, no.
<issue>1</issue>
, pp.
<fpage>4</fpage>
<lpage>35</lpage>
.</mixed-citation>
</ref>
<ref id="ref180">
<mixed-citation publication-type="book">
<string-name>
<surname>Falk</surname>
,
<given-names>R.</given-names>
</string-name>
<year>1963</year>
,
<source>Law, morality and war in the contemporary world</source>
,
<publisher-name>Paeger</publisher-name>
,
<publisher-loc>New York</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref181">
<mixed-citation publication-type="web">
<collab>FAS</collab>
<year>2002</year>
,
<source>Draft recommendations for a code of conduct for biodefense programs, Federation of American Scientists Online</source>
, available at <
<uri xlink:href="http://www.fas.org/bwc/papers/code.pdf">http://www.fas.org/bwc/papers/code.pdf</uri>
> (accessed
<date-in-citation>30 May 2005</date-in-citation>
).</mixed-citation>
</ref>
<ref id="ref182">
<mixed-citation publication-type="web">
<collab>FAS</collab>
<source>Draft Recommedations for a code of conduct for biodefense programs, Federation of American Scientists Online</source>
, viewed
<date-in-citation>30 May 2005</date-in-citation>
<
<uri xlink:href="http://www.fas.org/bwc/papers/code.pdf">http://www.fas.org/bwc/papers/code.pdf</uri>
>.</mixed-citation>
</ref>
<ref id="ref183">
<mixed-citation publication-type="journal">
<string-name>
<surname>Feinstein</surname>
,
<given-names>L.</given-names>
</string-name>
and
<string-name>
<surname>Slaughter</surname>
,
<given-names>A-M.</given-names>
</string-name>
<year>2004</year>
, ‘
<article-title>A Duty to Prevent</article-title>
’,
<source>Foreign Affairs</source>
, vol.
<volume>83</volume>
, no.
<issue>1</issue>
, pp.
<fpage>136</fpage>
<lpage>50</lpage>
.</mixed-citation>
</ref>
<ref id="ref184">
<mixed-citation publication-type="journal">
<string-name>
<surname>Ferejohn</surname>
,
<given-names>John</given-names>
</string-name>
, and
<string-name>
<surname>Pasquino</surname>
,
<given-names>Pasquale</given-names>
</string-name>
<year>2004</year>
, ‘
<article-title>The Law of the Exception: A Typology of Emergency Powers</article-title>
’,
<source>International Journal of Constitutional Law</source>
, vol.
<volume>2</volume>
, no.
<issue>2</issue>
, pp.
<fpage>210</fpage>
<lpage>39</lpage>
.</mixed-citation>
</ref>
<ref id="ref185">
<mixed-citation publication-type="journal">
<xref id="page_207" ref-type="page"></xref>
<string-name>
<surname>Fierke</surname>
,
<given-names>K.</given-names>
</string-name>
<year>2004</year>
, ‘
<article-title>Whereof We Can Speak, Thereof We Must Not Be Silent: Trauma, Political Solipsism and War</article-title>
’,
<source>Review of International Studies</source>
, vol.
<volume>30</volume>
, no.
<issue>4</issue>
, pp.
<fpage>471</fpage>
<lpage>91</lpage>
.</mixed-citation>
</ref>
<ref id="ref186">
<mixed-citation publication-type="book">
<string-name>
<surname>Fierke</surname>
,
<given-names>K.</given-names>
</string-name>
<year>2007</year>
,
<source>Critical approaches to international security</source>
,
<publisher-name>Polity</publisher-name>
,
<publisher-loc>Cambridge</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref187">
<mixed-citation publication-type="web">
<string-name>
<surname>Fiorill</surname>
,
<given-names>J.</given-names>
</string-name>
<year>2005</year>
,
<source>US Plans to defend against engineered bioattack, Global Security Newswire Online</source>
, viewed
<date-in-citation>1 July 2005</date-in-citation>
<
<uri xlink:href="http://www.nti.org/d_newswire/issues/2005/6/15/F1EB5240-6C65-41F5-A24E-DFD8EFF6C642.html">http://www.nti.org/d_newswire/issues/2005/6/15/F1EB5240-6C65-41F5-A24E-DFD8EFF6C642.html</uri>
>.</mixed-citation>
</ref>
<ref id="ref188">
<mixed-citation publication-type="book">
<string-name>
<surname>Fisher</surname>
,
<given-names>L.</given-names>
</string-name>
<year>2005</year>
,
<source>Military tribunals and presidential power: American revolution to the war on terrorism</source>
,
<publisher-name>University Press of Kansas</publisher-name>
,
<publisher-loc>Kansas</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref189">
<mixed-citation publication-type="other">
<string-name>
<surname>Fletcher</surname>
,
<given-names>G.P.</given-names>
</string-name>
<year>2006</year>
,
<source>‘The Hamdan Case and Conspiracy as a War Crime: A New Beginning for International Law in the US’, Journal of International Criminal Justice</source>
, vol.
<volume>4</volume>
, no.
<issue>3</issue>
, pp.
<fpage>442</fpage>
<lpage>7</lpage>
.</mixed-citation>
</ref>
<ref id="ref190">
<mixed-citation publication-type="book">
<string-name>
<surname>Foer</surname>
,
<given-names>J.S.</given-names>
</string-name>
<year>2005</year>
,
<source>Extremely loud and incredibly close</source>
,
<publisher-name>Houghton Mifflin Company</publisher-name>
,
<publisher-loc>Boston</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref191">
<mixed-citation publication-type="other">
<string-name>
<given-names>Foreign</given-names>
<surname>Policy</surname>
</string-name>
and
<collab>Fund for Peace</collab>
<year>2005</year>
, ‘
<article-title>The Failed States Index</article-title>
’,
<source>Foreign Policy</source>
, vol.
<volume>149</volume>
, no.
<month>July</month>
<month>August</month>
, pp.
<fpage>56</fpage>
<lpage>65</lpage>
.</mixed-citation>
</ref>
<ref id="ref192">
<mixed-citation publication-type="book">
<string-name>
<surname>Foucault</surname>
,
<given-names>M.</given-names>
</string-name>
<year>1978</year>
,
<source>The history of secuality: volume 1, The will to knowledge</source>
,
<publisher-name>Penguin</publisher-name>
,
<publisher-loc>Harmondsworth</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref193">
<mixed-citation publication-type="book">
<string-name>
<surname>Franck</surname>
,
<given-names>T.M.</given-names>
</string-name>
<year>2002</year>
,
<source>Recourse to force: state action against threats and armed attacks</source>
,
<publisher-name>Cambridge University Press</publisher-name>
,
<publisher-loc>Cambridge</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref194">
<mixed-citation publication-type="journal">
<string-name>
<surname>Freedman</surname>
,
<given-names>L.</given-names>
</string-name>
<year>2001/2</year>
, ‘
<article-title>The Third World War?</article-title>
<source>Survival</source>
, vol.
<volume>43</volume>
, no.
<issue>4</issue>
, pp.
<fpage>61</fpage>
<lpage>87</lpage>
.</mixed-citation>
</ref>
<ref id="ref195">
<mixed-citation publication-type="journal">
<string-name>
<surname>Freedman</surname>
,
<given-names>L.</given-names>
</string-name>
<year>2002</year>
, ‘
<article-title>The Coming War on Terrorism</article-title>
’,
<source>Political Quarterly</source>
, vol.
<volume>73</volume>
, no.
<issue>1</issue>
, pp.
<fpage>40</fpage>
<lpage>56</lpage>
.</mixed-citation>
</ref>
<ref id="ref196">
<mixed-citation publication-type="book">
<string-name>
<surname>Freedman</surname>
,
<given-names>L.</given-names>
</string-name>
<year>2004</year>
a,
<source>Deterrence</source>
,
<publisher-name>Polity Press</publisher-name>
,
<publisher-loc>Malden, MA</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref197">
<mixed-citation publication-type="journal">
<string-name>
<surname>Freedman</surname>
,
<given-names>L.</given-names>
</string-name>
<year>2004</year>
b, ‘
<article-title>War in Iraq: Selling the Threat</article-title>
’,
<source>Survival</source>
, vol.
<volume>46</volume>
, no.
<issue>2</issue>
, pp.
<fpage>7</fpage>
<lpage>49</lpage>
.</mixed-citation>
</ref>
<ref id="ref198">
<mixed-citation publication-type="other">
<string-name>
<surname>Freedman</surname>
,
<given-names>L.</given-names>
</string-name>
<year>2005</year>
, ‘
<article-title>The Age of Liberal Wars</article-title>
’,
<source>Review of International Studies</source>
, vol.
<volume>31</volume>
, no. Special Issue, pp.
<fpage>93</fpage>
<lpage>107</lpage>
.</mixed-citation>
</ref>
<ref id="ref199">
<mixed-citation publication-type="other">
<string-name>
<surname>Freedman</surname>
,
<given-names>L.</given-names>
</string-name>
<year>2006</year>
, ‘
<article-title>The Transformation of Military Strategy</article-title>
’,
<source>Adelphi Papers</source>
, vol.
<volume>379</volume>
, pp.
<fpage>61</fpage>
<lpage>71</lpage>
.</mixed-citation>
</ref>
<ref id="ref200">
<mixed-citation publication-type="book">
<string-name>
<surname>Frum</surname>
,
<given-names>D.</given-names>
</string-name>
and
<string-name>
<surname>Perle</surname>
,
<given-names>R.</given-names>
</string-name>
<year>2004</year>
,
<source>An end to evil: how to win the war on terror</source>
,
<publisher-name>Random House</publisher-name>
,
<publisher-loc>New York</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref201">
<mixed-citation publication-type="book">
<string-name>
<surname>Fukuyama</surname>
,
<given-names>F.</given-names>
</string-name>
<year>1992</year>
,
<source>The end of history and the last man</source>
,
<publisher-name>Sage Press</publisher-name>
,
<publisher-loc>New York</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref202">
<mixed-citation publication-type="book">
<string-name>
<surname>Fukuyama</surname>
,
<given-names>F.</given-names>
</string-name>
<year>2002</year>
, ‘
<chapter-title>History and September 11</chapter-title>
’, in
<string-name>
<given-names>K.</given-names>
<surname>Booth</surname>
</string-name>
and
<string-name>
<given-names>T.</given-names>
<surname>Dunne</surname>
</string-name>
(eds),
<source>Worlds in collision: terror and the future of global order</source>
,
<publisher-name>Palgrave</publisher-name>
,
<publisher-loc>London; New York</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref203">
<mixed-citation publication-type="journal">
<string-name>
<surname>Fullinwinder</surname>
,
<given-names>R.K.</given-names>
</string-name>
<year>1975</year>
, ‘
<article-title>War and Innocence</article-title>
’,
<source>Philosophy and Public Affairs</source>
, vol.
<volume>5</volume>
, no.
<issue>1</issue>
, pp.
<fpage>90</fpage>
<lpage>7</lpage>
.</mixed-citation>
</ref>
<ref id="ref204">
<mixed-citation publication-type="web">
<string-name>
<surname>Garamone</surname>
,
<given-names>J.</given-names>
</string-name>
<year>2006</year>
,
<source>Bush says military commissions act will bring justice</source>
, viewed
<date-in-citation>1 December 2006</date-in-citation>
<
<uri xlink:href="http://www.defenselink.mil/News/NewsArticle.aspx?id=1633">http://www.defenselink.mil/News/NewsArticle.aspx?id=1633</uri>
>.</mixed-citation>
</ref>
<ref id="ref205">
<mixed-citation publication-type="journal">
<string-name>
<surname>Gaudioso</surname>
,
<given-names>J.</given-names>
</string-name>
and
<string-name>
<surname>Salerno</surname>
,
<given-names>R.M.</given-names>
</string-name>
<year>2004</year>
, ‘
<article-title>Biosecurity and Research: Minimizing Adverse Impacts</article-title>
’,
<source>Science</source>
, vol.
<volume>304</volume>
, no.
<issue>5671</issue>
, p.
<fpage>687</fpage>
.</mixed-citation>
</ref>
<ref id="ref206">
<mixed-citation publication-type="other">
<string-name>
<surname>Gazit</surname>
,
<given-names>S.</given-names>
</string-name>
<year>2004</year>
, Interview with author,
<day>25</day>
<month>August</month>
.</mixed-citation>
</ref>
<ref id="ref207">
<mixed-citation publication-type="journal">
<string-name>
<surname>Geisbert</surname>
,
<given-names>T.W.</given-names>
</string-name>
,
<string-name>
<surname>Hensley</surname>
,
<given-names>L.E.</given-names>
</string-name>
,
<string-name>
<surname>Jahrling</surname>
,
<given-names>P.B.</given-names>
</string-name>
,
<string-name>
<surname>Larsen</surname>
,
<given-names>T.</given-names>
</string-name>
,
<string-name>
<surname>Geisbert</surname>
,
<given-names>J.B.</given-names>
</string-name>
,
<string-name>
<surname>Paragas</surname>
,
<given-names>J.</given-names>
</string-name>
,
<string-name>
<surname>Young</surname>
,
<given-names>H.A.</given-names>
</string-name>
,
<string-name>
<surname>Fredeking</surname>
,
<given-names>T.M.</given-names>
</string-name>
,
<string-name>
<surname>Rote</surname>
,
<given-names>W.E.</given-names>
</string-name>
and
<string-name>
<surname>Vlasuk</surname>
,
<given-names>G.B.</given-names>
</string-name>
<year>2003</year>
, ‘
<article-title>Treatment of Ebola Virus Infection With a Recombinant Inhibitor of Factor VIIA/Tissue Factor: a Study in Rhesus Monkeys</article-title>
’,
<source>The Lancet</source>
, vol.
<volume>362</volume>
, no.
<issue>9400</issue>
, pp.
<fpage>1953</fpage>
<lpage>8</lpage>
.</mixed-citation>
</ref>
<ref id="ref208">
<mixed-citation publication-type="journal">
<xref id="page_208" ref-type="page"></xref>
<string-name>
<surname>George</surname>
,
<given-names>J.</given-names>
</string-name>
<year>2005</year>
, ‘
<article-title>Leo Strauss, Neoconservatism and US Foreign Policy: Esoteric Nihilism and the Bush Doctrine</article-title>
’,
<source>International Politics</source>
, vol.
<volume>42</volume>
, no.
<issue>2</issue>
, pp.
<fpage>174</fpage>
<lpage>202</lpage>
.</mixed-citation>
</ref>
<ref id="ref209">
<mixed-citation publication-type="book">
<string-name>
<surname>Gilmore</surname>
,
<given-names>W.C.</given-names>
</string-name>
<year>1995</year>
,
<source>Dirty money: the evolution of money laundering counter-measures</source>
,
<publisher-name>Council of Europe</publisher-name>
,
<publisher-loc>Strasbourg</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref210">
<mixed-citation publication-type="journal">
<string-name>
<surname>Glennon</surname>
,
<given-names>M.J.</given-names>
</string-name>
<year>2002</year>
, ‘
<article-title>The Fog of Law: Self-Defense, Inherence, and Incoherence in Article 51 of the United Nations Charter</article-title>
’,
<source>Harvard Journal of International Law and Public Policy</source>
, vol.
<volume>25</volume>
, no.
<issue>2</issue>
, pp.
<fpage>541</fpage>
<lpage>9</lpage>
.</mixed-citation>
</ref>
<ref id="ref211">
<mixed-citation publication-type="journal">
<string-name>
<surname>Glennon</surname>
,
<given-names>M.J.</given-names>
</string-name>
<year>2003</year>
, ‘
<article-title>Why the Security Council Failed</article-title>
’,
<source>Foreign Affairs</source>
, vol.
<volume>82</volume>
, no.
<issue>3</issue>
, pp.
<fpage>16</fpage>
<lpage>35</lpage>
.</mixed-citation>
</ref>
<ref id="ref212">
<mixed-citation publication-type="journal">
<string-name>
<surname>Godfrey</surname>
,
<given-names>E.D.</given-names>
</string-name>
<year>1978</year>
, ‘
<article-title>Ethics and Intelligence</article-title>
’,
<source>Foreign Affairs</source>
, vol.
<volume>56</volume>
, no.
<issue>3</issue>
, pp.
<fpage>624</fpage>
<lpage>42</lpage>
.</mixed-citation>
</ref>
<ref id="ref213">
<mixed-citation publication-type="web">
<string-name>
<surname>Goldenbeg</surname>
,
<given-names>S.</given-names>
</string-name>
<year>2006</year>
a,
<source>Five US soldiers in Iraq rape and murder inquiry, Guardian Unlimited</source>
,
<day>1</day>
<month>July</month>
, viewed
<date-in-citation>26 April 2007</date-in-citation>
<
<uri xlink:href="http://www.guardian.co.uk/Iraq/Story/0,,1810326,00.html">http://www.guardian.co.uk/Iraq/Story/0,,1810326,00.html</uri>
>.</mixed-citation>
</ref>
<ref id="ref214">
<mixed-citation publication-type="web">
<string-name>
<surname>Goldenbeg</surname>
,
<given-names>S.</given-names>
</string-name>
<year>2006</year>
b,
<source>Woman soldier refuses return to Iraq, claiming sexual harassment, Guardian Unlimited</source>
,
<day>21</day>
<month>June</month>
, viewed
<date-in-citation>26 April 2007</date-in-citation>
<
<uri xlink:href="http://www.guardian.co.uk/international/story/0,,1802178,00.html">http://www.guardian.co.uk/international/story/0,,1802178,00.html</uri>
>.</mixed-citation>
</ref>
<ref id="ref215">
<mixed-citation publication-type="journal">
<string-name>
<surname>Goldgeier</surname>
,
<given-names>J.M.</given-names>
</string-name>
and
<string-name>
<surname>McFaul</surname>
,
<given-names>M.</given-names>
</string-name>
<year>1992</year>
, ‘
<article-title>A Tale of Two Worlds: Core and Periphery in the Post-Cold War Era</article-title>
’,
<source>International Organization</source>
, vol.
<volume>46</volume>
, no.
<issue>2</issue>
, pp.
<fpage>467</fpage>
<lpage>91</lpage>
.</mixed-citation>
</ref>
<ref id="ref216">
<mixed-citation publication-type="book">
<string-name>
<surname>Goldie</surname>
,
<given-names>P.</given-names>
</string-name>
<year>2002</year>
,
<source>The emotions: a philosophical exploration</source>
,
<publisher-name>Clarendon Press</publisher-name>
,
<publisher-loc>Oxford</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref217">
<mixed-citation publication-type="journal">
<string-name>
<surname>Gore</surname>
,
<given-names>A.</given-names>
</string-name>
<year>2004</year>
, ‘
<article-title>The Politics of Fear</article-title>
’,
<source>Social Research</source>
, vol.
<volume>71</volume>
, no.
<issue>4</issue>
, pp.
<fpage>779</fpage>
<lpage>98</lpage>
.</mixed-citation>
</ref>
<ref id="ref218">
<mixed-citation publication-type="book">
<collab>Government Accounting Office</collab>
<year>2006</year>
,
<source>Company formation: minimal company ownership information is collected and available</source>
,
<publisher-name>Government Accounting Office</publisher-name>
,
<publisher-loc>Washington, DC</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref219">
<mixed-citation publication-type="book">
<string-name>
<surname>Gray</surname>
,
<given-names>C.D.</given-names>
</string-name>
<year>2000</year>
,
<source>International law and the use of force</source>
,
<publisher-name>Oxford University Press</publisher-name>
,
<publisher-loc>Oxford; New York</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref220">
<mixed-citation publication-type="book">
<string-name>
<surname>Gray</surname>
,
<given-names>C.H.</given-names>
</string-name>
<year>2005</year>
,
<source>Peace, war and computers</source>
,
<publisher-name>Routledge</publisher-name>
,
<publisher-loc>London; New York</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref221">
<mixed-citation publication-type="book">
<string-name>
<surname>Greenberg</surname>
,
<given-names>K.J.</given-names>
</string-name>
<year>2006</year>
, ‘
<chapter-title>Introduction</chapter-title>
’, in
<string-name>
<given-names>K.J.</given-names>
<surname>Greenberg</surname>
</string-name>
(ed.),
<source>The torture debate in America</source>
,
<publisher-name>Cambridge University Press</publisher-name>
,
<publisher-loc>Cambridge; New York</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref222">
<mixed-citation publication-type="journal">
<string-name>
<surname>Greener-Barcham</surname>
,
<given-names>Beth K.</given-names>
</string-name>
, and
<string-name>
<surname>Barcham</surname>
,
<given-names>Manuhuia</given-names>
</string-name>
<year>2006</year>
,
<article-title>‘Terrorism in the South Pacific? Thinking Critically About Approaches to Security in the Region’</article-title>
,
<source>Australian Journal of International Affairs</source>
, vol
<volume>60</volume>
, no.
<issue>1</issue>
, pp.
<fpage>67</fpage>
<lpage>82</lpage>
.</mixed-citation>
</ref>
<ref id="ref223">
<mixed-citation publication-type="journal">
<string-name>
<surname>Greenwood</surname>
,
<given-names>C.</given-names>
</string-name>
<year>2002</year>
, ‘
<article-title>International Law and the “War Against Terrorism</article-title>
”’,
<source>International Affairs</source>
, vol.
<volume>78</volume>
, no.
<issue>2</issue>
, pp.
<fpage>301</fpage>
<lpage>17</lpage>
.</mixed-citation>
</ref>
<ref id="ref224">
<mixed-citation publication-type="other">
<string-name>
<surname>Greenwood</surname>
,
<given-names>C.</given-names>
</string-name>
<year>2003</year>
, ‘
<article-title>International Law and the Pre-emptive Use of Force: Afghanistan, Al-Qaida, and Iraq</article-title>
’,
<source>San Diego International Law Journal</source>
, vol.
<volume>7</volume>
, pp.
<fpage>7</fpage>
<lpage>37</lpage>
.</mixed-citation>
</ref>
<ref id="ref225">
<mixed-citation publication-type="journal">
<string-name>
<surname>Gross</surname>
,
<given-names>O.</given-names>
</string-name>
<year>2000</year>
, ‘
<article-title>The Normless and Exeptionless Exception: Carl Schmitt’s Theory of Emergency Powers and the “Norm-Exception” Dichotomy</article-title>
’,
<source>Cardozo Law Review</source>
, vol.
<volume>21</volume>
, no.
<issue>5–6</issue>
, pp.
<fpage>1825</fpage>
<lpage>68</lpage>
.</mixed-citation>
</ref>
<ref id="ref226">
<mixed-citation publication-type="journal">
<string-name>
<surname>Gross</surname>
,
<given-names>O.</given-names>
</string-name>
<year>2006</year>
, ‘
<article-title>What “Emergency” Regime?</article-title>
<source>Constellations</source>
, vol.
<volume>13</volume>
, no.
<issue>1</issue>
, pp.
<fpage>74</fpage>
<lpage>88</lpage>
.
<string-name>
<surname>Grotius</surname>
,
<given-names>H.</given-names>
</string-name>
<year>1913</year>
,
<source>De jure belli ac pacis libri tres</source>
,
<publisher-name>Carnegie Council</publisher-name>
,
<publisher-loc>Washington, DC</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref227">
<mixed-citation publication-type="book">
<string-name>
<surname>Gross</surname>
,
<given-names>O.</given-names>
</string-name>
<year>2005</year>
,
<chapter-title>‘The rights of war and peace’</chapter-title>
, in
<string-name>
<given-names>K.</given-names>
<surname>Haakonssen</surname>
</string-name>
and
<string-name>
<given-names>J.</given-names>
<surname>Barbeyrac</surname>
</string-name>
(eds),
<source>Natural law and enlightenment classics</source>
,
<publisher-name>Liberty Fund Press</publisher-name>
,
<publisher-loc>Indianapolis, IN</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref228">
<mixed-citation publication-type="other">
<string-name>
<surname>Gugliotta</surname>
,
<given-names>G.</given-names>
</string-name>
<year>2002</year>
, ‘
<article-title>Still No Arrests in Anthrax Probe, But “Progress” is Noted</article-title>
’,
<source>Washington Post</source>
,
<day>4</day>
<month>August</month>
, p.
<fpage>A08</fpage>
.</mixed-citation>
</ref>
<ref id="ref229">
<mixed-citation publication-type="book">
<string-name>
<surname>Guillemin</surname>
,
<given-names>J.</given-names>
</string-name>
<year>2005</year>
,
<source>Biological weapons: from the invention of state-sponsored programs to contemporary bioterrorism</source>
,
<publisher-name>Columbia University Press</publisher-name>
,
<publisher-loc>New York</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref230">
<mixed-citation publication-type="web">
<string-name>
<surname>Hafetz</surname>
,
<given-names>J.</given-names>
</string-name>
<year>2006</year>
, ‘
<article-title>Hamdan and the Guantanamo Detainees</article-title>
’,
<source>Jurist Forum</source>
,
<date-in-citation>12 July 2006</date-in-citation>
.
<uri xlink:href="http://jurist.law.pitt.edu/forumy/2006/07/hamdan-and-guantanamo-detainees.php">http://jurist.law.pitt.edu/forumy/2006/07/hamdan-and-guantanamo-detainees.php</uri>
(accessed
<date-in-citation>1 December 2006</date-in-citation>
).</mixed-citation>
</ref>
<ref id="ref231">
<mixed-citation publication-type="book">
<string-name>
<surname>Halliday</surname>
,
<given-names>F.</given-names>
</string-name>
<year>2005</year>
,
<source>The Middle East in international relations: power, politics and ideology</source>
,
<publisher-name>Cambridge University Press</publisher-name>
,
<publisher-loc>Cambridge, UK; New York</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref232">
<mixed-citation publication-type="book">
<string-name>
<surname>Halper</surname>
,
<given-names>S.A.</given-names>
</string-name>
and
<string-name>
<surname>Clarke</surname>
,
<given-names>J.</given-names>
</string-name>
<year>2004</year>
,
<source>America alone: the neo-conservatives and the global order</source>
,
<publisher-name>Cambridge University Press</publisher-name>
,
<publisher-loc>Cambridge</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref233">
<mixed-citation publication-type="book">
<xref id="page_209" ref-type="page"></xref>
<string-name>
<surname>Hamilton</surname>
,
<given-names>B.</given-names>
</string-name>
<year>1963</year>
,
<source>Political thought in sixteenth century Spain: a study of the political ideas of Vitoria, De Soto, Suárez, and Molina</source>
,
<publisher-name>Clarendon Press</publisher-name>
,
<publisher-loc>Oxford</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref234">
<mixed-citation publication-type="other">
<string-name>
<surname>Hammer</surname>
,
<given-names>R.</given-names>
</string-name>
<year>2003</year>
, ‘
<article-title>Militarism and Family Terrorism: a Critical Feminist Perspective</article-title>
’,
<source>The Review of Education, Pedagogy and Cultural Studies</source>
, vol.
<volume>25</volume>
, pp.
<fpage>231</fpage>
<lpage>56</lpage>
.</mixed-citation>
</ref>
<ref id="ref235">
<mixed-citation publication-type="web">
<string-name>
<surname>Harding</surname>
,
<given-names>L.</given-names>
</string-name>
<year>2004</year>
a, ‘
<article-title>Focus Shifts to Jail Abuse of Women</article-title>
’,
<source>Guardian</source>
,
<day>12</day>
<month>May</month>
, viewed
<date-in-citation>26 April 2007</date-in-citation>
<
<uri xlink:href="http://www.guardian.co.uk/print/0,,4921772-103550,00.html">http://www.guardian.co.uk/print/0,,4921772-103550,00.html</uri>
>.</mixed-citation>
</ref>
<ref id="ref236">
<mixed-citation publication-type="web">
<string-name>
<surname>Harding</surname>
,
<given-names>L.</given-names>
</string-name>
<year>2004</year>
b, ‘
<article-title>The Other Prisoners</article-title>
’,
<source>Guardian</source>
,
<day>20</day>
<month>May</month>
, viewed
<date-in-citation>26 April 2007</date-in-citation>
<
<uri xlink:href="http://www.guardian.co.uk/print/0,,4928134-103691,00.html">http://www.guardian.co.uk/print/0,,4928134-103691,00.html</uri>
>.</mixed-citation>
</ref>
<ref id="ref237">
<mixed-citation publication-type="book">
<string-name>
<surname>Harré</surname>
,
<given-names>R.</given-names>
</string-name>
<year>1986</year>
,
<source>The Social construction of emotions</source>
,
<publisher-name>Basil Blackwell</publisher-name>
,
<publisher-loc>Oxford</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref238">
<mixed-citation publication-type="web">
<string-name>
<surname>Hibbitts</surname>
,
<given-names>B.</given-names>
</string-name>
<year>2006</year>
,
<source>US assures Australia that Hicks will not face death penalty in new military trial</source>
, viewed
<date-in-citation>7 November 2006</date-in-citation>
<
<uri xlink:href="http://jurist.law.pitt.edu/paperchase/2006/08/us-assures-australia-that-hicks-will.php">http://jurist.law.pitt.edu/paperchase/2006/08/us-assures-australia-that-hicks-will.php</uri>
>.</mixed-citation>
</ref>
<ref id="ref239">
<mixed-citation publication-type="web">
<string-name>
<surname>Hill</surname>
,
<given-names>R.</given-names>
</string-name>
<year>2005</year>
,
<source>Terrorism and the new global security environment, speech at Murdoch University, Perth, 18 May</source>
, viewed
<date-in-citation>20 February 2007</date-in-citation>
<
<uri xlink:href="http://www.defence.gov.au/minister/HillSpeechtpl.cfm?CurrentId=4874">http://www.defence.gov.au/minister/HillSpeechtpl.cfm?CurrentId=4874</uri>
>.</mixed-citation>
</ref>
<ref id="ref240">
<mixed-citation publication-type="book">
<string-name>
<surname>Hills</surname>
,
<given-names>A.</given-names>
</string-name>
<year>2004</year>
,
<source>Future war in cities: rethinking a liberal dilemma</source>
,
<publisher-name>Frank Cass Publishers</publisher-name>
,
<publisher-loc>London</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref241">
<mixed-citation publication-type="journal">
<string-name>
<surname>Hills</surname>
,
<given-names>A.</given-names>
</string-name>
<year>2006</year>
, ‘
<article-title>Fear and Loathing in Falluja</article-title>
’,
<source>Armed Forces and Society</source>
, vol.
<volume>32</volume>
, no.
<issue>4</issue>
, pp.
<fpage>623</fpage>
<lpage>39</lpage>
.</mixed-citation>
</ref>
<ref id="ref242">
<mixed-citation publication-type="journal">
<string-name>
<surname>Hindess</surname>
,
<given-names>B.</given-names>
</string-name>
<year>2001</year>
, ‘
<article-title>The Liberal Government of Unfreedom</article-title>
’,
<source>Alternatives</source>
, vol.
<volume>26</volume>
, no.
<issue>2</issue>
, pp.
<fpage>93</fpage>
<lpage>111</lpage>
.</mixed-citation>
</ref>
<ref id="ref243">
<mixed-citation publication-type="book">
<string-name>
<surname>Hochschild</surname>
,
<given-names>A.R.</given-names>
</string-name>
<year>1998</year>
,
<chapter-title>‘The Sociology of Emotions as a Way of Seeing’</chapter-title>
, in
<string-name>
<given-names>G.</given-names>
<surname>Bendelow</surname>
</string-name>
and
<string-name>
<given-names>S.J.</given-names>
<surname>Williams</surname>
</string-name>
(eds),
<source>Emotions in social life: critical themes and contemporary issues</source>
,
<publisher-name>Routledge</publisher-name>
,
<publisher-loc>London</publisher-loc>
, pp.
<fpage>3</fpage>
<lpage>15</lpage>
.</mixed-citation>
</ref>
<ref id="ref244">
<mixed-citation publication-type="journal">
<string-name>
<surname>Hoffman</surname>
,
<given-names>P.</given-names>
</string-name>
<year>2004</year>
, ‘
<article-title>Human Rights and Terrorism</article-title>
’,
<source>Human Rights Quarterly</source>
, vol.
<volume>26</volume>
, no.
<issue>4</issue>
, pp.
<fpage>932</fpage>
<lpage>55</lpage>
.</mixed-citation>
</ref>
<ref id="ref245">
<mixed-citation publication-type="book">
<string-name>
<surname>Holmes</surname>
,
<given-names>S.</given-names>
</string-name>
<year>2005</year>
, ‘
<chapter-title>Al Qaeda, September 11, 2001</chapter-title>
’, in
<string-name>
<given-names>D.</given-names>
<surname>Gambetta</surname>
</string-name>
(ed.),
<source>Making sense of suicide missions</source>
,
<publisher-name>Oxford University Press</publisher-name>
,
<publisher-loc>Oxford</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref246">
<mixed-citation publication-type="book">
<string-name>
<surname>Holmes</surname>
,
<given-names>S.</given-names>
</string-name>
<year>2006</year>
, ‘
<chapter-title>Is Defiance of Law a Proof of Success? Magical Thinking in the War on Terror</chapter-title>
’, in
<string-name>
<given-names>K.J.</given-names>
<surname>Greenberg</surname>
</string-name>
(ed.),
<source>The torture debate in America</source>
,
<publisher-name>Cambridge University Press</publisher-name>
,
<publisher-loc>Cambridge; New York</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref247">
<mixed-citation publication-type="book">
<string-name>
<surname>Homes</surname>
,
<given-names>S.</given-names>
</string-name>
<year>1995</year>
,
<source>Passions and constraint: on the theory of liberal democracy</source>
,
<publisher-name>University of Chicago Press</publisher-name>
,
<publisher-loc>Chicago, IL</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref248">
<mixed-citation publication-type="journal">
<string-name>
<surname>Hoskins</surname>
,
<given-names>A.</given-names>
</string-name>
<year>2006</year>
, ‘
<article-title>Temporality, Proximity and Security: Terror in a Media-Drenched Age</article-title>
’,
<source>International Relations</source>
, vol.
<volume>20</volume>
, no.
<issue>4</issue>
, pp.
<fpage>453</fpage>
<lpage>66</lpage>
.</mixed-citation>
</ref>
<ref id="ref249">
<mixed-citation publication-type="web">
<string-name>
<surname>Hovell</surname>
,
<given-names>D.</given-names>
</string-name>
<year>2005</year>
,
<source>Justice at Guantanamo? The Paradox of David Hicks</source>
, viewed
<date-in-citation>7 November 2006</date-in-citation>
<
<uri xlink:href="http://jurist.law.pitt.edu/forumy/2005/11/justice-at-guantanamo-paradox-ofdavid.php">http://jurist.law.pitt.edu/forumy/2005/11/justice-at-guantanamo-paradox-ofdavid.php</uri>
>.</mixed-citation>
</ref>
<ref id="ref250">
<mixed-citation publication-type="web">
<string-name>
<surname>Howard</surname>
,
<given-names>J.</given-names>
</string-name>
<year>2005</year>
, ‘
<article-title>Australia in the World</article-title>
’,
<source>Address by the Prime Minister, the Hon John Howard MP to the Lowy Institute for International Policy</source>
, available at
<uri xlink:href="http://www.lowyinstitute.org/Publication.asp?pid=396">http://www.lowyinstitute.org/Publication.asp?pid=396</uri>
.</mixed-citation>
</ref>
<ref id="ref251">
<mixed-citation publication-type="web">
<string-name>
<surname>Howard</surname>
,
<given-names>J.</given-names>
</string-name>
<year>2007</year>
,
<source>Interview: John Howard</source>
,
<date-in-citation>Sunday, 11 February</date-in-citation>
, viewed
<date-in-citation>26 March 2007</date-in-citation>
<
<uri xlink:href="http://sunday.ninemsn.com.au/sunday/political_transcripts/article_2124.asp">http://sunday.ninemsn.com.au/sunday/political_transcripts/article_2124.asp</uri>
>.</mixed-citation>
</ref>
<ref id="ref252">
<mixed-citation publication-type="journal">
<string-name>
<surname>Howard</surname>
,
<given-names>M.</given-names>
</string-name>
<year>2002</year>
, ‘
<article-title>What’s in a Name? How to Fight Terrorism</article-title>
’,
<source>Foreign Affairs</source>
, vol.
<volume>81</volume>
, no.
<issue>1</issue>
, pp.
<fpage>8</fpage>
<lpage>13</lpage>
.</mixed-citation>
</ref>
<ref id="ref253">
<mixed-citation publication-type="book">
<string-name>
<surname>Howard</surname>
,
<given-names>M.E.</given-names>
</string-name>
<year>1978</year>
,
<source>War and the liberal conscience</source>
,
<publisher-name>Temple Smith</publisher-name>
,
<publisher-loc>London</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref254">
<mixed-citation publication-type="web">
<string-name>
<surname>Howeidy</surname>
,
<given-names>A.</given-names>
</string-name>
<year>2004</year>
,
<source>Balfour to Bush</source>
,
<publisher-name>Al-Ahram Weekly</publisher-name>
, viewed
<date-in-citation>6 March 2007</date-in-citation>
<
<uri xlink:href="http://weekly.ahram.org.eg/2004/686/fr3.htm">http://weekly.ahram.org.eg/2004/686/fr3.htm</uri>
>.</mixed-citation>
</ref>
<ref id="ref255">
<mixed-citation publication-type="journal">
<xref id="page_210" ref-type="page"></xref>
<string-name>
<surname>Hoyt</surname>
,
<given-names>K.</given-names>
</string-name>
and
<string-name>
<surname>Brooks</surname>
,
<given-names>S.G.</given-names>
</string-name>
<year>2004</year>
, ‘
<article-title>A Double-Edged Sword: Globalization and Biosecurity</article-title>
’,
<source>International Security</source>
, vol.
<volume>28</volume>
, no.
<issue>3</issue>
, pp.
<fpage>123</fpage>
<lpage>48</lpage>
.</mixed-citation>
</ref>
<ref id="ref256">
<mixed-citation publication-type="journal">
<string-name>
<surname>Humphrey</surname>
,
<given-names>M.</given-names>
</string-name>
<year>2000</year>
, ‘
<article-title>From Terror to Trauma: Commissioning Truth for National Reconciliation</article-title>
’,
<source>Social Identities</source>
, vol.
<volume>6</volume>
, no.
<issue>1</issue>
, pp.
<fpage>7</fpage>
<lpage>27</lpage>
.</mixed-citation>
</ref>
<ref id="ref257">
<mixed-citation publication-type="book">
<string-name>
<surname>Humphrey</surname>
,
<given-names>M.</given-names>
</string-name>
2002,
<source>The politics of atrocity and reconciliation: from terror to trauma</source>
,
<publisher-name>Routledge, London</publisher-name>
;
<publisher-loc>New York</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref258">
<mixed-citation publication-type="journal">
<string-name>
<surname>Humphreys</surname>
,
<given-names>S.</given-names>
</string-name>
<year>2006</year>
, ‘
<article-title>Legalizing Lawlessness: On Giorgio Agamben’s State of Exception</article-title>
’,
<source>European Journal of International Law</source>
, vol.
<volume>17</volume>
, no.
<issue>3</issue>
, pp.
<fpage>677</fpage>
<lpage>87</lpage>
.</mixed-citation>
</ref>
<ref id="ref259">
<mixed-citation publication-type="other">
<string-name>
<surname>Hunt</surname>
,
<given-names>S.</given-names>
</string-name>
and
<string-name>
<surname>Posa</surname>
,
<given-names>C.</given-names>
</string-name>
<year>2004</year>
, ‘
<article-title>Iraq’s Excluded Women</article-title>
’,
<source>Foreign Policy</source>
, vol.
<volume>143</volume>
, pp.
<fpage>40</fpage>
<lpage>5</lpage>
.</mixed-citation>
</ref>
<ref id="ref260">
<mixed-citation publication-type="book">
<string-name>
<surname>Huntington</surname>
,
<given-names>S.P.</given-names>
</string-name>
<year>1996</year>
,
<source>The clash of civilizations and the remaking of world order</source>
,
<publisher-name>Simon and Schuster</publisher-name>
,
<publisher-loc>New York</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref261">
<mixed-citation publication-type="journal">
<string-name>
<surname>Hurrell</surname>
,
<given-names>A.</given-names>
</string-name>
<year>2002</year>
, ‘’
<article-title>There Are No Rules’ (George W. Bush): International Order after</article-title>
<month>September</month>
<day>11</day>
’,
<source>International Relations</source>
, vol.
<volume>16</volume>
, no.
<issue>2</issue>
, pp.
<fpage>185</fpage>
<lpage>204</lpage>
.</mixed-citation>
</ref>
<ref id="ref262">
<mixed-citation publication-type="web">
<collab>ICRC</collab>
<year>2005</year>
, US detention related to the events of
<date-in-citation>11 September 2001</date-in-citation>
and its aftermath – the role of the ICRC, viewed
<date-in-citation>1 December 2006</date-in-citation>
<
<uri xlink:href="http://www.icrc.org/web/eng/siteeng0.nsf/iwpList454/541ACF6DC88315C4C125700B004FF643">http://www.icrc.org/web/eng/siteeng0.nsf/iwpList454/541ACF6DC88315C4C125700B004FF643</uri>
>.</mixed-citation>
</ref>
<ref id="ref263">
<mixed-citation publication-type="book">
<string-name>
<surname>Ignatieff</surname>
,
<given-names>M.</given-names>
</string-name>
<year>1997</year>
,
<source>The warrior’s honor: ethnic war and the modern conscience</source>
,
<publisher-name>Metropolitan Books</publisher-name>
,
<publisher-loc>New York</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref264">
<mixed-citation publication-type="book">
<string-name>
<surname>Ignatieff</surname>
,
<given-names>M.</given-names>
</string-name>
<year>2003</year>
,
<source>Empire lite: nation building in Bosnia, Kosovo and Afghanistan</source>
,
<publisher-name>Vintage</publisher-name>
,
<publisher-loc>London</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref265">
<mixed-citation publication-type="book">
<string-name>
<surname>Ignatieff</surname>
,
<given-names>M.</given-names>
</string-name>
<year>2004</year>
,
<source>The lesser evil: political ethics in an age of terror</source>
,
<publisher-name>Edinburgh University Press</publisher-name>
,
<publisher-loc>Edinburgh</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref266">
<mixed-citation publication-type="journal">
<string-name>
<surname>Ikenberry</surname>
,
<given-names>J.G.</given-names>
</string-name>
<year>2004</year>
, ‘
<article-title>The End of the Neo-Conservative Moment</article-title>
’,
<source>Survival</source>
, vol.
<volume>46</volume>
, no.
<issue>1</issue>
, pp.
<fpage>7</fpage>
<lpage>22</lpage>
.</mixed-citation>
</ref>
<ref id="ref267">
<mixed-citation publication-type="book">
<collab>Iraq Study Group</collab>
<year>2006</year>
,
<source>The way forward – a new approach</source>
,
<publisher-name>Vintage</publisher-name>
,
<publisher-loc>New York</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref268">
<mixed-citation publication-type="web">
<collab>IRIN</collab>
<year>2006</year>
a,
<source>Iraq: focus on increasing domestic violence</source>
,
<collab>IRNInews.org</collab>
,
<day>24</day>
<month>November</month>
, viewed
<date-in-citation>26 April 2007</date-in-citation>
<
<uri xlink:href="http://www.irinnews.org/report.asp?ReportID=37204&SelectRegion=Iraq_Crisis&SelectCountry=IRAQ">http://www.irinnews.org/report.asp?ReportID=37204&SelectRegion=Iraq_Crisis&SelectCountry=IRAQ</uri>
>.</mixed-citation>
</ref>
<ref id="ref269">
<mixed-citation publication-type="web">
<collab>IRIN</collab>
<year>2006</year>
b,
<source>Iraq: widow numbers rise in wake of violence</source>
,
<collab>IRINnews.org</collab>
,
<day>26</day>
<month>April</month>
, viewed
<date-in-citation>26 April 2007</date-in-citation>
<
<uri xlink:href="http://www.irinnews.org/report.aspx?reportid=26320">http://www.irinnews.org/report.aspx?reportid=26320</uri>
>.</mixed-citation>
</ref>
<ref id="ref270">
<mixed-citation publication-type="web">
<collab>IRIN</collab>
<year>2006</year>
c,
<source>Iraq: lawyers killed for defending cases ‘against Islam’</source>
,
<collab>IRINnews. org</collab>
,
<day>6</day>
<month>November</month>
, viewed
<date-in-citation>25 November 2006</date-in-citation>
<
<uri xlink:href="http://www.irinnews.org/print.asp?ReportID=55146">http://www.irinnews.org/print.asp?ReportID=55146</uri>
>.</mixed-citation>
</ref>
<ref id="ref271">
<mixed-citation publication-type="web">
<collab>IRIN</collab>
<year>2006</year>
d,
<source>Sex traffickers target women in war-torn Iraq</source>
, electronicIraq.net,
<day>26</day>
<month>October</month>
, viewed
<date-in-citation>26 April 2007</date-in-citation>
<
<uri xlink:href="http://electroniciraq.net/news/2569.shtml">http://electroniciraq.net/news/2569.shtml</uri>
>.</mixed-citation>
</ref>
<ref id="ref272">
<mixed-citation publication-type="book">
<string-name>
<surname>Jackson</surname>
,
<given-names>R.</given-names>
</string-name>
<year>2005</year>
,
<source>Writing the war on terrorism: language, politics and counter-terrorism</source>
,
<publisher-name>Manchester University Press</publisher-name>
,
<publisher-loc>Manchester; New York</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref273">
<mixed-citation publication-type="journal">
<string-name>
<surname>Jackson</surname>
,
<given-names>R.J.</given-names>
</string-name>
,
<string-name>
<surname>Ramsay</surname>
,
<given-names>A.J.</given-names>
</string-name>
,
<string-name>
<surname>Christensen</surname>
,
<given-names>C.D.</given-names>
</string-name>
,
<string-name>
<surname>Beaton</surname>
,
<given-names>S.</given-names>
</string-name>
,
<string-name>
<surname>Hall</surname>
,
<given-names>D.F.</given-names>
</string-name>
and
<string-name>
<surname>Ramshaw</surname>
,
<given-names>I.A.</given-names>
</string-name>
<year>2001</year>
, ‘
<article-title>Expression of Mouse Interleukin-4 by a Recombinant Ectromelia Virus Suppresses Cytolytic Lymphocyte Responses and Overcomes Genetic Resistance to Mousepox</article-title>
’,
<source>Journal of Virology</source>
, vol.
<volume>75</volume>
, no.
<issue>3</issue>
, pp.
<fpage>1205</fpage>
<lpage>10</lpage>
.</mixed-citation>
</ref>
<ref id="ref274">
<mixed-citation publication-type="book">
<string-name>
<surname>Jaggar</surname>
,
<given-names>A.M.</given-names>
</string-name>
<year>1989</year>
,
<chapter-title>‘Love and Knowledge: Emotion in Feminist Epistemology’</chapter-title>
, in
<string-name>
<given-names>S.</given-names>
<surname>Bordo</surname>
</string-name>
and
<string-name>
<given-names>A.M.</given-names>
<surname>Jaggar</surname>
</string-name>
(eds),
<source>Gender/body/knowledge: feminist reconstructions of being and knowing</source>
,
<publisher-name>Rutgers University Press</publisher-name>
,
<publisher-loc>New Brunswick, NJ</publisher-loc>
, pp.
<fpage>145</fpage>
<lpage>71</lpage>
.</mixed-citation>
</ref>
<ref id="ref275">
<mixed-citation publication-type="other">
<string-name>
<surname>James</surname>
,
<given-names>F.</given-names>
</string-name>
<year>2004</year>
, ‘
<article-title>Anti-bioterror Labs Raise Risk to US, Critics Say</article-title>
’,
<source>Chicago Tribune</source>
,
<day>5</day>
<month>December</month>
, p.
<fpage>9</fpage>
.</mixed-citation>
</ref>
<ref id="ref276">
<mixed-citation publication-type="journal">
<string-name>
<surname>James</surname>
,
<given-names>N.</given-names>
</string-name>
<year>2005</year>
, ‘
<article-title>Torture: An Unwarranted Case</article-title>
’,
<source>Defender</source>
, vol.
<volume>22</volume>
, no.
<issue>2</issue>
, pp.
<fpage>25</fpage>
<lpage>7</lpage>
.</mixed-citation>
</ref>
<ref id="ref277">
<mixed-citation publication-type="book">
<string-name>
<surname>Jamieson</surname>
,
<given-names>K.H.</given-names>
</string-name>
<year>1992</year>
,
<source>Dirty politics: deception, distraction, and democracy</source>
,
<publisher-name>Oxford University Press</publisher-name>
,
<publisher-loc>New York</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref278">
<mixed-citation publication-type="book">
<xref id="page_211" ref-type="page"></xref>
<string-name>
<surname>Jeleniewski Seidler</surname>
,
<given-names>V.</given-names>
</string-name>
<year>1998</year>
,
<chapter-title>‘Masculinity, Violence and Emotional Life’</chapter-title>
, in
<string-name>
<given-names>G.</given-names>
<surname>Bendelow</surname>
</string-name>
and
<string-name>
<given-names>S.J.</given-names>
<surname>Williams</surname>
</string-name>
(eds),
<source>Emotions in social life: critical themes and contemporary issues</source>
,
<publisher-name>Routledge</publisher-name>
,
<publisher-loc>London; New York</publisher-loc>
, pp.
<fpage>193</fpage>
<lpage>210</lpage>
.</mixed-citation>
</ref>
<ref id="ref279">
<mixed-citation publication-type="journal">
<string-name>
<surname>Johns</surname>
,
<given-names>F.</given-names>
</string-name>
<year>2005</year>
, ‘
<article-title>Guantanamo Bay and the Annihilation of the Exception</article-title>
’,
<source>European Journal of International Law</source>
, vol.
<volume>16</volume>
, no.
<issue>4</issue>
, pp.
<fpage>613</fpage>
<lpage>35</lpage>
.</mixed-citation>
</ref>
<ref id="ref280">
<mixed-citation publication-type="journal">
<string-name>
<surname>Johnson</surname>
,
<given-names>J.</given-names>
</string-name>
<year>2001</year>
, ‘
<article-title>Blacklisting: Initial Results, Responses and Repercussions</article-title>
’,
<source>Journal of Money Laundering Control</source>
, vol.
<volume>4</volume>
, no.
<issue>2</issue>
, pp.
<fpage>211</fpage>
<lpage>25</lpage>
.</mixed-citation>
</ref>
<ref id="ref281">
<mixed-citation publication-type="book">
<string-name>
<surname>Johnson</surname>
,
<given-names>J.T.</given-names>
</string-name>
<year>1975</year>
,
<source>Ideology, reason, and the limitation of war: religious and secular concepts, 1200–1740</source>
,
<publisher-name>Princeton University Press</publisher-name>
,
<publisher-loc>Princeton, NJ</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref282">
<mixed-citation publication-type="book">
<string-name>
<surname>Johnson</surname>
,
<given-names>J.T.</given-names>
</string-name>
<year>1981</year>
,
<source>Just war tradition and the restraint of war: a moral and historical inquiry</source>
,
<publisher-name>Princeton University Press</publisher-name>
,
<publisher-loc>Princeton, NJ</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref283">
<mixed-citation publication-type="other">
<string-name>
<surname>Johnson</surname>
,
<given-names>J.T.</given-names>
</string-name>
<year>1996</year>
, ‘
<article-title>The Broken Tradition</article-title>
’,
<source>The National Interest</source>
, vol.
<volume>45</volume>
, pp.
<fpage>27</fpage>
<lpage>37</lpage>
.</mixed-citation>
</ref>
<ref id="ref284">
<mixed-citation publication-type="book">
<string-name>
<surname>Johnson</surname>
,
<given-names>J.T.</given-names>
</string-name>
<year>1999</year>
,
<source>Morality and contemporary warfare</source>
,
<publisher-name>Yale University Press</publisher-name>
,
<publisher-loc>New Haven, CT</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref285">
<mixed-citation publication-type="book">
<string-name>
<surname>Johnson</surname>
,
<given-names>J.T.</given-names>
</string-name>
<year>2005</year>
,
<source>The war to oust Saddam Hussein: just war and the face of new conflict</source>
,
<publisher-name>Rowman and Littlefield</publisher-name>
,
<publisher-loc>Lanham, MD</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref286">
<mixed-citation publication-type="journal">
<string-name>
<surname>Johnson</surname>
,
<given-names>J.T.</given-names>
</string-name>
<year>2006</year>
, ‘
<article-title>Humanitarian Intervention after Iraq: Just War and International Law Perspectives</article-title>
’,
<source>Journal of Military Ethics</source>
, vol.
<volume>5</volume>
, no.
<issue>2</issue>
, pp.
<fpage>114</fpage>
<lpage>27</lpage>
.</mixed-citation>
</ref>
<ref id="ref287">
<mixed-citation publication-type="journal">
<string-name>
<surname>Johnstone</surname>
,
<given-names>I.</given-names>
</string-name>
<year>2004</year>
, ‘
<article-title>US–UN Relations after Iraq: The End of the World (Order) as We Know It?</article-title>
<source>European Journal of International Law</source>
, vol.
<volume>15</volume>
, no.
<issue>4</issue>
, pp.
<fpage>813</fpage>
<lpage>38</lpage>
.</mixed-citation>
</ref>
<ref id="ref288">
<mixed-citation publication-type="book">
<string-name>
<surname>Jones</surname>
,
<given-names>R.V.</given-names>
</string-name>
<year>1989</year>
,
<source>Reflections on intelligence</source>
,
<publisher-name>Heinemann</publisher-name>
,
<publisher-loc>London</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref289">
<mixed-citation publication-type="web">
<string-name>
<surname>Jones</surname>
,
<given-names>R.V.</given-names>
</string-name>
<year>1995</year>
,
<source>Some Lessons in Intelligence, Studies in Intelligence</source>
, viewed
<date-in-citation>15 March 2007</date-in-citation>
<
<uri xlink:href="http://www.cia.gov/csi/studies/95unclass/Jones.html">http://www.cia.gov/csi/studies/95unclass/Jones.html</uri>
>.</mixed-citation>
</ref>
<ref id="ref290">
<mixed-citation publication-type="journal">
<string-name>
<surname>Jones</surname>
,
<given-names>S.G.</given-names>
</string-name>
<year>2006</year>
, ‘
<article-title>Averting Failure in Afghanistan</article-title>
’,
<source>Survival</source>
, vol.
<volume>48</volume>
, no.
<issue>1</issue>
, pp.
<fpage>111</fpage>
<lpage>27</lpage>
.</mixed-citation>
</ref>
<ref id="ref291">
<mixed-citation publication-type="book">
<string-name>
<surname>Kagan</surname>
,
<given-names>R.</given-names>
</string-name>
<year>2003</year>
,
<source>Of paradise and power: America and Europe in the new world order, 1st Vintage Books with a new afterword</source>
,
<publisher-name>Atlantic Books</publisher-name>
,
<publisher-loc>London</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref292">
<mixed-citation publication-type="journal">
<string-name>
<surname>Kaiser</surname>
,
<given-names>J.</given-names>
</string-name>
<year>2004</year>
, ‘
<article-title>Citizens Sue to Block Montana Biodefense Lab</article-title>
’,
<source>Science</source>
, vol.
<volume>305</volume>
, no.
<issue>5687</issue>
, p.
<fpage>1088</fpage>
.</mixed-citation>
</ref>
<ref id="ref293">
<mixed-citation publication-type="book">
<string-name>
<surname>Kaldor</surname>
,
<given-names>M.</given-names>
</string-name>
<year>1999</year>
,
<source>New and old wars: organized violence in a global age, reprinted with a new afterword</source>
,
<publisher-name>Polity Press</publisher-name>
,
<publisher-loc>Cambridge</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref294">
<mixed-citation publication-type="book">
<string-name>
<surname>Kaldor</surname>
,
<given-names>M.</given-names>
</string-name>
<year>2003</year>
,
<source>Global civil society: an answer to war</source>
,
<publisher-name>Polity Press</publisher-name>
,
<publisher-loc>Cambridge</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref295">
<mixed-citation publication-type="book">
<string-name>
<surname>Kaldor</surname>
,
<given-names>M.</given-names>
</string-name>
<year>2006</year>
,
<source>New and old wars: organized violence in a global era</source>
,
<edition>2nd</edition>
edn,
<publisher-name>Polity Press</publisher-name>
,
<publisher-loc>Cambridge</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref296">
<mixed-citation publication-type="journal">
<string-name>
<surname>Kaplan</surname>
,
<given-names>A.</given-names>
</string-name>
<year>2005</year>
, ‘
<article-title>Where is Guantanamo?</article-title>
<source>American Quarterly</source>
, vol.
<volume>57</volume>
, no.
<issue>3</issue>
, pp.
<fpage>831</fpage>
<lpage>58</lpage>
.</mixed-citation>
</ref>
<ref id="ref297">
<mixed-citation publication-type="book">
<string-name>
<surname>Karoubi</surname>
,
<given-names>M.T.</given-names>
</string-name>
<year>2004</year>
,
<source>Just or unjust war?: international law and unilateral use of armed force by states at the turn of the 20th century</source>
,
<publisher-name>Ashgate</publisher-name>
,
<publisher-loc>Aldershot; Burlington, VT</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref298">
<mixed-citation publication-type="other">
<string-name>
<surname>Kaufman</surname>
,
<given-names>M.</given-names>
</string-name>
<year>2006</year>
, ‘
<article-title>Bush sets defense as space priority</article-title>
’,
<source>The Washington Post</source>
, p.
<fpage>A01</fpage>
.</mixed-citation>
</ref>
<ref id="ref299">
<mixed-citation publication-type="journal">
<string-name>
<surname>Kaufman</surname>
,
<given-names>W.</given-names>
</string-name>
<year>2005</year>
, ‘
<article-title>What’s Wrong with Preventive War? The Moral and Legal Basis for the Preventive Use of Force</article-title>
’,
<source>Ethics and International Affairs</source>
, vol.
<volume>19</volume>
, no.
<issue>3</issue>
, pp.
<fpage>23</fpage>
<lpage>38</lpage>
.</mixed-citation>
</ref>
<ref id="ref300">
<mixed-citation publication-type="other">
<string-name>
<surname>Keenan</surname>
,
<given-names>T.</given-names>
</string-name>
<year>2004</year>
, ‘
<article-title>To Speak in a Language that Needs no Translation</article-title>
’, unpublished paper.</mixed-citation>
</ref>
<ref id="ref301">
<mixed-citation publication-type="book">
<string-name>
<surname>Keene</surname>
,
<given-names>E.</given-names>
</string-name>
<year>2002</year>
,
<source>Beyond the anarchical society: Grotius, colonialism and order in world politics</source>
,
<publisher-name>Cambridge University Press</publisher-name>
,
<publisher-loc>Cambridge; New York</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref302">
<mixed-citation publication-type="journal">
<string-name>
<surname>Kelley</surname>
,
<given-names>M.</given-names>
</string-name>
and
<string-name>
<surname>Coghlan</surname>
,
<given-names>J.</given-names>
</string-name>
<year>2003</year>
, ‘
<article-title>Mixing Bugs and Bombs</article-title>
’,
<source>Bulletin of the Atomic Scientists</source>
, vol.
<volume>59</volume>
, no.
<issue>5</issue>
, pp.
<fpage>24</fpage>
<lpage>31</lpage>
.</mixed-citation>
</ref>
<ref id="ref303">
<mixed-citation publication-type="conf-proc">
<string-name>
<surname>Kellogg</surname>
,
<given-names>F.B.</given-names>
</string-name>
<year>1928</year>
, ‘
<conf-name>Address of the Hon. Frank B. Kellogg, 28 April 1928</conf-name>
’,
<source>Proceedings of the American Society of International Law</source>
, vol.
<volume>22</volume>
, pp.
<fpage>141</fpage>
<lpage>3</lpage>
.</mixed-citation>
</ref>
<ref id="ref304">
<mixed-citation publication-type="other">
<string-name>
<surname>Kelsen</surname>
,
<given-names>H.</given-names>
</string-name>
<year>1948</year>
, ‘
<article-title>Collective Security and Collective Self-Defense Under the Charter</article-title>
’,
<source>American Journal of International Law</source>
, vol.
<volume>42</volume>
, no.
<issue>3</issue>
.</mixed-citation>
</ref>
<ref id="ref305">
<mixed-citation publication-type="other">
<xref id="page_212" ref-type="page"></xref>
<string-name>
<surname>Kilcullen</surname>
,
<given-names>D.</given-names>
</string-name>
<year>2006</year>
, ‘Counter-insurgency
<source>Redux’, Survival</source>
, vol.
<volume>48</volume>
, no.
<issue>4</issue>
, pp.
<fpage>111</fpage>
<lpage>30</lpage>
.</mixed-citation>
</ref>
<ref id="ref306">
<mixed-citation publication-type="web">
<string-name>
<surname>Kissinger</surname>
,
<given-names>H.A.</given-names>
</string-name>
<year>1969</year>
,
<source>National Security Decision Memorandum (NSDM) 35, United States Policy on Chemical Warfare Program and Bacteriological/Biological Research Program, from National Security Advisor Henry A Kissinger to the Vice President, the Secretary of State, the Secretary of Defense, etc., George Washington University National Security Archive Online</source>
, viewed
<date-in-citation>27 May 2005</date-in-citation>
<
<uri xlink:href="http://www.gwu.edu/~nsarchiv/NSAEBB/NSAEBB58/RNCBW8.pdf">http://www.gwu.edu/~nsarchiv/NSAEBB/NSAEBB58/RNCBW8.pdf</uri>
>.</mixed-citation>
</ref>
<ref id="ref307">
<mixed-citation publication-type="journal">
<string-name>
<surname>Klusmeyer</surname>
,
<given-names>D.</given-names>
</string-name>
and
<string-name>
<surname>Suhrke</surname>
,
<given-names>A.</given-names>
</string-name>
<year>2002</year>
, ‘
<article-title>Comprehending “Evil”: Challenges for Law and Policy</article-title>
’,
<source>Ethics and International Affairs</source>
, vol.
<volume>16</volume>
, no.
<issue>1</issue>
, pp.
<fpage>27</fpage>
<lpage>42</lpage>
.</mixed-citation>
</ref>
<ref id="ref308">
<mixed-citation publication-type="book">
<string-name>
<surname>Koh</surname>
,
<given-names>H.H.</given-names>
</string-name>
<year>2005</year>
, ‘
<chapter-title>America’s Jekyll-and-Hyde Exceptionalism</chapter-title>
’, in
<string-name>
<given-names>M.</given-names>
<surname>Ignatieff</surname>
</string-name>
(ed.),
<source>American exceptionalism and human rights</source>
,
<publisher-name>Princeton University Press</publisher-name>
,
<publisher-loc>New Jersey</publisher-loc>
, pp.
<fpage>111</fpage>
<lpage>43</lpage>
.</mixed-citation>
</ref>
<ref id="ref309">
<mixed-citation publication-type="web">
<string-name>
<surname>Komp</surname>
,
<given-names>C.</given-names>
</string-name>
<year>2006</year>
,
<source>Domestic abuse in military families growing ‘systemic’, The New Standard</source>
,
<day>6</day>
<month>June</month>
, viewed
<date-in-citation>26 April 2007</date-in-citation>
<
<uri xlink:href="http://newstandardnews.net/content/index.cfm/items/3271">http://newstandardnews.net/content/index.cfm/items/3271</uri>
>.</mixed-citation>
</ref>
<ref id="ref310">
<mixed-citation publication-type="web">
<string-name>
<surname>Korch</surname>
,
<given-names>G.</given-names>
</string-name>
<year>2004</year>
,
<source>Leading edge of biodefense: The National Biodefense Analysis and Countermeasures Center, Lecture to the Department of Defense Pest Management Workshop, Jacksonville Naval Air Station, Bioweapons and Biodefense Freedom of Information Fund Online</source>
, viewed
<date-in-citation>26 May 2005</date-in-citation>
<
<uri xlink:href="http://www.cbwtransparency.org/archive/nbacc.pdf">http://www.cbwtransparency.org/archive/nbacc.pdf</uri>
>.</mixed-citation>
</ref>
<ref id="ref311">
<mixed-citation publication-type="book">
<string-name>
<surname>Koskenniemi</surname>
,
<given-names>M.</given-names>
</string-name>
<year>2005</year>
,
<source>From apology to Utopia: the structure of international legal argument</source>
,
<edition>2nd</edition>
edn,
<publisher-name>Cambridge University Press</publisher-name>
,
<publisher-loc>Cambridge</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref312">
<mixed-citation publication-type="book">
<collab>KPMG</collab>
<year>2004</year>
,
<source>Global Anti-Money Laundering Survey 2004: how banks are facing up to the challenge</source>
,
<publisher-loc>KPMG International</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref313">
<mixed-citation publication-type="journal">
<string-name>
<surname>Krasner</surname>
,
<given-names>S.D.</given-names>
</string-name>
and
<string-name>
<surname>Pascual</surname>
,
<given-names>C.</given-names>
</string-name>
<year>2005</year>
, ‘
<article-title>Addressing State Failure</article-title>
’,
<source>Foreign Affairs</source>
, vol.
<volume>84</volume>
, no.
<issue>4</issue>
, pp.
<fpage>153</fpage>
<lpage>63</lpage>
.</mixed-citation>
</ref>
<ref id="ref314">
<mixed-citation publication-type="journal">
<string-name>
<surname>Krause</surname>
,
<given-names>K.</given-names>
</string-name>
and
<string-name>
<surname>Williams</surname>
,
<given-names>M.C.</given-names>
</string-name>
<year>1996</year>
, ‘
<article-title>Broadening the Agenda of Security Studies: Politics and Methods</article-title>
’,
<source>Mershon International Studies Review</source>
, vol.
<volume>40</volume>
, no.
<issue>2</issue>
, pp.
<fpage>229</fpage>
<lpage>54</lpage>
.</mixed-citation>
</ref>
<ref id="ref315">
<mixed-citation publication-type="journal">
<string-name>
<surname>Kumar</surname>
,
<given-names>D.</given-names>
</string-name>
<year>2004</year>
, ‘
<article-title>War Propaganda and the (Ab)uses of Women, Media Constructions of the Jessica Lynch story</article-title>
’,
<source>Feminist Media Studies</source>
, vol.
<volume>4</volume>
, no.
<issue>3</issue>
, pp.
<fpage>297</fpage>
<lpage>313</lpage>
.</mixed-citation>
</ref>
<ref id="ref316">
<mixed-citation publication-type="journal">
<string-name>
<surname>Kunz</surname>
,
<given-names>J.L.</given-names>
</string-name>
<year>1947</year>
, ‘
<article-title>Individual and Collective Self-Defence in Article 51 of the Charter of the United Nations</article-title>
’,
<source>American Journal of International Law</source>
, vol.
<volume>41</volume>
, no.
<issue>4</issue>
, pp.
<fpage>872</fpage>
<lpage>9</lpage>
.</mixed-citation>
</ref>
<ref id="ref317">
<mixed-citation publication-type="journal">
<string-name>
<surname>LaFeber</surname>
,
<given-names>W.</given-names>
</string-name>
<year>2002</year>
, ‘
<article-title>The Bush Doctrine</article-title>
’,
<source>Diplomatic History</source>
, vol.
<volume>26</volume>
, no.
<issue>4</issue>
, pp.
<fpage>543</fpage>
<lpage>58</lpage>
.</mixed-citation>
</ref>
<ref id="ref318">
<mixed-citation publication-type="journal">
<string-name>
<surname>Lam</surname>
,
<given-names>C.</given-names>
</string-name>
,
<string-name>
<surname>Franco</surname>
,
<given-names>C.</given-names>
</string-name>
and
<string-name>
<surname>Schuler</surname>
,
<given-names>A.</given-names>
</string-name>
<year>2006</year>
, ‘
<article-title>Billions for Biodefense: Federal Agency Biodefense Funding, FY2006-FY2007</article-title>
’,
<source>Biosecurity and Bioterrorism</source>
, vol.
<volume>4</volume>
, no.
<issue>2</issue>
, pp.
<fpage>113</fpage>
<lpage>27</lpage>
.</mixed-citation>
</ref>
<ref id="ref319">
<mixed-citation publication-type="book">
<string-name>
<surname>Lang</surname>
,
<given-names>A.F.</given-names>
</string-name>
<year>2004</year>
,
<chapter-title>‘The Illegality of Punishing States – from Grotius to the ILC’</chapter-title>
,
<publisher-name>paper presented to International Studies Association</publisher-name>
,
<publisher-loc>Montreal</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref320">
<mixed-citation publication-type="web">
<string-name>
<surname>Lasky</surname>
,
<given-names>M.P.</given-names>
</string-name>
<year>2006</year>
,
<source>Iraq women under siege, Cope Pink/Global Exchange</source>
, viewed
<date-in-citation>26 April 2007</date-in-citation>
<
<uri xlink:href="http://www.codepinkalert.org/downloads/IraqiWomenReport.pdf">http://www.codepinkalert.org/downloads/IraqiWomenReport.pdf</uri>
>.</mixed-citation>
</ref>
<ref id="ref321">
<mixed-citation publication-type="book">
<string-name>
<surname>Lawrence</surname>
,
<given-names>B.</given-names>
</string-name>
<year>2005</year>
,
<source>Message to the world: the statements of Osama Bin Laden</source>
,
<publisher-name>Verso</publisher-name>
,
<publisher-loc>London; New York</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref322">
<mixed-citation publication-type="book">
<string-name>
<surname>Leighton</surname>
,
<given-names>S.R.</given-names>
</string-name>
<year>2003</year>
,
<source>Philosophy and the emotions: a reader</source>
,
<publisher-name>Broadview Press</publisher-name>
,
<publisher-loc>Peterborough, Ont</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref323">
<mixed-citation publication-type="journal">
<string-name>
<surname>Leitenberg</surname>
,
<given-names>M.</given-names>
</string-name>
<year>2003</year>
, ‘
<article-title>Distinguishing Offensive From Defensive Biological Weapons Research</article-title>
’,
<source>Critical Reviews in Microbiology</source>
, vol.
<volume>29</volume>
, no.
<issue>3</issue>
, pp.
<fpage>223</fpage>
<lpage>57</lpage>
.</mixed-citation>
</ref>
<ref id="ref324">
<mixed-citation publication-type="other">
<string-name>
<surname>Leitzau</surname>
,
<given-names>W.</given-names>
</string-name>
<year>2005</year>
, ‘
<article-title>Combating Terrorism: The Consequences of Moving from Law Enforcement to War</article-title>
’, in
<string-name>
<given-names>D.</given-names>
<surname>Wippman</surname>
</string-name>
and
<string-name>
<given-names>M.</given-names>
<surname>Evangelista</surname>
</string-name>
(eds),
<source>New wars, new laws?:
<xref id="page_213" ref-type="page"></xref>
applying the laws of war in 21st century conflicts, Transnational Publishers, Ardley</source>
,
<publisher-loc>NY</publisher-loc>
, pp.
<fpage>31</fpage>
<lpage>52</lpage>
.</mixed-citation>
</ref>
<ref id="ref325">
<mixed-citation publication-type="journal">
<collab>Letter</collab>
<year>2005</year>
, ‘
<article-title>An Open Letter to Elias Zerhouni (multiple authors)</article-title>
’,
<source>Science</source>
, vol.
<volume>307</volume>
, no.
<issue>5714</issue>
, pp.
<fpage>1409</fpage>
<lpage>10</lpage>
.</mixed-citation>
</ref>
<ref id="ref326">
<mixed-citation publication-type="journal">
<string-name>
<surname>Levi</surname>
,
<given-names>M.</given-names>
</string-name>
and
<string-name>
<surname>Gilmore</surname>
,
<given-names>W.C.</given-names>
</string-name>
<year>2002</year>
, ‘
<article-title>Terrorist Finance, Money Laundering and the Rise and Rise of Mutual Evaluation: A New Paradigm for Crime Control</article-title>
’,
<source>European Journal of Law Reform</source>
, vol.
<volume>4</volume>
, no.
<issue>2</issue>
, pp.
<fpage>337</fpage>
<lpage>64</lpage>
.</mixed-citation>
</ref>
<ref id="ref327">
<mixed-citation publication-type="book">
<string-name>
<surname>Levinas</surname>
,
<given-names>E.</given-names>
</string-name>
<year>1969</year>
,
<source>Totality and infinity: an essay on exteriority</source>
,
<publisher-name>Duquesne University Press</publisher-name>
The
<publisher-loc>Hague; M. Nijhoff, Pittsburgh, PA</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref328">
<mixed-citation publication-type="book">
<string-name>
<surname>Levinas</surname>
,
<given-names>E.</given-names>
</string-name>
<year>1987</year>
,
<source>Time and the other [and additional essays]</source>
,
<publisher-name>Duquesne University Press</publisher-name>
,
<publisher-loc>Pittsburgh, PA</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref329">
<mixed-citation publication-type="book">
<string-name>
<surname>Levinas</surname>
,
<given-names>E.</given-names>
</string-name>
<year>1996</year>
,
<chapter-title>‘Peace and Proximity’</chapter-title>
, in
<string-name>
<given-names>A.T.</given-names>
<surname>Peperzak</surname>
</string-name>
,
<string-name>
<given-names>S.</given-names>
<surname>Critchley</surname>
</string-name>
and
<string-name>
<given-names>R.</given-names>
<surname>Bernasconi</surname>
</string-name>
(eds),
<source>Emmanuel Levinas: basic philosophical writings</source>
,
<publisher-name>Indiana University Press</publisher-name>
,
<publisher-loc>Bloomington, IN</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref330">
<mixed-citation publication-type="journal">
<string-name>
<surname>Levinson</surname>
,
<given-names>S.</given-names>
</string-name>
<year>2006</year>
, ‘
<article-title>Preserving Constitutional Norms in Times of Permanent Emergencies</article-title>
’,
<source>Constellations</source>
, vol.
<volume>13</volume>
, no.
<issue>1</issue>
, pp.
<fpage>59</fpage>
<lpage>73</lpage>
.</mixed-citation>
</ref>
<ref id="ref331">
<mixed-citation publication-type="journal">
<string-name>
<surname>Lisle</surname>
,
<given-names>D.</given-names>
</string-name>
<year>2004</year>
, ‘
<article-title>Gazing at Ground Zero: Tourism, Voyeurism and Spectacle</article-title>
’,
<source>Journal for Cultural Research</source>
, vol.
<volume>8</volume>
, no.
<issue>1</issue>
, pp.
<fpage>3</fpage>
<lpage>21</lpage>
.</mixed-citation>
</ref>
<ref id="ref332">
<mixed-citation publication-type="journal">
<string-name>
<surname>Lowe</surname>
,
<given-names>V.</given-names>
</string-name>
<year>2003</year>
, ‘
<article-title>The Iraq Crisis: What Now?</article-title>
<source>International and Comparative Law Quarterly</source>
, vol.
<volume>52</volume>
, no.
<issue>4</issue>
, pp.
<fpage>859</fpage>
<lpage>71</lpage>
.</mixed-citation>
</ref>
<ref id="ref333">
<mixed-citation publication-type="book">
<string-name>
<surname>Luban</surname>
,
<given-names>D.</given-names>
</string-name>
<year>2005</year>
, ‘
<chapter-title>The War on Terrorism and the End of Human Rights</chapter-title>
’, in
<string-name>
<given-names>M.V.</given-names>
<surname>Tushnet</surname>
</string-name>
(ed.),
<source>The constitution in wartime: beyond alarmism and complacency</source>
,
<publisher-name>Duke University Press</publisher-name>
,
<publisher-loc>Durham, NC</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref334">
<mixed-citation publication-type="book">
<string-name>
<surname>Luban</surname>
,
<given-names>D.</given-names>
</string-name>
<year>2006</year>
, ‘
<chapter-title>Liberalism, Torture, and the Ticking Bomb</chapter-title>
’, in
<string-name>
<given-names>K.J.</given-names>
<surname>Greenberg</surname>
</string-name>
(ed.),
<source>The torture debate in America</source>
,
<publisher-name>Cambridge University Press</publisher-name>
,
<publisher-loc>Cambridge; New York</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref335">
<mixed-citation publication-type="journal">
<string-name>
<surname>Lucas</surname>
,
<given-names>G.R.</given-names>
</string-name>
<year>2003</year>
, ‘
<article-title>The Role of the “International Community” in Just War Tradition – Confronting the Challenges of Humanitarian Intervention and Preemptive War</article-title>
’,
<source>Journal of Military Ethics</source>
, vol.
<volume>2</volume>
, no.
<issue>2</issue>
, pp.
<fpage>122</fpage>
<lpage>44</lpage>
.</mixed-citation>
</ref>
<ref id="ref336">
<mixed-citation publication-type="journal">
<string-name>
<surname>Lukes</surname>
,
<given-names>S.</given-names>
</string-name>
<year>2005</year>
, ‘
<article-title>Liberal Democratic Torture</article-title>
’,
<source>British Journal of Political Science</source>
, vol.
<volume>36</volume>
, no.
<issue>1</issue>
, pp.
<fpage>1</fpage>
<lpage>16</lpage>
.</mixed-citation>
</ref>
<ref id="ref337">
<mixed-citation publication-type="book">
<string-name>
<surname>Lustgarten</surname>
,
<given-names>L.</given-names>
</string-name>
and
<string-name>
<surname>Leigh</surname>
,
<given-names>I.</given-names>
</string-name>
<year>1994</year>
,
<source>In from the cold: national security and parliamentary democracy</source>
,
<publisher-name>Clarendon Press</publisher-name>
,
<publisher-loc>Oxford</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref338">
<mixed-citation publication-type="book">
<string-name>
<surname>Lutz</surname>
,
<given-names>C.A.</given-names>
</string-name>
and
<string-name>
<surname>Abu-Lughod</surname>
,
<given-names>L.</given-names>
</string-name>
<year>1990</year>
,
<source>Language and the politics of emotion</source>
,
<publisher-name>Cambridge University Press</publisher-name>
,
<publisher-loc>Cambridge; Paris: Éditions de la maison des sciences de l’homme, New York</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref339">
<mixed-citation publication-type="book">
<string-name>
<surname>MacDonald</surname>
,
<given-names>H.</given-names>
</string-name>
<year>2006</year>
, ‘
<chapter-title>How to Interrogate Terrorists</chapter-title>
’, in
<string-name>
<given-names>K.J.</given-names>
<surname>Greenberg</surname>
</string-name>
(ed.),
<source>The torture debate in America</source>
,
<publisher-name>Cambridge University Press</publisher-name>
,
<publisher-loc>Cambridge; New York</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref340">
<mixed-citation publication-type="other">
<string-name>
<surname>McAlea</surname>
,
<given-names>D.</given-names>
</string-name>
<year>2005</year>
, ‘
<article-title>Post-Westphalian Crime</article-title>
’, in
<string-name>
<given-names>D.</given-names>
<surname>Wippman</surname>
</string-name>
and
<string-name>
<given-names>M.</given-names>
<surname>Evangelista</surname>
</string-name>
(eds),
<source>New wars, new laws: applying the laws of war in 21st century conflicts</source>
,
<publisher-name>Transnational Publishers</publisher-name>
,
<publisher-loc>Ardley, NY</publisher-loc>
, pp.
<fpage>111</fpage>
<lpage>34</lpage>
.</mixed-citation>
</ref>
<ref id="ref341">
<mixed-citation publication-type="book">
<string-name>
<surname>McClintock</surname>
,
<given-names>A.</given-names>
</string-name>
<year>1995</year>
,
<source>Imperial leather: race, gender, and sexuality in the colonial conquest</source>
,
<publisher-name>Routledge</publisher-name>
,
<publisher-loc>New York</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref342">
<mixed-citation publication-type="book">
<string-name>
<surname>McCormack</surname>
,
<given-names>T.L.H</given-names>
</string-name>
<year>1996</year>
,
<source>Self-defence in international law: the Israeli raid on the Iraqi nuclear reactor</source>
,
<publisher-name>St Martin’s Press</publisher-name>
,
<publisher-loc>Oxford</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref343">
<mixed-citation publication-type="journal">
<string-name>
<surname>McDougal</surname>
,
<given-names>M.S.</given-names>
</string-name>
<year>1963</year>
, ‘
<article-title>The Soviet-Cuban Quarantine and Self-Defence</article-title>
’,
<source>American Journal of International Law</source>
, vol.
<volume>57</volume>
, no.
<issue>2</issue>
, pp.
<fpage>597</fpage>
<lpage>604</lpage>
.</mixed-citation>
</ref>
<ref id="ref344">
<mixed-citation publication-type="book">
<string-name>
<surname>McDougal</surname>
,
<given-names>M.S.</given-names>
</string-name>
and
<string-name>
<surname>Feliciano</surname>
,
<given-names>F.P.</given-names>
</string-name>
<year>1961</year>
,
<source>Law and minimum world public order: the legal regulation of international coercion</source>
,
<publisher-name>Yale University Press</publisher-name>
,
<publisher-loc>New Haven, CT</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref345">
<mixed-citation publication-type="web">
<xref id="page_214" ref-type="page"></xref>
<string-name>
<surname>McKelvey</surname>
,
<given-names>T.</given-names>
</string-name>
<year>2005</year>
,
<source>A soldier’s tale: Lynndie England, Marie Claire</source>
, viewed
<date-in-citation>26 April 2007</date-in-citation>
<
<uri xlink:href="http://www.marieclaire.com/world/news/lynndie-england-1">http://www.marieclaire.com/world/news/lynndie-england-1</uri>
>.</mixed-citation>
</ref>
<ref id="ref346">
<mixed-citation publication-type="book">
<string-name>
<surname>Mackey</surname>
,
<given-names>C.</given-names>
</string-name>
<year>2004</year>
,
<source>The interrogator’s war: inside the secret war against Iraq</source>
,
<publisher-name>John Murray</publisher-name>
,
<publisher-loc>London</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref347">
<mixed-citation publication-type="other">
<string-name>
<surname>Mackinlay</surname>
,
<given-names>J.</given-names>
</string-name>
<year>2002</year>
, ‘
<article-title>Globalisation and Insurgency</article-title>
’,
<source>Adelphi Papers</source>
, vol.
<volume>352</volume>
,
<month>November</month>
, pp.
<fpage>5</fpage>
<lpage>116</lpage>
.</mixed-citation>
</ref>
<ref id="ref348">
<mixed-citation publication-type="journal">
<string-name>
<surname>McNally</surname>
,
<given-names>N.</given-names>
</string-name>
<year>2004</year>
, ‘
<article-title>Illegal Imprisonment at Guantanamo Bay</article-title>
’,
<source>Law Society Journal</source>
, vol.
<volume>42</volume>
, no.
<issue>3</issue>
, pp.
<fpage>78</fpage>
<lpage>82</lpage>
.</mixed-citation>
</ref>
<ref id="ref349">
<mixed-citation publication-type="other">
<string-name>
<surname>Marcus</surname>
,
<given-names>G.E.</given-names>
</string-name>
<year>2000</year>
, ‘
<article-title>Emotions in Politics</article-title>
’,
<source>Annual Review of Political Science</source>
, vol.
<volume>3</volume>
, pp.
<fpage>21</fpage>
<lpage>50</lpage>
.</mixed-citation>
</ref>
<ref id="ref350">
<mixed-citation publication-type="journal">
<string-name>
<surname>Marks</surname>
,
<given-names>S.</given-names>
</string-name>
<year>2006</year>
, ‘
<article-title>State-Centrism, International Law, and the Anxieties of Influence</article-title>
’,
<source>Leiden Journal of International Law</source>
, vol.
<volume>39</volume>
, no.
<issue>2</issue>
, pp.
<fpage>339</fpage>
<lpage>47</lpage>
.</mixed-citation>
</ref>
<ref id="ref351">
<mixed-citation publication-type="other">
<string-name>
<surname>Marqusee</surname>
,
<given-names>M.</given-names>
</string-name>
<year>2005</year>
, ‘
<article-title>A Name that Lives in Infamy: the Destruction of Falluja was an Act of Barbarism that Ranks Alongside My Lai, Guernica and Halabja</article-title>
’,
<source>Guardian</source>
,
<day>10</day>
<month>November</month>
, p.
<fpage>32</fpage>
.</mixed-citation>
</ref>
<ref id="ref352">
<mixed-citation publication-type="web">
<string-name>
<surname>Martyn</surname>
,
<given-names>A.</given-names>
</string-name>
<year>2005</year>
,
<source>Progress of the military trial of David Hicks</source>
, viewed
<date-in-citation>7 November 2006</date-in-citation>
<
<uri xlink:href="http://www.aph.gov.au/library/pubs/rn/2004-05/05rn33.htm">http://www.aph.gov.au/library/pubs/rn/2004-05/05rn33.htm</uri>
>.</mixed-citation>
</ref>
<ref id="ref353">
<mixed-citation publication-type="journal">
<string-name>
<surname>Matsumoto</surname>
,
<given-names>G.</given-names>
</string-name>
<year>2003</year>
, ‘
<article-title>Anthrax Powder: State of the Art?</article-title>
<source>Science</source>
, vol.
<volume>302</volume>
, no.
<issue>5650</issue>
, pp.
<fpage>1492</fpage>
<lpage>7</lpage>
.</mixed-citation>
</ref>
<ref id="ref354">
<mixed-citation publication-type="journal">
<string-name>
<surname>Mearsheimer</surname>
,
<given-names>J.J.</given-names>
</string-name>
<year>1990</year>
, ‘
<article-title>Why We Will Soon Miss the Cold War</article-title>
’,
<source>The Atlantic</source>
, vol.
<volume>266</volume>
, no.
<issue>2</issue>
, pp.
<fpage>35</fpage>
<lpage>50</lpage>
.</mixed-citation>
</ref>
<ref id="ref355">
<mixed-citation publication-type="journal">
<string-name>
<surname>Megret</surname>
,
<given-names>F.</given-names>
</string-name>
<year>2002</year>
, ‘
<article-title>’War”? Legal Semantics and the Move to Violence</article-title>
’,
<source>European Journal of International Law</source>
, vol.
<volume>13</volume>
, no.
<issue>2</issue>
, pp.
<fpage>361</fpage>
<lpage>99</lpage>
.</mixed-citation>
</ref>
<ref id="ref356">
<mixed-citation publication-type="other">
<string-name>
<surname>Menkhaus</surname>
,
<given-names>K.</given-names>
</string-name>
<year>2004</year>
, ‘
<article-title>Somalia: State Collapse and the Threat of Terrorism</article-title>
’,
<source>Adelphi Papers</source>
, vol.
<volume>364</volume>
, no. Mar, pp.
<fpage>7</fpage>
<lpage>92</lpage>
.</mixed-citation>
</ref>
<ref id="ref357">
<mixed-citation publication-type="book">
<string-name>
<surname>Menkhaus</surname>
,
<given-names>K.</given-names>
</string-name>
<year>2005</year>
, ‘
<chapter-title>Somalia and Somaliland</chapter-title>
’, in
<string-name>
<given-names>R.I.</given-names>
<surname>Rotberg</surname>
</string-name>
(ed.),
<source>Battling Terrorism in the Horn of Africa</source>
,
<publisher-name>Brookings Institution Press</publisher-name>
,
<publisher-loc>Washington, DC</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref358">
<mixed-citation publication-type="conf-proc">
<string-name>
<surname>Mercer</surname>
,
<given-names>J.</given-names>
</string-name>
<year>1996</year>
. ‘
<conf-name>Approaching Emotion in International Politics</conf-name>
’, paper presented and the
<source>International Studies Association Conference, San Diego, California</source>
,
<day>25</day>
<month>April</month>
.</mixed-citation>
</ref>
<ref id="ref359">
<mixed-citation publication-type="journal">
<string-name>
<surname>Mercer</surname>
,
<given-names>J.</given-names>
</string-name>
<year>2005</year>
, ‘
<article-title>Rationality and Psychology in International Politics</article-title>
’,
<source>International Organization</source>
, vol.
<volume>59</volume>
, no.
<issue>1</issue>
, pp.
<fpage>77</fpage>
<lpage>106</lpage>
.</mixed-citation>
</ref>
<ref id="ref360">
<mixed-citation publication-type="web">
<collab>Miami Herald</collab>
<year>2005</year>
,
<source>Timeline of legal and judicial events related to Guantanamo Bay</source>
, viewed
<date-in-citation>3 March 2006</date-in-citation>
<
<uri xlink:href="http://www.miami.com/mld/miamiherald/news/special_packages/archive/11276706.html">http://www.miami.com/mld/miamiherald/news/special_packages/archive/11276706.html</uri>
>.</mixed-citation>
</ref>
<ref id="ref361">
<mixed-citation publication-type="web">
<string-name>
<surname>Miles</surname>
,
<given-names>D.</given-names>
</string-name>
<year>2006</year>
,
<source>Bush Reacts to Supreme Court ruling on military tribunals</source>
, viewed
<date-in-citation>1 December 2006</date-in-citation>
<
<uri xlink:href="http://www.defenselink.mil/news/Jun2006/20060629_5543.html">http://www.defenselink.mil/news/Jun2006/20060629_5543.html</uri>
>.</mixed-citation>
</ref>
<ref id="ref362">
<mixed-citation publication-type="book">
<string-name>
<surname>Miles</surname>
,
<given-names>S.H.</given-names>
</string-name>
<year>2006</year>
,
<source>Oath betrayed: torture, medical complicity, and the war on terror</source>
,
<publisher-name>Random House</publisher-name>
,
<publisher-loc>New York</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref363">
<mixed-citation publication-type="web">
<string-name>
<surname>Miller</surname>
,
<given-names>J.</given-names>
</string-name>
<year>1998</year>
,
<source>To Terror’s Source</source>
, ABC news.com, viewed
<date-in-citation>6 March 2007</date-in-citation>
<
<uri xlink:href="http://www.freerepublic.com/focus/news/833647/posts">http://www.freerepublic.com/focus/news/833647/posts</uri>
>.</mixed-citation>
</ref>
<ref id="ref364">
<mixed-citation publication-type="other">
<string-name>
<surname>Miller</surname>
,
<given-names>J.</given-names>
</string-name>
<year>2003</year>
, ‘
<article-title>Scientist Files Suit Over Anthrax Inquiry</article-title>
’,
<source>New York Times</source>
,
<day>27</day>
<month>August</month>
, p.
<fpage>A13</fpage>
.</mixed-citation>
</ref>
<ref id="ref365">
<mixed-citation publication-type="other">
<string-name>
<surname>Miller</surname>
,
<given-names>J.</given-names>
</string-name>
,
<string-name>
<surname>Engelberg</surname>
,
<given-names>S.</given-names>
</string-name>
and
<string-name>
<surname>Broad</surname>
,
<given-names>W.</given-names>
</string-name>
<year>2001</year>
, ‘
<article-title>US Germ Warfare Research Pushes Treaty Limits</article-title>
’,
<source>New York Times</source>
,
<day>4</day>
<month>September</month>
, p.
<fpage>A1</fpage>
.</mixed-citation>
</ref>
<ref id="ref366">
<mixed-citation publication-type="journal">
<string-name>
<surname>Minca</surname>
,
<given-names>C.</given-names>
</string-name>
<year>2005</year>
, ‘
<article-title>The Return of the Camp</article-title>
’,
<source>Progress in Human Geography</source>
, vol.
<volume>29</volume>
, no.
<issue>4</issue>
, pp.
<fpage>405</fpage>
<lpage>12</lpage>
.</mixed-citation>
</ref>
<ref id="ref367">
<mixed-citation publication-type="journal">
<string-name>
<surname>Moïsi</surname>
,
<given-names>D.</given-names>
</string-name>
<year>2007</year>
, ‘
<article-title>The Clash of Emotions</article-title>
’,
<source>Foreign Affairs</source>
, vol.
<volume>86</volume>
, no.
<issue>1</issue>
, p.
<fpage>8</fpage>
.</mixed-citation>
</ref>
<ref id="ref368">
<mixed-citation publication-type="web">
<xref id="page_215" ref-type="page"></xref>
<string-name>
<surname>Monbiot</surname>
,
<given-names>G.</given-names>
</string-name>
<year>2005</year>
, ‘
<article-title>Behind the Phosphorous Clouds are War Crimes within War Crimes</article-title>
’,
<source>Guardian</source>
, viewed
<date-in-citation>17 January 2006</date-in-citation>
<
<uri xlink:href="http://www.guardian.co.uk/Columnists/Column/0,5673,1647998,00.html">http://www.guardian.co.uk/Columnists/Column/0,5673,1647998,00.html</uri>
>.</mixed-citation>
</ref>
<ref id="ref369">
<mixed-citation publication-type="journal">
<string-name>
<surname>Montgomery</surname>
,
<given-names>A.H.</given-names>
</string-name>
<year>2005</year>
, ‘
<article-title>Ringing in Proliferation: How to Dismantle an Atomic Bomb Network</article-title>
’,
<source>International Security</source>
, vol.
<volume>30</volume>
, no.
<issue>2</issue>
, pp.
<fpage>153</fpage>
<lpage>87</lpage>
.</mixed-citation>
</ref>
<ref id="ref370">
<mixed-citation publication-type="book">
<string-name>
<surname>Morgenthau</surname>
,
<given-names>H.J.</given-names>
</string-name>
<year>1962</year>
, ‘
<chapter-title>The Escape From Power</chapter-title>
’, in
<string-name>
<given-names>H.J.</given-names>
<surname>Morgenthau</surname>
</string-name>
(ed.),
<source>The decline of democratic politics</source>
,
<publisher-name>University of Chicago</publisher-name>
,
<publisher-loc>Chicago, IL</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref371">
<mixed-citation publication-type="book">
<string-name>
<surname>Mori</surname>
,
<given-names>M.</given-names>
</string-name>
<year>2006</year>
,
<chapter-title>‘Lecture for the Australian Lawyers’</chapter-title>
, paper presented to
<collab>Australian Lawyers Alliance</collab>
,
<publisher-name>Brisbane Convention Centre</publisher-name>
,
<publisher-loc>Australia</publisher-loc>
,
<day>3</day>
<month>November</month>
.</mixed-citation>
</ref>
<ref id="ref372">
<mixed-citation publication-type="book">
<string-name>
<surname>Morris</surname>
,
<given-names>D.B.</given-names>
</string-name>
<year>1993</year>
,
<source>The culture of pain</source>
,
<publisher-name>University of California Press</publisher-name>
,
<publisher-loc>Berkeley, CA</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref373">
<mixed-citation publication-type="journal">
<string-name>
<surname>Mueller</surname>
,
<given-names>J.</given-names>
</string-name>
<year>2004</year>
, ‘
<article-title>A False Sense of Insecurity</article-title>
’,
<source>Regulation</source>
, vol.
<volume>27</volume>
, no.
<issue>3</issue>
, pp.
<fpage>42</fpage>
<lpage>6</lpage>
.</mixed-citation>
</ref>
<ref id="ref374">
<mixed-citation publication-type="book">
<string-name>
<surname>Muggleton</surname>
,
<given-names>P.</given-names>
</string-name>
<year>2006</year>
,
<source>Certain legal and ethical aspects of contemporary ADF operations, Command Papers</source>
,
<chapter-title>Centre for Defence Leadership Studies</chapter-title>
,
<publisher-name>Australian Defence College</publisher-name>
,
<publisher-loc>Canberra</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref375">
<mixed-citation publication-type="book">
<string-name>
<surname>Mullerson</surname>
,
<given-names>R.</given-names>
</string-name>
<year>1991</year>
,
<chapter-title>‘Self-defense in the contemporary world’</chapter-title>
, in
<string-name>
<given-names>D.J.</given-names>
<surname>Scheffer</surname>
</string-name>
and
<string-name>
<given-names>L.F.</given-names>
<surname>Damrosch</surname>
</string-name>
(eds),
<source>Law and force in the new international order</source>
,
<publisher-name>Westview Press</publisher-name>
,
<publisher-loc>Boulder, CO</publisher-loc>
, pp.
<fpage>13</fpage>
<lpage>15</lpage>
.</mixed-citation>
</ref>
<ref id="ref376">
<mixed-citation publication-type="journal">
<string-name>
<surname>Myjer</surname>
,
<given-names>E.P.J.</given-names>
</string-name>
and
<string-name>
<surname>White</surname>
,
<given-names>N.D.</given-names>
</string-name>
<year>2002</year>
, ‘
<article-title>The Twin Tower Attack: An Unlimited Right to Self-Defence</article-title>
’,
<source>Journal of Conflict and Security Law</source>
, vol.
<volume>7</volume>
, no.
<issue>1</issue>
, pp.
<fpage>5</fpage>
<lpage>17</lpage>
.</mixed-citation>
</ref>
<ref id="ref377">
<mixed-citation publication-type="book">
<collab>NAS</collab>
<year>2004</year>
,
<source>Biotechnology research in the age of terrorism</source>
,
<publisher-name>National Academy of Sciences</publisher-name>
,
<publisher-loc>Washington, DC</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref378">
<mixed-citation publication-type="journal">
<string-name>
<surname>Nash</surname>
,
<given-names>K.</given-names>
</string-name>
<year>2003</year>
, ‘
<article-title>Cosmopolitan Political Community: Why Does It Feel So Right?</article-title>
<source>Constellations</source>
, vol.
<volume>10</volume>
, no.
<issue>4</issue>
, pp.
<fpage>506</fpage>
<lpage>18</lpage>
.</mixed-citation>
</ref>
<ref id="ref379">
<mixed-citation publication-type="other">
<collab>National Commission on Terrorist Attacks Upon the United States 2004</collab>
,
<source>9/11 investigations</source>
,
<collab>National Commission on Terrorist Attacks Upon the United States (9-11 Commission)</collab>
,
<publisher-loc>New York</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref380">
<mixed-citation publication-type="web">
<collab>National Security Council (NSC)</collab>
<year>2002</year>
,
<source>National security strategy of the United States of America</source>
, viewed
<date-in-citation>20 February 2007</date-in-citation>
<
<uri xlink:href="http://www.whitehouse.gov/nsc/nss/2002/nss.pdf">http://www.whitehouse.gov/nsc/nss/2002/nss.pdf</uri>
>.</mixed-citation>
</ref>
<ref id="ref381">
<mixed-citation publication-type="book">
<collab>National Security Council (NSC)</collab>
<year>2003</year>
,
<source>National strategy for combating terrorism</source>
,
<publisher-name>The White House</publisher-name>
,
<publisher-loc>Washington. DC</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref382">
<mixed-citation publication-type="web">
<collab>National Security Council (NSC)</collab>
<year>2006</year>
a,
<source>National security strategy of the United States of America</source>
, viewed
<date-in-citation>20 February 2007</date-in-citation>
<
<uri xlink:href="http://www.whitehouse.gov/nsc/nss/2006/nss2006.pdf">http://www.whitehouse.gov/nsc/nss/2006/nss2006.pdf</uri>
>.</mixed-citation>
</ref>
<ref id="ref383">
<mixed-citation publication-type="book">
<collab>National Security Council (NSC)</collab>
<year>2006</year>
b,
<source>National strategy for combating terrorism</source>
,
<publisher-name>The White House</publisher-name>
,
<publisher-loc>Washington, DC</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref384">
<mixed-citation publication-type="book">
<string-name>
<surname>Naylor</surname>
,
<given-names>R.T.</given-names>
</string-name>
<year>2004</year>
,
<source>Wages of crime: black markets, illegal finance and the underworld economy</source>
, revised edn,
<publisher-name>Cornell University Press</publisher-name>
,
<publisher-loc>Ithaca,NY</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref385">
<mixed-citation publication-type="book">
<string-name>
<surname>Neiman</surname>
,
<given-names>S.</given-names>
</string-name>
<year>2003</year>
,
<source>Evil in modern thought: an alternative history of philosophy</source>
,
<publisher-name>Scribe Publications</publisher-name>
,
<publisher-loc>Melbourne</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref386">
<mixed-citation publication-type="journal">
<string-name>
<surname>Nelson</surname>
,
<given-names>R.</given-names>
</string-name>
<year>2004</year>
, ‘
<article-title>Biosafety Laboratories Proliferate Across the USA</article-title>
’,
<source>The Lancet Infectious Diseases</source>
, vol.
<volume>4</volume>
, no.
<issue>10</issue>
, p.
<fpage>596</fpage>
.</mixed-citation>
</ref>
<ref id="ref387">
<mixed-citation publication-type="journal">
<string-name>
<surname>Neocleous</surname>
,
<given-names>M.</given-names>
</string-name>
<year>2006</year>
, ‘
<article-title>The Problem with Normality: Taking Exception to “Permanent Emergency”</article-title>
’,
<source>Alternatives</source>
, vol.
<volume>31</volume>
, no.
<issue>2</issue>
, pp.
<fpage>191</fpage>
<lpage>213</lpage>
.</mixed-citation>
</ref>
<ref id="ref388">
<mixed-citation publication-type="other">
<string-name>
<surname>Netanyahu</surname>
,
<given-names>B.</given-names>
</string-name>
<year>2002</year>
, ‘
<article-title>How Terror Feeds on Hope</article-title>
’,
<source>The Age</source>
.</mixed-citation>
</ref>
<ref id="ref389">
<mixed-citation publication-type="journal">
<string-name>
<surname>Newman</surname>
,
<given-names>E.</given-names>
</string-name>
<year>2004</year>
, ‘
<article-title>The “New Wars” Debate: A Historical Perspective Is Needed</article-title>
’,
<source>Security Dialogue</source>
, vol.
<volume>35</volume>
, no.
<issue>2</issue>
, pp.
<fpage>173</fpage>
<lpage>89</lpage>
.</mixed-citation>
</ref>
<ref id="ref390">
<mixed-citation publication-type="other">
<string-name>
<surname>Newton</surname>
,
<given-names>M.</given-names>
</string-name>
<year>2005</year>
, ‘
<article-title>Unlawful Belligerency After September 11: History Revisited and Law Revised</article-title>
’, in
<string-name>
<given-names>D.</given-names>
<surname>Wippman</surname>
</string-name>
and
<string-name>
<given-names>M.</given-names>
<surname>Evangelista</surname>
</string-name>
(eds),
<source>New wars, new laws?: applying
<xref id="page_216" ref-type="page"></xref>
the laws of war in 21st century conflicts</source>
,
<publisher-name>Transnational Publishers</publisher-name>
,
<publisher-loc>Ardley, NY</publisher-loc>
, pp.
<fpage>75</fpage>
<lpage>110</lpage>
.</mixed-citation>
</ref>
<ref id="ref391">
<mixed-citation publication-type="web">
<collab>NIH</collab>
<year>2003</year>
,
<source>NIAID funds construction of biosafety laboratories, National Institutes of Health</source>
Online, viewed
<date-in-citation>10 May 2005</date-in-citation>
<
<uri xlink:href="http://www2.niaid.nih.gov/newsroom/releases/nblscorrect21.htm">http://www2.niaid.nih.gov/newsroom/releases/nblscorrect21.htm</uri>
>.</mixed-citation>
</ref>
<ref id="ref392">
<mixed-citation publication-type="web">
<collab>NIH</collab>
<year>2005</year>
,
<source>NIAID awards first $27 million using new bioshield authorities, National Institutes of Health</source>
Online, viewed
<date-in-citation>9 June 2005</date-in-citation>
<
<uri xlink:href="http://www.nih.gov/news/pr/may2005/niaid–09.htm">http://www.nih.gov/news/pr/may2005/niaid–09.htm</uri>
>.</mixed-citation>
</ref>
<ref id="ref393">
<mixed-citation publication-type="book">
<string-name>
<surname>Nussbaum</surname>
,
<given-names>M.C.</given-names>
</string-name>
<year>1990</year>
,
<source>Love’s knowledge: essays on philosophy and literature</source>
,
<publisher-name>Oxford University Press</publisher-name>
,
<publisher-loc>New York</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref394">
<mixed-citation publication-type="book">
<string-name>
<surname>Nussbaum</surname>
,
<given-names>M.C.</given-names>
</string-name>
<year>1995</year>
a, ‘
<chapter-title>Rational Emotions</chapter-title>
’, in
<string-name>
<given-names>M.C.</given-names>
<surname>Nussbaum</surname>
</string-name>
(ed.),
<source>Poetic justice: the literary imagination and public life</source>
,
<publisher-name>Beacon Press</publisher-name>
,
<publisher-loc>Boston</publisher-loc>
, MA, pp.
<fpage>53</fpage>
<lpage>78</lpage>
.</mixed-citation>
</ref>
<ref id="ref395">
<mixed-citation publication-type="book">
<string-name>
<surname>Nussbaum</surname>
,
<given-names>M.C.</given-names>
</string-name>
<year>1995</year>
b,
<chapter-title>‘Emotions and Women’s Capabilities’</chapter-title>
, in
<string-name>
<given-names>M.C.</given-names>
<surname>Nussbaum</surname>
</string-name>
and
<string-name>
<given-names>J.</given-names>
<surname>Glover</surname>
</string-name>
(eds),
<source>Women, culture, and development: a study of human capabilities</source>
,
<publisher-name>Oxford University Press</publisher-name>
,
<publisher-loc>New York</publisher-loc>
, pp.
<fpage>360</fpage>
<lpage>95</lpage>
.</mixed-citation>
</ref>
<ref id="ref396">
<mixed-citation publication-type="book">
<string-name>
<surname>Nussbaum</surname>
,
<given-names>M.C.</given-names>
</string-name>
<year>2001</year>
,
<source>Upheavals of thought: the intelligence of emotions</source>
,
<publisher-name>Cambridge University Press</publisher-name>
,
<publisher-loc>Cambridge</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref397">
<mixed-citation publication-type="book">
<string-name>
<surname>Ober</surname>
,
<given-names>J.</given-names>
</string-name>
<year>1994</year>
,
<chapter-title>‘Classical Greek Times’</chapter-title>
, in
<string-name>
<given-names>M.E.</given-names>
<surname>Howard</surname>
</string-name>
,
<string-name>
<given-names>G.J.</given-names>
<surname>Andreopoulos</surname>
</string-name>
and
<string-name>
<given-names>M.R.</given-names>
<surname>Shulman</surname>
</string-name>
(eds),
<source>The laws of war: constraints on warfare in the Western world</source>
,
<publisher-name>Yale University Press</publisher-name>
,
<publisher-loc>New Haven, CT</publisher-loc>
, pp.
<fpage>12</fpage>
<lpage>26</lpage>
.</mixed-citation>
</ref>
<ref id="ref398">
<mixed-citation publication-type="book">
<string-name>
<surname>O’Brien</surname>
,
<given-names>W.V.</given-names>
</string-name>
<year>1981</year>
,
<source>The conduct of just and limited wars</source>
,
<publisher-name>Praeger</publisher-name>
,
<publisher-loc>New York</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref399">
<mixed-citation publication-type="book">
<string-name>
<surname>O’Donovan</surname>
,
<given-names>O.</given-names>
</string-name>
<year>2003</year>
,
<source>The just war revisited</source>
,
<publisher-name>Cambridge University Press</publisher-name>
,
<publisher-loc>Cambridge</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref400">
<mixed-citation publication-type="journal">
<string-name>
<surname>O’Driscoll</surname>
,
<given-names>C.</given-names>
</string-name>
<year>2006</year>
, ‘
<article-title>Re-negotiating the Just War: The Invasion of Iraq and Punitive War</article-title>
’,
<source>Cambridge Review of International Affairs</source>
, vol.
<volume>19</volume>
, no.
<issue>3</issue>
, pp.
<fpage>405</fpage>
<lpage>20</lpage>
.</mixed-citation>
</ref>
<ref id="ref401">
<mixed-citation publication-type="book">
<collab>Office of Force Transformation</collab>
<year>2003</year>
,
<source>Military transformation: a strategic approach</source>
,
<publisher-name>Office of the Secretary of Defense</publisher-name>
,
<publisher-loc>Washington, DC</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref402">
<mixed-citation publication-type="web">
<string-name>
<surname>O’Malley</surname>
,
<given-names>S.</given-names>
</string-name>
<year>2006</year>
,
<source>Bush promises trial for Hicks</source>
, viewed
<date-in-citation>1 December 2006</date-in-citation>
<
<uri xlink:href="http://www.news.com.au/story/0,10117,20774567-1702,00.html?from=public_rss">http://www.news.com.au/story/0,10117,20774567-1702,00.html?from=public_rss</uri>
>.</mixed-citation>
</ref>
<ref id="ref403">
<mixed-citation publication-type="web">
<string-name>
<surname>Online</surname>
,
<given-names>B.N.</given-names>
</string-name>
<year>2001</year>
,
<source>Cherie Blair attacks Taliban cruelty</source>
, BBC News,
<day>19</day>
<month>November</month>
, viewed
<date-in-citation>26 April 2007</date-in-citation>
<
<uri xlink:href="http://news.bbc.co.uk/2/hi/uk_news/politics/1663300.stm">http://news.bbc.co.uk/2/hi/uk_news/politics/1663300.stm</uri>
>.</mixed-citation>
</ref>
<ref id="ref404">
<mixed-citation publication-type="book">
<string-name>
<surname>Osgood</surname>
,
<given-names>R.E.</given-names>
</string-name>
<year>1957</year>
,
<source>Limited war: the challenge to American strategy</source>
,
<publisher-name>University of Chicago Press</publisher-name>
,
<publisher-loc>Chicago, IL</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref405">
<mixed-citation publication-type="book">
<string-name>
<surname>Osgood</surname>
,
<given-names>R.E.</given-names>
</string-name>
<year>1979</year>
,
<source>Limited war revisited</source>
,
<publisher-name>Westview Press</publisher-name>
,
<publisher-loc>Boulder, CO</publisher-loc>
.
<string-name>
<surname>Osgood</surname>
,
<given-names>R.E.</given-names>
</string-name>
and
<string-name>
<surname>Tucker</surname>
,
<given-names>R.W.</given-names>
</string-name>
<year>1967</year>
,
<source>Force, order and justice</source>
,
<publisher-name>Johns Hopkins University Press</publisher-name>
,
<publisher-loc>Baltimore, MD</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref406">
<mixed-citation publication-type="web">
<string-name>
<surname>Pantesco</surname>
,
<given-names>J.</given-names>
</string-name>
<year>2006</year>
,
<source>Australia repeats intent to seek Hicks return if charges not laid soon</source>
, viewed
<date-in-citation>14 November 2006</date-in-citation>
<
<uri xlink:href="http://jurist.law.pitt.edu/paperchase/2006/11/australiarepeats-intent-to-seek-hicks.php">http://jurist.law.pitt.edu/paperchase/2006/11/australiarepeats-intent-to-seek-hicks.php</uri>
>.</mixed-citation>
</ref>
<ref id="ref407">
<mixed-citation publication-type="journal">
<string-name>
<surname>Paskins</surname>
,
<given-names>B.</given-names>
</string-name>
<year>1976</year>
, ‘
<article-title>What’s Wrong with Torture?</article-title>
<source>British Journal of International Studies</source>
, vol.
<volume>2</volume>
, no.
<issue>2</issue>
, p.
<fpage>141</fpage>
.</mixed-citation>
</ref>
<ref id="ref408">
<mixed-citation publication-type="journal">
<string-name>
<surname>Patrick</surname>
,
<given-names>S.</given-names>
</string-name>
<year>2006</year>
, ‘
<article-title>Weak States and Global Threats: Fact or Fiction?</article-title>
<source>Washington Quarterly</source>
, vol.
<volume>29</volume>
, no.
<issue>2</issue>
, pp.
<fpage>27</fpage>
<lpage>53</lpage>
.</mixed-citation>
</ref>
<ref id="ref409">
<mixed-citation publication-type="other">
<collab>PBS</collab>
<year>2001</year>
,
<source>Looking for Answers</source>
,
<day>9</day>
<month>October</month>
.</mixed-citation>
</ref>
<ref id="ref410">
<mixed-citation publication-type="journal">
<string-name>
<surname>Perry</surname>
,
<given-names>D.L.</given-names>
</string-name>
<year>1995</year>
, ‘
<article-title>“Repugnant Philosophy”: Ethics, Espionage, and Covert Action</article-title>
’,
<source>Journal of Conflict Studies</source>
, vol.
<volume>15</volume>
, no.
<issue>1</issue>
, pp.
<fpage>92</fpage>
<lpage>115</lpage>
.</mixed-citation>
</ref>
<ref id="ref411">
<mixed-citation publication-type="journal">
<string-name>
<surname>Pettman</surname>
,
<given-names>J.J.</given-names>
</string-name>
<year>2004</year>
, ‘
<article-title>Feminist International Relations after 9/11</article-title>
’,
<source>Brown Journal of World Affairs</source>
, vol.
<volume>10</volume>
, no.
<issue>2</issue>
, pp.
<fpage>85</fpage>
<lpage>96</lpage>
.</mixed-citation>
</ref>
<ref id="ref412">
<mixed-citation publication-type="web">
<xref id="page_217" ref-type="page"></xref>
<collab>Pew Forum on Religion and Public Life</collab>
<year>2002</year>
,
<source>Just war tradition and the new war on terrorism</source>
, viewed
<date-in-citation>27 February 2007</date-in-citation>
<
<uri xlink:href="http://pewforum.org/events/print.php?EventID=15">http://pewforum.org/events/print.php?EventID=15</uri>
>.</mixed-citation>
</ref>
<ref id="ref413">
<mixed-citation publication-type="journal">
<string-name>
<surname>Pfaff</surname>
,
<given-names>T.</given-names>
</string-name>
and
<string-name>
<surname>Tiel</surname>
,
<given-names>J.R.</given-names>
</string-name>
<year>2004</year>
, ‘
<article-title>The Ethics of Espionage</article-title>
’,
<source>Journal of Military Ethics</source>
, vol.
<volume>3</volume>
, no.
<issue>1</issue>
, pp.
<fpage>6</fpage>
<lpage>10</lpage>
.</mixed-citation>
</ref>
<ref id="ref414">
<mixed-citation publication-type="web">
<string-name>
<surname>Philp</surname>
,
<given-names>C.</given-names>
</string-name>
<year>2005</year>
,
<source>Iraq’s women of power who tolerate wife-beating and promote polygamy</source>
,
<publisher-name>TimesOnline</publisher-name>
,
<day>31</day>
<month>March</month>
, viewed
<date-in-citation>26 April 2007</date-in-citation>
<
<uri xlink:href="http://www.timesonline.co.uk/tol/news/world/iraq/article440798.ece">http://www.timesonline.co.uk/tol/news/world/iraq/article440798.ece</uri>
>.</mixed-citation>
</ref>
<ref id="ref415">
<mixed-citation publication-type="journal">
<string-name>
<surname>Pieth</surname>
,
<given-names>M.</given-names>
</string-name>
<year>2002</year>
, ‘
<article-title>Financing of Terrorism: Following the Money</article-title>
’,
<source>European Journal of Law Reform</source>
, vol.
<volume>4</volume>
, no.
<issue>2</issue>
, pp.
<fpage>365</fpage>
<lpage>76</lpage>
.</mixed-citation>
</ref>
<ref id="ref416">
<mixed-citation publication-type="journal">
<string-name>
<surname>Pillar</surname>
,
<given-names>P.R.</given-names>
</string-name>
<year>2006</year>
, ‘
<article-title>Intelligence, Policy, and the War in Iraq</article-title>
’,
<source>Foreign Affairs</source>
, vol.
<volume>85</volume>
, no.
<issue>2</issue>
, pp.
<fpage>15</fpage>
<lpage>28</lpage>
.</mixed-citation>
</ref>
<ref id="ref417">
<mixed-citation publication-type="web">
<collab>Port Villa Presse</collab>
<year>2004</year>
,
<source>Pacific a soft terror target: US</source>
, viewed
<date-in-citation>20 February 2007</date-in-citation>
<
<uri xlink:href="http://www.news.vu/en/news/RegionalNews/pacific-a-soft-terror-tar.shtml">http://www.news.vu/en/news/RegionalNews/pacific-a-soft-terror-tar.shtml</uri>
>.</mixed-citation>
</ref>
<ref id="ref418">
<mixed-citation publication-type="journal">
<string-name>
<surname>Preston</surname>
,
<given-names>E.</given-names>
</string-name>
<year>2002</year>
, ‘
<article-title>The USA Patriot Act: New Adventures in American Extraterritoriality</article-title>
’,
<source>Journal of Financial Crime</source>
, vol.
<volume>10</volume>
, no.
<issue>2</issue>
, pp.
<fpage>104</fpage>
<lpage>16</lpage>
.</mixed-citation>
</ref>
<ref id="ref419">
<mixed-citation publication-type="book">
<string-name>
<surname>Pufendorf</surname>
,
<given-names>S.</given-names>
</string-name>
<year>1994</year>
, ‘
<chapter-title>On the Law of War</chapter-title>
’, in
<string-name>
<given-names>C.L.</given-names>
<surname>Carr</surname>
</string-name>
(ed.),
<source>The political writings of Samuel Pufendorf</source>
,
<publisher-name>Oxford University Press</publisher-name>
,
<publisher-loc>Oxford</publisher-loc>
, p.
<fpage>285</fpage>
.</mixed-citation>
</ref>
<ref id="ref420">
<mixed-citation publication-type="journal">
<string-name>
<surname>Quirk</surname>
,
<given-names>M.</given-names>
</string-name>
<year>2004</year>
, ‘
<article-title>Boost to US National Security With Signing of Bioshield</article-title>
’,
<source>The Lancet Infectious Diseases</source>
, vol.
<volume>4</volume>
, no.
<issue>9</issue>
, p.
<fpage>540</fpage>
.</mixed-citation>
</ref>
<ref id="ref421">
<mixed-citation publication-type="journal">
<string-name>
<surname>Read</surname>
,
<given-names>T.D.</given-names>
</string-name>
,
<string-name>
<surname>Salzberg</surname>
,
<given-names>S.L.</given-names>
</string-name>
,
<string-name>
<surname>Pop</surname>
,
<given-names>M.</given-names>
</string-name>
,
<string-name>
<surname>Shumway</surname>
,
<given-names>M.</given-names>
</string-name>
,
<string-name>
<surname>Umayam</surname>
,
<given-names>L.</given-names>
</string-name>
,
<string-name>
<surname>Jiang</surname>
,
<given-names>L.</given-names>
</string-name>
,
<string-name>
<surname>Holtzapple</surname>
,
<given-names>E.</given-names>
</string-name>
,
<string-name>
<surname>Busch</surname>
,
<given-names>J.D.</given-names>
</string-name>
,
<string-name>
<surname>Smith</surname>
,
<given-names>K.L.</given-names>
</string-name>
,
<string-name>
<surname>Schupp</surname>
,
<given-names>J.M.</given-names>
</string-name>
,
<string-name>
<surname>Solomon</surname>
,
<given-names>D.</given-names>
</string-name>
,
<string-name>
<surname>Keim</surname>
,
<given-names>P.</given-names>
</string-name>
and
<string-name>
<surname>Fraser</surname>
,
<given-names>C.M.</given-names>
</string-name>
<year>2002</year>
, ‘
<article-title>Comparative Genome Sequencing for Discovery of novel Polymorphisms in Bacillus Anthracis</article-title>
’,
<source>Science</source>
, vol.
<volume>296</volume>
, no.
<issue>5575</issue>
, pp.
<fpage>2028</fpage>
<lpage>33</lpage>
.</mixed-citation>
</ref>
<ref id="ref422">
<mixed-citation publication-type="book">
<string-name>
<surname>Record</surname>
,
<given-names>J.</given-names>
</string-name>
<year>2003</year>
,
<source>Bounding the war on terrorism</source>
,
<publisher-name>US Army War College Strategic Studies Institute</publisher-name>
,
<publisher-loc>Carlisle, PA</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref423">
<mixed-citation publication-type="book">
<string-name>
<surname>Reinhart</surname>
,
<given-names>T.</given-names>
</string-name>
<year>2006</year>
,
<source>Road map to nowhere</source>
,
<publisher-name>Verso</publisher-name>
,
<publisher-loc>London; New York</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref424">
<mixed-citation publication-type="journal">
<string-name>
<surname>Rengger</surname>
,
<given-names>N.</given-names>
</string-name>
<year>2004</year>
, ‘
<article-title>Just a War against Terror? Jean Bethke Elshtain’s Burden and American Power</article-title>
’,
<source>International Affairs</source>
, vol.
<volume>80</volume>
, no.
<issue>1</issue>
, pp.
<fpage>107</fpage>
<lpage>16</lpage>
.</mixed-citation>
</ref>
<ref id="ref425">
<mixed-citation publication-type="book">
<string-name>
<surname>Rentoul</surname>
,
<given-names>J.</given-names>
</string-name>
<year>2001</year>
,
<source>Tony Blair: prime minister</source>
,
<publisher-name>Little, Brown</publisher-name>
, and
<publisher-loc>Company, London</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref426">
<mixed-citation publication-type="other">
<string-name>
<surname>Reus-Smit</surname>
,
<given-names>C.</given-names>
</string-name>
<year>2005</year>
, ‘
<article-title>Liberal Hierarchy and the Licence to Use Force</article-title>
’,
<source>Review of International Studies</source>
, vol.
<volume>31</volume>
, no. Special Issue, pp.
<fpage>71</fpage>
<lpage>92</lpage>
.</mixed-citation>
</ref>
<ref id="ref427">
<mixed-citation publication-type="book">
<string-name>
<surname>Reus-Smit</surname>
,
<given-names>C.</given-names>
</string-name>
<year>2005</year>
, ‘
<chapter-title>Constructivism</chapter-title>
’, in
<string-name>
<given-names>S.</given-names>
<surname>Burchill</surname>
</string-name>
(ed.),
<source>Theories of international relations</source>
,
<edition>3rd</edition>
edn,
<publisher-name>Palgrave Macmillan</publisher-name>
,
<publisher-loc>London</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref428">
<mixed-citation publication-type="journal">
<string-name>
<surname>Reveron</surname>
,
<given-names>D.S.</given-names>
</string-name>
<year>2006</year>
, ‘
<article-title>Old Allies, New Friends: Intelligence-Sharing in the War on Terror</article-title>
’,
<source>Orbis: a journal of world affairs</source>
, vol.
<volume>50</volume>
, no.
<issue>3</issue>
, pp.
<fpage>453</fpage>
<lpage>68</lpage>
.</mixed-citation>
</ref>
<ref id="ref429">
<mixed-citation publication-type="book">
<string-name>
<surname>Richardson</surname>
,
<given-names>L.</given-names>
</string-name>
<year>2006</year>
,
<source>What terrorists want: understanding the terrorist threat</source>
,
<publisher-name>John Murray</publisher-name>
,
<publisher-loc>London</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref430">
<mixed-citation publication-type="book">
<string-name>
<surname>Rider</surname>
,
<given-names>B.A.K.</given-names>
</string-name>
<year>2004</year>
, ‘
<chapter-title>Law: the War on Terror and Crime and the Offshore Centres: the “New” Perspective</chapter-title>
’, in
<string-name>
<given-names>D.</given-names>
<surname>Masciandaro</surname>
</string-name>
(ed.),
<source>Global financial crime: terrorism, money laundering, and off shore centres</source>
,
<publisher-name>Ashgate, Aldershot</publisher-name>
;
<publisher-loc>Burlington, VT</publisher-loc>
, pp.
<fpage>X</fpage>
,
<lpage>256</lpage>
.</mixed-citation>
</ref>
<ref id="ref431">
<mixed-citation publication-type="journal">
<string-name>
<surname>Roberts</surname>
,
<given-names>A.</given-names>
</string-name>
<year>2004</year>
, ‘
<article-title>Righting Wrongs or Wronging Rights? The United States and Human Rights Post-September 11</article-title>
’,
<source>European Journal of International Law</source>
, vol.
<volume>15</volume>
, no.
<issue>4</issue>
, pp.
<fpage>721</fpage>
<lpage>49</lpage>
.</mixed-citation>
</ref>
<ref id="ref432">
<mixed-citation publication-type="journal">
<string-name>
<surname>Roberts</surname>
,
<given-names>A.</given-names>
</string-name>
<year>2005</year>
, ‘
<article-title>The “War on Terror” in Historical Perspective</article-title>
’,
<source>Survival</source>
, vol.
<volume>47</volume>
, no.
<issue>2</issue>
, pp.
<fpage>101</fpage>
<lpage>30</lpage>
.</mixed-citation>
</ref>
<ref id="ref433">
<mixed-citation publication-type="journal">
<string-name>
<surname>Roberts</surname>
,
<given-names>G.</given-names>
</string-name>
<year>1999</year>
, ‘
<article-title>The Counterproliferation Self-Help Paradigm: A Legal Regime for Enforcing the Norm Prohibiting the Proliferation of Weapons of Mass Destruction</article-title>
’,
<source>Denver Journal of International Law and Policy</source>
, vol.
<volume>27</volume>
, no.
<issue>3</issue>
, pp.
<fpage>483</fpage>
<lpage>518</lpage>
.</mixed-citation>
</ref>
<ref id="ref434">
<mixed-citation publication-type="book">
<string-name>
<surname>Robin</surname>
,
<given-names>C.</given-names>
</string-name>
<year>2004</year>
,
<source>Fear: the history of a political idea</source>
,
<publisher-name>Oxford University Press</publisher-name>
,
<publisher-loc>Oxford</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref435">
<mixed-citation publication-type="book">
<string-name>
<surname>Rogers</surname>
,
<given-names>P.</given-names>
</string-name>
<year>2006</year>
,
<source>Iraq and the war on terror: twelve months of insurgency 2004/2005</source>
,
<publisher-name>I.B. Tauris</publisher-name>
,
<publisher-loc>London</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref436">
<mixed-citation publication-type="book">
<xref id="page_218" ref-type="page"></xref>
<string-name>
<surname>Rorty</surname>
,
<given-names>R.</given-names>
</string-name>
<year>1989</year>
,
<source>Contingency, irony, and solidarity</source>
,
<publisher-name>Cambridge University Press</publisher-name>
,
<publisher-loc>Cambridge; New York</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref437">
<mixed-citation publication-type="book">
<string-name>
<surname>Ross</surname>
,
<given-names>A.A.G.</given-names>
</string-name>
<year>2005</year>
,
<source>Affective states: rethinking passion in global politics</source>
,
<publisher-name>John Hopkins University Press</publisher-name>
,
<publisher-loc>PhD dissertation</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref438">
<mixed-citation publication-type="journal">
<string-name>
<surname>Ross</surname>
,
<given-names>A.A.G.</given-names>
</string-name>
<year>2006</year>
, ‘
<article-title>Coming in from the Cold: Constructivism and Emotions</article-title>
’,
<source>European Journal of International Relations</source>
, vol.
<volume>12</volume>
, no.
<issue>2</issue>
, pp.
<fpage>197</fpage>
<lpage>222</lpage>
.</mixed-citation>
</ref>
<ref id="ref439">
<mixed-citation publication-type="journal">
<string-name>
<surname>Ross</surname>
,
<given-names>K.</given-names>
</string-name>
<year>2003</year>
, ‘
<article-title>Globalization, Governance and Guns: Some Reflections on the South Pacific in the 1990s</article-title>
’,
<source>The Round Table</source>
, vol.
<volume>92</volume>
, no.
<issue>372</issue>
, pp.
<fpage>687</fpage>
<lpage>96</lpage>
.</mixed-citation>
</ref>
<ref id="ref440">
<mixed-citation publication-type="journal">
<string-name>
<surname>Rossiter</surname>
,
<given-names>CL</given-names>
</string-name>
<year>1949</year>
, ‘
<article-title>Constitutional Dictatorship in the Atomic Age</article-title>
’,
<source>The Review of Politics</source>
, vol.
<volume>11</volume>
, no.
<issue>4</issue>
, pp.
<fpage>395</fpage>
<lpage>418</lpage>
.</mixed-citation>
</ref>
<ref id="ref441">
<mixed-citation publication-type="journal">
<string-name>
<surname>Rotberg</surname>
,
<given-names>R.I.</given-names>
</string-name>
<year>2002</year>
, ‘
<article-title>Failed States in a World of Terror</article-title>
’,
<source>Foreign Affairs</source>
, vol.
<volume>81</volume>
, no.
<issue>4</issue>
, pp.
<fpage>127</fpage>
<lpage>40</lpage>
.</mixed-citation>
</ref>
<ref id="ref442">
<mixed-citation publication-type="web">
<string-name>
<surname>Rothwell</surname>
,
<given-names>D.</given-names>
</string-name>
<year>2006</year>
,
<source>David Hicks and the US military commissions process: next steps</source>
, viewed
<date-in-citation>7 November 2006</date-in-citation>
<
<uri xlink:href="http://jurist.law.pitt.edu/forumy/2006/10/david-hicks-andus-military.php">http://jurist.law.pitt.edu/forumy/2006/10/david-hicks-andus-military.php</uri>
>.</mixed-citation>
</ref>
<ref id="ref443">
<mixed-citation publication-type="web">
<string-name>
<surname>Rumsfeld</surname>
,
<given-names>D.</given-names>
</string-name>
<year>2001</year>
,
<source>Remarks at stakeout outside ABC TV studio</source>
,
<day>28</day>
<month>October</month>
, viewed
<date-in-citation>3 February 2005</date-in-citation>
<
<uri xlink:href="http://www.defenselink.mil/news/Oct2001/t10292001_t1028sd3.html">www.defenselink.mil/news/Oct2001/t10292001_t1028sd3.html</uri>
>.</mixed-citation>
</ref>
<ref id="ref444">
<mixed-citation publication-type="book">
<string-name>
<surname>Safran Foer</surname>
,
<given-names>J.</given-names>
</string-name>
<year>2005</year>
,
<source>Extremely loud and extremely close</source>
.
<publisher-loc>Boston, MA</publisher-loc>
:
<publisher-name>Houghton Mifflin Company</publisher-name>
.</mixed-citation>
</ref>
<ref id="ref445">
<mixed-citation publication-type="journal">
<string-name>
<surname>Sagan</surname>
,
<given-names>S.D.</given-names>
</string-name>
<year>2006</year>
, ‘
<article-title>How to Keep the Bomb From Iran</article-title>
’,
<source>Foreign Affairs</source>
, vol.
<volume>85</volume>
, no.
<issue>5</issue>
, pp.
<fpage>45</fpage>
<lpage>59</lpage>
.</mixed-citation>
</ref>
<ref id="ref446">
<mixed-citation publication-type="book">
<string-name>
<surname>Sageman</surname>
,
<given-names>M.</given-names>
</string-name>
<year>2004</year>
,
<source>Understanding terror networks</source>
,
<publisher-name>University of Pennsylvania Press</publisher-name>
,
<publisher-loc>Philadelphia</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref447">
<mixed-citation publication-type="book">
<string-name>
<surname>Sartre</surname>
,
<given-names>J.-P.</given-names>
</string-name>
<year>2002</year>
,
<source>Sketch for a theory of the emotions</source>
,
<publisher-name>Routledge</publisher-name>
,
<publisher-loc>London</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref448">
<mixed-citation publication-type="journal">
<string-name>
<surname>Saurette</surname>
,
<given-names>P.</given-names>
</string-name>
<year>2006</year>
, ‘
<article-title>You Dissin Me? Humiliation and Post 9/11 Global Politics</article-title>
’,
<source>Review of International Studies</source>
, vol.
<volume>32</volume>
, no.
<issue>3</issue>
, pp.
<fpage>495</fpage>
<lpage>522</lpage>
.</mixed-citation>
</ref>
<ref id="ref449">
<mixed-citation publication-type="book">
<string-name>
<surname>Scarry</surname>
,
<given-names>E.</given-names>
</string-name>
<year>1985</year>
,
<source>The body in pain: the making and unmaking of the world</source>
,
<publisher-name>Oxford University Press</publisher-name>
,
<publisher-loc>New York</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref450">
<mixed-citation publication-type="book">
<string-name>
<surname>Schaap</surname>
,
<given-names>Andrew.</given-names>
</string-name>
<year>2005</year>
.
<source>Political reconciliation</source>
.
<publisher-loc>London</publisher-loc>
:
<publisher-name>Routledge</publisher-name>
.</mixed-citation>
</ref>
<ref id="ref451">
<mixed-citation publication-type="book">
<string-name>
<surname>Scheff</surname>
,
<given-names>T.J.</given-names>
</string-name>
<year>1994</year>
a, ‘
<chapter-title>Emotions and Identity: A Theory of Ethnic Nationalism</chapter-title>
’, in
<string-name>
<given-names>C.J.</given-names>
<surname>Calhoun</surname>
</string-name>
(ed.),
<source>Social theory and the politics of identity</source>
,
<publisher-name>Blackwell</publisher-name>
,
<publisher-loc>Oxford</publisher-loc>
, pp.
<fpage>277</fpage>
<lpage>303</lpage>
.</mixed-citation>
</ref>
<ref id="ref452">
<mixed-citation publication-type="book">
<string-name>
<surname>Scheff</surname>
,
<given-names>T.J.</given-names>
</string-name>
<year>1994</year>
b,
<source>Bloody revenge: emotions, nationalism and war</source>
,
<publisher-name>Westview Press</publisher-name>
,
<publisher-loc>Boulder, Colorado</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref453">
<mixed-citation publication-type="book">
<string-name>
<surname>Schelling</surname>
,
<given-names>T.C.</given-names>
</string-name>
and
<string-name>
<surname>Affairs</surname>
,
<given-names>HUCfI</given-names>
</string-name>
<year>1966</year>
,
<source>Arms and influence</source>
,
<publisher-name>Yale University Press</publisher-name>
,
<publisher-loc>New Haven, CT</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref454">
<mixed-citation publication-type="book">
<string-name>
<surname>Scheuerman</surname>
,
<given-names>W.E.</given-names>
</string-name>
<year>1994</year>
,
<source>Between the norm and exception: the Frankfurt School and the rule of law</source>
,
<publisher-name>MIT Press</publisher-name>
,
<publisher-loc>Cambridge, MA</publisher-loc>
</mixed-citation>
</ref>
<ref id="ref455">
<mixed-citation publication-type="journal">
<string-name>
<surname>Scheuerman</surname>
,
<given-names>W.E.</given-names>
</string-name>
<year>2006</year>
, ‘
<article-title>Carl Schmitt and the Road to Abu Ghraib</article-title>
’,
<source>Constellations</source>
, vol.
<volume>13</volume>
, no.
<issue>1</issue>
, pp.
<fpage>108</fpage>
<lpage>24</lpage>
.</mixed-citation>
</ref>
<ref id="ref456">
<mixed-citation publication-type="book">
<string-name>
<surname>Schmitt</surname>
,
<given-names>C.</given-names>
</string-name>
<year>1985</year>
,
<source>Political theology: four chpaters on the concept of sovereignty</source>
,
<publisher-name>MIT Press</publisher-name>
,
<publisher-loc>Cambridge, MA</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref457">
<mixed-citation publication-type="other">
<string-name>
<surname>Schmidt</surname>
,
<given-names>S.</given-names>
</string-name>
and
<string-name>
<surname>Leob</surname>
,
<given-names>V.</given-names>
</string-name>
<year>2003</year>
, ‘‘
<article-title>’She Was Fighting to the Death”; Details Emerging of W. Va. Soldier’s Capture and Rescue</article-title>
’,
<source>Washignton Post</source>
,
<day>3</day>
<month>April</month>
.</mixed-citation>
</ref>
<ref id="ref458">
<mixed-citation publication-type="book">
<string-name>
<surname>Schmidt</surname>
,
<given-names>S.</given-names>
</string-name>
and
<string-name>
<surname>Leob</surname>
,
<given-names>V.</given-names>
</string-name>
<year>1996</year>
,
<source>The concept of the political</source>
,
<publisher-name>University of Chicago Press</publisher-name>
,
<publisher-loc>Chicago, IL</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref459">
<mixed-citation publication-type="book">
<string-name>
<surname>Schwarzenberger</surname>
,
<given-names>G.</given-names>
</string-name>
<year>1955</year>
, ‘
<chapter-title>The Fundamental Principles of International Law</chapter-title>
’, in
<string-name>
<given-names>G.</given-names>
<surname>Schwarzenberger</surname>
</string-name>
(ed.),
<source>Recueil des Cours</source>
,
<string-name>
<given-names>A.W.</given-names>
<surname>Sijthoff</surname>
</string-name>
,
<publisher-loc>Leiden</publisher-loc>
, pp.
<fpage>195</fpage>
<lpage>383</lpage>
.</mixed-citation>
</ref>
<ref id="ref460">
<mixed-citation publication-type="journal">
<string-name>
<surname>Schwellenbach</surname>
,
<given-names>N.</given-names>
</string-name>
<year>2005</year>
, ‘
<article-title>Biodefense: a Plague of Researchers</article-title>
’,
<source>Bulletin of the Atomic Scientists</source>
, vol.
<volume>61</volume>
, no.
<issue>3</issue>
, pp.
<fpage>14</fpage>
<lpage>16</lpage>
.</mixed-citation>
</ref>
<ref id="ref461">
<mixed-citation publication-type="book">
<xref id="page_219" ref-type="page"></xref>
<string-name>
<surname>Scott</surname>
,
<given-names>J.B.</given-names>
</string-name>
<year>1934</year>
,
<source>The Spanish origins of international law: Francisco De Vitoria and his law of nations</source>
,
<publisher-name>Clarendon Press</publisher-name>
,
<publisher-loc>Oxford</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref462">
<mixed-citation publication-type="web">
<string-name>
<surname>Shane</surname>
,
<given-names>S.</given-names>
</string-name>
<year>2004</year>
,
<source>Bioterror fight may spawn new risks, Baltimore Sun Online</source>
, viewed
<date-in-citation>29 June 2004</date-in-citation>
<
<uri xlink:href="http://www.baltimoresun.com/news/nationworld/bal–te.biodefense27jun27,0,6098679.story">http://www.baltimoresun.com/news/nationworld/bal–te.biodefense27jun27,0,6098679.story</uri>
>.</mixed-citation>
</ref>
<ref id="ref463">
<mixed-citation publication-type="other">
<string-name>
<surname>Shane</surname>
,
<given-names>S.</given-names>
</string-name>
<year>2006</year>
, ‘
<article-title>An Exotic Tool for Espionage: Moral Compass</article-title>
’,
<source>The New York Times</source>
,
<day>28</day>
<month>January</month>
.</mixed-citation>
</ref>
<ref id="ref464">
<mixed-citation publication-type="other">
<string-name>
<surname>Shapiro</surname>
,
<given-names>J.</given-names>
</string-name>
<year>2006</year>
, ‘
<article-title>Terrorist Organizations Inefficiencies and Vulnerabilities</article-title>
’,
<source>paper presented to International Studies Association, San Diego</source>
,
<day>22</day>
<month>March</month>
.</mixed-citation>
</ref>
<ref id="ref465">
<mixed-citation publication-type="book">
<string-name>
<surname>Shapiro</surname>
,
<given-names>M.J.</given-names>
</string-name>
<year>1997</year>
,
<source>Violent cartographies: mapping cultures of war</source>
,
<publisher-name>University of Minnesota Press</publisher-name>
,
<publisher-loc>Minneapolis, MN</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref466">
<mixed-citation publication-type="book">
<string-name>
<surname>Sharman</surname>
,
<given-names>J.C.</given-names>
</string-name>
<year>2006</year>
,
<source>Havens in a storm: the struggle for global tax regulation</source>
,
<publisher-name>Cornell University Press</publisher-name>
,
<publisher-loc>Ithaca, NY</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref467">
<mixed-citation publication-type="book">
<string-name>
<surname>Sharman</surname>
,
<given-names>J.C.</given-names>
</string-name>
and
<string-name>
<surname>Mistry</surname>
,
<given-names>P.S.</given-names>
</string-name>
<year>2006</year>
,
<source>Developmental Implications of Recent International</source>
<string-name>
<surname>Sheehan</surname>
,
<given-names>M.</given-names>
</string-name>
<year>2005</year>
,
<source>International security: an analytical survey</source>
,
<publisher-name>Lynne Rienner Publishers</publisher-name>
,
<publisher-loc>Boulder, CO</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref468">
<mixed-citation publication-type="other">
<string-name>
<surname>Shehadi</surname>
,
<given-names>N.</given-names>
</string-name>
<year>2004</year>
,
<source>Interview with author</source>
,
<day>30</day>
<month>July</month>
.</mixed-citation>
</ref>
<ref id="ref469">
<mixed-citation publication-type="journal">
<string-name>
<surname>Shilling</surname>
,
<given-names>C.</given-names>
</string-name>
<year>1997</year>
, ‘
<article-title>Emotions, Embodiment and the Sensation of Society</article-title>
’,
<source>Sociological Review</source>
, vol.
<volume>45</volume>
, no.
<issue>2</issue>
, pp.
<fpage>195</fpage>
<lpage>219</lpage>
.</mixed-citation>
</ref>
<ref id="ref470">
<mixed-citation publication-type="book">
<string-name>
<surname>Shklar</surname>
,
<given-names>J.N.</given-names>
</string-name>
<year>1984</year>
,
<source>Ordinary vices</source>
,
<publisher-name>Belknap Press of Harvard University Press</publisher-name>
,
<publisher-loc>Cambridge, MA; London</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref471">
<mixed-citation publication-type="book">
<string-name>
<surname>Shlaim</surname>
,
<given-names>A.</given-names>
</string-name>
<year>2000</year>
,
<source>The iron wall: Israel and the Arab world</source>
,
<publisher-loc>London</publisher-loc>
:
<publisher-name>Penguin</publisher-name>
</mixed-citation>
</ref>
<ref id="ref472">
<mixed-citation publication-type="journal">
<string-name>
<surname>Shue</surname>
,
<given-names>H.</given-names>
</string-name>
<year>1978</year>
, ‘
<article-title>Torture</article-title>
’,
<source>Philosophy and Public Affairs</source>
, vol.
<volume>7</volume>
, no.
<issue>2</issue>
, pp.
<fpage>124</fpage>
<lpage>43</lpage>
.</mixed-citation>
</ref>
<ref id="ref473">
<mixed-citation publication-type="book">
<string-name>
<surname>Shulsky</surname>
,
<given-names>A.N.</given-names>
</string-name>
<year>1993</year>
,
<source>Silent warfare: understanding the world of intelligence</source>
,
<publisher-name>Brassey’s</publisher-name>
,
<publisher-loc>Washington, DC</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref474">
<mixed-citation publication-type="web">
<string-name>
<surname>Shumway</surname>
,
<given-names>C.</given-names>
</string-name>
<year>2005</year>
, ‘
<article-title>Rise of Extremism, Islamic Law Threaten Iraqi Women</article-title>
’,
<source>The New Standard</source>
,
<day>30</day>
<month>March</month>
, viewed
<date-in-citation>26 April 2007</date-in-citation>
<
<uri xlink:href="http://newstandardnews.net/content/index.cfm/items/1600">http://newstandardnews.net/content/index.cfm/items/1600</uri>
>.</mixed-citation>
</ref>
<ref id="ref475">
<mixed-citation publication-type="journal">
<string-name>
<surname>Sica</surname>
,
<given-names>V.</given-names>
</string-name>
<year>2000</year>
, ‘
<article-title>Cleaning the Laundry: States and the Monitoring of the Financial System</article-title>
’,
<source>Millennium</source>
, vol.
<volume>29</volume>
, no.
<issue>1</issue>
, pp.
<fpage>47</fpage>
<lpage>72</lpage>
.</mixed-citation>
</ref>
<ref id="ref476">
<mixed-citation publication-type="book">
<string-name>
<surname>Sidel</surname>
,
<given-names>V.</given-names>
</string-name>
<year>2002</year>
, ‘
<chapter-title>Defense Against Biological Weapons: Can Immunization and Secondary Prevention Succeed?</chapter-title>
’ in
<string-name>
<given-names>S.</given-names>
<surname>Wright</surname>
</string-name>
(ed.),
<source>Biological warfare and disarmament: new problems, new perspectives</source>
,
<publisher-name>Rowman and Littlefield</publisher-name>
,
<publisher-loc>Lanham, MD</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref477">
<mixed-citation publication-type="book">
<string-name>
<surname>Silke</surname>
,
<given-names>A.</given-names>
</string-name>
<year>2005</year>
, ‘
<chapter-title>Fire of Iolaus: The Role of Countermeasures in Causing Terrorism and What Needs to be Done</chapter-title>
’, in
<string-name>
<given-names>T.</given-names>
<surname>Bjørgo</surname>
</string-name>
(ed.),
<source>Root causes of terrorism: myths, reality, and ways forward</source>
,
<publisher-name>Routledge</publisher-name>
,
<publisher-loc>London; New York</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref478">
<mixed-citation publication-type="book">
<string-name>
<surname>Simma</surname>
,
<given-names>B.</given-names>
</string-name>
<year>2002</year>
,
<source>The charter of the United Nations: a commentary</source>
,
<publisher-name>Oxford University Press</publisher-name>
,
<publisher-loc>Oxford</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref479">
<mixed-citation publication-type="book">
<string-name>
<surname>Singer</surname>
,
<given-names>P.</given-names>
</string-name>
<year>2004</year>
,
<source>The president of good and evil: the ethics of George W. Bush</source>
,
<publisher-name>Dutton</publisher-name>
,
<publisher-loc>New York</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref480">
<mixed-citation publication-type="journal">
<string-name>
<surname>Slaughter</surname>
,
<given-names>A.-M.</given-names>
</string-name>
<year>1995</year>
, ‘
<article-title>International Law in a World of Liberal States</article-title>
’,
<source>European Journal of International Law</source>
, vol.
<volume>6</volume>
, no.
<issue>3</issue>
, pp.
<fpage>503</fpage>
<lpage>38</lpage>
.</mixed-citation>
</ref>
<ref id="ref481">
<mixed-citation publication-type="conf-proc">
<string-name>
<surname>Slaughter</surname>
,
<given-names>A.-M.</given-names>
</string-name>
<year>2000</year>
, ‘
<conf-name>A Liberal Theory of International Law</conf-name>
’,
<source>Proceedings of the American Society of International Law</source>
, vol.
<volume>94</volume>
, pp.
<fpage>240</fpage>
<lpage>9</lpage>
.</mixed-citation>
</ref>
<ref id="ref482">
<mixed-citation publication-type="journal">
<string-name>
<surname>Slaughter</surname>
,
<given-names>A.-M.</given-names>
</string-name>
<year>2003</year>
, ‘
<article-title>Leading Through Law</article-title>
’,
<source>The Wilson Quarterly</source>
, vol.
<volume>27</volume>
, no.
<issue>4</issue>
, pp.
<fpage>37</fpage>
<lpage>44</lpage>
.</mixed-citation>
</ref>
<ref id="ref483">
<mixed-citation publication-type="book">
<string-name>
<surname>Slaughter</surname>
,
<given-names>A.-M.</given-names>
</string-name>
<year>2005</year>
, ‘
<chapter-title>A Brave New Judicial World</chapter-title>
’, in
<string-name>
<given-names>M.</given-names>
<surname>Ignatieff</surname>
</string-name>
(ed.),
<source>American exceptionalism and human rights</source>
,
<publisher-name>Princeton University Press</publisher-name>
,
<publisher-loc>Princeton, NJ</publisher-loc>
, pp.
<fpage>277</fpage>
<lpage>303</lpage>
.</mixed-citation>
</ref>
<ref id="ref484">
<mixed-citation publication-type="book">
<string-name>
<surname>Smith</surname>
,
<given-names>R.</given-names>
</string-name>
<year>2005</year>
,
<source>The utility of force: the art of war in the modern world</source>
,
<publisher-name>Allen Lane</publisher-name>
,
<publisher-loc>London</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref485">
<mixed-citation publication-type="book">
<xref id="page_220" ref-type="page"></xref>
<string-name>
<surname>Smith</surname>
,
<given-names>S.</given-names>
</string-name>
<year>2005</year>
, ‘
<chapter-title>The Contested Concept of Security</chapter-title>
’, in
<string-name>
<given-names>K.</given-names>
<surname>Booth</surname>
</string-name>
(ed.),
<source>Critical security studies and world politics</source>
,
<publisher-name>Lynne Rienner Publishers</publisher-name>
,
<publisher-loc>Boulder, CO</publisher-loc>
, pp.
<fpage>47</fpage>
<lpage>63</lpage>
.</mixed-citation>
</ref>
<ref id="ref486">
<mixed-citation publication-type="web">
<string-name>
<surname>Snow</surname>
,
<given-names>T.</given-names>
</string-name>
<year>2006</year>
,
<source>Interview with the Vice-President by Tony Snow</source>
,
<day>29</day>
<month>March</month>
,
<month>March</month>
<year>2007</year>
<
<uri xlink:href="http://www.whitehouse.gov/news/releases/2006/03/20060329–2.html">http://www.whitehouse.gov/news/releases/2006/03/20060329–2.html</uri>
>.</mixed-citation>
</ref>
<ref id="ref487">
<mixed-citation publication-type="other">
<string-name>
<surname>Snyder</surname>
,
<given-names>J.</given-names>
</string-name>
<year>2003</year>
, ‘
<article-title>Imperial Temptations</article-title>
’,
<source>National Interest</source>
, vol.
<volume>71</volume>
, no.
<season>spring</season>
, pp.
<fpage>29</fpage>
<lpage>40</lpage>
.</mixed-citation>
</ref>
<ref id="ref488">
<mixed-citation publication-type="journal">
<string-name>
<surname>Sofaer</surname>
,
<given-names>A.D.</given-names>
</string-name>
<year>1986</year>
, ‘
<article-title>Terrorism and the Law</article-title>
’,
<source>Foreign Affairs</source>
, vol.
<volume>64</volume>
, no.
<issue>5</issue>
, p.
<fpage>901</fpage>
.</mixed-citation>
</ref>
<ref id="ref489">
<mixed-citation publication-type="journal">
<string-name>
<surname>Sofaer</surname>
,
<given-names>A.D.</given-names>
</string-name>
<year>2003</year>
, ‘
<article-title>On the Necessity of Pre-Emption</article-title>
’,
<source>European Journal of International Law</source>
, vol.
<volume>14</volume>
, no.
<issue>2</issue>
, pp.
<fpage>209</fpage>
<lpage>26</lpage>
.</mixed-citation>
</ref>
<ref id="ref490">
<mixed-citation publication-type="book">
<string-name>
<surname>Solomon</surname>
,
<given-names>R.C.</given-names>
</string-name>
<year>1993</year>
,
<source>The passions: emotions and the meaning of life</source>
,
<edition>2nd</edition>
edn,
<publisher-name>Hackett</publisher-name>
,
<publisher-loc>Indianapolis</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref491">
<mixed-citation publication-type="book">
<string-name>
<surname>Solomon</surname>
,
<given-names>R.C.</given-names>
</string-name>
<year>2003</year>
,
<source>Not passion’s slave: emotions and choice</source>
,
<publisher-name>Oxford University Press</publisher-name>
,
<publisher-loc>Oxford</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref492">
<mixed-citation publication-type="journal">
<string-name>
<surname>Stabile</surname>
,
<given-names>C.A.</given-names>
</string-name>
and
<string-name>
<surname>Kumar</surname>
,
<given-names>D.</given-names>
</string-name>
<year>2005</year>
, ‘
<article-title>Unveiling Imperialism: Media, Gender, and the War on Afghanistan</article-title>
’,
<source>Media, Culture and Society</source>
, vol.
<volume>27</volume>
, no.
<issue>5</issue>
, pp.
<fpage>765</fpage>
<lpage>82</lpage>
.</mixed-citation>
</ref>
<ref id="ref493">
<mixed-citation publication-type="book">
<string-name>
<surname>Stalenheim</surname>
,
<given-names>P.</given-names>
</string-name>
,
<string-name>
<surname>Fruchart</surname>
,
<given-names>D.</given-names>
</string-name>
,
<string-name>
<surname>Omitoogun</surname>
,
<given-names>W.</given-names>
</string-name>
and
<string-name>
<surname>Perdomo</surname>
,
<given-names>C.</given-names>
</string-name>
<year>2006</year>
, ‘
<chapter-title>Military Expenditure</chapter-title>
’, in
<collab>Stockholm International Peace Research Institute (SIPRI)</collab>
(ed.),
<source>SIPRI yearbook 2006</source>
,
<publisher-name>Oxford University Press</publisher-name>
,
<publisher-loc>Oxford</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref494">
<mixed-citation publication-type="book">
<string-name>
<surname>Stephens</surname>
,
<given-names>A.</given-names>
</string-name>
and
<string-name>
<surname>Connery</surname>
,
<given-names>D.</given-names>
</string-name>
<year>2006</year>
,
<chapter-title>‘Defence Transformation’</chapter-title>
, in
<string-name>
<given-names>D.</given-names>
<surname>Ball</surname>
</string-name>
and
<string-name>
<given-names>R.</given-names>
<surname>Ayson</surname>
</string-name>
(eds),
<source>Strategy and security in the Asia Pacific</source>
,
<publisher-name>Allen and Unwin</publisher-name>
,
<publisher-loc>Sydney</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref495">
<mixed-citation publication-type="book">
<string-name>
<surname>Stephens</surname>
,
<given-names>P.</given-names>
</string-name>
<year>2004</year>
,
<source>Tony Blair: the price of leadership</source>
,
<publisher-name>Politico’s</publisher-name>
,
<publisher-loc>London</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref496">
<mixed-citation publication-type="book">
<string-name>
<surname>Stevens</surname>
,
<given-names>K.R.</given-names>
</string-name>
<year>2004</year>
,
<source>Border diplomacy: the Caroline and McLeod affairs in Anglo-American-Canadian relations</source>
,
<publisher-name>University of Alabama Press</publisher-name>
,
<publisher-loc>Montgomery, AL</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref497">
<mixed-citation publication-type="journal">
<string-name>
<surname>Stewart</surname>
,
<given-names>J.G.</given-names>
</string-name>
<year>2006</year>
, ‘
<article-title>Rethinking Guantanamo: Unlawful Confinement as Applied in International Criminal Law</article-title>
’,
<source>Journal of International Criminal Justice</source>
, vol.
<volume>4</volume>
, no.
<issue>1</issue>
, pp.
<fpage>12</fpage>
<lpage>30</lpage>
.</mixed-citation>
</ref>
<ref id="ref498">
<mixed-citation publication-type="journal">
<string-name>
<surname>Steyn</surname>
,
<given-names>J.</given-names>
</string-name>
<year>2004</year>
, ‘
<article-title>Guantanamo Bay: The Legal Black Hole</article-title>
’,
<source>International and Comparative Law Quarterly</source>
, vol.
<volume>53</volume>
, no.
<issue>1</issue>
, pp.
<fpage>1</fpage>
<lpage>15</lpage>
.</mixed-citation>
</ref>
<ref id="ref499">
<mixed-citation publication-type="journal">
<string-name>
<surname>Stiehm</surname>
,
<given-names>J.H.</given-names>
</string-name>
<year>1982</year>
, ‘
<article-title>The Protected, the Protector, the Defender</article-title>
’,
<source>Women’s Studies International Forum</source>
, vol.
<volume>5</volume>
, no.
<issue>3/4</issue>
, pp.
<fpage>367</fpage>
<lpage>76</lpage>
.</mixed-citation>
</ref>
<ref id="ref500">
<mixed-citation publication-type="book">
<string-name>
<surname>Suárez</surname>
,
<given-names>F.</given-names>
</string-name>
<year>1944</year>
a,
<source>Selections from three works: De triplici virtute theologica, fide, spe, et caritate</source>
,
<publisher-name>Carnegie Classics on International Law</publisher-name>
,
<publisher-loc>New York</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref501">
<mixed-citation publication-type="book">
<string-name>
<surname>Suárez</surname>
,
<given-names>F.</given-names>
</string-name>
<year>1944</year>
b, ‘
<chapter-title>On war</chapter-title>
’, in
<string-name>
<given-names>G.</given-names>
<surname>Williams</surname>
</string-name>
(ed.),
<source>Selections from three works</source>
,
<publisher-name>Oxford University Press</publisher-name>
,
<publisher-loc>Oxford</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref502">
<mixed-citation publication-type="journal">
<string-name>
<surname>Sullivan</surname>
,
<given-names>N.J.</given-names>
</string-name>
,
<string-name>
<surname>Geisbert</surname>
,
<given-names>T.W.</given-names>
</string-name>
,
<string-name>
<surname>Geisbert</surname>
,
<given-names>J.B.</given-names>
</string-name>
,
<string-name>
<surname>Xu</surname>
,
<given-names>L.</given-names>
</string-name>
,
<string-name>
<surname>Yang</surname>
,
<given-names>Z.</given-names>
</string-name>
,
<string-name>
<surname>Roederer</surname>
,
<given-names>M.</given-names>
</string-name>
,
<string-name>
<surname>Koup</surname>
,
<given-names>R.A.</given-names>
</string-name>
,
<string-name>
<surname>Jahrling</surname>
,
<given-names>P.B.</given-names>
</string-name>
and
<string-name>
<surname>Nabel</surname>
,
<given-names>G.J.</given-names>
</string-name>
<year>2003</year>
, ‘
<article-title>Accelerated Vaccination for Ebola Virus Haemorrhagic Fever in Non-Human Primates</article-title>
’,
<source>Nature</source>
, vol.
<volume>424</volume>
, no.
<issue>6949</issue>
, pp.
<fpage>681</fpage>
<lpage>4</lpage>
.</mixed-citation>
</ref>
<ref id="ref503">
<mixed-citation publication-type="other">
<collab>Supreme Court of the United States</collab>
(
<year>2006</year>
) ‘
<article-title>Hamdan v. Rumsfeld, Secretary of Defense</article-title>
,
<etal>et al</etal>
.’,
<source>Bench Opinion. Cited as: 548 US 2006</source>
.</mixed-citation>
</ref>
<ref id="ref504">
<mixed-citation publication-type="web">
<source>Sydney Morning Herald</source>
<year>2005</year>
, ‘
<article-title>How Habib Became one of the “Worst of the Worst”</article-title>
’, viewed
<date-in-citation>1 December 2006</date-in-citation>
<
<uri xlink:href="http://www.smh.com.au/news/Anti-Terror-Watch/How-Habib-became-one-of-the-worst-of-the-worst/2005/01/12/1105423542199.html">http://www.smh.com.au/news/Anti-Terror-Watch/How-Habib-became-one-of-the-worst-of-the-worst/2005/01/12/1105423542199.html</uri>
>.</mixed-citation>
</ref>
<ref id="ref505">
<mixed-citation publication-type="web">
<source>Sydney Morning Herald</source>
<year>2006</year>
, ‘
<article-title>Hicks’ Lawyers in Bid to Bring Him Home</article-title>
’, viewed
<date-in-citation>6 December 2006</date-in-citation>
<
<uri xlink:href="http://www.smh.com.au/news/national/hicks-lawyers-in-bid-to-bring-him-home/2006/12/06/1165081013265.html">http://www.smh.com.au/news/national/hicks-lawyers-in-bid-to-bring-him-home/2006/12/06/1165081013265.html</uri>
>.</mixed-citation>
</ref>
<ref id="ref506">
<mixed-citation publication-type="journal">
<string-name>
<surname>Takacs</surname>
,
<given-names>S.</given-names>
</string-name>
<year>2005</year>
, ‘
<article-title>Jessica Lynch and the Regeneration of American Identity and Power Post 9/11</article-title>
’,
<source>Feminist Media Studies</source>
, vol.
<volume>5</volume>
, no.
<issue>3</issue>
, pp.
<fpage>297</fpage>
<lpage>310</lpage>
.</mixed-citation>
</ref>
<ref id="ref507">
<mixed-citation publication-type="journal">
<string-name>
<surname>Taylor</surname>
,
<given-names>S.A.</given-names>
</string-name>
and
<string-name>
<surname>Snow</surname>
,
<given-names>D.</given-names>
</string-name>
<year>1997</year>
, ‘
<article-title>Cold War Spies: Why They Spied and How They Got Caught</article-title>
’,
<source>Intelligence and National Security</source>
, vol.
<volume>12</volume>
, no.
<issue>2</issue>
, pp.
<fpage>101</fpage>
<lpage>25</lpage>
.</mixed-citation>
</ref>
<ref id="ref508">
<mixed-citation publication-type="book">
<string-name>
<surname>Tesón</surname>
,
<given-names>F.R.</given-names>
</string-name>
<year>1998</year>
,
<source>A philosophy of international law</source>
,
<publisher-name>Westview Press</publisher-name>
,
<publisher-loc>Boulder, CO</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref509">
<mixed-citation publication-type="journal">
<xref id="page_221" ref-type="page"></xref>
<string-name>
<surname>Tesón</surname>
,
<given-names>F.R.</given-names>
</string-name>
<year>2005</year>
, ‘
<article-title>Ending Tyranny in Iraq</article-title>
’,
<source>Ethics and International Affairs</source>
, vol.
<volume>19</volume>
, no.
<issue>2</issue>
, pp.
<fpage>1</fpage>
<lpage>20</lpage>
.</mixed-citation>
</ref>
<ref id="ref510">
<mixed-citation publication-type="web">
<collab>The Age</collab>
<year>2004</year>
,
<source>The charges against David Hicks</source>
, viewed
<date-in-citation>1 December 2006</date-in-citation>
<
<uri xlink:href="http://www.theage.com.au/articles/2004/06/13/1087065029888.html?from=storylhs">http://www.theage.com.au/articles/2004/06/13/1087065029888.html?from=storylhs</uri>
>.</mixed-citation>
</ref>
<ref id="ref511">
<mixed-citation publication-type="journal">
<string-name>
<surname>Travalio</surname>
,
<given-names>G.</given-names>
</string-name>
and
<string-name>
<surname>Altenburg</surname>
,
<given-names>J.</given-names>
</string-name>
<year>2003</year>
, ‘
<article-title>Terrorism, State Responsibility, and the Use of Military Force</article-title>
’,
<source>Chicago Journal of International Law</source>
, vol.
<volume>4</volume>
, no.
<issue>1</issue>
, pp.
<fpage>97</fpage>
<lpage>119</lpage>
.</mixed-citation>
</ref>
<ref id="ref512">
<mixed-citation publication-type="journal">
<string-name>
<surname>Tucker</surname>
,
<given-names>J.B.</given-names>
</string-name>
<year>2004</year>
, ‘
<article-title>Biological Threat Assessment: Is the Cure Worse Than the Disease?</article-title>
<source>Arms Control Today</source>
, vol.
<volume>34</volume>
, no.
<issue>8</issue>
, pp.
<fpage>13</fpage>
<lpage>9</lpage>
.</mixed-citation>
</ref>
<ref id="ref513">
<mixed-citation publication-type="book">
<string-name>
<surname>Tucker</surname>
,
<given-names>R.W.</given-names>
</string-name>
<year>1960</year>
,
<source>The just war: a study in contemporary doctrine</source>
,
<publisher-name>Johns Hopkins University Press</publisher-name>
,
<publisher-loc>Baltimore, MD</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref514">
<mixed-citation publication-type="book">
<string-name>
<surname>Tushnet</surname>
,
<given-names>M.V.</given-names>
</string-name>
<year>2005</year>
, ‘
<chapter-title>Emergencies and the Idea of Constitutionalism</chapter-title>
’, in
<string-name>
<given-names>M.V.</given-names>
<surname>Tushnet</surname>
</string-name>
(ed.),
<source>The constitution in wartime: beyond alarmism and complacency</source>
,
<publisher-name>Duke University Press</publisher-name>
,
<publisher-loc>Durham NC</publisher-loc>
, pp.
<fpage>39</fpage>
<lpage>54</lpage>
.</mixed-citation>
</ref>
<ref id="ref515">
<mixed-citation publication-type="book">
<collab>United Nations</collab>
<year>1998</year>
,
<source>Financial havens, bank secrecy and money laundering, United Nations Office on Drug Control and Crime Prevention</source>
,
<publisher-loc>Vienna</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref516">
<mixed-citation publication-type="web">
<collab>United Nations High-level Panel on Threats Challenges and Change</collab>
<year>2004</year>
,
<source>A more secure world our shared responsibility: report of the High-level Panel on Threats, Challenges, and Change, United Nations</source>
<
<uri xlink:href="http://www.un.org/secureworld/">http://www.un.org/secureworld/</uri>
>.</mixed-citation>
</ref>
<ref id="ref517">
<mixed-citation publication-type="web">
<collab>United Sates Department of Defense</collab>
<year>2004</year>
,
<source>Charge sheet – David Hicks</source>
, viewed
<date-in-citation>7 November 2006</date-in-citation>
<
<uri xlink:href="http://www.defenselink.mil/news/Jun2004/d20040610cs.pdf">http://www.defenselink.mil/news/Jun2004/d20040610cs.pdf</uri>
>.</mixed-citation>
</ref>
<ref id="ref518">
<mixed-citation publication-type="web">
<collab>United Sates Department of Defense</collab>
<year>2005</year>
a,
<source>JTF-GTMO information on detainees</source>
, viewed
<date-in-citation>7 November 2006</date-in-citation>
<
<uri xlink:href="http://www.google.com.au/search?hl=en&q=jtf-gtmo+Information+on+detainees&meta=">http://www.google.com.au/search?hl=en&q=jtf-gtmo+Information+on+detainees&meta=</uri>
>.</mixed-citation>
</ref>
<ref id="ref519">
<mixed-citation publication-type="web">
<collab>United Sates Department of Defense</collab>
<year>2005</year>
b,
<source>The national defense strategy of the United States of America</source>
, viewed
<date-in-citation>26 March 2007</date-in-citation>
<
<uri xlink:href="http://www.defenselink.mil/news/Mar2005/d20050318nds1.pdf">http://www.defenselink.mil/news/Mar2005/d20050318nds1.pdf</uri>
>.</mixed-citation>
</ref>
<ref id="ref520">
<mixed-citation publication-type="web">
<collab>United Sates Department of Defense</collab>
<year>2006</year>
a,
<source>Quadrennial defense review report</source>
, viewed
<date-in-citation>1 March 2007</date-in-citation>
<
<uri xlink:href="http://www.globalsecurity.org/military/library/policy/dod/qdr-2006-report.pdf">http://www.globalsecurity.org/military/library/policy/dod/qdr-2006-report.pdf</uri>
>.</mixed-citation>
</ref>
<ref id="ref521">
<mixed-citation publication-type="web">
<collab>United Sates Department of Defense</collab>
<year>2006</year>
b,
<source>Detainee transfer announced</source>
, viewed
<date-in-citation>1 December 2006</date-in-citation>
<
<uri xlink:href="http://www.defenselink.mil/Releases/Release.aspx?ReleaseID=10081">http://www.defenselink.mil/Releases/Release.aspx?ReleaseID=10081</uri>
>.</mixed-citation>
</ref>
<ref id="ref522">
<mixed-citation publication-type="web">
<collab>United Sates Department of Defense</collab>
<year>2006</year>
c,
<source>Military commissions fact sheet</source>
, viewed
<date-in-citation>1 December 2006</date-in-citation>
<
<uri xlink:href="http://www.defenselink.mil/news/Oct2006/d20061016factsheet.pdf">http://www.defenselink.mil/news/Oct2006/d20061016factsheet.pdf</uri>
>.</mixed-citation>
</ref>
<ref id="ref523">
<mixed-citation publication-type="web">
<collab>United Sates Department of Defense</collab>
<year>2006</year>
d,
<source>Commission transcripts, exhibits, and allied papers – David Hicks</source>
, viewed
<date-in-citation>1 December 2006</date-in-citation>
<
<uri xlink:href="http://www.defenselink.mil/news/commissions_exhibits_hicks.Html">http://www.defenselink.mil/news/commissions_exhibits_hicks.Html</uri>
>.</mixed-citation>
</ref>
<ref id="ref524">
<mixed-citation publication-type="book">
<collab>US</collab>
<year>2002</year>
,
<source>The national security strategy of the United States of America</source>
,
<publisher-loc>Washington, DC</publisher-loc>
,
<month>September</month>
.</mixed-citation>
</ref>
<ref id="ref525">
<mixed-citation publication-type="book">
<collab>US Department of State</collab>
<year>2005</year>
,
<source>Victims of trafficking and violence protection act of 2000: trafficking in persons report</source>
,
<publisher-name>US Department of State</publisher-name>
,
<publisher-loc>Washington</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref526">
<mixed-citation publication-type="book">
<collab>US Treasury</collab>
<year>2005</year>
,
<source>Money laundering threat assessment</source>
,
<publisher-name>US Treasury</publisher-name>
,
<publisher-loc>Washington, DC</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref527">
<mixed-citation publication-type="book">
<collab>USAID</collab>
<year>2005</year>
,
<source>Fragile states strategy</source>
,
<publisher-loc>USAID, Washington, DC</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref528">
<mixed-citation publication-type="book">
<string-name>
<surname>Van Creveld</surname>
,
<given-names>M.L.</given-names>
</string-name>
<year>1991</year>
,
<source>The transformation of war</source>
,
<publisher-name>Free Press</publisher-name>
;
<publisher-loc>Collier Macmillan Canada; Maxwell Macmillan International, New York; Toronto</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref529">
<mixed-citation publication-type="journal">
<string-name>
<surname>Van Evera</surname>
,
<given-names>S.</given-names>
</string-name>
<year>1990</year>
, ‘
<article-title>Why Europe Matters, Why the Third World Doesn’t: American Grand Strategy After the Cold War</article-title>
’,
<source>Journal of Strategic Studies</source>
, vol.
<volume>13</volume>
, no.
<issue>2</issue>
, pp.
<fpage>1</fpage>
<lpage>51</lpage>
.</mixed-citation>
</ref>
<ref id="ref530">
<mixed-citation publication-type="journal">
<string-name>
<surname>Van Evera</surname>
,
<given-names>S.</given-names>
</string-name>
<year>2006</year>
, ‘
<article-title>Bush Administration, Weak on Terror</article-title>
’,
<source>Middle East Policy</source>
, vol.
<volume>13</volume>
, no.
<issue>4</issue>
, pp.
<fpage>28</fpage>
<lpage>38</lpage>
.</mixed-citation>
</ref>
<ref id="ref531">
<mixed-citation publication-type="journal">
<string-name>
<surname>Van Fossen</surname>
,
<given-names>A.</given-names>
</string-name>
<year>2003</year>
, ‘
<article-title>Money Laundering, Global Financial Instability and Tax Havens in the Pacific Islands</article-title>
’,
<source>Contemporary Pacific</source>
, vol.
<volume>15</volume>
, no.
<issue>2</issue>
, pp.
<fpage>237</fpage>
<lpage>75</lpage>
.</mixed-citation>
</ref>
<ref id="ref532">
<mixed-citation publication-type="book">
<string-name>
<surname>Vattel</surname>
,
<given-names>E.</given-names>
</string-name>
<year>1916</year>
,
<source>The law of nations and the principles of natural law applied to the conduct and to the affairs of nations and sovereigns</source>
,
<publisher-name>Carnegie Institution</publisher-name>
,
<publisher-loc>Washington, DC</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref533">
<mixed-citation publication-type="book">
<xref id="page_222" ref-type="page"></xref>
<string-name>
<surname>Vernant</surname>
,
<given-names>J-P.</given-names>
</string-name>
<year>1982</year>
,
<source>The origins of Greek thought</source>
,
<publisher-name>Cornell University Press</publisher-name>
,
<publisher-loc>Ithaca, NY</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref534">
<mixed-citation publication-type="book">
<string-name>
<surname>Vitoria</surname>
,
<given-names>F.D.</given-names>
</string-name>
<year>1991</year>
,
<source>Vitoria: Political writings</source>
edited and translated by
<string-name>
<given-names>Anthony</given-names>
<surname>Pagden</surname>
</string-name>
,
<publisher-loc>Cambridge</publisher-loc>
:
<publisher-name>Cambridge University Press</publisher-name>
.</mixed-citation>
</ref>
<ref id="ref535">
<mixed-citation publication-type="book">
<string-name>
<surname>Walt</surname>
,
<given-names>S.M.</given-names>
</string-name>
<year>2006</year>
,
<source>Taming American power: the global response to US primacy</source>
,
<publisher-name>W.W. Norton</publisher-name>
,
<publisher-loc>New York</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref536">
<mixed-citation publication-type="journal">
<string-name>
<surname>Walzer</surname>
,
<given-names>M.</given-names>
</string-name>
<year>1973</year>
, ‘
<article-title>Political Action: the Problem of Dirty Hands</article-title>
’,
<source>Philosophy and Public Affairs</source>
, vol.
<volume>2</volume>
, no.
<issue>2</issue>
, pp.
<fpage>160</fpage>
<lpage>80</lpage>
.</mixed-citation>
</ref>
<ref id="ref537">
<mixed-citation publication-type="book">
<string-name>
<surname>Walzer</surname>
,
<given-names>M.</given-names>
</string-name>
<year>1977</year>
,
<source>Just and unjust wars: a moral argument with historical illustrations</source>
,
<publisher-name>Basic Books</publisher-name>
,
<publisher-loc>New York</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref538">
<mixed-citation publication-type="book">
<string-name>
<surname>Walzer</surname>
,
<given-names>M.</given-names>
</string-name>
<year>1992</year>
,
<source>Just and unjust wars: a moral argument with historical illustrations</source>
,
<edition>2nd</edition>
edn,
<publisher-name>Basic Books</publisher-name>
,
<publisher-loc>New York</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref539">
<mixed-citation publication-type="book">
<string-name>
<surname>Walzer</surname>
,
<given-names>M.</given-names>
</string-name>
<year>2004</year>
,
<source>Arguing about war</source>
,
<publisher-name>Yale University Press</publisher-name>
,
<publisher-loc>New Haven, CT; London</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref540">
<mixed-citation publication-type="other">
<string-name>
<surname>Warrick</surname>
,
<given-names>J.</given-names>
</string-name>
<year>2006</year>
, ‘
<article-title>The Secretive Fight Against Bioterror</article-title>
’,
<source>Washington Post</source>
,
<day>30</day>
<month>July</month>
, p.
<fpage>A01</fpage>
.</mixed-citation>
</ref>
<ref id="ref541">
<mixed-citation publication-type="book">
<string-name>
<surname>Webster</surname>
,
<given-names>D.</given-names>
</string-name>
<year>1983</year>
, ‘
<chapter-title>Letter to Sir Henry Stephen Fox</chapter-title>
’, in
<string-name>
<given-names>K.E.</given-names>
<surname>Shewmaker</surname>
</string-name>
(ed.),
<source>The Papers of Daniel Webster: Diplomatic Papers, Volume</source>
<volume>1</volume>
:
<fpage>1841</fpage>
<lpage>1843</lpage>
,
<publisher-name>University of New England Press</publisher-name>
,
<publisher-loc>Armidale</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref542">
<mixed-citation publication-type="other">
<string-name>
<surname>Wechsler</surname>
,
<given-names>W.</given-names>
</string-name>
<year>2001</year>
, ‘
<article-title>Follow the Money</article-title>
’,
<source>Foreign Affairs</source>
, vol.
<volume>80</volume>
, pp.
<fpage>40</fpage>
<lpage>57</lpage>
.</mixed-citation>
</ref>
<ref id="ref543">
<mixed-citation publication-type="web">
<string-name>
<surname>Weeks</surname>
,
<given-names>L.</given-names>
</string-name>
<year>2007</year>
,
<source>Silence no longer an option, says Fonda, The Sydney Morning Herald</source>
,
<day>29</day>
<month>January</month>
, viewed
<date-in-citation>26 April 2007</date-in-citation>
<
<uri xlink:href="http://www.smh.com.au/news/world/fonda-speaksout-on-iraq/2007/01/28/1169919213371.html">http://www.smh.com.au/news/world/fonda-speaksout-on-iraq/2007/01/28/1169919213371.html</uri>
>.</mixed-citation>
</ref>
<ref id="ref544">
<mixed-citation publication-type="other">
<string-name>
<surname>Weisman</surname>
,
<given-names>S.R.</given-names>
</string-name>
<year>2003</year>
, ‘
<article-title>Pre-emption Evolves from an Idea to Official Action</article-title>
’,
<source>New York Times</source>
,
<day>23</day>
<month>March</month>
, p.
<fpage>B1</fpage>
.</mixed-citation>
</ref>
<ref id="ref545">
<mixed-citation publication-type="book">
<string-name>
<surname>Wheeler</surname>
,
<given-names>N.J.</given-names>
</string-name>
<year>2000</year>
,
<source>Saving strangers: humanitarian intervention in international society</source>
,
<publisher-name>Oxford University Press</publisher-name>
,
<publisher-loc>Oxford; New York</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref546">
<mixed-citation publication-type="web">
<collab>White House</collab>
<year>2003</year>
,
<source>Statement of the Atlantic Summit: A vision for Iraq and the Iraqi people</source>
,
<day>16</day>
<month>March</month>
, viewed
<date-in-citation>25 March 2007</date-in-citation>
. <
<uri xlink:href="http://whitehouse.gove/news/releases/2003/03/20030316-1.html">http://whitehouse.gove/news/releases/2003/03/20030316-1.html</uri>
></mixed-citation>
</ref>
<ref id="ref547">
<mixed-citation publication-type="web">
<collab>White House</collab>
<year>2006</year>
a,
<source>President Bush Signs Military Commissions Act of 2006, Office of the Press Secretary</source>
, viewed
<date-in-citation>1 December 2006</date-in-citation>
<
<uri xlink:href="http://www.whitehouse.gov/news/releases/2006/10/print/20061017-1.html">http://www.whitehouse.gov/news/releases/2006/10/print/20061017-1.html</uri>
>.</mixed-citation>
</ref>
<ref id="ref548">
<mixed-citation publication-type="web">
<collab>White House</collab>
<year>2006</year>
b,
<source>President discusses creation of military commissions to try suspected terrorists, Office of the Press Secretary</source>
, viewed
<date-in-citation>15 March 2007</date-in-citation>
<
<uri xlink:href="http://www.whitehouse.gov/news/releases/2006/09/20060906-3.html">http://www.whitehouse.gov/news/releases/2006/09/20060906-3.html</uri>
>.</mixed-citation>
</ref>
<ref id="ref549">
<mixed-citation publication-type="web">
<string-name>
<surname>Wilkinson</surname>
,
<given-names>M.</given-names>
</string-name>
and
<string-name>
<surname>Pearlmann</surname>
,
<given-names>J.</given-names>
</string-name>
<year>2004</year>
,
<source>Military trial only option for Hicks, says Ruddock</source>
, viewed
<date-in-citation>18 December 2006</date-in-citation>
<
<uri xlink:href="http://www.smh.com.au/articles/2004/01/22/1074732544937.html">http://www.smh.com.au/articles/2004/01/22/1074732544937.html</uri>
>.</mixed-citation>
</ref>
<ref id="ref550">
<mixed-citation publication-type="book">
<string-name>
<surname>Williams</surname>
,
<given-names>C.</given-names>
</string-name>
<year>2006</year>
,
<chapter-title>‘Terrorism’</chapter-title>
, in
<string-name>
<given-names>D.</given-names>
<surname>Ball</surname>
</string-name>
and
<string-name>
<given-names>R.</given-names>
<surname>Ayson</surname>
</string-name>
(eds),
<source>Strategy and security in the Asia Pacific</source>
,
<publisher-name>Allen and Unwin</publisher-name>
,
<publisher-loc>Sydney</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref551">
<mixed-citation publication-type="book">
<string-name>
<surname>Williams</surname>
,
<given-names>S.J.</given-names>
</string-name>
<year>2001</year>
,
<source>Emotion and social theory: corporeal reflections on the (ir)rational</source>
,
<publisher-loc>Sage, London; Thousand Oaks, CA</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref552">
<mixed-citation publication-type="journal">
<string-name>
<surname>Winer</surname>
,
<given-names>J.M.</given-names>
</string-name>
<year>2002</year>
, ‘
<article-title>Globalization, Terrorist Finance, and Global Conflict: Time for a White List?</article-title>
<source>European Journal of Law Reform</source>
, vol.
<volume>4</volume>
, no.
<issue>2</issue>
, pp.
<fpage>255</fpage>
<lpage>90</lpage>
.</mixed-citation>
</ref>
<ref id="ref553">
<mixed-citation publication-type="book">
<string-name>
<surname>Wippman</surname>
,
<given-names>D.</given-names>
</string-name>
<year>2005</year>
,
<chapter-title>‘Introduction: Do New Wars Call for New Laws?’</chapter-title>
in
<string-name>
<given-names>D.</given-names>
<surname>Wippman</surname>
</string-name>
and
<string-name>
<given-names>M.</given-names>
<surname>Evangelista</surname>
</string-name>
(eds),
<source>New wars, new laws?: applying the laws of war in 21st century conflicts</source>
,
<publisher-name>Transnational Publishers</publisher-name>
,
<publisher-loc>Ardley, NY</publisher-loc>
, pp.
<fpage>1</fpage>
<lpage>28</lpage>
.</mixed-citation>
</ref>
<ref id="ref554">
<mixed-citation publication-type="book">
<string-name>
<surname>Wolff</surname>
,
<given-names>C.</given-names>
</string-name>
<year>1934</year>
,
<source>Jus gentium</source>
,
<publisher-name>Carnegie Classics on International Law</publisher-name>
,
<publisher-loc>New York</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref555">
<mixed-citation publication-type="journal">
<string-name>
<surname>Woods</surname>
,
<given-names>N.</given-names>
</string-name>
<year>2005</year>
, ‘
<article-title>The Shifting Politics of Foreign Aid</article-title>
’,
<source>International Affairs</source>
, vol.
<volume>81</volume>
, no.
<issue>2</issue>
, pp.
<fpage>393</fpage>
<lpage>409</lpage>
.</mixed-citation>
</ref>
<ref id="ref556">
<mixed-citation publication-type="book">
<xref id="page_223" ref-type="page"></xref>
<string-name>
<surname>Woodward</surname>
,
<given-names>B.</given-names>
</string-name>
<year>2004</year>
,
<source>Plan of attack</source>
,
<publisher-name>Simon and Schuster</publisher-name>
,
<publisher-loc>New York</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref557">
<mixed-citation publication-type="other">
<string-name>
<surname>Wroe</surname>
,
<given-names>D.</given-names>
</string-name>
<year>2005</year>
, ‘
<article-title>Iraq was motive for bombing: suspect</article-title>
’,
<source>The Age</source>
,
<day>2</day>
<month>August</month>
, p.
<fpage>1</fpage>
.</mixed-citation>
</ref>
<ref id="ref558">
<mixed-citation publication-type="web">
<string-name>
<surname>Yoch Jr</surname>
,
<given-names>J.M.</given-names>
</string-name>
<year>2006</year>
,
<source>Hicks to challenge US military commissions law</source>
, viewed
<date-in-citation>7 November 2006</date-in-citation>
<
<uri xlink:href="http://jurist.law.pitt.edu/paperchase/2006/10/hicks-to-challenge-us-military.php">http://jurist.law.pitt.edu/paperchase/2006/10/hicks-to-challenge-us-military.php</uri>
>.</mixed-citation>
</ref>
<ref id="ref559">
<mixed-citation publication-type="other">
<string-name>
<surname>Yoo</surname>
,
<given-names>J.</given-names>
</string-name>
<year>2004</year>
, ‘
<article-title>Using Force</article-title>
’,
<source>The University of Chicago Law Review</source>
, vol.
<volume>71</volume>
, no.
<issue>3</issue>
.</mixed-citation>
</ref>
<ref id="ref560">
<mixed-citation publication-type="book">
<string-name>
<surname>Yoo</surname>
,
<given-names>J.</given-names>
</string-name>
<year>2006</year>
,
<source>War by other means: an insider’s account of the war on terror</source>
,
<publisher-name>Atlantic Monthly Press</publisher-name>
,
<publisher-loc>New York</publisher-loc>
.</mixed-citation>
</ref>
<ref id="ref561">
<mixed-citation publication-type="journal">
<string-name>
<surname>Young</surname>
,
<given-names>I.M.</given-names>
</string-name>
<year>2003</year>
, ‘
<article-title>Feminist Reactions to the Contemporary Security Regime</article-title>
’,
<source>Hypatia</source>
, vol.
<volume>18</volume>
, no.
<issue>1</issue>
, pp.
<fpage>223</fpage>
<lpage>31</lpage>
.</mixed-citation>
</ref>
<ref id="ref562">
<mixed-citation publication-type="web">
<collab>Zoya</collab>
<year>2006</year>
,
<source>Five years later, Afghanistan still in flames</source>
,
<day>7</day>
<month>October</month>
, viewed
<date-in-citation>26 April 2007</date-in-citation>
<
<uri xlink:href="http://www.rawa.org/zoya_oct7-06.htm">http://www.rawa.org/zoya_oct7-06.htm</uri>
>.</mixed-citation>
</ref>
<ref id="ref563">
<mixed-citation publication-type="journal">
<string-name>
<surname>Zylinska</surname>
,
<given-names>J.</given-names>
</string-name>
<year>2004</year>
, ‘
<article-title>Mediating Murder: Ethics, Trauma and the Price of Death</article-title>
’,
<source>Journal of Cultural Research</source>
, vol.
<volume>8</volume>
, no.
<issue>3</issue>
, pp.
<fpage>232</fpage>
<lpage>35</lpage>
.</mixed-citation>
</ref>
</ref-list>
<sec sec-type="index">
<title>
<xref id="page_224" ref-type="page"></xref>
Index</title>
<list list-type="simple">
<list-item>
<p>
<italic>abaya</italic>
(full length Islamic dress)
<xref ref-type="page" rid="page_50">50</xref>
,
<xref ref-type="page" rid="page_51">51</xref>
</p>
</list-item>
<list-item>
<p>Abbasid Caliphate
<xref ref-type="page" rid="page_22">22</xref>
</p>
</list-item>
<list-item>
<p>Abdel-Kader, Salah
<xref ref-type="page" rid="page_51">51</xref>
</p>
</list-item>
<list-item>
<p>Abu Ghaith, Suleiman
<xref ref-type="page" rid="page_33">33</xref>
<xref ref-type="page" rid="page_34">4</xref>
</p>
</list-item>
<list-item>
<p>Abu Ghraib
<xref ref-type="page" rid="page_40">40</xref>
,
<xref ref-type="page" rid="page_43">43</xref>
,
<xref ref-type="page" rid="page_48">48</xref>
,
<xref ref-type="page" rid="page_53">53</xref>
,
<xref ref-type="page" rid="page_103">103</xref>
,
<xref ref-type="page" rid="page_174">174</xref>
</p>
</list-item>
<list-item>
<p>Abu Sayyaf
<xref ref-type="page" rid="page_21">21</xref>
</p>
</list-item>
<list-item>
<p>Acton, Lord
<xref ref-type="page" rid="page_157">157</xref>
</p>
</list-item>
<list-item>
<p>Afghanistan: al-Qaeda
<xref ref-type="page" rid="page_14">14</xref>
,
<xref ref-type="page" rid="page_21">21</xref>
,
<xref ref-type="page" rid="page_22">22</xref>
,
<xref ref-type="page" rid="page_23">23</xref>
,
<xref ref-type="page" rid="page_195">195</xref>
; cause and effects of of military intervention
<xref ref-type="page" rid="page_27">27</xref>
,
<xref ref-type="page" rid="page_28">28</xref>
,
<xref ref-type="page" rid="page_31">31</xref>
,
<xref ref-type="page" rid="page_32">32</xref>
; detention of Hicks
<xref ref-type="page" rid="page_81">81</xref>
,
<xref ref-type="page" rid="page_83">83</xref>
; as failed state generating terrorism
<xref ref-type="page" rid="page_136">136</xref>
<xref ref-type="page" rid="page_137">7</xref>
; invasion by US and allies (2001)
<xref ref-type="page" rid="page_71">71</xref>
,
<xref ref-type="page" rid="page_119">119</xref>
; policies for reconstruction
<xref ref-type="page" rid="page_16">16</xref>
<xref ref-type="page" rid="page_17">17</xref>
; prisoners moved to Guantanamo Bay from
<xref ref-type="page" rid="page_71">71</xref>
,
<xref ref-type="page" rid="page_72">72</xref>
,
<xref ref-type="page" rid="page_74">74</xref>
; war of response to terrorism
<xref ref-type="page" rid="page_3">3</xref>
,
<xref ref-type="page" rid="page_61">61</xref>
,
<xref ref-type="page" rid="page_194">194</xref>
</p>
</list-item>
<list-item>
<p>Afghan women
<xref ref-type="page" rid="page_42">42</xref>
,
<xref ref-type="page" rid="page_43">43</xref>
,
<xref ref-type="page" rid="page_44">44</xref>
<xref ref-type="page" rid="page_45">5</xref>
,
<xref ref-type="page" rid="page_53">53</xref>
</p>
</list-item>
<list-item>
<p>Africa
<xref ref-type="page" rid="page_15">15</xref>
,
<xref ref-type="page" rid="page_28">28</xref>
,
<xref ref-type="page" rid="page_127">127</xref>
,
<xref ref-type="page" rid="page_192">192</xref>
,
<xref ref-type="page" rid="page_198">198</xref>
</p>
</list-item>
<list-item>
<p>African National Congress
<xref ref-type="page" rid="page_20">20</xref>
</p>
</list-item>
<list-item>
<p>Agamben, Giorgio
<xref ref-type="page" rid="page_77">77</xref>
<xref ref-type="page" rid="page_79">9</xref>
,
<xref ref-type="page" rid="page_87">87</xref>
,
<xref ref-type="page" rid="page_89">89</xref>
,
<xref ref-type="page" rid="page_91">91</xref>
,
<xref ref-type="page" rid="page_125">125</xref>
,
<xref ref-type="page" rid="page_130">130</xref>
,
<xref ref-type="page" rid="page_131">131</xref>
<xref ref-type="page" rid="page_132">2</xref>
</p>
</list-item>
<list-item>
<p>Ahmed, Sara
<xref ref-type="page" rid="page_63">63</xref>
</p>
</list-item>
<list-item>
<p>Albright, Madeleine
<xref ref-type="page" rid="page_134">134</xref>
</p>
</list-item>
<list-item>
<p>Algeria
<xref ref-type="page" rid="page_21">21</xref>
</p>
</list-item>
<list-item>
<p>Alibek, Ken
<xref ref-type="page" rid="page_144">144</xref>
,
<xref ref-type="page" rid="page_153">153</xref>
</p>
</list-item>
<list-item>
<p>Amnesty International
<xref ref-type="page" rid="page_76">76</xref>
</p>
</list-item>
<list-item>
<p>ancient Greek philosophy: approach to emotions
<xref ref-type="page" rid="page_64">64</xref>
; distinction betwen natural and political life
<xref ref-type="page" rid="page_131">131</xref>
</p>
</list-item>
<list-item>
<p>Annan, Kofi
<xref ref-type="page" rid="page_2">2</xref>
</p>
</list-item>
<list-item>
<p>anthrax: envelope attacks (2001)
<xref ref-type="page" rid="page_142">142</xref>
,
<xref ref-type="page" rid="page_148">148</xref>
; use of
<italic>B anthracis</italic>
in Iraq
<xref ref-type="page" rid="page_154">154</xref>
</p>
</list-item>
<list-item>
<p>Aquinas, St Thomas
<xref ref-type="page" rid="page_97">97</xref>
,
<xref ref-type="page" rid="page_100">100</xref>
,
<xref ref-type="page" rid="page_101">101</xref>
</p>
</list-item>
<list-item>
<p>Arab states: al Qaeda’s objectives
<xref ref-type="page" rid="page_21">21</xref>
</p>
</list-item>
<list-item>
<p>Arafat, Yasser
<xref ref-type="page" rid="page_36">36</xref>
</p>
</list-item>
<list-item>
<p>Arendt, Hannah
<xref ref-type="page" rid="page_131">131</xref>
</p>
</list-item>
<list-item>
<p>Aristotle
<xref ref-type="page" rid="page_131">131</xref>
</p>
</list-item>
<list-item>
<p>armed attack: and pre-emptive action
<xref ref-type="page" rid="page_109">109</xref>
<xref ref-type="page" rid="page_110">10</xref>
,
<xref ref-type="page" rid="page_111">111</xref>
,
<xref ref-type="page" rid="page_117">117</xref>
</p>
</list-item>
<list-item>
<p>armed conflict
<italic>see</italic>
law of armed conflict Armitage, Richard
<xref ref-type="page" rid="page_32">32</xref>
</p>
</list-item>
<list-item>
<p>Ashcroft, John
<xref ref-type="page" rid="page_148">148</xref>
</p>
</list-item>
<list-item>
<p>Asia
<xref ref-type="page" rid="page_198">198</xref>
;
<italic>see also</italic>
Northeast Asia; Southeast Asia</p>
</list-item>
<list-item>
<p>asymmetric warfare
<xref ref-type="page" rid="page_29">29</xref>
</p>
</list-item>
<list-item>
<p>Athenian empire
<xref ref-type="page" rid="page_3">3</xref>
</p>
</list-item>
<list-item>
<p>Atta, Mohammed
<xref ref-type="page" rid="page_186">186</xref>
,
<xref ref-type="page" rid="page_188">188</xref>
</p>
</list-item>
<list-item>
<p>Augustine of Hippo, St
<xref ref-type="page" rid="page_4">4</xref>
,
<xref ref-type="page" rid="page_94">94</xref>
<xref ref-type="page" rid="page_95">5</xref>
,
<xref ref-type="page" rid="page_97">97</xref>
,
<xref ref-type="page" rid="page_100">100</xref>
,
<xref ref-type="page" rid="page_101">101</xref>
</p>
</list-item>
<list-item>
<p>Australia: agreement to hand over detainees
<xref ref-type="page" rid="page_175">175</xref>
; assumptions about failed states
<xref ref-type="page" rid="page_137">137</xref>
; debates surrounding women’s wearing of veil
<xref ref-type="page" rid="page_43">43</xref>
; experiment with mousepox virus
<xref ref-type="page" rid="page_144">144</xref>
; good governance as focus of aid programme
<xref ref-type="page" rid="page_140">140</xref>
; government’s refusal to seek release of Hicks
<xref ref-type="page" rid="page_73">73</xref>
,
<xref ref-type="page" rid="page_83">83</xref>
,
<xref ref-type="page" rid="page_90">90</xref>
; part in invasion of Iraq (March 2003)
<xref ref-type="page" rid="page_36">36</xref>
; post-9/11 foreign and security policies
<xref ref-type="page" rid="page_190">190</xref>
; Resistance to Interrogation Training of soldiers
<xref ref-type="page" rid="page_170">170</xref>
</p>
</list-item>
<list-item>
<p>Australian Defense Forces (ADF)
<xref ref-type="page" rid="page_81">81</xref>
</p>
</list-item>
<list-item>
<p>Australian Law Commission
<xref ref-type="page" rid="page_67">67</xref>
</p>
</list-item>
<list-item>
<p>authoritarian governments
<xref ref-type="page" rid="page_11">11</xref>
</p>
</list-item>
<list-item>
<p>‘axis of evil’ states
<xref ref-type="page" rid="page_19">19</xref>
<xref ref-type="page" rid="page_20">20</xref>
,
<xref ref-type="page" rid="page_133">133</xref>
,
<xref ref-type="page" rid="page_135">135</xref>
</p>
</list-item>
<list-item>
<p>Baader-Meinhof group
<xref ref-type="page" rid="page_20">20</xref>
</p>
</list-item>
<list-item>
<p>Baghdad
<xref ref-type="page" rid="page_22">22</xref>
</p>
</list-item>
<list-item>
<p>Bailey, Charles
<xref ref-type="page" rid="page_144">144</xref>
</p>
</list-item>
<list-item>
<p>Bali bombings
<xref ref-type="page" rid="page_2">2</xref>
,
<xref ref-type="page" rid="page_27">27</xref>
,
<xref ref-type="page" rid="page_32">32</xref>
,
<xref ref-type="page" rid="page_60">60</xref>
,
<xref ref-type="page" rid="page_181">181</xref>
,
<xref ref-type="page" rid="page_185">185</xref>
</p>
</list-item>
<list-item>
<p>Balkans
<xref ref-type="page" rid="page_127">127</xref>
;
<italic>see also</italic>
Bosnia; Macedonia banks: measures to counter terrorist finance
<xref ref-type="page" rid="page_177">177</xref>
,
<xref ref-type="page" rid="page_182">182</xref>
<xref ref-type="page" rid="page_183">3</xref>
,
<xref ref-type="page" rid="page_186">186</xref>
<xref ref-type="page" rid="page_187">7</xref>
</p>
</list-item>
<list-item>
<p>Barcham, Manuhuia
<xref ref-type="page" rid="page_138">138</xref>
</p>
</list-item>
<list-item>
<p>Basque Homeland and Freedom
<xref ref-type="page" rid="page_21">21</xref>
</p>
</list-item>
<list-item>
<p>Beirut
<xref ref-type="page" rid="page_34">34</xref>
,
<xref ref-type="page" rid="page_35">35</xref>
</p>
</list-item>
<list-item>
<p>Benjamin, Daniel
<xref ref-type="page" rid="page_194">194</xref>
,
<xref ref-type="page" rid="page_196">196</xref>
</p>
</list-item>
<list-item>
<p>Berra, Yogi 161</p>
</list-item>
<list-item>
<p>
<xref id="page_225" ref-type="page"></xref>
Best, Geoffrey
<xref ref-type="page" rid="page_158">158</xref>
</p>
</list-item>
<list-item>
<p>Bin Laden, Osama: alliance with alZarqawi
<xref ref-type="page" rid="page_22">22</xref>
; business properties
<xref ref-type="page" rid="page_15">15</xref>
; Clinton’s failure to act against
<xref ref-type="page" rid="page_114">114</xref>
; declaration of war against US
<xref ref-type="page" rid="page_35">35</xref>
; downplaying of own importance
<xref ref-type="page" rid="page_21">21</xref>
; on fatwa against Americans
<xref ref-type="page" rid="page_33">33</xref>
; idea of international tribunal to try
<xref ref-type="page" rid="page_40">40</xref>
; impact of Israeli invasion of Lebanon
<xref ref-type="page" rid="page_34">34</xref>
; on language of force
<xref ref-type="page" rid="page_134">134</xref>
; power of the example in speeches
<xref ref-type="page" rid="page_39">39</xref>
; and Salim Ahmed Hamdan
<xref ref-type="page" rid="page_84">84</xref>
; statement during 2004 US election campaign
<xref ref-type="page" rid="page_25">25</xref>
<xref ref-type="page" rid="page_26">6</xref>
,
<xref ref-type="page" rid="page_36">36</xref>
</p>
</list-item>
<list-item>
<p>biodefence programmes
<xref ref-type="page" rid="page_142">142</xref>
,
<xref ref-type="page" rid="page_143">143</xref>
,
<xref ref-type="page" rid="page_150">150</xref>
<xref ref-type="page" rid="page_154">4</xref>
,
<xref ref-type="page" rid="page_154">154</xref>
<xref ref-type="page" rid="page_155">5</xref>
; research
<xref ref-type="page" rid="page_145">145</xref>
<xref ref-type="page" rid="page_149">9</xref>
,
<xref ref-type="page" rid="page_154">154</xref>
</p>
</list-item>
<list-item>
<p>biological weapons (BW)
<xref ref-type="page" rid="page_142">142</xref>
,
<xref ref-type="page" rid="page_147">147</xref>
; threat assessments
<xref ref-type="page" rid="page_150">150</xref>
<xref ref-type="page" rid="page_152">2</xref>
,
<xref ref-type="page" rid="page_155">155</xref>
</p>
</list-item>
<list-item>
<p>Biological Weapons Convention (BWC) (1972)
<xref ref-type="page" rid="page_150">150</xref>
<xref ref-type="page" rid="page_151">1</xref>
,
<xref ref-type="page" rid="page_153">153</xref>
</p>
</list-item>
<list-item>
<p>biopolitics
<xref ref-type="page" rid="page_132">132</xref>
,
<xref ref-type="page" rid="page_139">139</xref>
</p>
</list-item>
<list-item>
<p>biosecurity
<xref ref-type="page" rid="page_147">147</xref>
<xref ref-type="page" rid="page_149">9</xref>
</p>
</list-item>
<list-item>
<p>
<italic>Biosecurity and Bioterrorism</italic>
<xref ref-type="page" rid="page_144">144</xref>
</p>
</list-item>
<list-item>
<p>bioterrorism
<xref ref-type="page" rid="page_142">142</xref>
<xref ref-type="page" rid="page_143">3</xref>
; pharmaceutical defence
<xref ref-type="page" rid="page_142">142</xref>
,
<xref ref-type="page" rid="page_143">143</xref>
<xref ref-type="page" rid="page_145">5</xref>
,
<xref ref-type="page" rid="page_154">154</xref>
</p>
</list-item>
<list-item>
<p>Black, Cofer
<xref ref-type="page" rid="page_164">164</xref>
</p>
</list-item>
<list-item>
<p>Blair, Cherie
<xref ref-type="page" rid="page_45">45</xref>
,
<xref ref-type="page" rid="page_53">53</xref>
</p>
</list-item>
<list-item>
<p>Blair, Tony
<xref ref-type="page" rid="page_1">1</xref>
,
<xref ref-type="page" rid="page_194">194</xref>
; rhetoric on war on terror
<xref ref-type="page" rid="page_97">97</xref>
,
<xref ref-type="page" rid="page_99">99</xref>
,
<xref ref-type="page" rid="page_100">100</xref>
,
<xref ref-type="page" rid="page_102">102</xref>
<xref ref-type="page" rid="page_103">3</xref>
</p>
</list-item>
<list-item>
<p>Bleiker, Roland
<xref ref-type="page" rid="page_134">134</xref>
,
<xref ref-type="page" rid="page_135">135</xref>
</p>
</list-item>
<list-item>
<p>Bosnia
<xref ref-type="page" rid="page_28">28</xref>
,
<xref ref-type="page" rid="page_134">134</xref>
,
<xref ref-type="page" rid="page_191">191</xref>
,
<xref ref-type="page" rid="page_192">192</xref>
</p>
</list-item>
<list-item>
<p>Bowden, Mark
<xref ref-type="page" rid="page_175">175</xref>
</p>
</list-item>
<list-item>
<p>Bowett, D.W.
<xref ref-type="page" rid="page_120">120</xref>
</p>
</list-item>
<list-item>
<p>Bowker, D.W.
<xref ref-type="page" rid="page_164">164</xref>
</p>
</list-item>
<list-item>
<p>Bragg, Rick
<xref ref-type="page" rid="page_46">46</xref>
</p>
</list-item>
<list-item>
<p>Bremmer, Paul
<xref ref-type="page" rid="page_18">18</xref>
</p>
</list-item>
<list-item>
<p>Britain: bugging of French embassy (1960–3)
<xref ref-type="page" rid="page_159">159</xref>
; campaign to block US funds to IRA
<xref ref-type="page" rid="page_178">178</xref>
; freeing of citizens detained in Guantanamo
<xref ref-type="page" rid="page_72">72</xref>
,
<xref ref-type="page" rid="page_81">81</xref>
,
<xref ref-type="page" rid="page_83">83</xref>
; invasion of Iraq (March 2003)
<xref ref-type="page" rid="page_31">31</xref>
,
<xref ref-type="page" rid="page_36">36</xref>
; support for Israel’s 2006 invasion of Lebanon
<xref ref-type="page" rid="page_38">38</xref>
;
<italic>see also</italic>
United Kingdom (UK)</p>
</list-item>
<list-item>
<p>British Institute of International and Comparative Law
<xref ref-type="page" rid="page_71">71</xref>
</p>
</list-item>
<list-item>
<p>British Medical Association (BMA)
<xref ref-type="page" rid="page_145">145</xref>
,
<xref ref-type="page" rid="page_153">153</xref>
</p>
</list-item>
<list-item>
<p>Bryant, Christopher
<xref ref-type="page" rid="page_98">98</xref>
</p>
</list-item>
<list-item>
<p>Burkitt, Ian
<xref ref-type="page" rid="page_63">63</xref>
</p>
</list-item>
<list-item>
<p>Bush, George H.W.
<xref ref-type="page" rid="page_35">35</xref>
</p>
</list-item>
<list-item>
<p>Bush, George W.: alignment of failed states with terrorist threat
<xref ref-type="page" rid="page_136">136</xref>
,
<xref ref-type="page" rid="page_137">137</xref>
; ‘Bush doctrine’
<xref ref-type="page" rid="page_11">11</xref>
<xref ref-type="page" rid="page_12">12</xref>
,
<xref ref-type="page" rid="page_197">197</xref>
; declaration of campaign against terrorist finance
<xref ref-type="page" rid="page_177">177</xref>
,
<xref ref-type="page" rid="page_181">181</xref>
; declaration on fall of Saddam
<xref ref-type="page" rid="page_195">195</xref>
; and detention of prisoners in Guantanamo Bay
<xref ref-type="page" rid="page_71">71</xref>
,
<xref ref-type="page" rid="page_81">81</xref>
; on imminence of terrorist threat
<xref ref-type="page" rid="page_113">113</xref>
; justifications for war in Iraq
<xref ref-type="page" rid="page_4">4</xref>
,
<xref ref-type="page" rid="page_51">51</xref>
,
<xref ref-type="page" rid="page_60">60</xref>
,
<xref ref-type="page" rid="page_118">118</xref>
; Netanyahu’s praise of
<xref ref-type="page" rid="page_33">33</xref>
; order to treat prisoners ‘humanely’
<xref ref-type="page" rid="page_174">174</xref>
; rhetoric on war on terror
<xref ref-type="page" rid="page_93">93</xref>
,
<xref ref-type="page" rid="page_97">97</xref>
<xref ref-type="page" rid="page_98">8</xref>
,
<xref ref-type="page" rid="page_100">100</xref>
,
<xref ref-type="page" rid="page_102">102</xref>
<xref ref-type="page" rid="page_103">3</xref>
,
<xref ref-type="page" rid="page_117">117</xref>
<xref ref-type="page" rid="page_118">18</xref>
,
<xref ref-type="page" rid="page_129">129</xref>
; on rogue states
<xref ref-type="page" rid="page_117">117</xref>
<xref ref-type="page" rid="page_118">18</xref>
,
<xref ref-type="page" rid="page_133">133</xref>
,
<xref ref-type="page" rid="page_193">193</xref>
,
<xref ref-type="page" rid="page_194">194</xref>
</p>
</list-item>
<list-item>
<p>Bush, Laura
<xref ref-type="page" rid="page_42">42</xref>
,
<xref ref-type="page" rid="page_45">45</xref>
,
<xref ref-type="page" rid="page_53">53</xref>
</p>
</list-item>
<list-item>
<p>Bush administration: arguments for non-proliferation strategy
<xref ref-type="page" rid="page_19">19</xref>
<xref ref-type="page" rid="page_20">20</xref>
; attempts to defend Lynndie England and colleagues
<xref ref-type="page" rid="page_49">49</xref>
; biodefence programmes
<xref ref-type="page" rid="page_143">143</xref>
; claim of right to act pre-emptively
<xref ref-type="page" rid="page_106">106</xref>
; defiance of international law regarding Guantanamo Bay
<xref ref-type="page" rid="page_73">73</xref>
,
<xref ref-type="page" rid="page_75">75</xref>
<xref ref-type="page" rid="page_76">6</xref>
,
<xref ref-type="page" rid="page_78">78</xref>
; gendered politics
<xref ref-type="page" rid="page_47">47</xref>
<xref ref-type="page" rid="page_48">8</xref>
; macho foreign policy
<xref ref-type="page" rid="page_135">135</xref>
; military response to 9/11 attacks
<xref ref-type="page" rid="page_36">36</xref>
; policies for reconstruction of Iraq
<xref ref-type="page" rid="page_17">17</xref>
<xref ref-type="page" rid="page_19">19</xref>
,
<xref ref-type="page" rid="page_23">23</xref>
<xref ref-type="page" rid="page_24">4</xref>
; presentation of Islamist threat
<xref ref-type="page" rid="page_1">1</xref>
</p>
</list-item>
<list-item>
<p>Buzan, B.
<xref ref-type="page" rid="page_12">12</xref>
</p>
</list-item>
<list-item>
<p>Bybee, Jay
<xref ref-type="page" rid="page_80">80</xref>
</p>
</list-item>
<list-item>
<p>Byers, M.
<xref ref-type="page" rid="page_120">120</xref>
<xref ref-type="page" rid="page_121">1</xref>
</p>
</list-item>
<list-item>
<p>Campbell, David
<xref ref-type="page" rid="page_66">66</xref>
</p>
</list-item>
<list-item>
<p>Canada
<xref ref-type="page" rid="page_112">112</xref>
,
<xref ref-type="page" rid="page_154">154</xref>
</p>
</list-item>
<list-item>
<p>Canberra
<xref ref-type="page" rid="page_129">129</xref>
</p>
</list-item>
<list-item>
<p>
<italic>Caroline</italic>
, dispute over sinking of
<xref ref-type="page" rid="page_107">107</xref>
,
<xref ref-type="page" rid="page_111">111</xref>
<xref ref-type="page" rid="page_113">13</xref>
,
<xref ref-type="page" rid="page_117">117</xref>
</p>
</list-item>
<list-item>
<p>Carr, E.H.
<xref ref-type="page" rid="page_1">1</xref>
,
<xref ref-type="page" rid="page_117">117</xref>
</p>
</list-item>
<list-item>
<p>Caruth, Cathy
<xref ref-type="page" rid="page_59">59</xref>
</p>
</list-item>
<list-item>
<p>Center for Disease Control (CDC)
<xref ref-type="page" rid="page_146">146</xref>
</p>
</list-item>
<list-item>
<p>Centre for Constitutional Rights
<xref ref-type="page" rid="page_81">81</xref>
</p>
</list-item>
<list-item>
<p>Chalabi, Ahmed
<xref ref-type="page" rid="page_18">18</xref>
</p>
</list-item>
<list-item>
<p>Chechnya
<xref ref-type="page" rid="page_21">21</xref>
</p>
</list-item>
<list-item>
<p>Cheney, Richard
<xref ref-type="page" rid="page_37">37</xref>
,
<xref ref-type="page" rid="page_118">118</xref>
,
<xref ref-type="page" rid="page_194">194</xref>
</p>
</list-item>
<list-item>
<p>China
<xref ref-type="page" rid="page_12">12</xref>
,
<xref ref-type="page" rid="page_152">152</xref>
,
<xref ref-type="page" rid="page_194">194</xref>
</p>
</list-item>
<list-item>
<p>Christianity: Blair’s values
<xref ref-type="page" rid="page_98">98</xref>
</p>
</list-item>
<list-item>
<p>CIA (Central Intelligence Agency)
<xref ref-type="page" rid="page_35">35</xref>
,
<xref ref-type="page" rid="page_164">164</xref>
,
<xref ref-type="page" rid="page_174">174</xref>
,
<xref ref-type="page" rid="page_183">183</xref>
</p>
</list-item>
<list-item>
<p>civil liberties: curtailment in name of state security
<xref ref-type="page" rid="page_11">11</xref>
,
<xref ref-type="page" rid="page_13">13</xref>
</p>
</list-item>
<list-item>
<p>Clarke, Jonathan
<xref ref-type="page" rid="page_135">135</xref>
,
<xref ref-type="page" rid="page_195">195</xref>
</p>
</list-item>
<list-item>
<p>Clark, W.K.
<xref ref-type="page" rid="page_3">3</xref>
</p>
</list-item>
<list-item>
<p>classical realism
<xref ref-type="page" rid="page_190">190</xref>
</p>
</list-item>
<list-item>
<p>Clausewitz, K. von
<xref ref-type="page" rid="page_26">26</xref>
,
<xref ref-type="page" rid="page_27">27</xref>
<xref ref-type="page" rid="page_28">8</xref>
,
<xref ref-type="page" rid="page_30">30</xref>
,
<xref ref-type="page" rid="page_41">41</xref>
,
<xref ref-type="page" rid="page_127">127</xref>
</p>
</list-item>
<list-item>
<p>Clinton, Bill
<xref ref-type="page" rid="page_114">114</xref>
,
<xref ref-type="page" rid="page_133">133</xref>
,
<xref ref-type="page" rid="page_154">154</xref>
</p>
</list-item>
<list-item>
<p>Cold War: defectors
<xref ref-type="page" rid="page_162">162</xref>
; dualistic thinking
<xref ref-type="page" rid="page_3">3</xref>
,
<xref ref-type="page" rid="page_5">5</xref>
,
<xref ref-type="page" rid="page_60">60</xref>
,
<xref ref-type="page" rid="page_61">61</xref>
,
<xref ref-type="page" rid="page_190">190</xref>
; end of
<xref ref-type="page" rid="page_2">2</xref>
,
<xref ref-type="page" rid="page_125">125</xref>
,
<xref ref-type="page" rid="page_126">126</xref>
,
<xref ref-type="page" rid="page_140">140</xref>
,
<xref ref-type="page" rid="page_190">190</xref>
,
<xref ref-type="page" rid="page_191">191</xref>
; exchange of captured spies
<xref ref-type="page" rid="page_158">158</xref>
; intelligence gathering
<xref ref-type="page" rid="page_161">161</xref>
,
<xref id="page_226" ref-type="page"></xref>
<xref ref-type="page" rid="page_163">163</xref>
,
<xref ref-type="page" rid="page_164">164</xref>
; nuclear deterrence
<xref ref-type="page" rid="page_169">169</xref>
; policy analyses of threats
<xref ref-type="page" rid="page_67">67</xref>
</p>
</list-item>
<list-item>
<p>Combatant Status Review Tribunal (CSRT)
<xref ref-type="page" rid="page_86">86</xref>
</p>
</list-item>
<list-item>
<p>Commonwealth
<xref ref-type="page" rid="page_179">179</xref>
</p>
</list-item>
<list-item>
<p>communism: Cold War
<xref ref-type="page" rid="page_61">61</xref>
,
<xref ref-type="page" rid="page_162">162</xref>
; limited wars against
<xref ref-type="page" rid="page_29">29</xref>
</p>
</list-item>
<list-item>
<p>Communist Party of Nepal-Maoists
<xref ref-type="page" rid="page_21">21</xref>
</p>
</list-item>
<list-item>
<p>community: development of belligerent forms
<xref ref-type="page" rid="page_58">58</xref>
<xref ref-type="page" rid="page_59">9</xref>
; emotions linked with
<xref ref-type="page" rid="page_57">57</xref>
,
<xref ref-type="page" rid="page_61">61</xref>
<xref ref-type="page" rid="page_62">2</xref>
,
<xref ref-type="page" rid="page_64">64</xref>
<xref ref-type="page" rid="page_67">7</xref>
; impact of terrorist attack on
<xref ref-type="page" rid="page_59">59</xref>
<xref ref-type="page" rid="page_62">62</xref>
; importance in rethinking security policy
<xref ref-type="page" rid="page_68">68</xref>
</p>
</list-item>
<list-item>
<p>conflict zones: new paradigm of war
<xref ref-type="page" rid="page_28">28</xref>
</p>
</list-item>
<list-item>
<p>Connery, David
<xref ref-type="page" rid="page_29">29</xref>
,
<xref ref-type="page" rid="page_30">30</xref>
</p>
</list-item>
<list-item>
<p>Connolly, William
<xref ref-type="page" rid="page_58">58</xref>
,
<xref ref-type="page" rid="page_64">64</xref>
,
<xref ref-type="page" rid="page_66">66</xref>
</p>
</list-item>
<list-item>
<p>Cordesman, Anthony
<xref ref-type="page" rid="page_38">38</xref>
<xref ref-type="page" rid="page_39">9</xref>
</p>
</list-item>
<list-item>
<p>Council of Europe
<xref ref-type="page" rid="page_178">178</xref>
,
<xref ref-type="page" rid="page_179">179</xref>
</p>
</list-item>
<list-item>
<p>Council on Foreign Relations
<xref ref-type="page" rid="page_183">183</xref>
</p>
</list-item>
<list-item>
<p>countering financing of terrorism (CFT): anti-money laundering laws
<xref ref-type="page" rid="page_183">183</xref>
<xref ref-type="page" rid="page_185">5</xref>
; international campaign
<xref ref-type="page" rid="page_177">177</xref>
,
<xref ref-type="page" rid="page_179">179</xref>
<xref ref-type="page" rid="page_181">81</xref>
; results and outlook
<xref ref-type="page" rid="page_186">186</xref>
<xref ref-type="page" rid="page_189">9</xref>
; US response
<xref ref-type="page" rid="page_181">181</xref>
<xref ref-type="page" rid="page_183">3</xref>
,
<xref ref-type="page" rid="page_186">186</xref>
</p>
</list-item>
<list-item>
<p>counter-insurgency
<xref ref-type="page" rid="page_22">22</xref>
</p>
</list-item>
<list-item>
<p>counter-terrorism
<xref ref-type="page" rid="page_13">13</xref>
,
<xref ref-type="page" rid="page_15">15</xref>
,
<xref ref-type="page" rid="page_27">27</xref>
,
<xref ref-type="page" rid="page_31">31</xref>
<xref ref-type="page" rid="page_32">2</xref>
</p>
</list-item>
<list-item>
<p>Covenant of the League of Nations
<xref ref-type="page" rid="page_97">97</xref>
,
<xref ref-type="page" rid="page_99">99</xref>
</p>
</list-item>
<list-item>
<p>Crawford, Neta
<xref ref-type="page" rid="page_58">58</xref>
,
<xref ref-type="page" rid="page_64">64</xref>
</p>
</list-item>
<list-item>
<p>Creveld, Martin van
<xref ref-type="page" rid="page_28">28</xref>
</p>
</list-item>
<list-item>
<p>criminal activities: al Qaeda
<xref ref-type="page" rid="page_21">21</xref>
</p>
</list-item>
<list-item>
<p>critical security studies (CSS)
<xref ref-type="page" rid="page_193">193</xref>
</p>
</list-item>
<list-item>
<p>Cronin, Audrey Kurth
<xref ref-type="page" rid="page_14">14</xref>
,
<xref ref-type="page" rid="page_20">20</xref>
<xref ref-type="page" rid="page_21">1</xref>
,
<xref ref-type="page" rid="page_23">23</xref>
</p>
</list-item>
<list-item>
<p>Cuba: Guantanamo Bay
<xref ref-type="page" rid="page_74">74</xref>
</p>
</list-item>
<list-item>
<p>Czechoslovakia
<xref ref-type="page" rid="page_109">109</xref>
</p>
</list-item>
<list-item>
<p>Dahlstrom, Elizabeth
<xref ref-type="page" rid="page_79">79</xref>
,
<xref ref-type="page" rid="page_80">80</xref>
</p>
</list-item>
<list-item>
<p>Danchev, Alex
<xref ref-type="page" rid="page_195">195</xref>
</p>
</list-item>
<list-item>
<p>Darby, Philip
<xref ref-type="page" rid="page_66">66</xref>
</p>
</list-item>
<list-item>
<p>Dar es Salaam
<xref ref-type="page" rid="page_35">35</xref>
</p>
</list-item>
<list-item>
<p>Darfur
<xref ref-type="page" rid="page_1">1</xref>
</p>
</list-item>
<list-item>
<p>Daschle, Tom
<xref ref-type="page" rid="page_142">142</xref>
</p>
</list-item>
<list-item>
<p>Davies, Sara E
<xref ref-type="page" rid="page_197">197</xref>
</p>
</list-item>
<list-item>
<p>defence transformation
<xref ref-type="page" rid="page_29">29</xref>
,
<xref ref-type="page" rid="page_38">38</xref>
<xref ref-type="page" rid="page_39">9</xref>
</p>
</list-item>
<list-item>
<p>Democratic Republic of Congo (DRC)
<xref ref-type="page" rid="page_1">1</xref>
</p>
</list-item>
<list-item>
<p>derogation: historical right
<xref ref-type="page" rid="page_77">77</xref>
,
<xref ref-type="page" rid="page_78">78</xref>
<xref ref-type="page" rid="page_80">80</xref>
,
<xref ref-type="page" rid="page_87">87</xref>
<xref ref-type="page" rid="page_88">8</xref>
</p>
</list-item>
<list-item>
<p>Derrida, Jacques
<xref ref-type="page" rid="page_133">133</xref>
</p>
</list-item>
<list-item>
<p>detention without charge
<xref ref-type="page" rid="page_172">172</xref>
</p>
</list-item>
<list-item>
<p>deterrence: Cold War nuclear threat
<xref ref-type="page" rid="page_169">169</xref>
; limited ability to constrain terrorism
<xref ref-type="page" rid="page_114">114</xref>
; posture of US Office of Force Transformation
<xref ref-type="page" rid="page_31">31</xref>
</p>
</list-item>
<list-item>
<p>development: fusion with security
<xref ref-type="page" rid="page_139">139</xref>
<xref ref-type="page" rid="page_140">40</xref>
</p>
</list-item>
<list-item>
<p>difference: relationship with identity
<xref ref-type="page" rid="page_66">66</xref>
<xref ref-type="page" rid="page_67">7</xref>
</p>
</list-item>
<list-item>
<p>Dodge, T.
<xref ref-type="page" rid="page_17">17</xref>
</p>
</list-item>
<list-item>
<p>Downer, Alexander
<xref ref-type="page" rid="page_137">137</xref>
<xref ref-type="page" rid="page_138">8</xref>
</p>
</list-item>
<list-item>
<p>drug trafficking: measures against
<xref ref-type="page" rid="page_180">180</xref>
; al Qaeda’s engagement in
<xref ref-type="page" rid="page_21">21</xref>
; ‘War on Drugs’
<xref ref-type="page" rid="page_178">178</xref>
,
<xref ref-type="page" rid="page_184">184</xref>
</p>
</list-item>
<list-item>
<p>Duffield, Mark
<xref ref-type="page" rid="page_139">139</xref>
<xref ref-type="page" rid="page_140">40</xref>
</p>
</list-item>
<list-item>
<p>Duffy, Helen
<xref ref-type="page" rid="page_79">79</xref>
</p>
</list-item>
<list-item>
<p>Düsseldorf
<xref ref-type="page" rid="page_186">186</xref>
</p>
</list-item>
<list-item>
<p>Dylan, Bob
<xref ref-type="page" rid="page_103">103</xref>
</p>
</list-item>
<list-item>
<p>
<italic>Economist</italic>
<xref ref-type="page" rid="page_177">177</xref>
,
<xref ref-type="page" rid="page_187">187</xref>
</p>
</list-item>
<list-item>
<p>effects-based operations (EBO)
<xref ref-type="page" rid="page_29">29</xref>
,
<xref ref-type="page" rid="page_30">30</xref>
,
<xref ref-type="page" rid="page_31">31</xref>
,
<xref ref-type="page" rid="page_38">38</xref>
<xref ref-type="page" rid="page_39">9</xref>
</p>
</list-item>
<list-item>
<p>Egypt
<xref ref-type="page" rid="page_111">111</xref>
,
<xref ref-type="page" rid="page_119">119</xref>
</p>
</list-item>
<list-item>
<p>Elshtain, Jean Bethke
<xref ref-type="page" rid="page_93">93</xref>
,
<xref ref-type="page" rid="page_94">94</xref>
<xref ref-type="page" rid="page_95">5</xref>
,
<xref ref-type="page" rid="page_96">96</xref>
,
<xref ref-type="page" rid="page_97">97</xref>
,
<xref ref-type="page" rid="page_98">98</xref>
,
<xref ref-type="page" rid="page_99">99</xref>
,
<xref ref-type="page" rid="page_100">100</xref>
,
<xref ref-type="page" rid="page_102">102</xref>
</p>
</list-item>
<list-item>
<p>emotions: links with identity and community
<xref ref-type="page" rid="page_57">57</xref>
,
<xref ref-type="page" rid="page_58">58</xref>
<xref ref-type="page" rid="page_62">62</xref>
; manipulation to justify policies
<xref ref-type="page" rid="page_57">57</xref>
,
<xref ref-type="page" rid="page_60">60</xref>
,
<xref ref-type="page" rid="page_67">67</xref>
<xref ref-type="page" rid="page_68">8</xref>
; scholarly views
<xref ref-type="page" rid="page_62">62</xref>
<xref ref-type="page" rid="page_64">4</xref>
; security’s linkage with
<xref ref-type="page" rid="page_57">57</xref>
,
<xref ref-type="page" rid="page_58">58</xref>
<xref ref-type="page" rid="page_59">9</xref>
,
<xref ref-type="page" rid="page_61">61</xref>
<xref ref-type="page" rid="page_62">2</xref>
,
<xref ref-type="page" rid="page_65">65</xref>
<xref ref-type="page" rid="page_69">9</xref>
; triggered by terrorist attacks
<xref ref-type="page" rid="page_57">57</xref>
,
<xref ref-type="page" rid="page_58">58</xref>
<xref ref-type="page" rid="page_59">9</xref>
,
<xref ref-type="page" rid="page_62">62</xref>
<xref ref-type="page" rid="page_64">4</xref>
,
<xref ref-type="page" rid="page_66">66</xref>
<xref ref-type="page" rid="page_67">7</xref>
</p>
</list-item>
<list-item>
<p>England, Lynndie
<xref ref-type="page" rid="page_43">43</xref>
,
<xref ref-type="page" rid="page_48">48</xref>
<xref ref-type="page" rid="page_49">9</xref>
,
<xref ref-type="page" rid="page_53">53</xref>
</p>
</list-item>
<list-item>
<p>ethics: arguments for and against intelligence gathering
<xref ref-type="page" rid="page_156">156</xref>
<xref ref-type="page" rid="page_158">8</xref>
; arguments for and against torture
<xref ref-type="page" rid="page_171">171</xref>
<xref ref-type="page" rid="page_172">2</xref>
; guidelines for intelligence gathering
<xref ref-type="page" rid="page_172">172</xref>
<xref ref-type="page" rid="page_174">4</xref>
; issues in interrogation of prisoners
<xref ref-type="page" rid="page_174">174</xref>
<xref ref-type="page" rid="page_175">5</xref>
; issues in security policy decisions
<xref ref-type="page" rid="page_65">65</xref>
<xref ref-type="page" rid="page_66">6</xref>
</p>
</list-item>
<list-item>
<p>ethnic cleansing
<xref ref-type="page" rid="page_127">127</xref>
</p>
</list-item>
<list-item>
<p>Euben, R.L.
<xref ref-type="page" rid="page_3">3</xref>
</p>
</list-item>
<list-item>
<p>Europe: security concerns over Balkan conflicts
<xref ref-type="page" rid="page_192">192</xref>
</p>
</list-item>
<list-item>
<p>extraordinary rendition
<xref ref-type="page" rid="page_175">175</xref>
</p>
</list-item>
<list-item>
<p>failed states
<xref ref-type="page" rid="page_125">125</xref>
; alignment with terrorist threat
<xref ref-type="page" rid="page_129">129</xref>
,
<xref ref-type="page" rid="page_136">136</xref>
<xref ref-type="page" rid="page_138">8</xref>
,
<xref ref-type="page" rid="page_140">140</xref>
,
<xref ref-type="page" rid="page_194">194</xref>
; move to centre of global politics post-9/11
<xref ref-type="page" rid="page_128">128</xref>
<xref ref-type="page" rid="page_129">9</xref>
; North’s response to
<xref ref-type="page" rid="page_132">132</xref>
<xref ref-type="page" rid="page_133">3</xref>
,
<xref ref-type="page" rid="page_139">139</xref>
<xref ref-type="page" rid="page_140">40</xref>
; in spaces of exception
<xref ref-type="page" rid="page_132">132</xref>
</p>
</list-item>
<list-item>
<p>Falluja
<xref ref-type="page" rid="page_18">18</xref>
<xref ref-type="page" rid="page_19">19</xref>
,
<xref ref-type="page" rid="page_75">75</xref>
,
<xref ref-type="page" rid="page_103">103</xref>
</p>
</list-item>
<list-item>
<p>
<italic>fatwa</italic>
: Bin Laden’s declaration (1998)
<xref ref-type="page" rid="page_33">33</xref>
,
<xref ref-type="page" rid="page_35">35</xref>
</p>
</list-item>
<list-item>
<p>Fauci, Anthony
<xref ref-type="page" rid="page_146">146</xref>
</p>
</list-item>
<list-item>
<p>fear, politics of
<xref ref-type="page" rid="page_60">60</xref>
,
<xref ref-type="page" rid="page_61">61</xref>
,
<xref ref-type="page" rid="page_68">68</xref>
</p>
</list-item>
<list-item>
<p>Federation of American Scientists (FAS)
<xref ref-type="page" rid="page_152">152</xref>
</p>
</list-item>
<list-item>
<p>Feinstein, L.
<xref ref-type="page" rid="page_115">115</xref>
</p>
</list-item>
<list-item>
<p>Feith, Douglas
<xref ref-type="page" rid="page_17">17</xref>
<xref ref-type="page" rid="page_18">18</xref>
</p>
</list-item>
<list-item>
<p>Feliciano, F.P.
<xref ref-type="page" rid="page_119">119</xref>
<xref ref-type="page" rid="page_120">20</xref>
</p>
</list-item>
<list-item>
<p>feminism: analysis of war on terror’s effect on women’s security
<xref ref-type="page" rid="page_42">42</xref>
,
<xref ref-type="page" rid="page_43">43</xref>
,
<xref ref-type="page" rid="page_49">49</xref>
,
<xref ref-type="page" rid="page_52">52</xref>
<xref ref-type="page" rid="page_53">3</xref>
</p>
</list-item>
<list-item>
<p>Ferejohn, John
<xref ref-type="page" rid="page_130">130</xref>
</p>
</list-item>
<list-item>
<p>
<xref id="page_227" ref-type="page"></xref>
finance
<italic>see</italic>
countering financing of terrorism</p>
</list-item>
<list-item>
<p>Financial Action Task Force (FATF)
<xref ref-type="page" rid="page_179">179</xref>
<xref ref-type="page" rid="page_181">81</xref>
,
<xref ref-type="page" rid="page_184">184</xref>
<xref ref-type="page" rid="page_185">5</xref>
</p>
</list-item>
<list-item>
<p>Fiorill, J.
<xref ref-type="page" rid="page_144">144</xref>
</p>
</list-item>
<list-item>
<p>First Gulf War (1991)
<xref ref-type="page" rid="page_96">96</xref>
,
<xref ref-type="page" rid="page_195">195</xref>
</p>
</list-item>
<list-item>
<p>First World War
<xref ref-type="page" rid="page_45">45</xref>
,
<xref ref-type="page" rid="page_98">98</xref>
<xref ref-type="page" rid="page_99">9</xref>
</p>
</list-item>
<list-item>
<p>Food and Drug Administration (FDA)
<xref ref-type="page" rid="page_143">143</xref>
</p>
</list-item>
<list-item>
<p>force: Clausewitzian concept
<xref ref-type="page" rid="page_27">27</xref>
<xref ref-type="page" rid="page_28">8</xref>
,
<xref ref-type="page" rid="page_31">31</xref>
,
<xref ref-type="page" rid="page_41">41</xref>
; in just wars
<xref ref-type="page" rid="page_95">95</xref>
<xref ref-type="page" rid="page_96">6</xref>
,
<xref ref-type="page" rid="page_97">97</xref>
; language of
<xref ref-type="page" rid="page_134">134</xref>
<xref ref-type="page" rid="page_135">5</xref>
; new concepts
<xref ref-type="page" rid="page_28">28</xref>
<xref ref-type="page" rid="page_29">9</xref>
; new US strategies
<xref ref-type="page" rid="page_31">31</xref>
,
<xref ref-type="page" rid="page_117">117</xref>
<xref ref-type="page" rid="page_118">18</xref>
,
<xref ref-type="page" rid="page_134">134</xref>
; and right of pre-emption
<xref ref-type="page" rid="page_121">121</xref>
; right to use in self-defence
<xref ref-type="page" rid="page_106">106</xref>
;
<italic>see also</italic>
military force</p>
</list-item>
<list-item>
<p>
<italic>Foreign Affairs</italic>
<xref ref-type="page" rid="page_58">58</xref>
</p>
</list-item>
<list-item>
<p>foreign policy: Bush administration’s macho approach
<xref ref-type="page" rid="page_135">135</xref>
; post-9/11 realist reactionism
<xref ref-type="page" rid="page_190">190</xref>
; powerful states
<xref ref-type="page" rid="page_191">191</xref>
</p>
</list-item>
<list-item>
<p>Forsyth, John
<xref ref-type="page" rid="page_112">112</xref>
</p>
</list-item>
<list-item>
<p>Foucault, Michel
<xref ref-type="page" rid="page_131">131</xref>
</p>
</list-item>
<list-item>
<p>France
<xref ref-type="page" rid="page_83">83</xref>
,
<xref ref-type="page" rid="page_159">159</xref>
,
<xref ref-type="page" rid="page_194">194</xref>
</p>
</list-item>
<list-item>
<p>Freedman, L.
<xref ref-type="page" rid="page_12">12</xref>
,
<xref ref-type="page" rid="page_102">102</xref>
</p>
</list-item>
<list-item>
<p>Frum, D.
<xref ref-type="page" rid="page_116">116</xref>
</p>
</list-item>
<list-item>
<p>Fukuyama, Francis
<xref ref-type="page" rid="page_33">33</xref>
,
<xref ref-type="page" rid="page_128">128</xref>
,
<xref ref-type="page" rid="page_191">191</xref>
</p>
</list-item>
<list-item>
<p>G7 members
<xref ref-type="page" rid="page_178">178</xref>
<xref ref-type="page" rid="page_179">9</xref>
,
<xref ref-type="page" rid="page_184">184</xref>
</p>
</list-item>
<list-item>
<p>Garner, Jay
<xref ref-type="page" rid="page_18">18</xref>
</p>
</list-item>
<list-item>
<p>Gaza
<xref ref-type="page" rid="page_26">26</xref>
,
<xref ref-type="page" rid="page_31">31</xref>
,
<xref ref-type="page" rid="page_35">35</xref>
</p>
</list-item>
<list-item>
<p>Gazit, Shlomo
<xref ref-type="page" rid="page_27">27</xref>
</p>
</list-item>
<list-item>
<p>gendered identities
<xref ref-type="page" rid="page_43">43</xref>
,
<xref ref-type="page" rid="page_44">44</xref>
,
<xref ref-type="page" rid="page_45">45</xref>
,
<xref ref-type="page" rid="page_47">47</xref>
<xref ref-type="page" rid="page_48">8</xref>
,
<xref ref-type="page" rid="page_49">49</xref>
,
<xref ref-type="page" rid="page_53">53</xref>
</p>
</list-item>
<list-item>
<p>Geneva Conventions
<xref ref-type="page" rid="page_40">40</xref>
,
<xref ref-type="page" rid="page_80">80</xref>
; issues regarding Guantanamo detainees
<xref ref-type="page" rid="page_72">72</xref>
,
<xref ref-type="page" rid="page_73">73</xref>
,
<xref ref-type="page" rid="page_84">84</xref>
,
<xref ref-type="page" rid="page_85">85</xref>
,
<xref ref-type="page" rid="page_86">86</xref>
,
<xref ref-type="page" rid="page_88">88</xref>
<xref ref-type="page" rid="page_89">9</xref>
; liberal states’ ability to create legal excepions to
<xref ref-type="page" rid="page_75">75</xref>
; US deviations from
<xref ref-type="page" rid="page_73">73</xref>
,
<xref ref-type="page" rid="page_85">85</xref>
,
<xref ref-type="page" rid="page_103">103</xref>
</p>
</list-item>
<list-item>
<p>genocides
<xref ref-type="page" rid="page_127">127</xref>
,
<xref ref-type="page" rid="page_192">192</xref>
</p>
</list-item>
<list-item>
<p>Germany
<xref ref-type="page" rid="page_4">4</xref>
,
<xref ref-type="page" rid="page_112">112</xref>
,
<xref ref-type="page" rid="page_117">117</xref>
,
<xref ref-type="page" rid="page_186">186</xref>
;
<italic>see also</italic>
West Germany</p>
</list-item>
<list-item>
<p>Gilpin, Robert
<xref ref-type="page" rid="page_127">127</xref>
</p>
</list-item>
<list-item>
<p>Glennon, M.J.
<xref ref-type="page" rid="page_116">116</xref>
</p>
</list-item>
<list-item>
<p>‘global commons’
<xref ref-type="page" rid="page_31">31</xref>
</p>
</list-item>
<list-item>
<p>global war on terror (GWoT): Bush doctrine
<xref ref-type="page" rid="page_11">11</xref>
<xref ref-type="page" rid="page_12">12</xref>
,
<xref ref-type="page" rid="page_103">103</xref>
; effects on security and international relations
<xref ref-type="page" rid="page_10">10</xref>
<xref ref-type="page" rid="page_11">11</xref>
; Pentagon’s agenda for transformation
<xref ref-type="page" rid="page_30">30</xref>
<xref ref-type="page" rid="page_31">1</xref>
; problematic nature of term
<xref ref-type="page" rid="page_1">1</xref>
<xref ref-type="page" rid="page_2">2</xref>
,
<xref ref-type="page" rid="page_12">12</xref>
<xref ref-type="page" rid="page_13">13</xref>
; in Sharon’s justification of force against Palestinians
<xref ref-type="page" rid="page_36">36</xref>
</p>
</list-item>
<list-item>
<p>Godfrey, E.D.
<xref ref-type="page" rid="page_161">161</xref>
</p>
</list-item>
<list-item>
<p>Goldgeier, James
<xref ref-type="page" rid="page_127">127</xref>
</p>
</list-item>
<list-item>
<p>good and evil: Bush and Blair’s rhetoric
<xref ref-type="page" rid="page_60">60</xref>
,
<xref ref-type="page" rid="page_98">98</xref>
; Manichean narratives
<xref ref-type="page" rid="page_10">10</xref>
,
<xref ref-type="page" rid="page_19">19</xref>
,
<xref ref-type="page" rid="page_134">134</xref>
</p>
</list-item>
<list-item>
<p>Gore, Al
<xref ref-type="page" rid="page_61">61</xref>
</p>
</list-item>
<list-item>
<p>Graner, Charles
<xref ref-type="page" rid="page_48">48</xref>
<xref ref-type="page" rid="page_49">9</xref>
</p>
</list-item>
<list-item>
<p>Gray, Chris Hables
<xref ref-type="page" rid="page_28">28</xref>
</p>
</list-item>
<list-item>
<p>Greece
<xref ref-type="page" rid="page_110">110</xref>
</p>
</list-item>
<list-item>
<p>Greek civilisation
<italic>see</italic>
Athenian empire</p>
</list-item>
<list-item>
<p>Greenberg, Karen
<xref ref-type="page" rid="page_164">164</xref>
</p>
</list-item>
<list-item>
<p>Greener-Barcham, Beth
<xref ref-type="page" rid="page_138">138</xref>
</p>
</list-item>
<list-item>
<p>Greenwood, C.
<xref ref-type="page" rid="page_80">80</xref>
</p>
</list-item>
<list-item>
<p>Gross, O.
<xref ref-type="page" rid="page_75">75</xref>
</p>
</list-item>
<list-item>
<p>Grotius, Hugo
<xref ref-type="page" rid="page_93">93</xref>
,
<xref ref-type="page" rid="page_100">100</xref>
,
<xref ref-type="page" rid="page_101">101</xref>
<xref ref-type="page" rid="page_102">2</xref>
,
<xref ref-type="page" rid="page_104">104</xref>
,
<xref ref-type="page" rid="page_108">108</xref>
</p>
</list-item>
<list-item>
<p>Guantanamo Bay: Agamben’s view as zone of anomie
<xref ref-type="page" rid="page_78">78</xref>
,
<xref ref-type="page" rid="page_79">79</xref>
,
<xref ref-type="page" rid="page_87">87</xref>
,
<xref ref-type="page" rid="page_89">89</xref>
; Camp X-Ray
<xref ref-type="page" rid="page_40">40</xref>
,
<xref ref-type="page" rid="page_103">103</xref>
; case of David Hicks
<xref ref-type="page" rid="page_72">72</xref>
<xref ref-type="page" rid="page_73">3</xref>
,
<xref ref-type="page" rid="page_81">81</xref>
<xref ref-type="page" rid="page_84">4</xref>
,
<xref ref-type="page" rid="page_87">87</xref>
,
<xref ref-type="page" rid="page_89">89</xref>
,
<xref ref-type="page" rid="page_90">90</xref>
,
<xref ref-type="page" rid="page_91">91</xref>
; case of Salim Ahmed Hamdan
<xref ref-type="page" rid="page_84">84</xref>
<xref ref-type="page" rid="page_86">6</xref>
,
<xref ref-type="page" rid="page_89">89</xref>
; conditions of detention
<xref ref-type="page" rid="page_71">71</xref>
<xref ref-type="page" rid="page_72">2</xref>
; goals pursued by US
<xref ref-type="page" rid="page_165">165</xref>
,
<xref ref-type="page" rid="page_197">197</xref>
; key points regarding legal status
<xref ref-type="page" rid="page_86">86</xref>
<xref ref-type="page" rid="page_91">91</xref>
,
<xref ref-type="page" rid="page_167">167</xref>
; legalist challenge
<xref ref-type="page" rid="page_79">79</xref>
<xref ref-type="page" rid="page_81">81</xref>
,
<xref ref-type="page" rid="page_89">89</xref>
; legal status of detainees
<xref ref-type="page" rid="page_72">72</xref>
,
<xref ref-type="page" rid="page_73">73</xref>
<xref ref-type="page" rid="page_75">5</xref>
,
<xref ref-type="page" rid="page_87">87</xref>
</p>
</list-item>
<list-item>
<p>Hague Conventions
<xref ref-type="page" rid="page_85">85</xref>
</p>
</list-item>
<list-item>
<p>Haitian refugees
<xref ref-type="page" rid="page_74">74</xref>
</p>
</list-item>
<list-item>
<p>Halliday, F.
<xref ref-type="page" rid="page_1">1</xref>
</p>
</list-item>
<list-item>
<p>Halper, Stefan
<xref ref-type="page" rid="page_135">135</xref>
,
<xref ref-type="page" rid="page_195">195</xref>
</p>
</list-item>
<list-item>
<p>Hamas
<xref ref-type="page" rid="page_31">31</xref>
,
<xref ref-type="page" rid="page_35">35</xref>
,
<xref ref-type="page" rid="page_40">40</xref>
</p>
</list-item>
<list-item>
<p>Hamburg
<xref ref-type="page" rid="page_186">186</xref>
</p>
</list-item>
<list-item>
<p>Hamdan, Salim Ahmed
<xref ref-type="page" rid="page_84">84</xref>
<xref ref-type="page" rid="page_85">5</xref>
,
<xref ref-type="page" rid="page_88">88</xref>
,
<xref ref-type="page" rid="page_89">89</xref>
</p>
</list-item>
<list-item>
<p>
<italic>Hamdan v. Rumsfeld</italic>
case
<xref ref-type="page" rid="page_83">83</xref>
,
<xref ref-type="page" rid="page_84">84</xref>
<xref ref-type="page" rid="page_86">6</xref>
,
<xref ref-type="page" rid="page_87">87</xref>
</p>
</list-item>
<list-item>
<p>Harman, Sabrina
<xref ref-type="page" rid="page_48">48</xref>
</p>
</list-item>
<list-item>
<p>Hatfill, Steven
<xref ref-type="page" rid="page_148">148</xref>
</p>
</list-item>
<list-item>
<p>Herat
<xref ref-type="page" rid="page_17">17</xref>
</p>
</list-item>
<list-item>
<p>Hezb-i-Islami
<xref ref-type="page" rid="page_17">17</xref>
</p>
</list-item>
<list-item>
<p>Hezbollah
<xref ref-type="page" rid="page_34">34</xref>
<xref ref-type="page" rid="page_35">5</xref>
,
<xref ref-type="page" rid="page_40">40</xref>
</p>
</list-item>
<list-item>
<p>Hicks, David
<xref ref-type="page" rid="page_72">72</xref>
<xref ref-type="page" rid="page_73">3</xref>
,
<xref ref-type="page" rid="page_81">81</xref>
<xref ref-type="page" rid="page_84">4</xref>
,
<xref ref-type="page" rid="page_87">87</xref>
,
<xref ref-type="page" rid="page_89">89</xref>
,
<xref ref-type="page" rid="page_90">90</xref>
,
<xref ref-type="page" rid="page_91">91</xref>
</p>
</list-item>
<list-item>
<p>
<italic>hijab</italic>
(veil)
<xref ref-type="page" rid="page_43">43</xref>
,
<xref ref-type="page" rid="page_51">51</xref>
</p>
</list-item>
<list-item>
<p>Hills, Alice
<xref ref-type="page" rid="page_18">18</xref>
<xref ref-type="page" rid="page_19">19</xref>
</p>
</list-item>
<list-item>
<p>Hindess, Barry
<xref ref-type="page" rid="page_132">132</xref>
</p>
</list-item>
<list-item>
<p>Hiroshima
<xref ref-type="page" rid="page_39">39</xref>
</p>
</list-item>
<list-item>
<p>Hobbes, Thomas
<xref ref-type="page" rid="page_68">68</xref>
,
<xref ref-type="page" rid="page_132">132</xref>
,
<xref ref-type="page" rid="page_135">135</xref>
,
<xref ref-type="page" rid="page_158">158</xref>
</p>
</list-item>
<list-item>
<p>Hoffman, Paul
<xref ref-type="page" rid="page_76">76</xref>
,
<xref ref-type="page" rid="page_79">79</xref>
</p>
</list-item>
<list-item>
<p>homeland defense
<xref ref-type="page" rid="page_14">14</xref>
</p>
</list-item>
<list-item>
<p>
<italic>homo sacer</italic>
<xref ref-type="page" rid="page_131">131</xref>
<xref ref-type="page" rid="page_132">2</xref>
,
<xref ref-type="page" rid="page_140">140</xref>
</p>
</list-item>
<list-item>
<p>honour killings
<xref ref-type="page" rid="page_51">51</xref>
</p>
</list-item>
<list-item>
<p>Howard, John
<xref ref-type="page" rid="page_136">136</xref>
,
<xref ref-type="page" rid="page_137">137</xref>
</p>
</list-item>
<list-item>
<p>humanitarian interventions
<xref ref-type="page" rid="page_127">127</xref>
,
<xref ref-type="page" rid="page_128">128</xref>
,
<xref ref-type="page" rid="page_129">129</xref>
,
<xref ref-type="page" rid="page_140">140</xref>
</p>
</list-item>
<list-item>
<p>human rights: issues in intelligence gathering
<xref ref-type="page" rid="page_167">167</xref>
,
<xref ref-type="page" rid="page_175">175</xref>
</p>
</list-item>
<list-item>
<p>human rights abuses: against Guantanamo Bay detainees
<xref ref-type="page" rid="page_71">71</xref>
<xref ref-type="page" rid="page_72">2</xref>
,
<xref ref-type="page" rid="page_74">74</xref>
; in interrogation of suspected terrorists
<xref ref-type="page" rid="page_164">164</xref>
</p>
</list-item>
<list-item>
<p>Humphreys, S.
<xref ref-type="page" rid="page_77">77</xref>
</p>
</list-item>
<list-item>
<p>Huntington, Samuel
<xref ref-type="page" rid="page_61">61</xref>
</p>
</list-item>
<list-item>
<p>Hunt, S.
<xref ref-type="page" rid="page_52">52</xref>
</p>
</list-item>
<list-item>
<p>
<xref id="page_228" ref-type="page"></xref>
Hussein, Saddam
<xref ref-type="page" rid="page_35">35</xref>
,
<xref ref-type="page" rid="page_47">47</xref>
,
<xref ref-type="page" rid="page_133">133</xref>
; overthrowing of
<xref ref-type="page" rid="page_40">40</xref>
,
<xref ref-type="page" rid="page_195">195</xref>
<xref ref-type="page" rid="page_196">6</xref>
; women’s rights under
<xref ref-type="page" rid="page_51">51</xref>
,
<xref ref-type="page" rid="page_52">52</xref>
</p>
</list-item>
<list-item>
<p>Huxsoll, David
<xref ref-type="page" rid="page_151">151</xref>
</p>
</list-item>
<list-item>
<p>identity: emotions linked with
<xref ref-type="page" rid="page_57">57</xref>
,
<xref ref-type="page" rid="page_59">59</xref>
<xref ref-type="page" rid="page_60">60</xref>
,
<xref ref-type="page" rid="page_61">61</xref>
<xref ref-type="page" rid="page_62">2</xref>
,
<xref ref-type="page" rid="page_63">63</xref>
,
<xref ref-type="page" rid="page_64">64</xref>
<xref ref-type="page" rid="page_67">7</xref>
; importance in approach to security policy
<xref ref-type="page" rid="page_66">66</xref>
<xref ref-type="page" rid="page_67">7</xref>
,
<xref ref-type="page" rid="page_68">68</xref>
</p>
</list-item>
<list-item>
<p>Ignatieff, Michael
<xref ref-type="page" rid="page_128">128</xref>
</p>
</list-item>
<list-item>
<p>Ikenberry, J.G.
<xref ref-type="page" rid="page_106">106</xref>
</p>
</list-item>
<list-item>
<p>India
<xref ref-type="page" rid="page_12">12</xref>
,
<xref ref-type="page" rid="page_19">19</xref>
,
<xref ref-type="page" rid="page_117">117</xref>
</p>
</list-item>
<list-item>
<p>Indonesia
<xref ref-type="page" rid="page_2">2</xref>
,
<xref ref-type="page" rid="page_16">16</xref>
</p>
</list-item>
<list-item>
<p>industrial warfare: First World War
<xref ref-type="page" rid="page_98">98</xref>
<xref ref-type="page" rid="page_99">9</xref>
; outdated concept
<xref ref-type="page" rid="page_28">28</xref>
; weapons of 9/11 attack
<xref ref-type="page" rid="page_12">12</xref>
</p>
</list-item>
<list-item>
<p>Indyk, Martin
<xref ref-type="page" rid="page_133">133</xref>
</p>
</list-item>
<list-item>
<p>information technology
<xref ref-type="page" rid="page_15">15</xref>
,
<xref ref-type="page" rid="page_22">22</xref>
</p>
</list-item>
<list-item>
<p>insurgency
<xref ref-type="page" rid="page_22">22</xref>
<xref ref-type="page" rid="page_23">3</xref>
</p>
</list-item>
<list-item>
<p>intelligence gathering
<xref ref-type="page" rid="page_156">156</xref>
; before war on terror
<xref ref-type="page" rid="page_158">158</xref>
; ethical guidelines
<xref ref-type="page" rid="page_172">172</xref>
<xref ref-type="page" rid="page_174">4</xref>
; ethical objections and justifications
<xref ref-type="page" rid="page_156">156</xref>
<xref ref-type="page" rid="page_158">8</xref>
; methods of collection
<xref ref-type="page" rid="page_160">160</xref>
<xref ref-type="page" rid="page_163">3</xref>
; pressures to expand means of
<xref ref-type="page" rid="page_164">164</xref>
<xref ref-type="page" rid="page_165">5</xref>
; since 9/11
<xref ref-type="page" rid="page_163">163</xref>
<xref ref-type="page" rid="page_164">4</xref>
; those targeted for
<xref ref-type="page" rid="page_158">158</xref>
<xref ref-type="page" rid="page_160">60</xref>
; in war on terror
<xref ref-type="page" rid="page_166">166</xref>
,
<xref ref-type="page" rid="page_167">167</xref>
<xref ref-type="page" rid="page_172">72</xref>
</p>
</list-item>
<list-item>
<p>International Atomic Energy Agency
<xref ref-type="page" rid="page_20">20</xref>
</p>
</list-item>
<list-item>
<p>International Committee of the Red Cross (ICRC)
<xref ref-type="page" rid="page_71">71</xref>
</p>
</list-item>
<list-item>
<p>International Convention Against Torture (1984)
<xref ref-type="page" rid="page_158">158</xref>
,
<xref ref-type="page" rid="page_170">170</xref>
,
<xref ref-type="page" rid="page_175">175</xref>
</p>
</list-item>
<list-item>
<p>International Court of Justice (ICJ)
<xref ref-type="page" rid="page_110">110</xref>
,
<xref ref-type="page" rid="page_110">110</xref>
<xref ref-type="page" rid="page_111">11</xref>
,
<xref ref-type="page" rid="page_119">119</xref>
</p>
</list-item>
<list-item>
<p>International Covenant on Civil and Political Rights (ICCPR)
<xref ref-type="page" rid="page_79">79</xref>
,
<xref ref-type="page" rid="page_80">80</xref>
</p>
</list-item>
<list-item>
<p>International Institute of Strategic Studies
<xref ref-type="page" rid="page_32">32</xref>
</p>
</list-item>
<list-item>
<p>international law: concerns regarding Guantanamo Bay
<xref ref-type="page" rid="page_73">73</xref>
,
<xref ref-type="page" rid="page_75">75</xref>
<xref ref-type="page" rid="page_76">6</xref>
,
<xref ref-type="page" rid="page_79">79</xref>
,
<xref ref-type="page" rid="page_80">80</xref>
,
<xref ref-type="page" rid="page_87">87</xref>
,
<xref ref-type="page" rid="page_88">88</xref>
; illegality of Bush’s pre-emptive self-defence
<xref ref-type="page" rid="page_11">11</xref>
; new liberal arguments for re-ordering of
<xref ref-type="page" rid="page_113">113</xref>
,
<xref ref-type="page" rid="page_115">115</xref>
; new realists’ view of
<xref ref-type="page" rid="page_113">113</xref>
,
<xref ref-type="page" rid="page_115">115</xref>
<xref ref-type="page" rid="page_117">17</xref>
; right to use self-defence
<xref ref-type="page" rid="page_109">109</xref>
<xref ref-type="page" rid="page_114">14</xref>
</p>
</list-item>
<list-item>
<p>International Monetary Fund (IMF)
<xref ref-type="page" rid="page_179">179</xref>
</p>
</list-item>
<list-item>
<p>international relations: effect of global war on terrorism on
<xref ref-type="page" rid="page_11">11</xref>
; North–South divide in post-Cold War analyses
<xref ref-type="page" rid="page_129">129</xref>
</p>
</list-item>
<list-item>
<p>International Security Assistance Force (ISAF)
<xref ref-type="page" rid="page_16">16</xref>
</p>
</list-item>
<list-item>
<p>Iqbal, Asif
<xref ref-type="page" rid="page_81">81</xref>
</p>
</list-item>
<list-item>
<p>Iran
<xref ref-type="page" rid="page_19">19</xref>
,
<xref ref-type="page" rid="page_20">20</xref>
</p>
</list-item>
<list-item>
<p>Iraq: alleged program for WMD
<xref ref-type="page" rid="page_2">2</xref>
; current state of chaos and fuelling of terrorism
<xref ref-type="page" rid="page_138">138</xref>
,
<xref ref-type="page" rid="page_196">196</xref>
; as failed state
<xref ref-type="page" rid="page_138">138</xref>
; Israel’s air strike against nuclear reactor
<xref ref-type="page" rid="page_111">111</xref>
; Muslims killed by US and Israel in past decade
<xref ref-type="page" rid="page_33">33</xref>
<xref ref-type="page" rid="page_34">4</xref>
; new constitution
<xref ref-type="page" rid="page_51">51</xref>
<xref ref-type="page" rid="page_52">2</xref>
; policies for reconstruction
<xref ref-type="page" rid="page_17">17</xref>
<xref ref-type="page" rid="page_19">19</xref>
; al Qaeda
<xref ref-type="page" rid="page_22">22</xref>
,
<xref ref-type="page" rid="page_23">23</xref>
; as rogue state
<xref ref-type="page" rid="page_133">133</xref>
; suicide bombings
<xref ref-type="page" rid="page_58">58</xref>
; US non-proliferation strategy
<xref ref-type="page" rid="page_19">19</xref>
; US strategies of force
<xref ref-type="page" rid="page_31">31</xref>
</p>
</list-item>
<list-item>
<p>Iraqi Lawyers Association
<xref ref-type="page" rid="page_51">51</xref>
</p>
</list-item>
<list-item>
<p>Iraqi women: worsening of security situation
<xref ref-type="page" rid="page_49">49</xref>
<xref ref-type="page" rid="page_52">52</xref>
</p>
</list-item>
<list-item>
<p>Iraq war: as anticipatory war
<xref ref-type="page" rid="page_97">97</xref>
; attempts to justify
<xref ref-type="page" rid="page_98">98</xref>
,
<xref ref-type="page" rid="page_194">194</xref>
<xref ref-type="page" rid="page_195">5</xref>
; dramatic rescue of Private Jessica Lynch
<xref ref-type="page" rid="page_46">46</xref>
<xref ref-type="page" rid="page_49">9</xref>
; final economic cost to US
<xref ref-type="page" rid="page_10">10</xref>
; new paradigm of war
<xref ref-type="page" rid="page_28">28</xref>
; as response to terrorism
<xref ref-type="page" rid="page_3">3</xref>
,
<xref ref-type="page" rid="page_4">4</xref>
,
<xref ref-type="page" rid="page_27">27</xref>
,
<xref ref-type="page" rid="page_36">36</xref>
,
<xref ref-type="page" rid="page_61">61</xref>
,
<xref ref-type="page" rid="page_194">194</xref>
; worsening security situation of women
<xref ref-type="page" rid="page_49">49</xref>
<xref ref-type="page" rid="page_52">52</xref>
</p>
</list-item>
<list-item>
<p>Irgun/Stern Gang
<xref ref-type="page" rid="page_20">20</xref>
</p>
</list-item>
<list-item>
<p>Irish Republican Army (IRA)
<xref ref-type="page" rid="page_178">178</xref>
; Provisional IRA
<xref ref-type="page" rid="page_20">20</xref>
; Real IRA
<xref ref-type="page" rid="page_20">20</xref>
,
<xref ref-type="page" rid="page_21">21</xref>
</p>
</list-item>
<list-item>
<p>Islamic charities
<xref ref-type="page" rid="page_180">180</xref>
,
<xref ref-type="page" rid="page_186">186</xref>
</p>
</list-item>
<list-item>
<p>Islamic fundamentalism: Afghanistan
<xref ref-type="page" rid="page_46">46</xref>
; post-invasion Iraq
<xref ref-type="page" rid="page_51">51</xref>
</p>
</list-item>
<list-item>
<p>Islamism: arguments for killing of civilians
<xref ref-type="page" rid="page_34">34</xref>
; interpretations of Western actions
<xref ref-type="page" rid="page_39">39</xref>
; linked with terrorism
<xref ref-type="page" rid="page_1">1</xref>
,
<xref ref-type="page" rid="page_192">192</xref>
; in new Iraqi constitution
<xref ref-type="page" rid="page_52">52</xref>
; prime importance of religious identity
<xref ref-type="page" rid="page_33">33</xref>
; rise of movements
<xref ref-type="page" rid="page_14">14</xref>
</p>
</list-item>
<list-item>
<p>Israel: Hezbollah’s guerilla war with
<xref ref-type="page" rid="page_35">35</xref>
; killing of Muslims in Iraq and Palestine
<xref ref-type="page" rid="page_33">33</xref>
<xref ref-type="page" rid="page_34">4</xref>
; military operations against Palestinians
<xref ref-type="page" rid="page_27">27</xref>
,
<xref ref-type="page" rid="page_31">31</xref>
,
<xref ref-type="page" rid="page_36">36</xref>
; policies of causal importance to 9/11
<xref ref-type="page" rid="page_26">26</xref>
<xref ref-type="page" rid="page_27">7</xref>
; possession of nuclear weapons
<xref ref-type="page" rid="page_19">19</xref>
; pre-9/11 Islamist terrorism against
<xref ref-type="page" rid="page_2">2</xref>
; pre-emptive attacks by
<xref ref-type="page" rid="page_111">111</xref>
,
<xref ref-type="page" rid="page_119">119</xref>
; war on Lebanon (2006)
<xref ref-type="page" rid="page_26">26</xref>
,
<xref ref-type="page" rid="page_31">31</xref>
,
<xref ref-type="page" rid="page_38">38</xref>
</p>
</list-item>
<list-item>
<p>Italy
<xref ref-type="page" rid="page_178">178</xref>
</p>
</list-item>
<list-item>
<p>Al Itihad Al Islamiya
<xref ref-type="page" rid="page_15">15</xref>
</p>
</list-item>
<list-item>
<p>Jackson, Richard
<xref ref-type="page" rid="page_40">40</xref>
</p>
</list-item>
<list-item>
<p>Jakarta: bombing of Australian embassy
<xref ref-type="page" rid="page_36">36</xref>
,
<xref ref-type="page" rid="page_37">37</xref>
</p>
</list-item>
<list-item>
<p>James, William
<xref ref-type="page" rid="page_64">64</xref>
</p>
</list-item>
<list-item>
<p>Al Jazeera
<xref ref-type="page" rid="page_25">25</xref>
</p>
</list-item>
<list-item>
<p>Jemaah Islamiyah
<xref ref-type="page" rid="page_36">36</xref>
</p>
</list-item>
<list-item>
<p>
<italic>The Jerusalem Post</italic>
<xref ref-type="page" rid="page_32">32</xref>
<xref ref-type="page" rid="page_33">3</xref>
</p>
</list-item>
<list-item>
<p>jihad
<xref ref-type="page" rid="page_21">21</xref>
,
<xref ref-type="page" rid="page_34">34</xref>
<xref ref-type="page" rid="page_35">5</xref>
,
<xref ref-type="page" rid="page_40">40</xref>
,
<xref ref-type="page" rid="page_196">196</xref>
</p>
</list-item>
<list-item>
<p>Johns, Fleur
<xref ref-type="page" rid="page_79">79</xref>
</p>
</list-item>
<list-item>
<p>Johnson, James Turner
<xref ref-type="page" rid="page_4">4</xref>
,
<xref ref-type="page" rid="page_93">93</xref>
,
<xref ref-type="page" rid="page_95">95</xref>
<xref ref-type="page" rid="page_96">6</xref>
,
<xref ref-type="page" rid="page_97">97</xref>
,
<xref ref-type="page" rid="page_98">98</xref>
,
<xref ref-type="page" rid="page_99">99</xref>
<xref ref-type="page" rid="page_100">100</xref>
,
<xref ref-type="page" rid="page_102">102</xref>
</p>
</list-item>
<list-item>
<p>
<xref id="page_229" ref-type="page"></xref>
Johnson, William
<xref ref-type="page" rid="page_174">174</xref>
</p>
</list-item>
<list-item>
<p>Jones, R.V.
<xref ref-type="page" rid="page_159">159</xref>
,
<xref ref-type="page" rid="page_160">160</xref>
</p>
</list-item>
<list-item>
<p>Jones, Seth
<xref ref-type="page" rid="page_16">16</xref>
<xref ref-type="page" rid="page_17">17</xref>
</p>
</list-item>
<list-item>
<p>Jordan
<xref ref-type="page" rid="page_50">50</xref>
</p>
</list-item>
<list-item>
<p>just war: contemporary theories
<xref ref-type="page" rid="page_93">93</xref>
<xref ref-type="page" rid="page_97">7</xref>
,
<xref ref-type="page" rid="page_102">102</xref>
,
<xref ref-type="page" rid="page_103">103</xref>
<xref ref-type="page" rid="page_104">4</xref>
; importance of
<italic>Caroline</italic>
case
<xref ref-type="page" rid="page_107">107</xref>
,
<xref ref-type="page" rid="page_113">113</xref>
,
<xref ref-type="page" rid="page_118">118</xref>
; and notion of vindictive justice
<xref ref-type="page" rid="page_100">100</xref>
<xref ref-type="page" rid="page_102">2</xref>
; in self-defence
<xref ref-type="page" rid="page_99">99</xref>
<xref ref-type="page" rid="page_100">100</xref>
,
<xref ref-type="page" rid="page_106">106</xref>
,
<xref ref-type="page" rid="page_108">108</xref>
<xref ref-type="page" rid="page_109">9</xref>
</p>
</list-item>
<list-item>
<p>Kabul
<xref ref-type="page" rid="page_16">16</xref>
</p>
</list-item>
<list-item>
<p>Kaldor, Mary
<xref ref-type="page" rid="page_28">28</xref>
,
<xref ref-type="page" rid="page_127">127</xref>
,
<xref ref-type="page" rid="page_191">191</xref>
</p>
</list-item>
<list-item>
<p>Kandahar
<xref ref-type="page" rid="page_17">17</xref>
,
<xref ref-type="page" rid="page_82">82</xref>
</p>
</list-item>
<list-item>
<p>Kant, Immanuel
<xref ref-type="page" rid="page_131">131</xref>
,
<xref ref-type="page" rid="page_157">157</xref>
</p>
</list-item>
<list-item>
<p>Karprinski, Colonel Janis
<xref ref-type="page" rid="page_49">49</xref>
</p>
</list-item>
<list-item>
<p>Karzai, Hamid
<xref ref-type="page" rid="page_16">16</xref>
</p>
</list-item>
<list-item>
<p>Keenan, Tom
<xref ref-type="page" rid="page_135">135</xref>
</p>
</list-item>
<list-item>
<p>Keene, Edward
<xref ref-type="page" rid="page_128">128</xref>
</p>
</list-item>
<list-item>
<p>Kellogg-Briand Pact (1928)
<xref ref-type="page" rid="page_99">99</xref>
,
<xref ref-type="page" rid="page_109">109</xref>
</p>
</list-item>
<list-item>
<p>Kelsen, Hans
<xref ref-type="page" rid="page_110">110</xref>
</p>
</list-item>
<list-item>
<p>Kenya
<xref ref-type="page" rid="page_16">16</xref>
</p>
</list-item>
<list-item>
<p>Kerry, John
<xref ref-type="page" rid="page_25">25</xref>
</p>
</list-item>
<list-item>
<p>Khan, A.Q.
<xref ref-type="page" rid="page_19">19</xref>
</p>
</list-item>
<list-item>
<p>Khan, Ismail
<xref ref-type="page" rid="page_17">17</xref>
</p>
</list-item>
<list-item>
<p>Khmer Rouge
<xref ref-type="page" rid="page_21">21</xref>
</p>
</list-item>
<list-item>
<p>Kilcullen, David
<xref ref-type="page" rid="page_22">22</xref>
</p>
</list-item>
<list-item>
<p>Kissinger, Henry
<xref ref-type="page" rid="page_120">120</xref>
,
<xref ref-type="page" rid="page_150">150</xref>
<xref ref-type="page" rid="page_151">1</xref>
</p>
</list-item>
<list-item>
<p>Klein, Dale
<xref ref-type="page" rid="page_144">144</xref>
</p>
</list-item>
<list-item>
<p>Kollar-Kotelly, Colleen
<xref ref-type="page" rid="page_84">84</xref>
</p>
</list-item>
<list-item>
<p>Korch, George
<xref ref-type="page" rid="page_151">151</xref>
,
<xref ref-type="page" rid="page_152">152</xref>
</p>
</list-item>
<list-item>
<p>Kosovo
<xref ref-type="page" rid="page_28">28</xref>
,
<xref ref-type="page" rid="page_116">116</xref>
,
<xref ref-type="page" rid="page_134">134</xref>
</p>
</list-item>
<list-item>
<p>Kosovo Liberation Army (KLA)
<xref ref-type="page" rid="page_81">81</xref>
</p>
</list-item>
<list-item>
<p>KPMG (accounting firm)
<xref ref-type="page" rid="page_187">187</xref>
</p>
</list-item>
<list-item>
<p>Krasner, Stephen
<xref ref-type="page" rid="page_136">136</xref>
<xref ref-type="page" rid="page_137">7</xref>
,
<xref ref-type="page" rid="page_140">140</xref>
</p>
</list-item>
<list-item>
<p>Krause, K.
<xref ref-type="page" rid="page_193">193</xref>
</p>
</list-item>
<list-item>
<p>Kumar, D.
<xref ref-type="page" rid="page_46">46</xref>
,
<xref ref-type="page" rid="page_47">47</xref>
</p>
</list-item>
<list-item>
<p>Kurdistan Workers Party
<xref ref-type="page" rid="page_20">20</xref>
,
<xref ref-type="page" rid="page_21">21</xref>
</p>
</list-item>
<list-item>
<p>Lashkar e Tayyiba (LET)
<xref ref-type="page" rid="page_81">81</xref>
</p>
</list-item>
<list-item>
<p>Lasky, M.P.
<xref ref-type="page" rid="page_52">52</xref>
</p>
</list-item>
<list-item>
<p>lawlessness: and collapse of Iraqi state
<xref ref-type="page" rid="page_18">18</xref>
; in situations of state collapse
<xref ref-type="page" rid="page_15">15</xref>
<xref ref-type="page" rid="page_16">16</xref>
</p>
</list-item>
<list-item>
<p>law of armed conflict
<xref ref-type="page" rid="page_165">165</xref>
<xref ref-type="page" rid="page_166">6</xref>
,
<xref ref-type="page" rid="page_175">175</xref>
</p>
</list-item>
<list-item>
<p>Lawrence, Bruce
<xref ref-type="page" rid="page_25">25</xref>
</p>
</list-item>
<list-item>
<p>lawyers: murdered and attacked in post-invasion Iraq
<xref ref-type="page" rid="page_51">51</xref>
</p>
</list-item>
<list-item>
<p>Leahy, Patrick
<xref ref-type="page" rid="page_142">142</xref>
</p>
</list-item>
<list-item>
<p>Lebanon: Israel’s 1982 invasion
<xref ref-type="page" rid="page_34">34</xref>
<xref ref-type="page" rid="page_35">5</xref>
; Israel’s 2006 war on
<xref ref-type="page" rid="page_26">26</xref>
,
<xref ref-type="page" rid="page_31">31</xref>
,
<xref ref-type="page" rid="page_38">38</xref>
; Israel’s new offensive against (1996)
<xref ref-type="page" rid="page_35">35</xref>
; US strategies of force
<xref ref-type="page" rid="page_31">31</xref>
</p>
</list-item>
<list-item>
<p>Leob, V.
<xref ref-type="page" rid="page_47">47</xref>
</p>
</list-item>
<list-item>
<p>Levinas, Emmanuel
<xref ref-type="page" rid="page_66">66</xref>
</p>
</list-item>
<list-item>
<p>liberal democracy: and counter-insurgency
<xref ref-type="page" rid="page_22">22</xref>
<xref ref-type="page" rid="page_23">3</xref>
; justification of use of torture
<xref ref-type="page" rid="page_76">76</xref>
; US promotion of
<xref ref-type="page" rid="page_13">13</xref>
,
<xref ref-type="page" rid="page_23">23</xref>
,
<xref ref-type="page" rid="page_39">39</xref>
<xref ref-type="page" rid="page_40">40</xref>
</p>
</list-item>
<list-item>
<p>liberal states: abandoning of principles in state of emergency
<xref ref-type="page" rid="page_75">75</xref>
<xref ref-type="page" rid="page_77">7</xref>
,
<xref ref-type="page" rid="page_87">87</xref>
; North–South divide in international relations theory
<xref ref-type="page" rid="page_129">129</xref>
; suspension of principles regarding rogue states
<xref ref-type="page" rid="page_134">134</xref>
</p>
</list-item>
<list-item>
<p>Liberation Tigers of Tamil Eelam
<xref ref-type="page" rid="page_178">178</xref>
</p>
</list-item>
<list-item>
<p>Libya
<xref ref-type="page" rid="page_19">19</xref>
,
<xref ref-type="page" rid="page_103">103</xref>
</p>
</list-item>
<list-item>
<p>Lietzau, W.
<xref ref-type="page" rid="page_73">73</xref>
</p>
</list-item>
<list-item>
<p>limited wars
<xref ref-type="page" rid="page_29">29</xref>
,
<xref ref-type="page" rid="page_38">38</xref>
<xref ref-type="page" rid="page_39">9</xref>
</p>
</list-item>
<list-item>
<p>London bombings (2005)
<xref ref-type="page" rid="page_32">32</xref>
,
<xref ref-type="page" rid="page_37">37</xref>
,
<xref ref-type="page" rid="page_60">60</xref>
,
<xref ref-type="page" rid="page_76">76</xref>
,
<xref ref-type="page" rid="page_98">98</xref>
,
<xref ref-type="page" rid="page_185">185</xref>
,
<xref ref-type="page" rid="page_195">195</xref>
</p>
</list-item>
<list-item>
<p>long war ideology
<xref ref-type="page" rid="page_13">13</xref>
<xref ref-type="page" rid="page_20">20</xref>
,
<xref ref-type="page" rid="page_23">23</xref>
<xref ref-type="page" rid="page_24">4</xref>
</p>
</list-item>
<list-item>
<p>Los Alamos National Laboratory, New Mexico
<xref ref-type="page" rid="page_150">150</xref>
</p>
</list-item>
<list-item>
<p>Luban, David
<xref ref-type="page" rid="page_76">76</xref>
</p>
</list-item>
<list-item>
<p>Lukes, Steven
<xref ref-type="page" rid="page_76">76</xref>
</p>
</list-item>
<list-item>
<p>Lynch, Jessica
<xref ref-type="page" rid="page_43">43</xref>
,
<xref ref-type="page" rid="page_46">46</xref>
<xref ref-type="page" rid="page_49">9</xref>
,
<xref ref-type="page" rid="page_53">53</xref>
</p>
</list-item>
<list-item>
<p>McClintock, Anne
<xref ref-type="page" rid="page_127">127</xref>
<xref ref-type="page" rid="page_128">8</xref>
</p>
</list-item>
<list-item>
<p>McDougal, M.S.
<xref ref-type="page" rid="page_110">110</xref>
,
<xref ref-type="page" rid="page_119">119</xref>
<xref ref-type="page" rid="page_120">20</xref>
</p>
</list-item>
<list-item>
<p>Macedonia
<xref ref-type="page" rid="page_187">187</xref>
</p>
</list-item>
<list-item>
<p>McFaul, Michael
<xref ref-type="page" rid="page_127">127</xref>
</p>
</list-item>
<list-item>
<p>Machiavelli, Niccolò
<xref ref-type="page" rid="page_157">157</xref>
<xref ref-type="page" rid="page_158">8</xref>
,
<xref ref-type="page" rid="page_158">158</xref>
</p>
</list-item>
<list-item>
<p>Mackey, C.
<xref ref-type="page" rid="page_167">167</xref>
,
<xref ref-type="page" rid="page_167">167</xref>
<xref ref-type="page" rid="page_168">8</xref>
,
<xref ref-type="page" rid="page_170">170</xref>
</p>
</list-item>
<list-item>
<p>Madrid bombings
<xref ref-type="page" rid="page_32">32</xref>
,
<xref ref-type="page" rid="page_37">37</xref>
,
<xref ref-type="page" rid="page_185">185</xref>
</p>
</list-item>
<list-item>
<p>Maghreb
<xref ref-type="page" rid="page_14">14</xref>
</p>
</list-item>
<list-item>
<p>Makiya, Kanan
<xref ref-type="page" rid="page_18">18</xref>
</p>
</list-item>
<list-item>
<p>Marcus, G.E.
<xref ref-type="page" rid="page_64">64</xref>
</p>
</list-item>
<list-item>
<p>Marks, Susan
<xref ref-type="page" rid="page_79">79</xref>
,
<xref ref-type="page" rid="page_80">80</xref>
</p>
</list-item>
<list-item>
<p>Martyn, A.
<xref ref-type="page" rid="page_82">82</xref>
,
<xref ref-type="page" rid="page_83">83</xref>
</p>
</list-item>
<list-item>
<p>media: context of new paradigm of war
<xref ref-type="page" rid="page_28">28</xref>
; coverage of plight of Afghan women
<xref ref-type="page" rid="page_44">44</xref>
,
<xref ref-type="page" rid="page_45">45</xref>
<xref ref-type="page" rid="page_46">6</xref>
; coverage of rescue of Private Jessica Lynch
<xref ref-type="page" rid="page_46">46</xref>
</p>
</list-item>
<list-item>
<p>Menkhaus, Ken
<xref ref-type="page" rid="page_15">15</xref>
<xref ref-type="page" rid="page_16">16</xref>
,
<xref ref-type="page" rid="page_138">138</xref>
</p>
</list-item>
<list-item>
<p>Mercer, J.
<xref ref-type="page" rid="page_58">58</xref>
,
<xref ref-type="page" rid="page_64">64</xref>
</p>
</list-item>
<list-item>
<p>Middle East: Bush’s arguments for promoting democracy in
<xref ref-type="page" rid="page_39">39</xref>
<xref ref-type="page" rid="page_40">40</xref>
; terrorist threat
<xref ref-type="page" rid="page_2">2</xref>
</p>
</list-item>
<list-item>
<p>Military Commissions/Tribunals: to try Guantanamo detainees
<xref ref-type="page" rid="page_72">72</xref>
,
<xref ref-type="page" rid="page_73">73</xref>
,
<xref ref-type="page" rid="page_81">81</xref>
,
<xref ref-type="page" rid="page_82">82</xref>
,
<xref ref-type="page" rid="page_84">84</xref>
<xref ref-type="page" rid="page_85">5</xref>
</p>
</list-item>
<list-item>
<p>Military Commissions Act (MCA)
<xref ref-type="page" rid="page_90">90</xref>
</p>
</list-item>
<list-item>
<p>military force: Bush administration’s preference for
<xref ref-type="page" rid="page_19">19</xref>
; Clausewitzian reasoning
<xref ref-type="page" rid="page_28">28</xref>
; in Cold War mentality
<xref ref-type="page" rid="page_5">5</xref>
; Cordesman’s concerns
<xref ref-type="page" rid="page_39">39</xref>
; post-9/11 response to terrorism
<xref ref-type="page" rid="page_11">11</xref>
,
<xref ref-type="page" rid="page_27">27</xref>
; strategic and moral issues
<xref ref-type="page" rid="page_3">3</xref>
;
<italic>see also</italic>
force ‘military transformation’
<xref ref-type="page" rid="page_29">29</xref>
<xref ref-type="page" rid="page_30">30</xref>
</p>
</list-item>
<list-item>
<p>Miller, Jon
<xref ref-type="page" rid="page_33">33</xref>
</p>
</list-item>
<list-item>
<p>
<xref id="page_230" ref-type="page"></xref>
Milosevic, Slobodan
<xref ref-type="page" rid="page_134">134</xref>
</p>
</list-item>
<list-item>
<p>Mohammed, Khaled Sheikh
<xref ref-type="page" rid="page_35">35</xref>
</p>
</list-item>
<list-item>
<p>Moïsi, Dominique
<xref ref-type="page" rid="page_58">58</xref>
</p>
</list-item>
<list-item>
<p>money laundering: anti-money laundering (AML) measures
<xref ref-type="page" rid="page_178">178</xref>
,
<xref ref-type="page" rid="page_179">179</xref>
,
<xref ref-type="page" rid="page_183">183</xref>
<xref ref-type="page" rid="page_185">5</xref>
; differences with terrorist finance
<xref ref-type="page" rid="page_185">185</xref>
<xref ref-type="page" rid="page_186">6</xref>
</p>
</list-item>
<list-item>
<p>morality: dual standards (Morgenthau’s ‘escape from power’ theory)
<xref ref-type="page" rid="page_196">196</xref>
<xref ref-type="page" rid="page_197">7</xref>
; framework of Bush-Blair rhetoric
<xref ref-type="page" rid="page_100">100</xref>
,
<xref ref-type="page" rid="page_103">103</xref>
; issues regarding mehtods of interrogation
<xref ref-type="page" rid="page_167">167</xref>
<xref ref-type="page" rid="page_168">8</xref>
,
<xref ref-type="page" rid="page_169">169</xref>
; role of fear in foundations of
<xref ref-type="page" rid="page_68">68</xref>
</p>
</list-item>
<list-item>
<p>Morgenthau, Hans
<xref ref-type="page" rid="page_117">117</xref>
,
<xref ref-type="page" rid="page_191">191</xref>
,
<xref ref-type="page" rid="page_196">196</xref>
<xref ref-type="page" rid="page_197">7</xref>
</p>
</list-item>
<list-item>
<p>Mori, Michael Dan
<xref ref-type="page" rid="page_83">83</xref>
,
<xref ref-type="page" rid="page_84">84</xref>
</p>
</list-item>
<list-item>
<p>Nagasaki
<xref ref-type="page" rid="page_33">33</xref>
,
<xref ref-type="page" rid="page_39">39</xref>
</p>
</list-item>
<list-item>
<p>Nairobi: bombing of US embassy
<xref ref-type="page" rid="page_35">35</xref>
</p>
</list-item>
<list-item>
<p>Nassiriya
<xref ref-type="page" rid="page_46">46</xref>
</p>
</list-item>
<list-item>
<p>National Biodefense Analysis and Countermeasures Center (NBACC)
<xref ref-type="page" rid="page_151">151</xref>
</p>
</list-item>
<list-item>
<p>National Institute for Allergy and Infectious Diseases (NIAID)
<xref ref-type="page" rid="page_146">146</xref>
,
<xref ref-type="page" rid="page_148">148</xref>
</p>
</list-item>
<list-item>
<p>National Institutes for Health (US)
<xref ref-type="page" rid="page_146">146</xref>
<xref ref-type="page" rid="page_147">7</xref>
,
<xref ref-type="page" rid="page_148">148</xref>
</p>
</list-item>
<list-item>
<p>National Intelligence Estimates (US)
<xref ref-type="page" rid="page_196">196</xref>
</p>
</list-item>
<list-item>
<p>
<italic>National Security Strategy</italic>
(US government, 2002)
<xref ref-type="page" rid="page_107">107</xref>
,
<xref ref-type="page" rid="page_114">114</xref>
,
<xref ref-type="page" rid="page_117">117</xref>
<xref ref-type="page" rid="page_118">18</xref>
</p>
</list-item>
<list-item>
<p>
<italic>National Strategy for Combating Terrorism</italic>
(NSC) (US government, 2006)
<xref ref-type="page" rid="page_37">37</xref>
</p>
</list-item>
<list-item>
<p>NATO (North Atlantic Treaty Organization)
<xref ref-type="page" rid="page_12">12</xref>
,
<xref ref-type="page" rid="page_17">17</xref>
,
<xref ref-type="page" rid="page_40">40</xref>
,
<xref ref-type="page" rid="page_116">116</xref>
,
<xref ref-type="page" rid="page_134">134</xref>
</p>
</list-item>
<list-item>
<p>
<italic>Nature</italic>
<xref ref-type="page" rid="page_145">145</xref>
</p>
</list-item>
<list-item>
<p>Nauru
<xref ref-type="page" rid="page_181">181</xref>
<xref ref-type="page" rid="page_182">2</xref>
,
<xref ref-type="page" rid="page_183">183</xref>
</p>
</list-item>
<list-item>
<p>Naylor, R.T.
<xref ref-type="page" rid="page_187">187</xref>
</p>
</list-item>
<list-item>
<p>
<italic>NBC Nightly News</italic>
<xref ref-type="page" rid="page_142">142</xref>
</p>
</list-item>
<list-item>
<p>Neiman, Susan
<xref ref-type="page" rid="page_5">5</xref>
</p>
</list-item>
<list-item>
<p>neo-conservatives
<xref ref-type="page" rid="page_32">32</xref>
,
<xref ref-type="page" rid="page_33">33</xref>
,
<xref ref-type="page" rid="page_195">195</xref>
</p>
</list-item>
<list-item>
<p>Netanyahu, Benjamin
<xref ref-type="page" rid="page_33">33</xref>
</p>
</list-item>
<list-item>
<p>net-centric warfare
<xref ref-type="page" rid="page_38">38</xref>
<xref ref-type="page" rid="page_39">9</xref>
</p>
</list-item>
<list-item>
<p>new liberals
<xref ref-type="page" rid="page_113">113</xref>
,
<xref ref-type="page" rid="page_114">114</xref>
<xref ref-type="page" rid="page_115">15</xref>
</p>
</list-item>
<list-item>
<p>new realists
<xref ref-type="page" rid="page_113">113</xref>
,
<xref ref-type="page" rid="page_115">115</xref>
<xref ref-type="page" rid="page_117">17</xref>
</p>
</list-item>
<list-item>
<p>‘new wars: in post-Cold War underdeveloped world
<xref ref-type="page" rid="page_127">127</xref>
,
<xref ref-type="page" rid="page_191">191</xref>
<xref ref-type="page" rid="page_192">2</xref>
</p>
</list-item>
<list-item>
<p>New York
<xref ref-type="page" rid="page_59">59</xref>
,
<xref ref-type="page" rid="page_128">128</xref>
</p>
</list-item>
<list-item>
<p>
<italic>New York Post</italic>
<xref ref-type="page" rid="page_142">142</xref>
</p>
</list-item>
<list-item>
<p>
<italic>New York Times</italic>
<xref ref-type="page" rid="page_152">152</xref>
,
<xref ref-type="page" rid="page_187">187</xref>
</p>
</list-item>
<list-item>
<p>
<italic>Nicaragua v. US</italic>
case
<xref ref-type="page" rid="page_110">110</xref>
<xref ref-type="page" rid="page_111">11</xref>
</p>
</list-item>
<list-item>
<p>Nijaf
<xref ref-type="page" rid="page_52">52</xref>
</p>
</list-item>
<list-item>
<p>9/11 attacks: Bin Laden’s admission of responsibility
<xref ref-type="page" rid="page_25">25</xref>
<xref ref-type="page" rid="page_26">6</xref>
; and campaign against terrorist financing
<xref ref-type="page" rid="page_177">177</xref>
,
<xref ref-type="page" rid="page_178">178</xref>
; causal importance of US and Israeli policies
<xref ref-type="page" rid="page_26">26</xref>
; effects on North–South divide
<xref ref-type="page" rid="page_126">126</xref>
,
<xref ref-type="page" rid="page_128">128</xref>
,
<xref ref-type="page" rid="page_129">129</xref>
,
<xref ref-type="page" rid="page_140">140</xref>
; funding of
<xref ref-type="page" rid="page_185">185</xref>
<xref ref-type="page" rid="page_186">6</xref>
; generation of culture of fear
<xref ref-type="page" rid="page_60">60</xref>
; impact on security of Western states
<xref ref-type="page" rid="page_10">10</xref>
,
<xref ref-type="page" rid="page_190">190</xref>
,
<xref ref-type="page" rid="page_192">192</xref>
<xref ref-type="page" rid="page_193">3</xref>
,
<xref ref-type="page" rid="page_198">198</xref>
; as justifying exceptional acts by liberal states
<xref ref-type="page" rid="page_76">76</xref>
; potential as turning point for US foreign policy
<xref ref-type="page" rid="page_36">36</xref>
; significance for international politics
<xref ref-type="page" rid="page_1">1</xref>
<xref ref-type="page" rid="page_5">5</xref>
; subsequent rhetoric of good versus evil
<xref ref-type="page" rid="page_57">57</xref>
,
<xref ref-type="page" rid="page_60">60</xref>
,
<xref ref-type="page" rid="page_98">98</xref>
; traumatic emotions triggered by
<xref ref-type="page" rid="page_59">59</xref>
,
<xref ref-type="page" rid="page_67">67</xref>
; US response
<xref ref-type="page" rid="page_1">1</xref>
,
<xref ref-type="page" rid="page_3">3</xref>
,
<xref ref-type="page" rid="page_4">4</xref>
,
<xref ref-type="page" rid="page_11">11</xref>
,
<xref ref-type="page" rid="page_60">60</xref>
,
<xref ref-type="page" rid="page_192">192</xref>
,
<xref ref-type="page" rid="page_193">193</xref>
<xref ref-type="page" rid="page_194">4</xref>
</p>
</list-item>
<list-item>
<p>
<italic>9/11 Commission Report</italic>
(2004)
<xref ref-type="page" rid="page_33">33</xref>
</p>
</list-item>
<list-item>
<p>Nixon, Richard
<xref ref-type="page" rid="page_153">153</xref>
</p>
</list-item>
<list-item>
<p>non-state actors: complicating of non-proliferation strategy
<xref ref-type="page" rid="page_20">20</xref>
; as instruments of violence
<xref ref-type="page" rid="page_127">127</xref>
; al Qaeda
<xref ref-type="page" rid="page_20">20</xref>
,
<xref ref-type="page" rid="page_75">75</xref>
;
<italic>see also</italic>
terrorist movements/organisations</p>
</list-item>
<list-item>
<p>Northeast Asia
<xref ref-type="page" rid="page_2">2</xref>
</p>
</list-item>
<list-item>
<p>Northern Alliance
<xref ref-type="page" rid="page_16">16</xref>
,
<xref ref-type="page" rid="page_81">81</xref>
,
<xref ref-type="page" rid="page_82">82</xref>
,
<xref ref-type="page" rid="page_83">83</xref>
</p>
</list-item>
<list-item>
<p>Northern Ireland
<xref ref-type="page" rid="page_28">28</xref>
</p>
</list-item>
<list-item>
<p>North Korea: Bush’s perception
<xref ref-type="page" rid="page_135">135</xref>
; nuclear test (October 2006)
<xref ref-type="page" rid="page_2">2</xref>
,
<xref ref-type="page" rid="page_20">20</xref>
; US non-proliferation strategy
<xref ref-type="page" rid="page_19">19</xref>
,
<xref ref-type="page" rid="page_20">20</xref>
</p>
</list-item>
<list-item>
<p>North–South divide
<xref ref-type="page" rid="page_125">125</xref>
; and changing strategic cartographies
<xref ref-type="page" rid="page_126">126</xref>
,
<xref ref-type="page" rid="page_128">128</xref>
; core and periphery states
<xref ref-type="page" rid="page_127">127</xref>
,
<xref ref-type="page" rid="page_139">139</xref>
; widening after end of Cold War
<xref ref-type="page" rid="page_126">126</xref>
<xref ref-type="page" rid="page_128">8</xref>
</p>
</list-item>
<list-item>
<p>Norway: German invasion
<xref ref-type="page" rid="page_112">112</xref>
</p>
</list-item>
<list-item>
<p>Nuclear Non-Proliferaion Treaty
<xref ref-type="page" rid="page_19">19</xref>
</p>
</list-item>
<list-item>
<p>Nuclear Posture Review (2002)
<xref ref-type="page" rid="page_20">20</xref>
</p>
</list-item>
<list-item>
<p>nuclear weapons: advent
<xref ref-type="page" rid="page_99">99</xref>
; and limited war doctrines
<xref ref-type="page" rid="page_29">29</xref>
; US partnerships with states in possession of
<xref ref-type="page" rid="page_19">19</xref>
;
<italic>see also</italic>
weapons of mass destruction (WMD)</p>
</list-item>
<list-item>
<p>Nuremburg International Military Tribunal
<xref ref-type="page" rid="page_85">85</xref>
,
<xref ref-type="page" rid="page_99">99</xref>
,
<xref ref-type="page" rid="page_112">112</xref>
</p>
</list-item>
<list-item>
<p>Nussbaum, Martha
<xref ref-type="page" rid="page_63">63</xref>
<xref ref-type="page" rid="page_64">4</xref>
</p>
</list-item>
<list-item>
<p>O’Brien, William V.
<xref ref-type="page" rid="page_99">99</xref>
</p>
</list-item>
<list-item>
<p>O’Donovan, Oliver
<xref ref-type="page" rid="page_93">93</xref>
,
<xref ref-type="page" rid="page_96">96</xref>
<xref ref-type="page" rid="page_97">7</xref>
,
<xref ref-type="page" rid="page_98">98</xref>
,
<xref ref-type="page" rid="page_99">99</xref>
,
<xref ref-type="page" rid="page_100">100</xref>
,
<xref ref-type="page" rid="page_102">102</xref>
</p>
</list-item>
<list-item>
<p>OECD (Organization for Economic Cooperation and Development)
<xref ref-type="page" rid="page_179">179</xref>
,
<xref ref-type="page" rid="page_186">186</xref>
<xref ref-type="page" rid="page_187">7</xref>
,
<xref ref-type="page" rid="page_188">188</xref>
</p>
</list-item>
<list-item>
<p>Office of the Coordinator for Reconstruction and Stabilization (S/CRS)
<xref ref-type="page" rid="page_139">139</xref>
</p>
</list-item>
<list-item>
<p>Operation Defensive Shield
<xref ref-type="page" rid="page_40">40</xref>
</p>
</list-item>
<list-item>
<p>Operation Enduring Freedom
<xref ref-type="page" rid="page_12">12</xref>
,
<xref ref-type="page" rid="page_16">16</xref>
,
<xref ref-type="page" rid="page_23">23</xref>
,
<xref ref-type="page" rid="page_31">31</xref>
,
<xref ref-type="page" rid="page_44">44</xref>
<xref ref-type="page" rid="page_45">5</xref>
,
<xref ref-type="page" rid="page_111">111</xref>
</p>
</list-item>
<list-item>
<p>Operation Grapes of Wrath
<xref ref-type="page" rid="page_35">35</xref>
</p>
</list-item>
<list-item>
<p>Operation Infinite Justice
<xref ref-type="page" rid="page_103">103</xref>
</p>
</list-item>
<list-item>
<p>Operation Iraqi Freedom
<xref ref-type="page" rid="page_23">23</xref>
,
<xref ref-type="page" rid="page_103">103</xref>
</p>
</list-item>
<list-item>
<p>Operation Vigilant Justice
<xref ref-type="page" rid="page_18">18</xref>
<xref ref-type="page" rid="page_19">19</xref>
</p>
</list-item>
<list-item>
<p>opium production
<xref ref-type="page" rid="page_17">17</xref>
</p>
</list-item>
<list-item>
<p>
<xref id="page_231" ref-type="page"></xref>
Organisation for Women’s Freedom in Iraq
<xref ref-type="page" rid="page_50">50</xref>
</p>
</list-item>
<list-item>
<p>Osgood, Robert
<xref ref-type="page" rid="page_29">29</xref>
</p>
</list-item>
<list-item>
<p>Pacific Islands
<xref ref-type="page" rid="page_138">138</xref>
;
<italic>see also</italic>
Nauru</p>
</list-item>
<list-item>
<p>Pakistan: as base for terrorist organisations
<xref ref-type="page" rid="page_16">16</xref>
,
<xref ref-type="page" rid="page_17">17</xref>
,
<xref ref-type="page" rid="page_138">138</xref>
; citizens detained in Guantanamo
<xref ref-type="page" rid="page_72">72</xref>
; Hicks’s visit
<xref ref-type="page" rid="page_81">81</xref>
,
<xref ref-type="page" rid="page_82">82</xref>
; possession of nuclear weapons
<xref ref-type="page" rid="page_19">19</xref>
; prisoners moved to Guantanamo Bay from borders of
<xref ref-type="page" rid="page_71">71</xref>
,
<xref ref-type="page" rid="page_74">74</xref>
; al Qaeda contacts
<xref ref-type="page" rid="page_21">21</xref>
,
<xref ref-type="page" rid="page_22">22</xref>
,
<xref ref-type="page" rid="page_195">195</xref>
; ungoverned zones
<xref ref-type="page" rid="page_137">137</xref>
</p>
</list-item>
<list-item>
<p>Palestine Liberation Organization (PLO)
<xref ref-type="page" rid="page_20">20</xref>
,
<xref ref-type="page" rid="page_34">34</xref>
,
<xref ref-type="page" rid="page_35">35</xref>
</p>
</list-item>
<list-item>
<p>Palestinians: Intifada
<xref ref-type="page" rid="page_35">35</xref>
,
<xref ref-type="page" rid="page_36">36</xref>
; Islamic Jihad
<xref ref-type="page" rid="page_35">35</xref>
; Israeli counter-terrorist strategy
<xref ref-type="page" rid="page_27">27</xref>
; Israelis’ operations against authority of
<xref ref-type="page" rid="page_31">31</xref>
,
<xref ref-type="page" rid="page_36">36</xref>
; massacred during Lebanon war (1982)
<xref ref-type="page" rid="page_34">34</xref>
; Muslims killed by US and Israel in past decade
<xref ref-type="page" rid="page_33">33</xref>
<xref ref-type="page" rid="page_34">4</xref>
; US strategies of force against
<xref ref-type="page" rid="page_31">31</xref>
</p>
</list-item>
<list-item>
<p>Pascual, C.
<xref ref-type="page" rid="page_136">136</xref>
<xref ref-type="page" rid="page_137">7</xref>
</p>
</list-item>
<list-item>
<p>Pasquino, Pasquale
<xref ref-type="page" rid="page_130">130</xref>
</p>
</list-item>
<list-item>
<p>Patrick, Stewart
<xref ref-type="page" rid="page_138">138</xref>
</p>
</list-item>
<list-item>
<p>Paul, St
<xref ref-type="page" rid="page_95">95</xref>
,
<xref ref-type="page" rid="page_96">96</xref>
,
<xref ref-type="page" rid="page_100">100</xref>
<xref ref-type="page" rid="page_101">1</xref>
</p>
</list-item>
<list-item>
<p>peace movements
<xref ref-type="page" rid="page_99">99</xref>
</p>
</list-item>
<list-item>
<p>Pearl Harbor
<xref ref-type="page" rid="page_157">157</xref>
</p>
</list-item>
<list-item>
<p>Pentagon: central role in Iraqi project
<xref ref-type="page" rid="page_17">17</xref>
<xref ref-type="page" rid="page_18">18</xref>
; gendered politics
<xref ref-type="page" rid="page_47">47</xref>
<xref ref-type="page" rid="page_48">8</xref>
; Office of Transformation’s new strategic concepts
<xref ref-type="page" rid="page_29">29</xref>
<xref ref-type="page" rid="page_31">31</xref>
</p>
</list-item>
<list-item>
<p>People’s Will
<xref ref-type="page" rid="page_21">21</xref>
</p>
</list-item>
<list-item>
<p>perfectionism (Morgenthau’s ‘escape from power’ theory)
<xref ref-type="page" rid="page_197">197</xref>
</p>
</list-item>
<list-item>
<p>Perle, R.
<xref ref-type="page" rid="page_116">116</xref>
</p>
</list-item>
<list-item>
<p>Perry, D.L.
<xref ref-type="page" rid="page_162">162</xref>
,
<xref ref-type="page" rid="page_173">173</xref>
</p>
</list-item>
<list-item>
<p>Philippines
<xref ref-type="page" rid="page_2">2</xref>
,
<xref ref-type="page" rid="page_16">16</xref>
,
<xref ref-type="page" rid="page_21">21</xref>
,
<xref ref-type="page" rid="page_31">31</xref>
</p>
</list-item>
<list-item>
<p>Philp, C.
<xref ref-type="page" rid="page_51">51</xref>
<xref ref-type="page" rid="page_52">2</xref>
</p>
</list-item>
<list-item>
<p>political life: distinction with ‘bare’ or natural life
<xref ref-type="page" rid="page_131">131</xref>
</p>
</list-item>
<list-item>
<p>Posa, C.
<xref ref-type="page" rid="page_52">52</xref>
</p>
</list-item>
<list-item>
<p>Powell, Colin
<xref ref-type="page" rid="page_118">118</xref>
,
<xref ref-type="page" rid="page_174">174</xref>
,
<xref ref-type="page" rid="page_181">181</xref>
</p>
</list-item>
<list-item>
<p>power: dynamics of abuse of Abu Ghraib prisoners
<xref ref-type="page" rid="page_48">48</xref>
; possessional and relational perspectives
<xref ref-type="page" rid="page_18">18</xref>
<xref ref-type="page" rid="page_19">19</xref>
; Schmitt’s view of sovereignty
<xref ref-type="page" rid="page_130">130</xref>
</p>
</list-item>
<list-item>
<p>powerful states: foreign policy
<xref ref-type="page" rid="page_191">191</xref>
</p>
</list-item>
<list-item>
<p>pre-emptive self-defence: ambiguity in UN Charter
<xref ref-type="page" rid="page_106">106</xref>
; approach permitting application against terrorism
<xref ref-type="page" rid="page_107">107</xref>
,
<xref ref-type="page" rid="page_118">118</xref>
<xref ref-type="page" rid="page_121">21</xref>
; Bush-Blair presentation of Iraq war as
<xref ref-type="page" rid="page_98">98</xref>
; Bush doctrine
<xref ref-type="page" rid="page_11">11</xref>
,
<xref ref-type="page" rid="page_106">106</xref>
; in just war thinking
<xref ref-type="page" rid="page_108">108</xref>
<xref ref-type="page" rid="page_109">9</xref>
,
<xref ref-type="page" rid="page_113">113</xref>
; and legitimisation of war on terror
<xref ref-type="page" rid="page_61">61</xref>
; reconceptualised to respond to terrorism
<xref ref-type="page" rid="page_114">114</xref>
,
<xref ref-type="page" rid="page_118">118</xref>
<xref ref-type="page" rid="page_121">21</xref>
; US
<italic>Strategy</italic>
way of re-thinking
<xref ref-type="page" rid="page_117">117</xref>
<xref ref-type="page" rid="page_118">18</xref>
</p>
</list-item>
<list-item>
<p>preventive attacks: Bush administration’s strategy of
<xref ref-type="page" rid="page_107">107</xref>
,
<xref ref-type="page" rid="page_118">118</xref>
; forbidden in right of self-defence
<xref ref-type="page" rid="page_111">111</xref>
; labelled as preemptive by
<italic>Strategy</italic>
<xref ref-type="page" rid="page_117">117</xref>
<xref ref-type="page" rid="page_118">18</xref>
</p>
</list-item>
<list-item>
<p>prisoners of war: law of armed conflict
<xref ref-type="page" rid="page_165">165</xref>
<xref ref-type="page" rid="page_166">6</xref>
</p>
</list-item>
<list-item>
<p>Proliferation Security Initiative (PSI)
<xref ref-type="page" rid="page_19">19</xref>
</p>
</list-item>
<list-item>
<p>prostitution: Iraqi women
<xref ref-type="page" rid="page_50">50</xref>
</p>
</list-item>
<list-item>
<p>public health issues: biodefence
<xref ref-type="page" rid="page_144">144</xref>
<xref ref-type="page" rid="page_145">5</xref>
,
<xref ref-type="page" rid="page_154">154</xref>
</p>
</list-item>
<list-item>
<p>Public Health Security and Bioterrorism Preparedness Act 2002
<xref ref-type="page" rid="page_147">147</xref>
</p>
</list-item>
<list-item>
<p>Pufendorf, Samuel
<xref ref-type="page" rid="page_108">108</xref>
</p>
</list-item>
<list-item>
<p>Al Qaeda: in Afghanistan
<xref ref-type="page" rid="page_16">16</xref>
,
<xref ref-type="page" rid="page_194">194</xref>
,
<xref ref-type="page" rid="page_195">195</xref>
; allegations of Hicks’s membership
<xref ref-type="page" rid="page_81">81</xref>
,
<xref ref-type="page" rid="page_82">82</xref>
,
<xref ref-type="page" rid="page_83">83</xref>
; American targets in Iraq
<xref ref-type="page" rid="page_5">5</xref>
; campaign and ideology
<xref ref-type="page" rid="page_26">26</xref>
; development and organisation
<xref ref-type="page" rid="page_14">14</xref>
<xref ref-type="page" rid="page_15">15</xref>
; financing of
<xref ref-type="page" rid="page_186">186</xref>
,
<xref ref-type="page" rid="page_187">187</xref>
; founding of (1988)
<xref ref-type="page" rid="page_35">35</xref>
; freezing of assets
<xref ref-type="page" rid="page_178">178</xref>
,
<xref ref-type="page" rid="page_181">181</xref>
,
<xref ref-type="page" rid="page_186">186</xref>
; grievances and justification of attacks on the West
<xref ref-type="page" rid="page_33">33</xref>
<xref ref-type="page" rid="page_34">4</xref>
; human consequences of Afghan wars as fuel for
<xref ref-type="page" rid="page_27">27</xref>
; idea of war against the West before 9/11
<xref ref-type="page" rid="page_12">12</xref>
; increased support since wars of response
<xref ref-type="page" rid="page_4">4</xref>
,
<xref ref-type="page" rid="page_21">21</xref>
; as non-state actor
<xref ref-type="page" rid="page_20">20</xref>
,
<xref ref-type="page" rid="page_75">75</xref>
; possible strategies for defeating
<xref ref-type="page" rid="page_20">20</xref>
<xref ref-type="page" rid="page_23">3</xref>
; ‘state of war’ against
<xref ref-type="page" rid="page_14">14</xref>
,
<xref ref-type="page" rid="page_31">31</xref>
<xref ref-type="page" rid="page_32">2</xref>
,
<xref ref-type="page" rid="page_88">88</xref>
; strategies that could have weakened
<xref ref-type="page" rid="page_40">40</xref>
</p>
</list-item>
<list-item>
<p>Qana
<xref ref-type="page" rid="page_35">35</xref>
,
<xref ref-type="page" rid="page_38">38</xref>
</p>
</list-item>
<list-item>
<p>al-Qushtaini, Zeena
<xref ref-type="page" rid="page_50">50</xref>
</p>
</list-item>
<list-item>
<p>Qutb,…
<xref ref-type="page" rid="page_40">40</xref>
</p>
</list-item>
<list-item>
<p>Ramsey, Paul
<xref ref-type="page" rid="page_95">95</xref>
</p>
</list-item>
<list-item>
<p>Rasul, Shafiz
<xref ref-type="page" rid="page_81">81</xref>
</p>
</list-item>
<list-item>
<p>
<italic>Rasul v. Bush</italic>
case
<xref ref-type="page" rid="page_81">81</xref>
,
<xref ref-type="page" rid="page_86">86</xref>
</p>
</list-item>
<list-item>
<p>RAWA (Revolutionary Association of the Women of Afghanistan)
<xref ref-type="page" rid="page_45">45</xref>
<xref ref-type="page" rid="page_46">6</xref>
</p>
</list-item>
<list-item>
<p>Reagan, Ronald
<xref ref-type="page" rid="page_103">103</xref>
</p>
</list-item>
<list-item>
<p>reconciliation
<xref ref-type="page" rid="page_66">66</xref>
<xref ref-type="page" rid="page_67">7</xref>
,
<xref ref-type="page" rid="page_68">68</xref>
<xref ref-type="page" rid="page_69">9</xref>
</p>
</list-item>
<list-item>
<p>Record, Jeffrey
<xref ref-type="page" rid="page_30">30</xref>
,
<xref ref-type="page" rid="page_31">31</xref>
<xref ref-type="page" rid="page_32">2</xref>
,
<xref ref-type="page" rid="page_33">33</xref>
</p>
</list-item>
<list-item>
<p>Red Brigades
<xref ref-type="page" rid="page_20">20</xref>
</p>
</list-item>
<list-item>
<p>Red Cross
<xref ref-type="page" rid="page_159">159</xref>
,
<xref ref-type="page" rid="page_161">161</xref>
</p>
</list-item>
<list-item>
<p>regime change
<xref ref-type="page" rid="page_116">116</xref>
</p>
</list-item>
<list-item>
<p>responsibility: and idea of ‘vindictive justice’
<xref ref-type="page" rid="page_97">97</xref>
; in interrogation of prisoners
<xref ref-type="page" rid="page_174">174</xref>
<xref ref-type="page" rid="page_175">5</xref>
; issues in security policy decisions
<xref ref-type="page" rid="page_65">65</xref>
<xref ref-type="page" rid="page_66">6</xref>
</p>
</list-item>
<list-item>
<p>
<xref id="page_232" ref-type="page"></xref>
Reus-Smit, Christian
<xref ref-type="page" rid="page_26">26</xref>
</p>
</list-item>
<list-item>
<p>Revolutionary Armed Forces of Columbia
<xref ref-type="page" rid="page_21">21</xref>
</p>
</list-item>
<list-item>
<p>revolution in military affairs (RMA)
<xref ref-type="page" rid="page_29">29</xref>
</p>
</list-item>
<list-item>
<p>Richardson, Louise
<xref ref-type="page" rid="page_31">31</xref>
</p>
</list-item>
<list-item>
<p>Roberts, A.
<xref ref-type="page" rid="page_21">21</xref>
,
<xref ref-type="page" rid="page_23">23</xref>
</p>
</list-item>
<list-item>
<p>Rogers, Paul
<xref ref-type="page" rid="page_22">22</xref>
</p>
</list-item>
<list-item>
<p>rogue states
<xref ref-type="page" rid="page_125">125</xref>
; Bush’s rhetoric on
<xref ref-type="page" rid="page_20">20</xref>
,
<xref ref-type="page" rid="page_117">117</xref>
<xref ref-type="page" rid="page_118">18</xref>
,
<xref ref-type="page" rid="page_133">133</xref>
,
<xref ref-type="page" rid="page_193">193</xref>
,
<xref ref-type="page" rid="page_194">194</xref>
; characterisations
<xref ref-type="page" rid="page_133">133</xref>
<xref ref-type="page" rid="page_134">4</xref>
; identification of sources of terrorism with
<xref ref-type="page" rid="page_129">129</xref>
,
<xref ref-type="page" rid="page_133">133</xref>
,
<xref ref-type="page" rid="page_140">140</xref>
,
<xref ref-type="page" rid="page_194">194</xref>
; imminence of threat from
<xref ref-type="page" rid="page_113">113</xref>
,
<xref ref-type="page" rid="page_121">121</xref>
; North’s response to
<xref ref-type="page" rid="page_132">132</xref>
,
<xref ref-type="page" rid="page_134">134</xref>
,
<xref ref-type="page" rid="page_140">140</xref>
; role of deterrence
<xref ref-type="page" rid="page_114">114</xref>
; in spaces of exception
<xref ref-type="page" rid="page_132">132</xref>
</p>
</list-item>
<list-item>
<p>Roman antiquity:
<italic>homo sacer</italic>
<xref ref-type="page" rid="page_131">131</xref>
<xref ref-type="page" rid="page_132">2</xref>
</p>
</list-item>
<list-item>
<p>Ross, Andrew
<xref ref-type="page" rid="page_58">58</xref>
,
<xref ref-type="page" rid="page_64">64</xref>
</p>
</list-item>
<list-item>
<p>Rossiter, Clinton
<xref ref-type="page" rid="page_130">130</xref>
</p>
</list-item>
<list-item>
<p>Ross, Ken
<xref ref-type="page" rid="page_138">138</xref>
</p>
</list-item>
<list-item>
<p>Rotberg, Robert
<xref ref-type="page" rid="page_136">136</xref>
</p>
</list-item>
<list-item>
<p>Rumsfeld, Donald
<xref ref-type="page" rid="page_13">13</xref>
,
<xref ref-type="page" rid="page_17">17</xref>
<xref ref-type="page" rid="page_18">18</xref>
,
<xref ref-type="page" rid="page_29">29</xref>
,
<xref ref-type="page" rid="page_117">117</xref>
</p>
</list-item>
<list-item>
<p>Russia
<xref ref-type="page" rid="page_2">2</xref>
,
<xref ref-type="page" rid="page_117">117</xref>
,
<xref ref-type="page" rid="page_194">194</xref>
</p>
</list-item>
<list-item>
<p>Rwanda
<xref ref-type="page" rid="page_191">191</xref>
</p>
</list-item>
<list-item>
<p>Safran Foyer, Jonathan
<xref ref-type="page" rid="page_67">67</xref>
</p>
</list-item>
<list-item>
<p>Sagan, Scott
<xref ref-type="page" rid="page_20">20</xref>
</p>
</list-item>
<list-item>
<p>satellite spy systems
<xref ref-type="page" rid="page_161">161</xref>
,
<xref ref-type="page" rid="page_164">164</xref>
</p>
</list-item>
<list-item>
<p>Saudi Arabia: al-Qaeda
<xref ref-type="page" rid="page_14">14</xref>
,
<xref ref-type="page" rid="page_22">22</xref>
; basing of US troops in
<xref ref-type="page" rid="page_35">35</xref>
; regulation of nonprofit organisations
<xref ref-type="page" rid="page_180">180</xref>
,
<xref ref-type="page" rid="page_183">183</xref>
</p>
</list-item>
<list-item>
<p>Schaap, Andrew
<xref ref-type="page" rid="page_66">66</xref>
</p>
</list-item>
<list-item>
<p>Scheff, Thomas
<xref ref-type="page" rid="page_63">63</xref>
</p>
</list-item>
<list-item>
<p>Schelling, Thomas
<xref ref-type="page" rid="page_29">29</xref>
</p>
</list-item>
<list-item>
<p>Scheuerman, W.E.
<xref ref-type="page" rid="page_75">75</xref>
<xref ref-type="page" rid="page_76">6</xref>
</p>
</list-item>
<list-item>
<p>Schmidt, S.
<xref ref-type="page" rid="page_47">47</xref>
</p>
</list-item>
<list-item>
<p>Schmitt, Carl
<xref ref-type="page" rid="page_75">75</xref>
,
<xref ref-type="page" rid="page_76">76</xref>
<xref ref-type="page" rid="page_77">7</xref>
,
<xref ref-type="page" rid="page_79">79</xref>
,
<xref ref-type="page" rid="page_86">86</xref>
<xref ref-type="page" rid="page_87">7</xref>
,
<xref ref-type="page" rid="page_91">91</xref>
,
<xref ref-type="page" rid="page_130">130</xref>
<xref ref-type="page" rid="page_131">1</xref>
,
<xref ref-type="page" rid="page_132">132</xref>
,
<xref ref-type="page" rid="page_134">134</xref>
</p>
</list-item>
<list-item>
<p>scientism: (Morgenthau’s ‘escape from power’ theory)
<xref ref-type="page" rid="page_196">196</xref>
</p>
</list-item>
<list-item>
<p>Scott, James Brown
<xref ref-type="page" rid="page_101">101</xref>
</p>
</list-item>
<list-item>
<p>Scowcroft, Brent
<xref ref-type="page" rid="page_151">151</xref>
</p>
</list-item>
<list-item>
<p>Second World War
<xref ref-type="page" rid="page_75">75</xref>
</p>
</list-item>
<list-item>
<p>security: alternative approaches regarding terrorism
<xref ref-type="page" rid="page_5">5</xref>
<xref ref-type="page" rid="page_6">6</xref>
,
<xref ref-type="page" rid="page_193">193</xref>
; changing context since Cold War
<xref ref-type="page" rid="page_191">191</xref>
<xref ref-type="page" rid="page_193">3</xref>
; clusters of threats identified by UN
<xref ref-type="page" rid="page_9">9</xref>
<xref ref-type="page" rid="page_10">10</xref>
; definitions and conceptions
<xref ref-type="page" rid="page_9">9</xref>
; deterioration in Afghanistan
<xref ref-type="page" rid="page_16">16</xref>
<xref ref-type="page" rid="page_17">17</xref>
; effect of narrowing of North–South gap
<xref ref-type="page" rid="page_129">129</xref>
; fusion with development
<xref ref-type="page" rid="page_139">139</xref>
<xref ref-type="page" rid="page_140">40</xref>
; linkage with emotions
<xref ref-type="page" rid="page_57">57</xref>
,
<xref ref-type="page" rid="page_58">58</xref>
<xref ref-type="page" rid="page_59">9</xref>
,
<xref ref-type="page" rid="page_61">61</xref>
<xref ref-type="page" rid="page_62">2</xref>
,
<xref ref-type="page" rid="page_65">65</xref>
<xref ref-type="page" rid="page_69">9</xref>
; need to rewrite Clausewitzian formulae
<xref ref-type="page" rid="page_41">41</xref>
; realist reactionism of policy responses
<xref ref-type="page" rid="page_190">190</xref>
,
<xref ref-type="page" rid="page_191">191</xref>
; regulation of biotechnology sector
<xref ref-type="page" rid="page_147">147</xref>
<xref ref-type="page" rid="page_149">9</xref>
; role of intelligence gathering
<xref ref-type="page" rid="page_157">157</xref>
<xref ref-type="page" rid="page_158">8</xref>
,
<xref ref-type="page" rid="page_159">159</xref>
; significance of 9/11 attacks for West
<xref ref-type="page" rid="page_2">2</xref>
<xref ref-type="page" rid="page_5">5</xref>
,
<xref ref-type="page" rid="page_10">10</xref>
,
<xref ref-type="page" rid="page_190">190</xref>
,
<xref ref-type="page" rid="page_192">192</xref>
<xref ref-type="page" rid="page_193">3</xref>
,
<xref ref-type="page" rid="page_198">198</xref>
; US policy’s state-centric policy
<xref ref-type="page" rid="page_194">194</xref>
; ‘war on terror’ and worsening situation of women
<xref ref-type="page" rid="page_42">42</xref>
<xref ref-type="page" rid="page_43">3</xref>
</p>
</list-item>
<list-item>
<p>security agencies/organisations
<xref ref-type="page" rid="page_165">165</xref>
,
<xref ref-type="page" rid="page_166">166</xref>
</p>
</list-item>
<list-item>
<p>security studies: analyses of war on terror
<xref ref-type="page" rid="page_193">193</xref>
<xref ref-type="page" rid="page_194">4</xref>
; need to place terrorism in appropriate contexts
<xref ref-type="page" rid="page_24">24</xref>
</p>
</list-item>
<list-item>
<p>self-defence: in international law
<xref ref-type="page" rid="page_109">109</xref>
<xref ref-type="page" rid="page_114">14</xref>
; and just war
<xref ref-type="page" rid="page_99">99</xref>
,
<xref ref-type="page" rid="page_106">106</xref>
,
<xref ref-type="page" rid="page_108">108</xref>
<xref ref-type="page" rid="page_109">9</xref>
; right of
<xref ref-type="page" rid="page_106">106</xref>
<xref ref-type="page" rid="page_107">7</xref>
;
<italic>see also</italic>
pre-emptive self-defence</p>
</list-item>
<list-item>
<p>September
<xref ref-type="page" rid="page_11">11</xref>
attacks
<italic>see</italic>
9/11 attacks</p>
</list-item>
<list-item>
<p>Serbia
<xref ref-type="page" rid="page_134">134</xref>
</p>
</list-item>
<list-item>
<p>sexual abuse: of Abu Ghraib prisoners
<xref ref-type="page" rid="page_48">48</xref>
</p>
</list-item>
<list-item>
<p>sexual slavery: Iraqi women
<xref ref-type="page" rid="page_50">50</xref>
</p>
</list-item>
<list-item>
<p>Shapiro, J.
<xref ref-type="page" rid="page_186">186</xref>
</p>
</list-item>
<list-item>
<p>Shapiro, Michael
<xref ref-type="page" rid="page_66">66</xref>
</p>
</list-item>
<list-item>
<p>Shari’a
<xref ref-type="page" rid="page_51">51</xref>
,
<xref ref-type="page" rid="page_52">52</xref>
</p>
</list-item>
<list-item>
<p>Sharm El Sheikh
<xref ref-type="page" rid="page_37">37</xref>
</p>
</list-item>
<list-item>
<p>Sharon, Ariel
<xref ref-type="page" rid="page_34">34</xref>
,
<xref ref-type="page" rid="page_35">35</xref>
,
<xref ref-type="page" rid="page_36">36</xref>
</p>
</list-item>
<list-item>
<p>Shehadi, Nadim
<xref ref-type="page" rid="page_39">39</xref>
<xref ref-type="page" rid="page_40">40</xref>
</p>
</list-item>
<list-item>
<p>Shi’a
<xref ref-type="page" rid="page_51">51</xref>
</p>
</list-item>
<list-item>
<p>Shining Path
<xref ref-type="page" rid="page_20">20</xref>
,
<xref ref-type="page" rid="page_21">21</xref>
</p>
</list-item>
<list-item>
<p>Shirzai, Gul Agha
<xref ref-type="page" rid="page_17">17</xref>
</p>
</list-item>
<list-item>
<p>Short, Clare
<xref ref-type="page" rid="page_159">159</xref>
</p>
</list-item>
<list-item>
<p>Sidon
<xref ref-type="page" rid="page_35">35</xref>
</p>
</list-item>
<list-item>
<p>Simma, B.
<xref ref-type="page" rid="page_110">110</xref>
</p>
</list-item>
<list-item>
<p>Simon, Steven
<xref ref-type="page" rid="page_194">194</xref>
,
<xref ref-type="page" rid="page_196">196</xref>
</p>
</list-item>
<list-item>
<p>Slaughter, Anne-Marie
<xref ref-type="page" rid="page_115">115</xref>
,
<xref ref-type="page" rid="page_129">129</xref>
</p>
</list-item>
<list-item>
<p>Smith, James
<xref ref-type="page" rid="page_150">150</xref>
</p>
</list-item>
<list-item>
<p>Smith, General Rupert
<xref ref-type="page" rid="page_28">28</xref>
,
<xref ref-type="page" rid="page_29">29</xref>
</p>
</list-item>
<list-item>
<p>Society for Worldwide Interbank Financial Telecommunications (SWIFT)
<xref ref-type="page" rid="page_183">183</xref>
</p>
</list-item>
<list-item>
<p>Sofaer, Abraham
<xref ref-type="page" rid="page_106">106</xref>
</p>
</list-item>
<list-item>
<p>Solomon, Robert
<xref ref-type="page" rid="page_63">63</xref>
<xref ref-type="page" rid="page_64">4</xref>
</p>
</list-item>
<list-item>
<p>Somalia
<xref ref-type="page" rid="page_15">15</xref>
,
<xref ref-type="page" rid="page_16">16</xref>
,
<xref ref-type="page" rid="page_138">138</xref>
</p>
</list-item>
<list-item>
<p>South America
<xref ref-type="page" rid="page_2">2</xref>
</p>
</list-item>
<list-item>
<p>Southeast Asia
<xref ref-type="page" rid="page_2">2</xref>
,
<xref ref-type="page" rid="page_14">14</xref>
</p>
</list-item>
<list-item>
<p>sovereignty: Agamben’s idea
<xref ref-type="page" rid="page_131">131</xref>
; Schmitt’s view
<xref ref-type="page" rid="page_130">130</xref>
; US power to decide use of force
<xref ref-type="page" rid="page_134">134</xref>
</p>
</list-item>
<list-item>
<p>Soviet Union: biological weapons programme
<xref ref-type="page" rid="page_153">153</xref>
; collapse
<xref ref-type="page" rid="page_126">126</xref>
,
<xref ref-type="page" rid="page_191">191</xref>
; ‘evil empire’ during Cold War
<xref ref-type="page" rid="page_61">61</xref>
; intervention in Czechoslovakia (1948)
<xref ref-type="page" rid="page_109">109</xref>
; responses to spy-planes over
<xref ref-type="page" rid="page_161">161</xref>
</p>
</list-item>
<list-item>
<p>special forces operations
<xref ref-type="page" rid="page_31">31</xref>
</p>
</list-item>
<list-item>
<p>Srebrenica
<xref ref-type="page" rid="page_1">1</xref>
</p>
</list-item>
<list-item>
<p>Sri Lanka
<xref ref-type="page" rid="page_178">178</xref>
</p>
</list-item>
<list-item>
<p>state collapse
<xref ref-type="page" rid="page_15">15</xref>
<xref ref-type="page" rid="page_16">16</xref>
</p>
</list-item>
<list-item>
<p>
<xref id="page_233" ref-type="page"></xref>
state of emergency: and derogation from ratification of international treaties
<xref ref-type="page" rid="page_77">77</xref>
; response of liberal states
<xref ref-type="page" rid="page_75">75</xref>
<xref ref-type="page" rid="page_76">6</xref>
,
<xref ref-type="page" rid="page_77">77</xref>
</p>
</list-item>
<list-item>
<p>state of exception (SOE): ideas of Schmitt and Agamben
<xref ref-type="page" rid="page_130">130</xref>
<xref ref-type="page" rid="page_132">2</xref>
; Iraq
<xref ref-type="page" rid="page_138">138</xref>
; legal
<xref ref-type="page" rid="page_74">74</xref>
<xref ref-type="page" rid="page_77">7</xref>
,
<xref ref-type="page" rid="page_91">91</xref>
; North’s view of South
<xref ref-type="page" rid="page_125">125</xref>
<xref ref-type="page" rid="page_126">6</xref>
,
<xref ref-type="page" rid="page_140">140</xref>
<xref ref-type="page" rid="page_141">1</xref>
; political
<xref ref-type="page" rid="page_77">77</xref>
<xref ref-type="page" rid="page_79">9</xref>
,
<xref ref-type="page" rid="page_91">91</xref>
</p>
</list-item>
<list-item>
<p>state terrorism
<xref ref-type="page" rid="page_13">13</xref>
</p>
</list-item>
<list-item>
<p>Stephens, Alan
<xref ref-type="page" rid="page_29">29</xref>
,
<xref ref-type="page" rid="page_30">30</xref>
</p>
</list-item>
<list-item>
<p>Stevens, Justice
<xref ref-type="page" rid="page_87">87</xref>
,
<xref ref-type="page" rid="page_88">88</xref>
<xref ref-type="page" rid="page_89">9</xref>
</p>
</list-item>
<list-item>
<p>Stevens, K.R.
<xref ref-type="page" rid="page_112">112</xref>
</p>
</list-item>
<list-item>
<p>Stevens, Robert
<xref ref-type="page" rid="page_142">142</xref>
</p>
</list-item>
<list-item>
<p>Stewart, James G.
<xref ref-type="page" rid="page_79">79</xref>
</p>
</list-item>
<list-item>
<p>Steyn, J.
<xref ref-type="page" rid="page_71">71</xref>
</p>
</list-item>
<list-item>
<p>Stiehm, J.H.
<xref ref-type="page" rid="page_44">44</xref>
</p>
</list-item>
<list-item>
<p>Stimson, Henry L.
<xref ref-type="page" rid="page_156">156</xref>
<xref ref-type="page" rid="page_157">7</xref>
</p>
</list-item>
<list-item>
<p>strategic thought: Clausewitzian concept of force
<xref ref-type="page" rid="page_27">27</xref>
<xref ref-type="page" rid="page_28">8</xref>
; new paradigm of war
<xref ref-type="page" rid="page_28">28</xref>
<xref ref-type="page" rid="page_29">9</xref>
,
<xref ref-type="page" rid="page_38">38</xref>
; new western concepts
<xref ref-type="page" rid="page_29">29</xref>
<xref ref-type="page" rid="page_31">31</xref>
; questioning traditional tenets
<xref ref-type="page" rid="page_26">26</xref>
<xref ref-type="page" rid="page_27">7</xref>
</p>
</list-item>
<list-item>
<p>Strategy see National Strategy for Combating Terrorism</p>
</list-item>
<list-item>
<p>Suárez, Francisco
<xref ref-type="page" rid="page_100">100</xref>
,
<xref ref-type="page" rid="page_101">101</xref>
,
<xref ref-type="page" rid="page_108">108</xref>
</p>
</list-item>
<list-item>
<p>Sudan
<xref ref-type="page" rid="page_14">14</xref>
,
<xref ref-type="page" rid="page_21">21</xref>
</p>
</list-item>
<list-item>
<p>suicide bombings
<xref ref-type="page" rid="page_35">35</xref>
,
<xref ref-type="page" rid="page_36">36</xref>
,
<xref ref-type="page" rid="page_58">58</xref>
,
<xref ref-type="page" rid="page_185">185</xref>
</p>
</list-item>
<list-item>
<p>Sunnis
<xref ref-type="page" rid="page_14">14</xref>
</p>
</list-item>
<list-item>
<p>Syria
<xref ref-type="page" rid="page_50">50</xref>
,
<xref ref-type="page" rid="page_137">137</xref>
</p>
</list-item>
<list-item>
<p>Tajikistan
<xref ref-type="page" rid="page_17">17</xref>
</p>
</list-item>
<list-item>
<p>Takacs, S.
<xref ref-type="page" rid="page_47">47</xref>
</p>
</list-item>
<list-item>
<p>Taliban
<xref ref-type="page" rid="page_16">16</xref>
<xref ref-type="page" rid="page_17">17</xref>
,
<xref ref-type="page" rid="page_22">22</xref>
,
<xref ref-type="page" rid="page_31">31</xref>
,
<xref ref-type="page" rid="page_81">81</xref>
,
<xref ref-type="page" rid="page_186">186</xref>
; claims about Afghan women suffering under
<xref ref-type="page" rid="page_42">42</xref>
,
<xref ref-type="page" rid="page_44">44</xref>
,
<xref ref-type="page" rid="page_45">45</xref>
,
<xref ref-type="page" rid="page_46">46</xref>
; overthrowing of regime by US
<xref ref-type="page" rid="page_16">16</xref>
,
<xref ref-type="page" rid="page_111">111</xref>
,
<xref ref-type="page" rid="page_194">194</xref>
</p>
</list-item>
<list-item>
<p>terrorism: alignment of failed states with
<xref ref-type="page" rid="page_136">136</xref>
<xref ref-type="page" rid="page_138">8</xref>
,
<xref ref-type="page" rid="page_140">140</xref>
; alignment of rogue states with
<xref ref-type="page" rid="page_129">129</xref>
,
<xref ref-type="page" rid="page_133">133</xref>
,
<xref ref-type="page" rid="page_140">140</xref>
; emotions associated with
<xref ref-type="page" rid="page_57">57</xref>
,
<xref ref-type="page" rid="page_58">58</xref>
<xref ref-type="page" rid="page_59">9</xref>
,
<xref ref-type="page" rid="page_62">62</xref>
<xref ref-type="page" rid="page_64">4</xref>
,
<xref ref-type="page" rid="page_65">65</xref>
<xref ref-type="page" rid="page_66">6</xref>
,
<xref ref-type="page" rid="page_67">67</xref>
; examination of cause and effect
<xref ref-type="page" rid="page_26">26</xref>
<xref ref-type="page" rid="page_27">7</xref>
; globalisation and collapsing of distance
<xref ref-type="page" rid="page_128">128</xref>
; Gore’s characterisation of
<xref ref-type="page" rid="page_61">61</xref>
; governments’ application of label
<xref ref-type="page" rid="page_13">13</xref>
,
<xref ref-type="page" rid="page_76">76</xref>
; increase in attacks since start of war on terror
<xref ref-type="page" rid="page_5">5</xref>
; interdisciplinary approaches to dealing with
<xref ref-type="page" rid="page_5">5</xref>
<xref ref-type="page" rid="page_6">6</xref>
,
<xref ref-type="page" rid="page_24">24</xref>
; nature of threat
<xref ref-type="page" rid="page_2">2</xref>
; and need to change way of thinking about security
<xref ref-type="page" rid="page_5">5</xref>
,
<xref ref-type="page" rid="page_193">193</xref>
; need to understand grievances behind
<xref ref-type="page" rid="page_32">32</xref>
<xref ref-type="page" rid="page_33">3</xref>
,
<xref ref-type="page" rid="page_34">34</xref>
; notion of ‘imminence’
<xref ref-type="page" rid="page_113">113</xref>
<xref ref-type="page" rid="page_114">14</xref>
,
<xref ref-type="page" rid="page_118">118</xref>
<xref ref-type="page" rid="page_119">19</xref>
; potential for mass destruction
<xref ref-type="page" rid="page_171">171</xref>
; pre-emptive self-defence to meet threat of
<xref ref-type="page" rid="page_107">107</xref>
,
<xref ref-type="page" rid="page_118">118</xref>
<xref ref-type="page" rid="page_121">21</xref>
; problem of definition
<xref ref-type="page" rid="page_170">170</xref>
; small cost of attacks
<xref ref-type="page" rid="page_185">185</xref>
<xref ref-type="page" rid="page_186">6</xref>
; as threatening as ever today
<xref ref-type="page" rid="page_61">61</xref>
; trauma caused by
<xref ref-type="page" rid="page_57">57</xref>
,
<xref ref-type="page" rid="page_59">59</xref>
<xref ref-type="page" rid="page_62">62</xref>
;
<italic>see also</italic>
9/11 attacks; countering financing of terrorism; global war on terrorism; war on terrorism</p>
</list-item>
<list-item>
<p>terrorist movements/organisations: alternative strategies against
<xref ref-type="page" rid="page_40">40</xref>
<xref ref-type="page" rid="page_41">1</xref>
; difficulties of intelligence gathering on
<xref ref-type="page" rid="page_159">159</xref>
; explanations for decline or end of
<xref ref-type="page" rid="page_20">20</xref>
<xref ref-type="page" rid="page_21">1</xref>
; operation in weak states
<xref ref-type="page" rid="page_16">16</xref>
; recruitment of disenchanted individuals
<xref ref-type="page" rid="page_3">3</xref>
<xref ref-type="page" rid="page_4">4</xref>
; use of force against
<xref ref-type="page" rid="page_28">28</xref>
</p>
</list-item>
<list-item>
<p>Tesón, Fernando
<xref ref-type="page" rid="page_114">114</xref>
</p>
</list-item>
<list-item>
<p>Thailand
<xref ref-type="page" rid="page_2">2</xref>
</p>
</list-item>
<list-item>
<p>Third World: post-Cold War decline in strategic significance
<xref ref-type="page" rid="page_126">126</xref>
</p>
</list-item>
<list-item>
<p>Thompson, Tommy
<xref ref-type="page" rid="page_146">146</xref>
</p>
</list-item>
<list-item>
<p>Tokyo Criminal Tribunal
<xref ref-type="page" rid="page_99">99</xref>
</p>
</list-item>
<list-item>
<p>torture: of Abu Ghraib prisoners
<xref ref-type="page" rid="page_48">48</xref>
; acts in war against terrorism
<xref ref-type="page" rid="page_5">5</xref>
,
<xref ref-type="page" rid="page_164">164</xref>
; debates about value
<xref ref-type="page" rid="page_170">170</xref>
<xref ref-type="page" rid="page_171">1</xref>
; ethical arguments for and against
<xref ref-type="page" rid="page_172">172</xref>
<xref ref-type="page" rid="page_173">3</xref>
; international law prohibiting
<xref ref-type="page" rid="page_158">158</xref>
,
<xref ref-type="page" rid="page_170">170</xref>
; in interrogation of prisoners
<xref ref-type="page" rid="page_167">167</xref>
,
<xref ref-type="page" rid="page_169">169</xref>
<xref ref-type="page" rid="page_170">70</xref>
; problem of definition
<xref ref-type="page" rid="page_170">170</xref>
; used on Guantanamo detainees
<xref ref-type="page" rid="page_76">76</xref>
</p>
</list-item>
<list-item>
<p>totalitarianism (Morgenthau’s ‘escape from power’ theory)
<xref ref-type="page" rid="page_197">197</xref>
</p>
</list-item>
<list-item>
<p>trauma
<xref ref-type="page" rid="page_59">59</xref>
<xref ref-type="page" rid="page_60">60</xref>
; caused by terrorism
<xref ref-type="page" rid="page_57">57</xref>
,
<xref ref-type="page" rid="page_62">62</xref>
; need for security policy to address
<xref ref-type="page" rid="page_65">65</xref>
<xref ref-type="page" rid="page_66">6</xref>
,
<xref ref-type="page" rid="page_68">68</xref>
</p>
</list-item>
<list-item>
<p>treason
<xref ref-type="page" rid="page_162">162</xref>
</p>
</list-item>
<list-item>
<p>Tucker, R.W.
<xref ref-type="page" rid="page_29">29</xref>
,
<xref ref-type="page" rid="page_99">99</xref>
</p>
</list-item>
<list-item>
<p>Al Ubaedey, Jenan
<xref ref-type="page" rid="page_51">51</xref>
<xref ref-type="page" rid="page_52">2</xref>
</p>
</list-item>
<list-item>
<p>UN Charter
<xref ref-type="page" rid="page_71">71</xref>
,
<xref ref-type="page" rid="page_97">97</xref>
,
<xref ref-type="page" rid="page_99">99</xref>
,
<xref ref-type="page" rid="page_100">100</xref>
,
<xref ref-type="page" rid="page_103">103</xref>
,
<xref ref-type="page" rid="page_106">106</xref>
; Article
<xref ref-type="page" rid="page_51">51</xref>
</p>
</list-item>
<list-item>
<p>on right of self-defence
<xref ref-type="page" rid="page_109">109</xref>
<xref ref-type="page" rid="page_111">11</xref>
,
<xref ref-type="page" rid="page_116">116</xref>
,
<xref ref-type="page" rid="page_120">120</xref>
</p>
</list-item>
<list-item>
<p>underdeveloped world: post-Cold War crises
<xref ref-type="page" rid="page_126">126</xref>
</p>
</list-item>
<list-item>
<p>Uniform Code of Military Justice (UCMJ)
<xref ref-type="page" rid="page_72">72</xref>
</p>
</list-item>
<list-item>
<p>United Arab Emirates (UAE)
<xref ref-type="page" rid="page_186">186</xref>
,
<xref ref-type="page" rid="page_188">188</xref>
</p>
</list-item>
<list-item>
<p>United Kingdom (UK): debates surrounding women’s wearing of veil
<xref ref-type="page" rid="page_43">43</xref>
; deployment of troops to Iraq
<xref ref-type="page" rid="page_195">195</xref>
; dispute with US over sinking of
<italic>Caroline</italic>
<xref ref-type="page" rid="page_107">107</xref>
,
<xref ref-type="page" rid="page_111">111</xref>
<xref ref-type="page" rid="page_112">12</xref>
; engagement in spying on UN
<xref ref-type="page" rid="page_159">159</xref>
; post-9/11 foreign and security policies
<xref ref-type="page" rid="page_190">190</xref>
; redrafting of JIC memo regarding WMD
<xref ref-type="page" rid="page_195">195</xref>
;
<italic>see also</italic>
Britain; London bombings</p>
</list-item>
<list-item>
<p>United Nations (UN): Counter Terrorism Committee
<xref ref-type="page" rid="page_179">179</xref>
; General Assembly
<xref ref-type="page" rid="page_111">111</xref>
; High Level Panel
<xref id="page_234" ref-type="page"></xref>
on Threats, Challenges, and Change
<xref ref-type="page" rid="page_9">9</xref>
; International Convention for the Suppressing of Financing Terrorism
<xref ref-type="page" rid="page_178">178</xref>
,
<xref ref-type="page" rid="page_180">180</xref>
; Office on Drugs and Crime
<xref ref-type="page" rid="page_179">179</xref>
; al Qaeda and Taliban Sanctions Committee
<xref ref-type="page" rid="page_186">186</xref>
; recent conflicts fought by members
<xref ref-type="page" rid="page_116">116</xref>
; report on money laundering
<xref ref-type="page" rid="page_186">186</xref>
; Security Council
<xref ref-type="page" rid="page_20">20</xref>
,
<xref ref-type="page" rid="page_40">40</xref>
,
<xref ref-type="page" rid="page_98">98</xref>
,
<xref ref-type="page" rid="page_109">109</xref>
,
<xref ref-type="page" rid="page_111">111</xref>
,
<xref ref-type="page" rid="page_115">115</xref>
,
<xref ref-type="page" rid="page_118">118</xref>
,
<xref ref-type="page" rid="page_178">178</xref>
,
<xref ref-type="page" rid="page_194">194</xref>
; UK’s engagement in spying on
<xref ref-type="page" rid="page_159">159</xref>
;
<italic>see also</italic>
UN Charter</p>
</list-item>
<list-item>
<p>United States (US): agenda for representation of Jessica Lynch
<xref ref-type="page" rid="page_47">47</xref>
; aid committed to development
<xref ref-type="page" rid="page_140">140</xref>
; dispute with UK over sinking of
<italic>Caroline</italic>
<xref ref-type="page" rid="page_107">107</xref>
,
<xref ref-type="page" rid="page_111">111</xref>
<xref ref-type="page" rid="page_112">12</xref>
; effect of Bin Laden’s communication on elections
<xref ref-type="page" rid="page_25">25</xref>
; funds for IRA
<xref ref-type="page" rid="page_178">178</xref>
; global perspective on intelligence gathering
<xref ref-type="page" rid="page_163">163</xref>
; human rights abuses of Guantanamo detainees
<xref ref-type="page" rid="page_74">74</xref>
; invasion of Iraq (March 2003)
<xref ref-type="page" rid="page_36">36</xref>
,
<xref ref-type="page" rid="page_194">194</xref>
,
<xref ref-type="page" rid="page_195">195</xref>
; killing of Muslims in Iraq and Palestine
<xref ref-type="page" rid="page_33">33</xref>
<xref ref-type="page" rid="page_34">4</xref>
; and language of force
<xref ref-type="page" rid="page_134">134</xref>
,
<xref ref-type="page" rid="page_136">136</xref>
; limited war doctrines
<xref ref-type="page" rid="page_29">29</xref>
; long war ideology
<xref ref-type="page" rid="page_13">13</xref>
<xref ref-type="page" rid="page_14">14</xref>
,
<xref ref-type="page" rid="page_23">23</xref>
<xref ref-type="page" rid="page_24">4</xref>
; National Security Strategy
<xref ref-type="page" rid="page_11">11</xref>
<xref ref-type="page" rid="page_12">12</xref>
,
<xref ref-type="page" rid="page_15">15</xref>
,
<xref ref-type="page" rid="page_129">129</xref>
,
<xref ref-type="page" rid="page_137">137</xref>
; new realists’ thinking on self-defence
<xref ref-type="page" rid="page_115">115</xref>
<xref ref-type="page" rid="page_116">16</xref>
; policy on bioterrorism
<xref ref-type="page" rid="page_142">142</xref>
<xref ref-type="page" rid="page_155">55</xref>
; post-9/11 foreign and security policies
<xref ref-type="page" rid="page_190">190</xref>
; post-9/11 view of world politics
<xref ref-type="page" rid="page_10">10</xref>
; post-Cold War hegemony
<xref ref-type="page" rid="page_30">30</xref>
<xref ref-type="page" rid="page_31">1</xref>
,
<xref ref-type="page" rid="page_126">126</xref>
,
<xref ref-type="page" rid="page_191">191</xref>
; promotion of liberal democratic values
<xref ref-type="page" rid="page_13">13</xref>
,
<xref ref-type="page" rid="page_23">23</xref>
; ‘protection myth’ framework of war on terror
<xref ref-type="page" rid="page_44">44</xref>
; response to 9/11 attacks
<xref ref-type="page" rid="page_1">1</xref>
,
<xref ref-type="page" rid="page_3">3</xref>
,
<xref ref-type="page" rid="page_11">11</xref>
,
<xref ref-type="page" rid="page_60">60</xref>
,
<xref ref-type="page" rid="page_192">192</xref>
,
<xref ref-type="page" rid="page_193">193</xref>
<xref ref-type="page" rid="page_194">4</xref>
; risk of undermining international order
<xref ref-type="page" rid="page_3">3</xref>
; slogan ‘global war against terrorism’
<xref ref-type="page" rid="page_12">12</xref>
<xref ref-type="page" rid="page_13">13</xref>
; strategies of force in war on terror
<xref ref-type="page" rid="page_31">31</xref>
,
<xref ref-type="page" rid="page_134">134</xref>
; strategies to combat al-Qaeda
<xref ref-type="page" rid="page_15">15</xref>
; support for Israel’s 2006 invasion of Lebanon
<xref ref-type="page" rid="page_38">38</xref>
; treatment of detainees in war on terror
<xref ref-type="page" rid="page_169">169</xref>
; Uniform Military Code of Justice (UMCJ)
<xref ref-type="page" rid="page_85">85</xref>
,
<xref ref-type="page" rid="page_86">86</xref>
,
<xref ref-type="page" rid="page_90">90</xref>
; unilateral response against financing of terrorism
<xref ref-type="page" rid="page_181">181</xref>
<xref ref-type="page" rid="page_183">3</xref>
,
<xref ref-type="page" rid="page_186">186</xref>
;
<italic>see also</italic>
Bush administration</p>
</list-item>
<list-item>
<p>US Agency for International Development (USAID)
<xref ref-type="page" rid="page_128">128</xref>
<xref ref-type="page" rid="page_129">9</xref>
,
<xref ref-type="page" rid="page_137">137</xref>
</p>
</list-item>
<list-item>
<p>USA Patriot Act 2001
<xref ref-type="page" rid="page_177">177</xref>
,
<xref ref-type="page" rid="page_181">181</xref>
,
<xref ref-type="page" rid="page_182">182</xref>
<xref ref-type="page" rid="page_183">3</xref>
</p>
</list-item>
<list-item>
<p>US Army: reservists charged with Abu Ghraib prisoner abuses
<xref ref-type="page" rid="page_48">48</xref>
; sexual harassment towards women
<xref ref-type="page" rid="page_42">42</xref>
<xref ref-type="page" rid="page_43">3</xref>
</p>
</list-item>
<list-item>
<p>US Army Edgewood Chemical Biological Center
<xref ref-type="page" rid="page_152">152</xref>
</p>
</list-item>
<list-item>
<p>US Army Medical Research Institute for Infectious Diseases (USAMRIID)
<xref ref-type="page" rid="page_145">145</xref>
<xref ref-type="page" rid="page_146">6</xref>
,
<xref ref-type="page" rid="page_149">149</xref>
</p>
</list-item>
<list-item>
<p>
<italic>USA Today</italic>
<xref ref-type="page" rid="page_45">45</xref>
</p>
</list-item>
<list-item>
<p>US Department of Defense (DOD): allegations against David Hicks
<xref ref-type="page" rid="page_82">82</xref>
<xref ref-type="page" rid="page_83">3</xref>
; Chemical and Biological Defense Program (CBDP)
<xref ref-type="page" rid="page_144">144</xref>
; creation of S/CRS
<xref ref-type="page" rid="page_139">139</xref>
; on ‘military transformation’
<xref ref-type="page" rid="page_29">29</xref>
<xref ref-type="page" rid="page_30">30</xref>
;
<italic>National Defense Strategy</italic>
<xref ref-type="page" rid="page_133">133</xref>
; Quadrennial Defense Review (QDR) February 2006)
<xref ref-type="page" rid="page_13">13</xref>
<xref ref-type="page" rid="page_14">14</xref>
,
<xref ref-type="page" rid="page_14">14</xref>
,
<xref ref-type="page" rid="page_19">19</xref>
,
<xref ref-type="page" rid="page_23">23</xref>
; on threat from failed states
<xref ref-type="page" rid="page_137">137</xref>
; use of Guantanamo Bay detention camp
<xref ref-type="page" rid="page_71">71</xref>
,
<xref ref-type="page" rid="page_72">72</xref>
</p>
</list-item>
<list-item>
<p>USS
<italic>Abraham Lincoln</italic>
<xref ref-type="page" rid="page_195">195</xref>
</p>
</list-item>
<list-item>
<p>USS
<italic>Cole</italic>
<xref ref-type="page" rid="page_35">35</xref>
</p>
</list-item>
<list-item>
<p>US State Department:
<italic>Future of Iraq</italic>
project
<xref ref-type="page" rid="page_17">17</xref>
<xref ref-type="page" rid="page_18">18</xref>
,
<xref ref-type="page" rid="page_18">18</xref>
; report on people trafficking
<xref ref-type="page" rid="page_50">50</xref>
<xref ref-type="page" rid="page_51">1</xref>
</p>
</list-item>
<list-item>
<p>US Supreme Court: findings on Guantanamo Bay detainees
<xref ref-type="page" rid="page_81">81</xref>
,
<xref ref-type="page" rid="page_83">83</xref>
,
<xref ref-type="page" rid="page_84">84</xref>
<xref ref-type="page" rid="page_85">5</xref>
,
<xref ref-type="page" rid="page_87">87</xref>
; neglect of issue of derogation
<xref ref-type="page" rid="page_80">80</xref>
; rulings on Guantanamo Bay
<xref ref-type="page" rid="page_72">72</xref>
,
<xref ref-type="page" rid="page_73">73</xref>
,
<xref ref-type="page" rid="page_74">74</xref>
,
<xref ref-type="page" rid="page_78">78</xref>
,
<xref ref-type="page" rid="page_83">83</xref>
<xref ref-type="page" rid="page_84">4</xref>
,
<xref ref-type="page" rid="page_88">88</xref>
<xref ref-type="page" rid="page_89">9</xref>
,
<xref ref-type="page" rid="page_90">90</xref>
</p>
</list-item>
<list-item>
<p>Uzbekistan
<xref ref-type="page" rid="page_17">17</xref>
,
<xref ref-type="page" rid="page_140">140</xref>
</p>
</list-item>
<list-item>
<p>Van Evera, Stephen
<xref ref-type="page" rid="page_135">135</xref>
,
<xref ref-type="page" rid="page_136">136</xref>
,
<xref ref-type="page" rid="page_137">137</xref>
</p>
</list-item>
<list-item>
<p>Vattel, E.
<xref ref-type="page" rid="page_4">4</xref>
,
<xref ref-type="page" rid="page_108">108</xref>
,
<xref ref-type="page" rid="page_108">108</xref>
<xref ref-type="page" rid="page_109">9</xref>
,
<xref ref-type="page" rid="page_114">114</xref>
</p>
</list-item>
<list-item>
<p>Védrine, Hubert
<xref ref-type="page" rid="page_191">191</xref>
</p>
</list-item>
<list-item>
<p>veil
<italic>see hijab</italic>
</p>
</list-item>
<list-item>
<p>Vietnam war
<xref ref-type="page" rid="page_29">29</xref>
,
<xref ref-type="page" rid="page_39">39</xref>
</p>
</list-item>
<list-item>
<p>‘vindictive justice’
<xref ref-type="page" rid="page_97">97</xref>
<xref ref-type="page" rid="page_98">8</xref>
,
<xref ref-type="page" rid="page_100">100</xref>
<xref ref-type="page" rid="page_102">2</xref>
</p>
</list-item>
<list-item>
<p>violence: Bin Laden’s attempt to communicate about causes and effects
<xref ref-type="page" rid="page_25">25</xref>
; breaking cycles of
<xref ref-type="page" rid="page_66">66</xref>
; daily reality in Iraq
<xref ref-type="page" rid="page_196">196</xref>
; in interrogation of prisoners
<xref ref-type="page" rid="page_168">168</xref>
<xref ref-type="page" rid="page_169">9</xref>
; Islamist ideology of
<xref ref-type="page" rid="page_39">39</xref>
; long-term consequences for society
<xref ref-type="page" rid="page_4">4</xref>
; movement from grievance to use of
<xref ref-type="page" rid="page_32">32</xref>
; in ‘new wars’ discourse
<xref ref-type="page" rid="page_127">127</xref>
; spiralling cycle generated by wars of response
<xref ref-type="page" rid="page_61">61</xref>
; state of exception allowing justification of
<xref ref-type="page" rid="page_77">77</xref>
<xref ref-type="page" rid="page_78">8</xref>
</p>
</list-item>
<list-item>
<p>Vitoria, Francisco de
<xref ref-type="page" rid="page_97">97</xref>
,
<xref ref-type="page" rid="page_100">100</xref>
,
<xref ref-type="page" rid="page_101">101</xref>
</p>
</list-item>
<list-item>
<p>Waldock, Sir Humphrey
<xref ref-type="page" rid="page_110">110</xref>
</p>
</list-item>
<list-item>
<p>Walt, Stephen
<xref ref-type="page" rid="page_136">136</xref>
</p>
</list-item>
<list-item>
<p>Walzer, Michael
<xref ref-type="page" rid="page_99">99</xref>
</p>
</list-item>
<list-item>
<p>war: Clausewitz’s first strategic question on
<xref ref-type="page" rid="page_41">41</xref>
; new paradigm
<xref ref-type="page" rid="page_28">28</xref>
<xref ref-type="page" rid="page_29">9</xref>
,
<xref ref-type="page" rid="page_38">38</xref>
; zones
<xref id="page_235" ref-type="page"></xref>
of chaos
<xref ref-type="page" rid="page_127">127</xref>
<xref ref-type="page" rid="page_128">8</xref>
;
<italic>see also</italic>
just war; ‘new wars’</p>
</list-item>
<list-item>
<p>Warren, Earl
<xref ref-type="page" rid="page_156">156</xref>
</p>
</list-item>
<list-item>
<p>wars of response to terrorism
<xref ref-type="page" rid="page_3">3</xref>
<xref ref-type="page" rid="page_5">5</xref>
; generation of further hatred and violence
<xref ref-type="page" rid="page_61">61</xref>
</p>
</list-item>
<list-item>
<p>war on terror: actions at individual level
<xref ref-type="page" rid="page_164">164</xref>
; anti-money laundering laws
<xref ref-type="page" rid="page_183">183</xref>
<xref ref-type="page" rid="page_185">5</xref>
; Bush’s rhetoric
<xref ref-type="page" rid="page_97">97</xref>
<xref ref-type="page" rid="page_98">8</xref>
,
<xref ref-type="page" rid="page_99">99</xref>
,
<xref ref-type="page" rid="page_100">100</xref>
,
<xref ref-type="page" rid="page_102">102</xref>
,
<xref ref-type="page" rid="page_129">129</xref>
; concept of force in
<xref ref-type="page" rid="page_28">28</xref>
; current state of play
<xref ref-type="page" rid="page_195">195</xref>
<xref ref-type="page" rid="page_196">6</xref>
; as defining present age
<xref ref-type="page" rid="page_93">93</xref>
; establishment of spaces of exception
<xref ref-type="page" rid="page_130">130</xref>
; flawed conception of
<xref ref-type="page" rid="page_190">190</xref>
,
<xref ref-type="page" rid="page_195">195</xref>
<xref ref-type="page" rid="page_196">6</xref>
; gendered identities
<xref ref-type="page" rid="page_43">43</xref>
,
<xref ref-type="page" rid="page_44">44</xref>
,
<xref ref-type="page" rid="page_45">45</xref>
,
<xref ref-type="page" rid="page_47">47</xref>
<xref ref-type="page" rid="page_48">8</xref>
,
<xref ref-type="page" rid="page_49">49</xref>
,
<xref ref-type="page" rid="page_53">53</xref>
; Geneva Conventions as applicable to
<xref ref-type="page" rid="page_73">73</xref>
; impact of emotions
<xref ref-type="page" rid="page_61">61</xref>
<xref ref-type="page" rid="page_62">2</xref>
; intelligence gathering
<xref ref-type="page" rid="page_156">156</xref>
,
<xref ref-type="page" rid="page_163">163</xref>
<xref ref-type="page" rid="page_164">4</xref>
,
<xref ref-type="page" rid="page_175">175</xref>
; justification and legitimisation
<xref ref-type="page" rid="page_61">61</xref>
; problem of categorising as war or crime
<xref ref-type="page" rid="page_165">165</xref>
; questioning of idea of
<xref ref-type="page" rid="page_31">31</xref>
,
<xref ref-type="page" rid="page_40">40</xref>
; role of Jessica Lynch narrative
<xref ref-type="page" rid="page_47">47</xref>
; and use of Guantanamo detention facilities
<xref ref-type="page" rid="page_71">71</xref>
; US rhetoric to justify
<xref ref-type="page" rid="page_57">57</xref>
; and worsening security of women
<xref ref-type="page" rid="page_42">42</xref>
<xref ref-type="page" rid="page_43">3</xref>
,
<xref ref-type="page" rid="page_49">49</xref>
<xref ref-type="page" rid="page_53">53</xref>
;
<italic>see also</italic>
global war on terror</p>
</list-item>
<list-item>
<p>Washington, DC
<xref ref-type="page" rid="page_59">59</xref>
,
<xref ref-type="page" rid="page_128">128</xref>
,
<xref ref-type="page" rid="page_129">129</xref>
</p>
</list-item>
<list-item>
<p>
<italic>Washington Post</italic>
<xref ref-type="page" rid="page_147">147</xref>
,
<xref ref-type="page" rid="page_150">150</xref>
</p>
</list-item>
<list-item>
<p>weapons of mass destruction (WMD): and intelligence gathering
<xref ref-type="page" rid="page_163">163</xref>
; Iraq’s alleged program
<xref ref-type="page" rid="page_2">2</xref>
,
<xref ref-type="page" rid="page_194">194</xref>
; and legitimisation of pre-emptive attack on Iraq
<xref ref-type="page" rid="page_61">61</xref>
,
<xref ref-type="page" rid="page_98">98</xref>
; threat from nations suspected of
<xref ref-type="page" rid="page_115">115</xref>
; US priority of preventing proliferation
<xref ref-type="page" rid="page_14">14</xref>
,
<xref ref-type="page" rid="page_19">19</xref>
<xref ref-type="page" rid="page_20">20</xref>
</p>
</list-item>
<list-item>
<p>Weather Underground
<xref ref-type="page" rid="page_20">20</xref>
</p>
</list-item>
<list-item>
<p>Webster, Daniel
<xref ref-type="page" rid="page_111">111</xref>
<xref ref-type="page" rid="page_113">13</xref>
,
<xref ref-type="page" rid="page_117">117</xref>
,
<xref ref-type="page" rid="page_119">119</xref>
</p>
</list-item>
<list-item>
<p>the West: development of grievances against
<xref ref-type="page" rid="page_32">32</xref>
; justification of violence against those outside state system
<xref ref-type="page" rid="page_75">75</xref>
; significance of 9/11 attacks for security
<xref ref-type="page" rid="page_2">2</xref>
<xref ref-type="page" rid="page_5">5</xref>
,
<xref ref-type="page" rid="page_10">10</xref>
,
<xref ref-type="page" rid="page_198">198</xref>
</p>
</list-item>
<list-item>
<p>West Bank
<xref ref-type="page" rid="page_26">26</xref>
,
<xref ref-type="page" rid="page_31">31</xref>
,
<xref ref-type="page" rid="page_35">35</xref>
,
<xref ref-type="page" rid="page_36">36</xref>
</p>
</list-item>
<list-item>
<p>West Germany
<xref ref-type="page" rid="page_178">178</xref>
</p>
</list-item>
<list-item>
<p>Williams, Clive
<xref ref-type="page" rid="page_31">31</xref>
</p>
</list-item>
<list-item>
<p>Williams, M.C.
<xref ref-type="page" rid="page_193">193</xref>
</p>
</list-item>
<list-item>
<p>Williams, Paul
<xref ref-type="page" rid="page_3">3</xref>
<xref ref-type="page" rid="page_4">4</xref>
</p>
</list-item>
<list-item>
<p>Wippman, D
<xref ref-type="page" rid="page_80">80</xref>
</p>
</list-item>
<list-item>
<p>Wolff, C.
<xref ref-type="page" rid="page_108">108</xref>
</p>
</list-item>
<list-item>
<p>Wolfowitz, Paul
<xref ref-type="page" rid="page_17">17</xref>
<xref ref-type="page" rid="page_18">18</xref>
</p>
</list-item>
<list-item>
<p>women: historical linkage of emotions with
<xref ref-type="page" rid="page_62">62</xref>
; worsening security situation due to war on terror
<xref ref-type="page" rid="page_42">42</xref>
<xref ref-type="page" rid="page_43">3</xref>
,
<xref ref-type="page" rid="page_49">49</xref>
<xref ref-type="page" rid="page_53">53</xref>
</p>
</list-item>
<list-item>
<p>Woodward, Bob
<xref ref-type="page" rid="page_98">98</xref>
</p>
</list-item>
<list-item>
<p>World Bank
<xref ref-type="page" rid="page_179">179</xref>
</p>
</list-item>
<list-item>
<p>World Islamic Front for Jihad against Crusaders and Jews
<xref ref-type="page" rid="page_35">35</xref>
</p>
</list-item>
<list-item>
<p>World Trade Center
<xref ref-type="page" rid="page_35">35</xref>
</p>
</list-item>
<list-item>
<p>World Wide Web
<xref ref-type="page" rid="page_161">161</xref>
</p>
</list-item>
<list-item>
<p>Yemen
<xref ref-type="page" rid="page_16">16</xref>
,
<xref ref-type="page" rid="page_50">50</xref>
,
<xref ref-type="page" rid="page_83">83</xref>
</p>
</list-item>
<list-item>
<p>Yoo, John
<xref ref-type="page" rid="page_80">80</xref>
,
<xref ref-type="page" rid="page_173">173</xref>
</p>
</list-item>
<list-item>
<p>Yousef, Ramsi
<xref ref-type="page" rid="page_35">35</xref>
</p>
</list-item>
<list-item>
<p>Yugoslavia
<italic>see</italic>
Bosnia; Serbia</p>
</list-item>
<list-item>
<p>al-Zarqawi, Abu Musah
<xref ref-type="page" rid="page_22">22</xref>
</p>
</list-item>
<list-item>
<p>Zerhouni, Elias
<xref ref-type="page" rid="page_146">146</xref>
</p>
</list-item>
<list-item>
<p>zones of chaos
<xref ref-type="page" rid="page_127">127</xref>
<xref ref-type="page" rid="page_128">8</xref>
,
<xref ref-type="page" rid="page_129">129</xref>
,
<xref ref-type="page" rid="page_136">136</xref>
,
<xref ref-type="page" rid="page_139">139</xref>
,
<xref ref-type="page" rid="page_140">140</xref>
</p>
</list-item>
<list-item>
<p>‘zones of indistinction’
<xref ref-type="page" rid="page_132">132</xref>
</p>
</list-item>
<list-item>
<p>Zoya
<xref ref-type="page" rid="page_46">46</xref>
</p>
</list-item>
</list>
</sec>
</back>
</book>
</istex:document>
</istex:metadataXml>
<mods version="3.6">
<titleInfo>
<title>Security and the War on Terror</title>
</titleInfo>
<titleInfo type="alternative">
<title>Security and the War on Terror</title>
</titleInfo>
<name type="personal">
<namePart type="given">Alex J.</namePart>
<namePart type="family">Bellamy</namePart>
<description>Alex J. Bellamy is Professor of International Relations at the University of Queensland, Australia.</description>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Roland</namePart>
<namePart type="family">Bleiker</namePart>
<description>Roland Bleiker is Professor of International Relations at the University of Queensland, Australia.</description>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Sara E.</namePart>
<namePart type="family">Davies</namePart>
<description>Sara E. Davies is Lecturer at the School of Justice, Queensland University of Technology, Australia.</description>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Richard</namePart>
<namePart type="family">Devetak</namePart>
<description>Richard Devetak is Senior Lecturer in International Relations and Director of the Rotary Centre for International Studies in Peace and Conflict Resolution at the University of Queensland, Australia.</description>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<typeOfResource>text</typeOfResource>
<genre type="book" displayLabel="N/A" authority="ISTEX" authorityURI="https://content-type.data.istex.fr" valueURI="https://content-type.data.istex.fr/ark:/67375/XTP-94FB0L8V-T"></genre>
<originInfo>
<publisher>Routledge</publisher>
<place>
<placeTerm type="text">2 Park Square, Milton Park, Abingdon, Oxon OX14 4RN</placeTerm>
</place>
<publisher>Routledge</publisher>
<place>
<placeTerm type="text">270 Madison Ave, New York, NY 10016</placeTerm>
</place>
<dateIssued encoding="w3cdtf">2008</dateIssued>
<copyrightDate encoding="w3cdtf">2008</copyrightDate>
<edition>1</edition>
</originInfo>
<language>
<languageTerm type="code" authority="iso639-2b">eng</languageTerm>
<languageTerm type="code" authority="rfc3066">en</languageTerm>
</language>
<tableOfContents displayLabel="chapters-included-in-book">Introduction [Bellamy, Alex J.], [Bleiker, Roland], page_1; Security studies, 9/11 and the long war [Williams, Paul D.], page_9; Cause and effect in the war on terror [Burke, Anthony], page_25; ‘War on terror’/‘war on women’ : Critical feminist perspectives, [Lee-Koo, Katrina], page_42; Emotions in the war on terror [Hutchison, Emma], [Bleiker, Roland], page_57; International law and the state of exception [Davies1, Sara E.], page_71; New thinking in the just war tradition : Theorizing the war on terror, [O’Driscoll, Cian], page_93; Pre-empting terror [Bellamy, Alex J.], page_106; Failures, rogues and terrorists : States of exception and the North/South divide, [Devetak, Richard], page_125; US bioterrorism policy [Enemark, Christian], page_142; Ethics and intelligence in the age of terror [Smith, Hugh], page_156; The international campaign to counter the financing of terrorism [Sharman, J. C.], page_177; Conclusion [Davies, Sara E.], [Devetak, Richard], page_190;</tableOfContents>
<physicalDescription>
<extent unit="references">563</extent>
</physicalDescription>
<abstract>The terrorist attacks of 11 September 2001 marked a turning point in international politics, representing a new type of threat that could not easily be anticipated or prevented through state-based structures of security alone. Opening up interdisciplinary conversations between strategic, economic, ethical and legal approaches to global terrorism, this edited book recognises a fundamental issue: while major crises initially tend to reinforce old thinking and behavioural patterns, they also allow societies to challenge and overcome entrenched habits, thereby creating the foundations for a new and perhaps more peaceful future. The objective of this volume is to address the issues that are at stake in this dual process of political closure, and to therefore rethink how states can respond to terrorist threats. The contributors offer a unique combination, being drawn from leading conceptual theorists to policy-oriented analysts, from senior academics to junior researchers. The book explores how terrorism has had a profound impact on how security is being understood and implemented, and uses a range of hitherto neglected sources of insight, such as those between political, economic, legal and ethical factors, to examine the nature and meaning of security in a rapidly changing world. This book will be of much interest to students of Terrorism Studies, Security Studies, International Law and International Relations in general.</abstract>
<note type="supplier">codeMantra LLC</note>
<relatedItem type="host">
<titleInfo>
<title>Security and the War on Terror</title>
</titleInfo>
<name type="personal">
<namePart type="given">Alex J.</namePart>
<namePart type="family">Bellamy</namePart>
<description>Alex J. Bellamy is Professor of International Relations at the University of Queensland, Australia.</description>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Roland</namePart>
<namePart type="family">Bleiker</namePart>
<description>Roland Bleiker is Professor of International Relations at the University of Queensland, Australia.</description>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Sara E.</namePart>
<namePart type="family">Davies</namePart>
<description>Sara E. Davies is Lecturer at the School of Justice, Queensland University of Technology, Australia.</description>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Richard</namePart>
<namePart type="family">Devetak</namePart>
<description>Richard Devetak is Senior Lecturer in International Relations and Director of the Rotary Centre for International Studies in Peace and Conflict Resolution at the University of Queensland, Australia.</description>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<genre type="book" authority="ISTEX" authorityURI="https://publication-type.data.istex.fr" valueURI="https://publication-type.data.istex.fr/ark:/67375/JMC-5WTPMB5N-F">book</genre>
<originInfo>
<publisher>Routledge</publisher>
<place>
<placeTerm type="text">2 Park Square, Milton Park, Abingdon, Oxon OX14 4RN</placeTerm>
</place>
<publisher>Routledge</publisher>
<place>
<placeTerm type="text">270 Madison Ave, New York, NY 10016</placeTerm>
</place>
<dateIssued encoding="w3cdtf">2008</dateIssued>
<copyrightDate encoding="w3cdtf">2008</copyrightDate>
<edition>1</edition>
</originInfo>
<subject>
<genre>book-collection</genre>
<topic>Contemporary Security Studies</topic>
</subject>
<identifier type="ISBN">9780415368445</identifier>
<identifier type="ISBN">9780415368452</identifier>
<identifier type="eISBN">9780203028094</identifier>
<part>
<date>2008</date>
<extent unit="pages">
<start>1</start>
<end>124</end>
<total>246</total>
</extent>
</part>
</relatedItem>
<relatedItem type="references" ID="ref1" displayLabel="bib1">
<titleInfo>
<title>Supreme Court of the United States</title>
</titleInfo>
<name type="personal">
<namePart type="family">BUSH</namePart>
<namePart type="given">Rasul v.</namePart>
</name>
<titleInfo>
<title>Rasul v. Bush, 2004, Supreme Court of the United States.</title>
</titleInfo>
<genre type="other">other</genre>
<note type="content-in-line">Rasul v. Bush, 2004, Supreme Court of the United States.</note>
<part>
<date>2004</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref2" displayLabel="bib2">
<titleInfo>
<title>Supreme Court of the United States</title>
</titleInfo>
<name type="personal">
<namePart type="family">RUMSFELD</namePart>
<namePart type="given">Hamdan v.</namePart>
</name>
<titleInfo>
<title>Hamdan v. Rumsfeld, 2006, Supreme Court of the United States.</title>
</titleInfo>
<genre type="other">other</genre>
<note type="content-in-line">Hamdan v. Rumsfeld, 2006, Supreme Court of the United States.</note>
<part>
<date>2006</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref3" displayLabel="bib3">
<titleInfo>
<title>Final report of the National Commission on Terrorist Attacks upon the United States</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">9/11 Commission (2004) Final report of the National Commission on Terrorist Attacks upon the United States, New York: Norton.</note>
<originInfo>
<publisher>Norton</publisher>
<place>
<placeTerm type="text">New York</placeTerm>
</place>
</originInfo>
<part>
<date>2004</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref4" displayLabel="bib4">
<titleInfo>
<title>The World Today</title>
</titleInfo>
<relatedItem type="host">
<titleInfo>
<title>Al Qaeda regrouping in Afghanistan: UN</title>
</titleInfo>
<genre>web</genre>
<part>
<date>2002</date>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref5" displayLabel="bib5">
<titleInfo>
<title>Hicks’ return not so simple, says Ruddock</title>
</titleInfo>
<genre type="web">web</genre>
<note type="content-in-line">ABC 2006, Hicks’ return not so simple, says Ruddock, viewed 9 December 2006 .</note>
<part>
<date>2006</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref6" displayLabel="bib6">
<name type="personal">
<namePart type="family">ABDELA</namePart>
<namePart type="given">L.</namePart>
</name>
<titleInfo>
<title>Iraq’s war on women, Open Democracy</title>
</titleInfo>
<genre type="web">web</genre>
<note type="content-in-line">Abdela, L. 2005, Iraq’s war on women, Open Democracy, 18 July, viewed 26 April 2007 .</note>
<part>
<date>2005</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref7" displayLabel="bib7">
<name type="personal">
<namePart type="family">AGAMBEN</namePart>
<namePart type="given">G.</namePart>
</name>
<titleInfo>
<title>Homo sacer: sovereign power and bare life</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Agamben, G. 1998, Homo sacer: sovereign power and bare life, Stanford University Press, Stanford, CA.</note>
<originInfo>
<publisher>Stanford University Press</publisher>
<place>
<placeTerm type="text">Stanford, CA</placeTerm>
</place>
</originInfo>
<part>
<date>1998</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref8" displayLabel="bib8">
<name type="personal">
<namePart type="family">AGAMBEN</namePart>
<namePart type="given">G.</namePart>
</name>
<titleInfo>
<title>State of exception</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Agamben, G. 2005, State of exception, University of Chicago Press, Chicago, IL.</note>
<originInfo>
<publisher>University of Chicago Press</publisher>
<place>
<placeTerm type="text">Chicago, IL</placeTerm>
</place>
</originInfo>
<part>
<date>2005</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref9" displayLabel="bib9">
<name type="personal">
<namePart type="family">AHMED</namePart>
<namePart type="given">S.</namePart>
</name>
<titleInfo>
<title>The cultural politics of emotion</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Ahmed, S. 2004, The cultural politics of emotion, Edinburgh University Press, Edinburgh.</note>
<originInfo>
<publisher>Edinburgh University Press</publisher>
<place>
<placeTerm type="text">Edinburgh</placeTerm>
</place>
</originInfo>
<part>
<date>2004</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref10" displayLabel="bib10">
<name type="personal">
<namePart type="family">ALEXANDROV</namePart>
<namePart type="given">S.A.</namePart>
</name>
<titleInfo>
<title>Self-defense against the use of force in international law</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Alexandrov, S.A. 1996, Self-defense against the use of force in international law, Kluwer Law International, The Hague.</note>
<originInfo>
<publisher>Kluwer Law International</publisher>
<place>
<placeTerm type="text">The Hague</placeTerm>
</place>
</originInfo>
<part>
<date>1996</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref11" displayLabel="bib11">
<name type="personal">
<namePart type="family">ALIBEK</namePart>
<namePart type="given">K.</namePart>
</name>
<titleInfo>
<title>Biohazard</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Alibek, K. 1999, Biohazard, Arrow, London.</note>
<originInfo>
<publisher>Arrow</publisher>
<place>
<placeTerm type="text">London</placeTerm>
</place>
</originInfo>
<part>
<date>1999</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref12" displayLabel="bib12">
<titleInfo>
<title>Letter to the Editor: BioShield or BioGap</title>
</titleInfo>
<name type="personal">
<namePart type="family">ALIBEK</namePart>
<namePart type="given">K.</namePart>
</name>
<name type="personal">
<namePart type="family">BAILEY</namePart>
<namePart type="given">C.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>Biosecurity and Bioterrorism</title>
</titleInfo>
<genre>journal</genre>
<part>
<date>2004</date>
<detail type="volume">
<caption>vol.</caption>
<number>2</number>
</detail>
<detail type="issue">
<caption>no.</caption>
<number>2</number>
</detail>
<extent unit="pages">
<start>132</start>
<end>3</end>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref13" displayLabel="bib13">
<titleInfo>
<title>Iraq: decades of suffering, now women deserve better</title>
</titleInfo>
<genre type="web">web</genre>
<note type="content-in-line">Amnesty International 2005, Iraq: decades of suffering, now women deserve better, February, viewed 26 April 2007 .</note>
<part>
<date>2005</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref14" displayLabel="bib14">
<titleInfo>
<title>Hundreds of ‘war on terror’ detainees in US custody</title>
</titleInfo>
<titleInfo>
<title>Amnesty International Australia 2006, Hundreds of ‘war on terror’ detainees in US custody, viewed 1 December 2006 .</title>
</titleInfo>
<genre type="web">web</genre>
<note type="content-in-line">Amnesty International Australia 2006, Hundreds of ‘war on terror’ detainees in US custody, viewed 1 December 2006 .</note>
<part>
<date>2006</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref15" displayLabel="bib15">
<titleInfo>
<title>Winning with Allies: The Strategic Value of the Afghan Model</title>
</titleInfo>
<name type="personal">
<namePart type="family">ANDRES</namePart>
<namePart type="given">R.B.</namePart>
</name>
<name type="personal">
<namePart type="family">WILLS</namePart>
<namePart type="given">C.</namePart>
</name>
<name type="personal">
<namePart type="family">GRIFFITH</namePart>
<namePart type="given">T.E.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>International Security</title>
</titleInfo>
<genre>journal</genre>
<part>
<date>2005</date>
<detail type="volume">
<caption>vol.</caption>
<number>30</number>
</detail>
<detail type="issue">
<caption>no.</caption>
<number>3</number>
</detail>
<extent unit="pages">
<start>124</start>
<end>60</end>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref16" displayLabel="bib16">
<titleInfo>
<title>Military critical technologies List (MCTL), part 2: weapons of mass destruction technologies</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Anonymous 1998, Military critical technologies List (MCTL), part 2: weapons of mass destruction technologies, Office of the Under Secretary of Defense for Acquistion and Technology, Washington, DC.</note>
<originInfo>
<place>
<placeTerm type="text">Washington, DC</placeTerm>
</place>
</originInfo>
<part>
<date>1998</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref17" displayLabel="bib17">
<titleInfo>
<title>The Scowcroft Memorandum</title>
</titleInfo>
<relatedItem type="host">
<titleInfo>
<title>CBW Convention Bulletin</title>
</titleInfo>
<genre>other</genre>
<part>
<date>2002</date>
<detail type="volume">
<caption>vol.</caption>
<number>57</number>
</detail>
<detail type="issue">
<caption>no.</caption>
<number>2</number>
</detail>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref18" displayLabel="bib18">
<titleInfo>
<title>US Department of State Online</title>
</titleInfo>
<relatedItem type="host">
<titleInfo>
<title>Adherence to and compliance with arms control, nonproliferation and disarmament agreements and commitments</title>
</titleInfo>
<genre>web</genre>
<part>
<date>2005</date>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref19" displayLabel="bib19">
<name type="personal">
<namePart type="family">ANSCOMBE</namePart>
<namePart type="given">E.</namePart>
</name>
<name type="personal">
<namePart type="family">STEIN</namePart>
<namePart type="given">W</namePart>
</name>
<titleInfo>
<title>Nuclear weapons and Christian conscience</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Anscombe, E. 1961, ‘War and Murder’, in W Stein (ed.), Nuclear weapons and Christian conscience, Merlin Press, New York.</note>
<originInfo>
<publisher>Merlin Press</publisher>
<place>
<placeTerm type="text">New York</placeTerm>
</place>
</originInfo>
<part>
<date>1961</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref20" displayLabel="bib20">
<name type="personal">
<namePart type="family">AQUINAS</namePart>
<namePart type="given">T.</namePart>
</name>
<name type="personal">
<namePart type="family">DYSON</namePart>
<namePart type="given">R.W.</namePart>
</name>
<titleInfo>
<title>Aquinas: political writings</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Aquinas, T. (ed. Dyson, R.W.) 2002, Aquinas: political writings, Cambridge University Press, Cambridge.</note>
<originInfo>
<publisher>Cambridge University Press</publisher>
<place>
<placeTerm type="text">Cambridge</placeTerm>
</place>
</originInfo>
<part>
<date>2002</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref21" displayLabel="bib21">
<name type="personal">
<namePart type="family">ARENDT</namePart>
<namePart type="given">H.</namePart>
</name>
<titleInfo>
<title>The human condition</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Arendt, H. 1958, The human condition, University of Chicago Press, Chicago, IL.</note>
<originInfo>
<publisher>University of Chicago Press</publisher>
<place>
<placeTerm type="text">Chicago, IL</placeTerm>
</place>
</originInfo>
<part>
<date>1958</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref22" displayLabel="bib22">
<name type="personal">
<namePart type="family">ARMON-JONES</namePart>
<namePart type="given">C.</namePart>
</name>
<titleInfo>
<title>Varieties of affect</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Armon-Jones, C. 1991, Varieties of affect, Harvester Wheatsheaf, New York.</note>
<originInfo>
<publisher>Harvester Wheatsheaf</publisher>
<place>
<placeTerm type="text">New York</placeTerm>
</place>
</originInfo>
<part>
<date>1991</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref23" displayLabel="bib23">
<name type="personal">
<namePart type="family">ARON</namePart>
<namePart type="given">R.</namePart>
</name>
<titleInfo>
<title>Clausewitz: philosopher of war</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Aron, R. 1986, Clausewitz: philosopher of war, Simon and Schuster, New York.</note>
<originInfo>
<publisher>Simon and Schuster</publisher>
<place>
<placeTerm type="text">New York</placeTerm>
</place>
</originInfo>
<part>
<date>1986</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref24" displayLabel="bib24">
<name type="personal">
<namePart type="family">AUGUSTINE</namePart>
</name>
<titleInfo>
<title>The city of God against the pagans</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Augustine, Bishop of Hippo 1998, The city of God against the pagans, Cambridge Texts in the History of Political Thought, Cambridge University Press, Cambridge.</note>
<originInfo>
<publisher>Cambridge University Press</publisher>
<place>
<placeTerm type="text">Cambridge</placeTerm>
</place>
</originInfo>
<part>
<date>1998</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref25" displayLabel="bib25">
<name type="personal">
<namePart type="family">AUGUSTINE</namePart>
</name>
<name type="personal">
<namePart type="family">ATKINS</namePart>
<namePart type="given">E.M.</namePart>
</name>
<name type="personal">
<namePart type="family">DODARO</namePart>
<namePart type="given">R.J.</namePart>
</name>
<titleInfo>
<title>Augustine: –.political writings</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Augustine, Bishop of Hippo 2001, ‘Letter to Count Boniface’, in E.M. Atkins and R.J. Dodaro (eds), Augustine: –.political writings, Cambridge University Press, Cambridge.</note>
<originInfo>
<publisher>Cambridge University Press</publisher>
<place>
<placeTerm type="text">Cambridge</placeTerm>
</place>
</originInfo>
<part>
<date>2001</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref26" displayLabel="bib26">
<name type="personal">
<namePart type="family">AUGUSTINE</namePart>
</name>
<name type="personal">
<namePart type="family">DYSON</namePart>
<namePart type="given">R.W.</namePart>
</name>
<titleInfo>
<title>Augustine: political writings</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Augustine, Bishop of Hippo (ed. Dyson, R.W.) 2001, Augustine: political writings, Cambridge University Press, Cambridge.</note>
<originInfo>
<publisher>Cambridge University Press</publisher>
<place>
<placeTerm type="text">Cambridge</placeTerm>
</place>
</originInfo>
<part>
<date>2001</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref27" displayLabel="bib27">
<titleInfo>
<title>Media release: are sedition laws necessary and affective</title>
</titleInfo>
<genre type="web">web</genre>
<note type="content-in-line">Australian Government Law Reform Commission 2006, Media release: are sedition laws necessary and affective, viewed 20 March 2006 .</note>
<part>
<date>2006</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref28" displayLabel="bib28">
<titleInfo>
<title>“Six Floors” of Detainee Operations in the Post-9/11 World</title>
</titleInfo>
<name type="personal">
<namePart type="family">AYRES</namePart>
<namePart type="given">T.E.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>Parameters</title>
</titleInfo>
<genre>journal</genre>
<part>
<detail type="volume">
<caption>vol.</caption>
<number>35</number>
</detail>
<detail type="issue">
<caption>no.</caption>
<number>3</number>
</detail>
<extent unit="pages">
<start>33</start>
<end>53</end>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref29" displayLabel="bib29">
<name type="personal">
<namePart type="family">BAILES</namePart>
<namePart type="given">A.J.K.</namePart>
</name>
<titleInfo>
<title>SIPRI Yearbook 2006</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Bailes, A.J.K. 2006, ‘Introduction: The World of Security and Peace Research in 40-Year Perspective’, in Stockholm International Peace Research Institute (SIPRI) (ed.), SIPRI Yearbook 2006, Oxford University Press, Oxford.</note>
<originInfo>
<publisher>Oxford University Press</publisher>
<place>
<placeTerm type="text">Oxford</placeTerm>
</place>
</originInfo>
<part>
<date>2006</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref30" displayLabel="bib30">
<name type="personal">
<namePart type="family">BARBALET</namePart>
<namePart type="given">J.M.</namePart>
</name>
<titleInfo>
<title>Emotion, social theory and social structure: a macrosociological approach</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Barbalet, J.M. 2001, Emotion, social theory and social structure: a macrosociological approach, Cambridge University Press, Cambridge.</note>
<originInfo>
<publisher>Cambridge University Press</publisher>
<place>
<placeTerm type="text">Cambridge</placeTerm>
</place>
</originInfo>
<part>
<date>2001</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref31" displayLabel="bib31">
<titleInfo>
<title>On the Pedagogy of “Small Wars’</title>
</titleInfo>
<name type="personal">
<namePart type="family">BARKAWI</namePart>
<namePart type="given">T.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>International Affairs</title>
</titleInfo>
<genre>journal</genre>
<part>
<date>2004</date>
<detail type="volume">
<caption>vol.</caption>
<number>80</number>
</detail>
<detail type="issue">
<caption>no.</caption>
<number>1</number>
</detail>
<extent unit="pages">
<start>19</start>
<end>37</end>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref32" displayLabel="bib32">
<name type="personal">
<namePart type="family">BARKAWI</namePart>
<namePart type="given">T.</namePart>
</name>
<titleInfo>
<title>Globalization and war</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Barkawi, T. 2006, Globalization and war, Rowman and Littlefield, Lanham, MD.</note>
<originInfo>
<publisher>Rowman and Littlefield</publisher>
<place>
<placeTerm type="text">Lanham, MD</placeTerm>
</place>
</originInfo>
<part>
<date>2006</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref33" displayLabel="bib33">
<titleInfo>
<title>The Postcolonial Moment in Security Studies</title>
</titleInfo>
<name type="personal">
<namePart type="family">BARKAWI</namePart>
<namePart type="given">T.</namePart>
</name>
<name type="personal">
<namePart type="family">LAFFEY</namePart>
<namePart type="given">M.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>Review of International Studies</title>
</titleInfo>
<genre>journal</genre>
<part>
<date>2006</date>
<detail type="volume">
<caption>vol.</caption>
<number>32</number>
</detail>
<detail type="issue">
<caption>no.</caption>
<number>4</number>
</detail>
<extent unit="pages">
<start>329</start>
<end>52</end>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref34" displayLabel="bib34">
<titleInfo>
<title>Cherie Blair Attacks Taleban “Cruelty</title>
</titleInfo>
<titleInfo>
<title>BBC (2001) ‘Cherie Blair Attacks Taleban “Cruelty”’, 19 November, viewed 6 April 2007 .</title>
</titleInfo>
<genre type="web">web</genre>
<note type="content-in-line">BBC (2001) ‘Cherie Blair Attacks Taleban “Cruelty”’, 19 November, viewed 6 April 2007 .</note>
<part>
<date>2001</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref35" displayLabel="bib35">
<titleInfo>
<title>Bin Laden video threatens America</title>
</titleInfo>
<genre type="web">web</genre>
<note type="content-in-line">BBC News Online 2004, Bin Laden video threatens America, viewed 6 March 2007 .</note>
<part>
<date>2004</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref36" displayLabel="bib36">
<titleInfo>
<title>UK ‘Spied on UN’s Kofi Annan’</title>
</titleInfo>
<titleInfo>
<title>BBC News Online 2004, UK ‘Spied on UN’s Kofi Annan’, viewed 15 March 2007 .</title>
</titleInfo>
<genre type="web">web</genre>
<note type="content-in-line">BBC News Online 2004, UK ‘Spied on UN’s Kofi Annan’, viewed 15 March 2007 .</note>
<part>
<date>2004</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref37" displayLabel="bib37">
<titleInfo>
<title>Al Qaeda to avenge Israel deeds</title>
</titleInfo>
<genre type="web">web</genre>
<note type="content-in-line">BBC News Online 2006, Al Qaeda to avenge Israel deeds, viewed 6 March 2007 .</note>
<part>
<date>2006</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref38" displayLabel="bib38">
<titleInfo>
<title>Blair’s concerns over face veils</title>
</titleInfo>
<genre type="web">web</genre>
<note type="content-in-line">BBC News Online 2006, Blair’s concerns over face veils, BBC News, 17 October, viewed 26 April 2007 .</note>
<part>
<date>2006</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref39" displayLabel="bib39">
<titleInfo>
<title>Biological and Chemical Defence Review Committee Online</title>
</titleInfo>
<relatedItem type="host">
<titleInfo>
<title>Annual report</title>
</titleInfo>
<genre>web</genre>
<part>
<date>2005</date>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref40" displayLabel="bib40">
<titleInfo>
<title>Hidden victims of a brutal conflict: Iraq’s women</title>
</titleInfo>
<name type="personal">
<namePart type="family">BEAUMONT</namePart>
<namePart type="given">P.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>The Observer</title>
</titleInfo>
<genre>web</genre>
<part>
<date>2006</date>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref41" displayLabel="bib41">
<titleInfo>
<title>The Great Beyond: Rethinking Military Responses to New Wars and Complex Emergencies</title>
</titleInfo>
<name type="personal">
<namePart type="family">BELLAMY</namePart>
<namePart type="given">A.J.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>Defence Studies</title>
</titleInfo>
<genre>journal</genre>
<part>
<date>2002</date>
<detail type="volume">
<caption>vol.</caption>
<number>2</number>
</detail>
<detail type="issue">
<caption>no.</caption>
<number>1</number>
</detail>
<extent unit="pages">
<start>25</start>
<end>50</end>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref42" displayLabel="bib42">
<name type="personal">
<namePart type="family">BELLAMY</namePart>
<namePart type="given">A.J.</namePart>
</name>
<titleInfo>
<title>Just wars: from Cicero to Iraq</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Bellamy, A.J. 2006, Just wars: from Cicero to Iraq, Polity, Cambridge, UK; Malden, MA.</note>
<originInfo>
<place>
<placeTerm type="text">Polity, Cambridge, UK; Malden, MA</placeTerm>
</place>
</originInfo>
<part>
<date>2006</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref43" displayLabel="bib43">
<name type="personal">
<namePart type="family">BENDELOW</namePart>
<namePart type="given">G.</namePart>
</name>
<name type="personal">
<namePart type="family">WILLIAMS</namePart>
<namePart type="given">S.J.</namePart>
</name>
<titleInfo>
<title>Emotions in social life: critical themes and contemporary issues</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Bendelow, G. and Williams, S.J. 1998, Emotions in social life: critical themes and contemporary issues, Routledge, London.</note>
<originInfo>
<publisher>Routledge</publisher>
<place>
<placeTerm type="text">London</placeTerm>
</place>
</originInfo>
<part>
<date>1998</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref44" displayLabel="bib44">
<name type="personal">
<namePart type="family">BENJAMIN</namePart>
<namePart type="given">D.</namePart>
</name>
<name type="personal">
<namePart type="family">SIMON</namePart>
<namePart type="given">S.</namePart>
</name>
<titleInfo>
<title>The next attack: the failure of the war on terror and a strategy for getting it right</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Benjamin, D. and Simon, S. 2005, The next attack: the failure of the war on terror and a strategy for getting it right, Hodder and Stoughton, London.</note>
<originInfo>
<publisher>Hodder and Stoughton</publisher>
<place>
<placeTerm type="text">London</placeTerm>
</place>
</originInfo>
<part>
<date>2005</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref45" displayLabel="bib45">
<name type="personal">
<namePart type="family">BENNETT</namePart>
<namePart type="given">B.</namePart>
</name>
<titleInfo>
<title>Stolen away</title>
</titleInfo>
<genre type="web">web</genre>
<note type="content-in-line">Bennett, B. 2006, Stolen away, Time, 23 April, viewed 26 April 2007 .</note>
<part>
<date>2006</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref46" displayLabel="bib46">
<titleInfo>
<title>How “New” Are “New Wars”’ Global Economic Change and the Study of Civil War</title>
</titleInfo>
<name type="personal">
<namePart type="family">BERDAL</namePart>
<namePart type="given">M.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>Global Governance</title>
</titleInfo>
<genre>journal</genre>
<part>
<date>2003</date>
<detail type="volume">
<caption>vol.</caption>
<number>9</number>
</detail>
<detail type="issue">
<caption>no.</caption>
<number>4</number>
</detail>
<extent unit="pages">
<start>477</start>
<end>502</end>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref47" displayLabel="bib47">
<name type="personal">
<namePart type="family">BEREZIN</namePart>
<namePart type="given">M.</namePart>
</name>
<name type="personal">
<namePart type="family">GOODWIN</namePart>
<namePart type="given">J.</namePart>
</name>
<name type="personal">
<namePart type="family">JASPER</namePart>
<namePart type="given">J.M.</namePart>
</name>
<name type="personal">
<namePart type="family">POLLETTA</namePart>
<namePart type="given">F.</namePart>
</name>
<titleInfo>
<title>Passionate politics: emotions and social movements</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Berezin, M. 2001, ‘Emotions and Political Identity: Mobilizing Affection for the Polity’, in J. Goodwin, J.M. Jasper and F. Polletta (eds), Passionate politics: emotions and social movements, University of Chicago Press, Chicago, IL, pp. 83–98.</note>
<originInfo>
<publisher>University of Chicago Press</publisher>
<place>
<placeTerm type="text">Chicago, IL</placeTerm>
</place>
</originInfo>
<part>
<date>2001</date>
<extent unit="pages">
<start>83</start>
<end>98</end>
</extent>
</part>
</relatedItem>
<relatedItem type="references" ID="ref48" displayLabel="bib48">
<name type="personal">
<namePart type="family">BEREZIN</namePart>
<namePart type="given">M.</namePart>
</name>
<name type="personal">
<namePart type="family">BARBALET</namePart>
<namePart type="given">J.M.</namePart>
</name>
<titleInfo>
<title>Emotions and sociology</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Berezin, M. 2002, ‘Secure States: Towards a Political Sociology of Emotion’, in J.M. Barbalet (ed.), Emotions and sociology, Blackwell Publishing/The Socological Review, Oxford; Malden, MA, pp. 33–52.</note>
<originInfo>
<publisher>Blackwell Publishing/The Socological Review</publisher>
<place>
<placeTerm type="text">Oxford; Malden, MA</placeTerm>
</place>
</originInfo>
<part>
<date>2002</date>
<extent unit="pages">
<start>33</start>
<end>52</end>
</extent>
</part>
</relatedItem>
<relatedItem type="references" ID="ref49" displayLabel="bib49">
<name type="personal">
<namePart type="family">BERGEN</namePart>
<namePart type="given">P.L.</namePart>
</name>
<titleInfo>
<title>The Osama bin Laden I know: an oral history of al-Qaeda’s leader</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Bergen, P.L. 2006, The Osama bin Laden I know: an oral history of al-Qaeda’s leader, Free Press, New York.</note>
<originInfo>
<publisher>Free Press</publisher>
<place>
<placeTerm type="text">New York</placeTerm>
</place>
</originInfo>
<part>
<date>2006</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref50" displayLabel="bib50">
<name type="personal">
<namePart type="family">BERLANT</namePart>
<namePart type="given">L.</namePart>
</name>
<name type="personal">
<namePart type="family">DEAN</namePart>
<namePart type="given">J</namePart>
</name>
<titleInfo>
<title>Cultural studies and political theory</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Berlant, L. 2000, ‘The Subject of True Feeling: Pain, Privacy, Politics’, in J Dean (ed.), Cultural studies and political theory, Cornell University Press, Ithaca, NY, pp. 42–312.</note>
<originInfo>
<publisher>Cornell University Press</publisher>
<place>
<placeTerm type="text">Ithaca, NY</placeTerm>
</place>
</originInfo>
<part>
<date>2000</date>
<extent unit="pages">
<start>42</start>
<end>312</end>
</extent>
</part>
</relatedItem>
<relatedItem type="references" ID="ref51" displayLabel="bib51">
<name type="personal">
<namePart type="family">BEST</namePart>
<namePart type="given">G.</namePart>
</name>
<titleInfo>
<title>War and law since 1945</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Best, G. 1994, War and law since 1945, Clarendon Press, Oxford.</note>
<originInfo>
<publisher>Clarendon Press</publisher>
<place>
<placeTerm type="text">Oxford</placeTerm>
</place>
</originInfo>
<part>
<date>1994</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref52" displayLabel="bib52">
<titleInfo>
<title>The Soft Underbelly of American Primacy: Tactical Advantages of Terror</title>
</titleInfo>
<name type="personal">
<namePart type="family">BETTS</namePart>
<namePart type="given">R.K.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>Political Science Quarterly</title>
</titleInfo>
<genre>journal</genre>
<part>
<date>2002</date>
<detail type="volume">
<caption>vol.</caption>
<number>117</number>
</detail>
<detail type="issue">
<caption>no.</caption>
<number>1</number>
</detail>
<extent unit="pages">
<start>19</start>
<end>36</end>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref53" displayLabel="bib53">
<titleInfo>
<title>Allies, Airpower, and Modern Warfare: The Afghan Model in Afghanistan and Iraq</title>
</titleInfo>
<name type="personal">
<namePart type="family">BIDDLE</namePart>
<namePart type="given">S.D.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>International Security</title>
</titleInfo>
<genre>journal</genre>
<part>
<date>2005</date>
<detail type="volume">
<caption>vol.</caption>
<number>30</number>
</detail>
<detail type="issue">
<caption>no.</caption>
<number>3</number>
</detail>
<extent unit="pages">
<start>161</start>
<end>76</end>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref54" displayLabel="bib54">
<name type="personal">
<namePart type="family">BLAIR</namePart>
<namePart type="given">T.</namePart>
</name>
<name type="personal">
<namePart type="family">BRYANT</namePart>
<namePart type="given">C.</namePart>
</name>
<titleInfo>
<title>Reclaiming the ground: Christianity and socialism</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Blair, T. 1993, ‘Foreword’, in C. Bryant (ed.), Reclaiming the ground: Christianity and socialism, Spire and the Christian Socialist Movement, London.</note>
<originInfo>
<place>
<placeTerm type="text">London</placeTerm>
</place>
</originInfo>
<part>
<date>1993</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref55" displayLabel="bib55">
<name type="personal">
<namePart type="family">BLAIR</namePart>
<namePart type="given">T.</namePart>
</name>
<titleInfo>
<title>Statement in response to terrorist attacks</title>
</titleInfo>
<genre type="web">web</genre>
<note type="content-in-line">Blair, T. 2001, Statement in response to terrorist attacks, 11 September 2001, viewed 27 November 2006 .</note>
<part>
<date>2001</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref56" displayLabel="bib56">
<name type="personal">
<namePart type="family">BLAIR</namePart>
<namePart type="given">T.</namePart>
</name>
<titleInfo>
<title>Our Third term will be our best yet</title>
</titleInfo>
<genre type="web">web</genre>
<note type="content-in-line">Blair, T. 2005, Our Third term will be our best yet, viewed 27 November 2006 .</note>
<part>
<date>2005</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref57" displayLabel="bib57">
<titleInfo>
<title>We Don’t Need Another Hero</title>
</titleInfo>
<name type="personal">
<namePart type="family">BLEIKER</namePart>
<namePart type="given">R.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>International Femininst Journal of Politics</title>
</titleInfo>
<genre>journal</genre>
<part>
<date>2000</date>
<detail type="volume">
<caption>vol.</caption>
<number>2</number>
</detail>
<detail type="issue">
<caption>no.</caption>
<number>1</number>
</detail>
<extent unit="pages">
<start>30</start>
<end>57</end>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref58" displayLabel="bib58">
<titleInfo>
<title>A Rogue Is a Rogue Is a Rogue: US Foreign Policy and the Korean Nuclear Crisis</title>
</titleInfo>
<name type="personal">
<namePart type="family">BLEIKER</namePart>
<namePart type="given">R.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>International Affairs</title>
</titleInfo>
<genre>journal</genre>
<part>
<date>2003</date>
<detail type="volume">
<caption>vol.</caption>
<number>79</number>
</detail>
<detail type="issue">
<caption>no.</caption>
<number>4</number>
</detail>
<extent unit="pages">
<start>719</start>
<end>37</end>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref59" displayLabel="bib59">
<titleInfo>
<title>Prepared for the United Nations Office for Drug Control and Crime Prevention</title>
</titleInfo>
<name type="personal">
<namePart type="family">BLUM</namePart>
<namePart type="given">Jack A.</namePart>
</name>
<name type="personal">
<namePart type="family">LEVI</namePart>
<namePart type="given">M.</namePart>
</name>
<name type="personal">
<namePart type="family">NAYLOR</namePart>
<namePart type="given">R.T.</namePart>
</name>
<name type="personal">
<namePart type="family">WILLIAMS</namePart>
<namePart type="given">P.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>Financial havens, banking secrecy and money laundering</title>
</titleInfo>
<genre>other</genre>
<part>
<date>1998</date>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref60" displayLabel="bib60">
<titleInfo>
<title>State Response to Acts of Terrorism</title>
</titleInfo>
<name type="personal">
<namePart type="family">BLUM</namePart>
<namePart type="given">Y.Z.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>German Yearbook of International Law</title>
</titleInfo>
<genre>other</genre>
<part>
<date>1976</date>
<detail type="volume">
<caption>vol.</caption>
<number>19</number>
</detail>
<extent unit="pages">
<start>223</start>
<end>33</end>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref61" displayLabel="bib61">
<titleInfo>
<title>Biotechnology, weapons and humanity</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">BMA 2004, Biotechnology, weapons and humanity, British Medical Association, London.</note>
<originInfo>
<publisher>British Medical Association</publisher>
<place>
<placeTerm type="text">London</placeTerm>
</place>
</originInfo>
<part>
<date>2004</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref62" displayLabel="bib62">
<name type="personal">
<namePart type="family">BOOTH</namePart>
<namePart type="given">K.</namePart>
</name>
<titleInfo>
<title>Theory of world security</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Booth, K., forthcoming, Theory of world security, Cambridge University Press, Cambridge.</note>
<originInfo>
<publisher>Cambridge University Press</publisher>
<place>
<placeTerm type="text">Cambridge</placeTerm>
</place>
</originInfo>
</relatedItem>
<relatedItem type="references" ID="ref63" displayLabel="bib63">
<name type="personal">
<namePart type="family">BOOTH</namePart>
<namePart type="given">K.</namePart>
</name>
<name type="personal">
<namePart type="family">DUNNE</namePart>
<namePart type="given">T.</namePart>
</name>
<titleInfo>
<title>Worlds in collision: terror and the future of global order</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Booth, K. and Dunne, T. (eds) 2002, Worlds in collision: terror and the future of global order, Palgrave, Basingstoke.</note>
<originInfo>
<publisher>Palgrave</publisher>
<place>
<placeTerm type="text">Basingstoke</placeTerm>
</place>
</originInfo>
<part>
<date>2002</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref64" displayLabel="bib64">
<name type="personal">
<namePart type="family">BOURKE</namePart>
<namePart type="given">J.</namePart>
</name>
<titleInfo>
<title>Fear: a cultural history</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Bourke, J. 2005, Fear: a cultural history, Virago, London.</note>
<originInfo>
<publisher>Virago</publisher>
<place>
<placeTerm type="text">London</placeTerm>
</place>
</originInfo>
<part>
<date>2005</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref65" displayLabel="bib65">
<titleInfo>
<title>The Dark Art of Interrogation</title>
</titleInfo>
<name type="personal">
<namePart type="family">BOWDEN</namePart>
<namePart type="given">M.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>Atlantic Monthly</title>
</titleInfo>
<genre>journal</genre>
<part>
<date>2003</date>
<detail type="volume">
<caption>vol.</caption>
<number>292</number>
</detail>
<detail type="issue">
<caption>no.</caption>
<number>3</number>
</detail>
<extent unit="pages">
<start>51</start>
<end>76</end>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref66" displayLabel="bib66">
<name type="personal">
<namePart type="family">BOWKER</namePart>
<namePart type="given">D.W.</namePart>
</name>
<name type="personal">
<namePart type="family">GREENBERG</namePart>
<namePart type="given">K.J.</namePart>
</name>
<titleInfo>
<title>The torture debate in America</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Bowker, D.W. 2006, ‘Unwise Counsel: the War on Terrorism and the Criminal Mistreatment of Detainees in U.S. Custody’, in K.J. Greenberg (ed.), The torture debate in America, Cambridge University Press, Cambridge; New York.</note>
<originInfo>
<publisher>Cambridge University Press, Cambridge</publisher>
<place>
<placeTerm type="text">New York</placeTerm>
</place>
</originInfo>
<part>
<date>2006</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref67" displayLabel="bib67">
<name type="personal">
<namePart type="family">BOWETT</namePart>
<namePart type="given">D.W.</namePart>
</name>
<titleInfo>
<title>Self-defence in international law</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Bowett, D.W. 1958, Self-defence in international law, Manchester University Press, Manchester.</note>
<originInfo>
<publisher>Manchester University Press</publisher>
<place>
<placeTerm type="text">Manchester</placeTerm>
</place>
</originInfo>
<part>
<date>1958</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref68" displayLabel="bib68">
<titleInfo>
<title>America in Denial</title>
</titleInfo>
<name type="personal">
<namePart type="family">BOYLE</namePart>
<namePart type="given">M.J.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>International Affairs</title>
</titleInfo>
<genre>journal</genre>
<part>
<date>2007</date>
<detail type="volume">
<caption>vol.</caption>
<number>83</number>
</detail>
<detail type="issue">
<caption>no.</caption>
<number>1</number>
</detail>
<extent unit="pages">
<start>147</start>
<end>59</end>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref69" displayLabel="bib69">
<titleInfo>
<title>Book says pre-Gulf War discovery raised germ warfare fears</title>
</titleInfo>
<name type="personal">
<namePart type="family">BROAD</namePart>
<namePart type="given">W.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>New York Times</title>
</titleInfo>
<genre>other</genre>
<part>
<date>1998</date>
<extent unit="pages">
<start>A6</start>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref70" displayLabel="bib70">
<name type="personal">
<namePart type="family">BROWN</namePart>
<namePart type="given">S.</namePart>
</name>
<titleInfo>
<title>The illusion of control: force and foreign policy in the twenty-first century</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Brown, S. 2003, The illusion of control: force and foreign policy in the twenty-first century, Brookings Institution Press, Washington, DC.</note>
<originInfo>
<publisher>Brookings Institution Press</publisher>
<place>
<placeTerm type="text">Washington, DC</placeTerm>
</place>
</originInfo>
<part>
<date>2003</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref71" displayLabel="bib71">
<name type="personal">
<namePart type="family">BROWN</namePart>
<namePart type="given">W.</namePart>
</name>
<titleInfo>
<title>States of injury: power and freedom in late modernity</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Brown, W. 1995, States of injury: power and freedom in late modernity, Princeton University Press, Princeton, NJ.</note>
<originInfo>
<publisher>Princeton University Press</publisher>
<place>
<placeTerm type="text">Princeton, NJ</placeTerm>
</place>
</originInfo>
<part>
<date>1995</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref72" displayLabel="bib72">
<name type="personal">
<namePart type="family">BROWNLIE</namePart>
<namePart type="given">I.</namePart>
</name>
<titleInfo>
<title>International law and the use of force by states</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Brownlie, I. 1963, International law and the use of force by states, Oxford University Press, Oxford.</note>
<originInfo>
<publisher>Oxford University Press</publisher>
<place>
<placeTerm type="text">Oxford</placeTerm>
</place>
</originInfo>
<part>
<date>1963</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref73" displayLabel="bib73">
<titleInfo>
<title>The Preventive Use of Force: A Cosmopolitan Institutional Proposal</title>
</titleInfo>
<name type="personal">
<namePart type="family">BUCHANAN</namePart>
<namePart type="given">A.</namePart>
</name>
<name type="personal">
<namePart type="family">KEOHANE</namePart>
<namePart type="given">R.O.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>Ethics and International Affairs</title>
</titleInfo>
<genre>journal</genre>
<part>
<date>2004</date>
<detail type="volume">
<caption>vol.</caption>
<number>18</number>
</detail>
<detail type="issue">
<caption>no.</caption>
<number>1</number>
</detail>
<extent unit="pages">
<start>1</start>
<end>22</end>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref74" displayLabel="bib74">
<name type="personal">
<namePart type="family">BULL</namePart>
<namePart type="given">H.</namePart>
</name>
<titleInfo>
<title>The anarchical society: a study of order in world politics</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Bull, H. 1977, The anarchical society: a study of order in world politics, Columbia University Press, New York.</note>
<originInfo>
<publisher>Columbia University Press</publisher>
<place>
<placeTerm type="text">New York</placeTerm>
</place>
</originInfo>
<part>
<date>1977</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref75" displayLabel="bib75">
<titleInfo>
<title>Just War or Ethical Peace? Moral Discourses of Strategic Violence after 9/11</title>
</titleInfo>
<name type="personal">
<namePart type="family">BURKE</namePart>
<namePart type="given">A.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>International Affairs</title>
</titleInfo>
<genre>journal</genre>
<part>
<date>2004</date>
<detail type="volume">
<caption>vol.</caption>
<number>80</number>
</detail>
<detail type="issue">
<caption>no.</caption>
<number>2</number>
</detail>
<extent unit="pages">
<start>329</start>
<end>53</end>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref76" displayLabel="bib76">
<titleInfo>
<title>Against the New Internationalism</title>
</titleInfo>
<name type="personal">
<namePart type="family">BURKE</namePart>
<namePart type="given">A.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>Ethics and International Affairs</title>
</titleInfo>
<genre>journal</genre>
<part>
<date>2005</date>
<detail type="volume">
<caption>vol.</caption>
<number>9</number>
</detail>
<detail type="issue">
<caption>no.</caption>
<number>2</number>
</detail>
<extent unit="pages">
<start>73</start>
<end>89</end>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref77" displayLabel="bib77">
<titleInfo>
<title>Iraq: Strategy’s Burnt Offering</title>
</titleInfo>
<name type="personal">
<namePart type="family">BURKE</namePart>
<namePart type="given">A.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>Global Change, Peace and Security</title>
</titleInfo>
<genre>journal</genre>
<part>
<date>2005</date>
<detail type="volume">
<caption>vol.</caption>
<number>17</number>
</detail>
<detail type="issue">
<caption>no.</caption>
<number>2</number>
</detail>
<extent unit="pages">
<start>191</start>
<end>213</end>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref78" displayLabel="bib78">
<name type="personal">
<namePart type="family">BURKE</namePart>
<namePart type="given">A.</namePart>
</name>
<name type="personal">
<namePart type="family">BALL</namePart>
<namePart type="given">D.</namePart>
</name>
<name type="personal">
<namePart type="family">AYSON</namePart>
<namePart type="given">R.</namePart>
</name>
<titleInfo>
<title>Strategy and security in the Asia Pacific</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Burke, A. 2006, ‘Critical Approaches to Security and Strategy’, in D. Ball and R. Ayson (eds), Strategy and security in the Asia Pacific, Allen and Unwin, Sydney.</note>
<originInfo>
<publisher>Allen and Unwin</publisher>
<place>
<placeTerm type="text">Sydney</placeTerm>
</place>
</originInfo>
<part>
<date>2006</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref79" displayLabel="bib79">
<name type="personal">
<namePart type="family">BURKE</namePart>
<namePart type="given">A.</namePart>
</name>
<titleInfo>
<title>Beyond security, ethics and violence: war against the other</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Burke, A. 2007, Beyond security, ethics and violence: war against the other, Routledge, London; New York.</note>
<originInfo>
<publisher>Routledge</publisher>
<place>
<placeTerm type="text">London; New York</placeTerm>
</place>
</originInfo>
<part>
<date>2007</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref80" displayLabel="bib80">
<name type="personal">
<namePart type="family">BURKITT</namePart>
<namePart type="given">I.</namePart>
</name>
<titleInfo>
<title>Social selves: theories of the social formation of personality</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Burkitt, I. 1991, Social selves: theories of the social formation of personality, Sage Publications, London.</note>
<originInfo>
<publisher>Sage Publications</publisher>
<place>
<placeTerm type="text">London</placeTerm>
</place>
</originInfo>
<part>
<date>1991</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref81" displayLabel="bib81">
<name type="personal">
<namePart type="family">BUSH</namePart>
<namePart type="given">G.W.</namePart>
</name>
<titleInfo>
<title>The first Gore–Bush presidential debate</title>
</titleInfo>
<genre type="web">web</genre>
<note type="content-in-line">Bush, G.W. 2000, The first Gore–Bush presidential debate, viewed 6 March 2007 .</note>
<part>
<date>2000</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref82" displayLabel="bib82">
<name type="personal">
<namePart type="family">BUSH</namePart>
<namePart type="given">G.W.</namePart>
</name>
<titleInfo>
<title>Address to a joint session of Congress and the American people</title>
</titleInfo>
<genre type="web">web</genre>
<note type="content-in-line">Bush, G.W. 2001, Address to a joint session of Congress and the American people, 20 September, viewed 27 November 2006 .</note>
<part>
<date>2001</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref83" displayLabel="bib83">
<name type="personal">
<namePart type="family">BUSH</namePart>
<namePart type="given">G.W.</namePart>
</name>
<titleInfo>
<title>Speech at Cincinnati</title>
</titleInfo>
<genre type="web">web</genre>
<note type="content-in-line">Bush, G.W. 2002a, Speech at Cincinnati, 7 October, viewed 2 February 2005 .</note>
<part>
<date>2002</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref84" displayLabel="bib84">
<name type="personal">
<namePart type="family">BUSH</namePart>
<namePart type="given">G.W.</namePart>
</name>
<titleInfo>
<title>Speech at the West Point graduation ceremony</title>
</titleInfo>
<genre type="web">web</genre>
<note type="content-in-line">Bush, G.W. 2002b, Speech at the West Point graduation ceremony, 1 June, viewed 5 February 2005 .</note>
<part>
<date>2002</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref85" displayLabel="bib85">
<name type="personal">
<namePart type="family">BUSH</namePart>
<namePart type="given">G.W.</namePart>
</name>
<titleInfo>
<title>State of the union</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Bush, G.W. 2002c, State of the union, Office of the Press Secretary, 29 January, viewed 26 March 2007 .</note>
<originInfo>
<publisher>Office of the Press Secretary</publisher>
</originInfo>
<part>
<date>2002</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref86" displayLabel="bib86">
<name type="personal">
<namePart type="family">BUSH</namePart>
<namePart type="given">G.W.</namePart>
</name>
<titleInfo>
<title>President Bush announces major combat operations in Iraq Have Ended</title>
</titleInfo>
<genre type="web">web</genre>
<note type="content-in-line">Bush, G.W. 2003a, President Bush announces major combat operations in Iraq Have Ended, 1 May, viewed 27 November 2006 .</note>
<part>
<date>2003</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref87" displayLabel="bib87">
<name type="personal">
<namePart type="family">BUSH</namePart>
<namePart type="given">G.W.</namePart>
</name>
<titleInfo>
<title>President delivers ‘State of the union’</title>
</titleInfo>
<genre type="web">web</genre>
<note type="content-in-line">Bush, G.W. 2003b, President delivers ‘State of the union’, 28 January, viewed 27 November 2006 .</note>
<part>
<date>2003</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref88" displayLabel="bib88">
<name type="personal">
<namePart type="family">BUSH</namePart>
<namePart type="given">G.W.</namePart>
</name>
<titleInfo>
<title>Interview with President George W. Bush on NBC’s ‘Meet the press’</title>
</titleInfo>
<genre type="web">web</genre>
<note type="content-in-line">Bush, G.W. 2004, Interview with President George W. Bush on NBC’s ‘Meet the press’, viewed 20 February 2007 .</note>
<part>
<date>2004</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref89" displayLabel="bib89">
<name type="personal">
<namePart type="family">BUSH</namePart>
<namePart type="given">G.W.</namePart>
</name>
<titleInfo>
<title>President discusses Iraqi Constitution with press pool</title>
</titleInfo>
<genre type="web">web</genre>
<note type="content-in-line">Bush, G.W. 2005, President discusses Iraqi Constitution with press pool, 23 August, viewed 26 April 2007 .</note>
<part>
<date>2005</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref90" displayLabel="bib90">
<name type="personal">
<namePart type="family">BUSH</namePart>
<namePart type="given">L.</namePart>
</name>
<titleInfo>
<title>Radio address by Laura Bush to the nation</title>
</titleInfo>
<genre type="web">web</genre>
<note type="content-in-line">Bush, L. 2001, Radio address by Laura Bush to the nation, 17 November, viewed 26 April 2007 .</note>
<part>
<date>2001</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref91" displayLabel="bib91">
<name type="personal">
<namePart type="family">BUTLER</namePart>
<namePart type="given">J.</namePart>
</name>
<titleInfo>
<title>Precarious life: the powers of mourning and violence</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Butler, J. 2004, Precarious life: the powers of mourning and violence, Verso, London; New York.</note>
<originInfo>
<publisher>Verso</publisher>
<place>
<placeTerm type="text">London; New York</placeTerm>
</place>
</originInfo>
<part>
<date>2004</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref92" displayLabel="bib92">
<name type="personal">
<namePart type="family">BUZAN</namePart>
<namePart type="given">B.</namePart>
</name>
<titleInfo>
<title>People, states, and fear: an agenda for international security in the post-Cold War era</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Buzan, B. 1991, People, states, and fear: an agenda for international security in the post-Cold War era, 2nd edn, Lynne Rienner, Boulder, CO.</note>
<originInfo>
<edition>2nd</edition>
<publisher>Lynne Rienner</publisher>
<place>
<placeTerm type="text">Boulder, CO</placeTerm>
</place>
</originInfo>
<part>
<date>1991</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref93" displayLabel="bib93">
<titleInfo>
<title>Will the “global war on terrorism” be the new Cold War?</title>
</titleInfo>
<name type="personal">
<namePart type="family">BUZAN</namePart>
<namePart type="given">B.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>International Affairs</title>
</titleInfo>
<genre>journal</genre>
<part>
<date>2006</date>
<detail type="volume">
<caption>vol.</caption>
<number>82</number>
</detail>
<detail type="issue">
<caption>no.</caption>
<number>6</number>
</detail>
<extent unit="pages">
<start>1101</start>
<end>18</end>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref94" displayLabel="bib94">
<titleInfo>
<title>Annex to final declaration on confidence building measures, Third Review Conference of the States Parties to the Convention on the Prohibition of the Development, Production and Stockpiling of Bacteriological (Biological) and Toxin Weapons and on Their Destruction</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">BWC 1991, Annex to final declaration on confidence building measures, Third Review Conference of the States Parties to the Convention on the Prohibition of the Development, Production and Stockpiling of Bacteriological (Biological) and Toxin Weapons and on Their Destruction, Geneva.</note>
<originInfo>
<place>
<placeTerm type="text">Geneva</placeTerm>
</place>
</originInfo>
<part>
<date>1991</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref95" displayLabel="bib95">
<titleInfo>
<title>Terrorism, the Use of Force and International Law after 11 September</title>
</titleInfo>
<name type="personal">
<namePart type="family">BYERS</namePart>
<namePart type="given">M.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>International and Comparative Law Quarterly</title>
</titleInfo>
<genre>journal</genre>
<part>
<date>2002</date>
<detail type="volume">
<caption>vol.</caption>
<number>51</number>
</detail>
<detail type="issue">
<caption>no.</caption>
<number>2</number>
</detail>
<extent unit="pages">
<start>401</start>
<end>14</end>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref96" displayLabel="bib96">
<titleInfo>
<title>Preemptive Self-Defense: Hegemony, Equality and Strategies of Legal Change</title>
</titleInfo>
<name type="personal">
<namePart type="family">BYERS</namePart>
<namePart type="given">M.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>The Journal of Political Philosophy</title>
</titleInfo>
<genre>journal</genre>
<part>
<date>2003</date>
<detail type="volume">
<caption>vol.</caption>
<number>11</number>
</detail>
<detail type="issue">
<caption>no.</caption>
<number>2</number>
</detail>
<extent unit="pages">
<start>171</start>
<end>90</end>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref97" displayLabel="bib97">
<titleInfo>
<title>Letting the Exception Prove the Rule</title>
</titleInfo>
<name type="personal">
<namePart type="family">BYERS</namePart>
<namePart type="given">M.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>Ethics and International Affairs</title>
</titleInfo>
<genre>journal</genre>
<part>
<date>2003</date>
<detail type="volume">
<caption>vol.</caption>
<number>17</number>
</detail>
<detail type="issue">
<caption>no.</caption>
<number>1</number>
</detail>
<extent unit="pages">
<start>9</start>
<end>16</end>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref98" displayLabel="bib98">
<titleInfo>
<title>Policing the High Seas: The Proliferation Security Initiative</title>
</titleInfo>
<name type="personal">
<namePart type="family">BYERS</namePart>
<namePart type="given">M.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>American Journal of International Law</title>
</titleInfo>
<genre>other</genre>
<part>
<date>2004</date>
<detail type="volume">
<caption>vol.</caption>
<number>98</number>
</detail>
<detail type="issue">
<caption>no.</caption>
<number>3</number>
</detail>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref99" displayLabel="bib99">
<name type="personal">
<namePart type="family">BYERS</namePart>
<namePart type="given">M.</namePart>
</name>
<titleInfo>
<title>War law: international law and armed conflict</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Byers, M. 2005, War law: international law and armed conflict, Atlantic Books, London.</note>
<originInfo>
<publisher>Atlantic Books</publisher>
<place>
<placeTerm type="text">London</placeTerm>
</place>
</originInfo>
<part>
<date>2005</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref100" displayLabel="bib100">
<name type="personal">
<namePart type="family">CALHOUN</namePart>
<namePart type="given">C.J.</namePart>
</name>
<name type="personal">
<namePart type="family">GOODWIN</namePart>
<namePart type="given">J.</namePart>
</name>
<name type="personal">
<namePart type="family">JASPER</namePart>
<namePart type="given">J.M.</namePart>
</name>
<name type="personal">
<namePart type="family">POLLETTA</namePart>
<namePart type="given">F.</namePart>
</name>
<titleInfo>
<title>Passionate politics: emotions and social movements</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Calhoun, C.J. 2001, ‘Putting Emotions in Their Place’, in J. Goodwin, J.M. Jasper and F. Polletta (eds), Passionate politics: emotions and social movements, University of Chicago Press, Chicago, IL, pp. 45–58.</note>
<originInfo>
<publisher>University of Chicago Press</publisher>
<place>
<placeTerm type="text">Chicago, IL</placeTerm>
</place>
</originInfo>
<part>
<date>2001</date>
<extent unit="pages">
<start>45</start>
<end>58</end>
</extent>
</part>
</relatedItem>
<relatedItem type="references" ID="ref101" displayLabel="bib101">
<titleInfo>
<title>The Deterritorialization of Responsibility: Levinas, Derrida, and Ethics after the End of Philosophy</title>
</titleInfo>
<name type="personal">
<namePart type="family">CAMPBELL</namePart>
<namePart type="given">D.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>Alternatives</title>
</titleInfo>
<genre>journal</genre>
<part>
<date>1994</date>
<detail type="volume">
<caption>vol.</caption>
<number>19</number>
</detail>
<detail type="issue">
<caption>no.</caption>
<number>4</number>
</detail>
<extent unit="pages">
<start>455</start>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref102" displayLabel="bib102">
<name type="personal">
<namePart type="family">CAMPBELL</namePart>
<namePart type="given">D.</namePart>
</name>
<titleInfo>
<title>National deconstruction: violence, identity, and justice in Bosnia</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Campbell, D. 1998, National deconstruction: violence, identity, and justice in Bosnia, University of Minneapolis Press, Minneapolis, MN.</note>
<originInfo>
<publisher>University of Minneapolis Press</publisher>
<place>
<placeTerm type="text">Minneapolis, MN</placeTerm>
</place>
</originInfo>
<part>
<date>1998</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref103" displayLabel="bib103">
<titleInfo>
<title>Beyond Choice: The Onto-Politics of Critique</title>
</titleInfo>
<name type="personal">
<namePart type="family">CAMPBELL</namePart>
<namePart type="given">D.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>International Relations</title>
</titleInfo>
<genre>journal</genre>
<part>
<date>2005</date>
<detail type="volume">
<caption>vol.</caption>
<number>19</number>
</detail>
<detail type="issue">
<caption>no.</caption>
<number>1</number>
</detail>
<extent unit="pages">
<start>127</start>
<end>34</end>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref104" displayLabel="bib104">
<name type="personal">
<namePart type="family">CARR</namePart>
<namePart type="given">E.H.</namePart>
</name>
<titleInfo>
<title>The twenty years’ crisis, 1919–1939: an introduction to the study of international relations</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Carr, E.H. 1946, The twenty years’ crisis, 1919–1939: an introduction to the study of international relations, 2nd edn, Macmillan, Basingstoke.</note>
<originInfo>
<edition>2nd</edition>
<publisher>Macmillan</publisher>
<place>
<placeTerm type="text">Basingstoke</placeTerm>
</place>
</originInfo>
<part>
<date>1946</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref105" displayLabel="bib105">
<name type="personal">
<namePart type="family">CARTER</namePart>
<namePart type="given">P.</namePart>
</name>
<titleInfo>
<title>The road to Abu Ghraib</title>
</titleInfo>
<genre type="web">web</genre>
<note type="content-in-line">Carter, P. 2004, The road to Abu Ghraib, Washington Monthly, November, viewed 26 April 2007 .</note>
<originInfo>
<place>
<placeTerm type="text">Washington</placeTerm>
</place>
</originInfo>
<part>
<date>2004</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref106" displayLabel="bib106">
<name type="personal">
<namePart type="family">CARUTH</namePart>
<namePart type="given">C.</namePart>
</name>
<name type="personal">
<namePart type="family">CARUTH</namePart>
<namePart type="given">C</namePart>
</name>
<titleInfo>
<title>Trauma: explorations in memory</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Caruth, C. 1995, ‘Recapturing the Past: Introduction’, in C Caruth (ed.), Trauma: explorations in memory, Johns Hopkins University Press, Baltimore, MD.</note>
<originInfo>
<publisher>Johns Hopkins University Press</publisher>
<place>
<placeTerm type="text">Baltimore, MD</placeTerm>
</place>
</originInfo>
<part>
<date>1995</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref107" displayLabel="bib107">
<name type="personal">
<namePart type="family">CASSESE</namePart>
<namePart type="given">A.</namePart>
</name>
<name type="personal">
<namePart type="family">CASSESE</namePart>
<namePart type="given">A.</namePart>
</name>
<titleInfo>
<title>The current legal regulation of the use of force</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Cassese, A. 1986, ‘Return to Westphalia? Considerations on the gradual erosion of the charter system’, in A. Cassese (ed.), The current legal regulation of the use of force, Martinus Nijhoff, Leiden.</note>
<originInfo>
<publisher>Martinus Nijhoff</publisher>
<place>
<placeTerm type="text">Leiden</placeTerm>
</place>
</originInfo>
<part>
<date>1986</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref108" displayLabel="bib108">
<titleInfo>
<title>The Definition of Aggression</title>
</titleInfo>
<name type="personal">
<namePart type="family">CASSIM</namePart>
<namePart type="given">V.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>Harvard International Law Journal</title>
</titleInfo>
<genre>other</genre>
<part>
<date>1975</date>
<detail type="volume">
<caption>vol.</caption>
<number>16</number>
</detail>
<detail type="issue">
<caption>no.</caption>
<number>1</number>
</detail>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref109" displayLabel="bib109">
<titleInfo>
<title>Chemical and Biological Defense Program Annual Report to Congress</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">CBDP 2005, Chemical and Biological Defense Program Annual Report to Congress, US Department of Defense.</note>
<originInfo>
<publisher>US Department of Defense</publisher>
</originInfo>
<part>
<date>2005</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref110" displayLabel="bib110">
<titleInfo>
<title>Chemical and Biological Defense Program Annual Report to Congress</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">CBDP 2006, Chemical and Biological Defense Program Annual Report to Congress, US Department of Defense.</note>
<originInfo>
<publisher>US Department of Defense</publisher>
</originInfo>
<part>
<date>2006</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref111" displayLabel="bib111">
<titleInfo>
<title>List of select biological agents and toxins, Centers for Disease Control and Prevention Online</title>
</titleInfo>
<genre type="web">web</genre>
<note type="content-in-line">CDC 2005, List of select biological agents and toxins, Centers for Disease Control and Prevention Online, viewed 5 July 2005 .</note>
<part>
<date>2005</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref112" displayLabel="bib112">
<titleInfo>
<title>Neomedievalism, Civil War and the New Security Dilemma: Globalisation as Durable Disorder</title>
</titleInfo>
<name type="personal">
<namePart type="family">CERNY</namePart>
<namePart type="given">P.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>Civil Wars</title>
</titleInfo>
<genre>journal</genre>
<part>
<date>1998</date>
<detail type="volume">
<caption>vol.</caption>
<number>1</number>
</detail>
<detail type="issue">
<caption>no.</caption>
<number>1</number>
</detail>
<extent unit="pages">
<start>36</start>
<end>64</end>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref113" displayLabel="bib113">
<titleInfo>
<title>Computers simulate terrorism’s extremes</title>
</titleInfo>
<name type="personal">
<namePart type="family">CHA</namePart>
<namePart type="given">A.E.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>Washington Post</title>
</titleInfo>
<genre>other</genre>
<part>
<date>2005</date>
<extent unit="pages">
<start>A01</start>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref114" displayLabel="bib114">
<name type="personal">
<namePart type="family">CHAN</namePart>
<namePart type="given">S.</namePart>
</name>
<titleInfo>
<title>Out of evil: new international politics and old doctrines of war</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Chan, S. 2005, Out of evil: new international politics and old doctrines of war, I.B. Tauris, London.</note>
<originInfo>
<publisher>I.B. Tauris</publisher>
<place>
<placeTerm type="text">London</placeTerm>
</place>
</originInfo>
<part>
<date>2005</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref115" displayLabel="bib115">
<name type="personal">
<namePart type="family">CHURCH</namePart>
<namePart type="given">A.A.T.</namePart>
</name>
<titleInfo>
<title>Executive Summary</title>
</titleInfo>
<genre type="web">web</genre>
<note type="content-in-line">Church, A.A.T. 2005, Executive Summary, viewed 15 March 2007 .</note>
<part>
<date>2005</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref116" displayLabel="bib116">
<titleInfo>
<title>Biotechnology and Bioterrorism: An Unprecedented World</title>
</titleInfo>
<name type="personal">
<namePart type="family">CHYBA</namePart>
<namePart type="given">C.F.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>Survival</title>
</titleInfo>
<genre>journal</genre>
<part>
<date>2004</date>
<detail type="volume">
<caption>vol.</caption>
<number>46</number>
</detail>
<detail type="issue">
<caption>no.</caption>
<number>2</number>
</detail>
<extent unit="pages">
<start>143</start>
<end>62</end>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref117" displayLabel="bib117">
<titleInfo>
<title>Biotechnology and Bioterrorism: An Unprecedented World</title>
</titleInfo>
<name type="personal">
<namePart type="family">CHYBA</namePart>
<namePart type="given">C.F.</namePart>
</name>
<name type="personal">
<namePart type="family">GRENINGER</namePart>
<namePart type="given">A.L.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>Survival</title>
</titleInfo>
<genre>journal</genre>
<part>
<date>2004</date>
<detail type="volume">
<caption>vol.</caption>
<number>46</number>
</detail>
<detail type="issue">
<caption>no.</caption>
<number>2</number>
</detail>
<extent unit="pages">
<start>143</start>
<end>62</end>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref118" displayLabel="bib118">
<name type="personal">
<namePart type="family">CLARK</namePart>
<namePart type="given">I.</namePart>
</name>
<titleInfo>
<title>Legitimacy in international society</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Clark, I. 2005, Legitimacy in international society, Oxford University Press, Oxford; New York.</note>
<originInfo>
<publisher>Oxford University Press, Oxford</publisher>
<place>
<placeTerm type="text">New York</placeTerm>
</place>
</originInfo>
<part>
<date>2005</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref119" displayLabel="bib119">
<titleInfo>
<title>Medical Ethics at Guantanamo Bay and Abu Ghraib: The Problem of Dual Loyalty</title>
</titleInfo>
<name type="personal">
<namePart type="family">CLARK</namePart>
<namePart type="given">P.A.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>Journal of Law, Medicine and Ethics</title>
</titleInfo>
<genre>journal</genre>
<part>
<date>2006</date>
<detail type="volume">
<caption>vol.</caption>
<number>34</number>
</detail>
<detail type="issue">
<caption>no.</caption>
<number>3</number>
</detail>
<extent unit="pages">
<start>570</start>
<end>80</end>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref120" displayLabel="bib120">
<name type="personal">
<namePart type="family">CLARK</namePart>
<namePart type="given">W.K.</namePart>
</name>
<titleInfo>
<title>Winning modern wars: Iraq, terrorism and the American Empire</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Clark, W.K. 2004, Winning modern wars: Iraq, terrorism and the American Empire, Public Affairs, New York.</note>
<originInfo>
<publisher>Public Affairs</publisher>
<place>
<placeTerm type="text">New York</placeTerm>
</place>
</originInfo>
<part>
<date>2004</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref121" displayLabel="bib121">
<name type="personal">
<namePart type="family">CLARKE</namePart>
<namePart type="given">R.A.</namePart>
</name>
<titleInfo>
<title>Against all enemies: inside America’s war on terror</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Clarke, R.A. 2004, Against all enemies: inside America’s war on terror, Free Press, New York.</note>
<originInfo>
<publisher>Free Press</publisher>
<place>
<placeTerm type="text">New York</placeTerm>
</place>
</originInfo>
<part>
<date>2004</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref122" displayLabel="bib122">
<name type="personal">
<namePart type="family">CLAUSEWITZ</namePart>
<namePart type="given">K. von</namePart>
</name>
<name type="personal">
<namePart type="family">HOWARD</namePart>
<namePart type="given">M.E.</namePart>
</name>
<name type="personal">
<namePart type="family">PARET</namePart>
<namePart type="given">P.</namePart>
</name>
<titleInfo>
<title>On war</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Clausewitz, K. von, Howard, M.E. and Paret, P. 1976, On war, Princeton University Press, Princeton, NJ.</note>
<originInfo>
<publisher>Princeton University Press</publisher>
<place>
<placeTerm type="text">Princeton, NJ</placeTerm>
</place>
</originInfo>
<part>
<date>1976</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref123" displayLabel="bib123">
<titleInfo>
<title>The Pitfalls of Bioterrorism Preparedness: the Anthrax and Smallpox Experiences</title>
</titleInfo>
<name type="personal">
<namePart type="family">COHEN</namePart>
<namePart type="given">H.W.</namePart>
</name>
<name type="personal">
<namePart type="family">GOULD</namePart>
<namePart type="given">R.M.</namePart>
</name>
<name type="personal">
<namePart type="family">SIDEL</namePart>
<namePart type="given">V.W.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>American Journal of Public Health</title>
</titleInfo>
<genre>journal</genre>
<part>
<date>2004</date>
<detail type="volume">
<caption>vol.</caption>
<number>94</number>
</detail>
<detail type="issue">
<caption>no.</caption>
<number>10</number>
</detail>
<extent unit="pages">
<start>1667</start>
<end>71</end>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref124" displayLabel="bib124">
<titleInfo>
<title>Sex and Death in the Rational World of Defense Intellectuals</title>
</titleInfo>
<name type="personal">
<namePart type="family">COHN</namePart>
<namePart type="given">C.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>Signs: Journal of Women in Culture and Society</title>
</titleInfo>
<genre>journal</genre>
<part>
<date>1987</date>
<detail type="volume">
<caption>vol.</caption>
<number>12</number>
</detail>
<detail type="issue">
<caption>no.</caption>
<number>4</number>
</detail>
<extent unit="pages">
<start>687</start>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref125" displayLabel="bib125">
<name type="personal">
<namePart type="family">COMBACAU</namePart>
<namePart type="given">J.</namePart>
</name>
<name type="personal">
<namePart type="family">CASSESE</namePart>
<namePart type="given">A</namePart>
</name>
<titleInfo>
<title>The current legal regulation of the use of force</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Combacau, J. 1986, ‘The exception of self-defence in UN practice’, in A Cassese (ed.), The current legal regulation of the use of force, Martinus Nijhoff, Dordrecht, pp. 9–37.</note>
<part>
<date>1986</date>
<extent unit="pages">
<start>9</start>
<end>37</end>
</extent>
</part>
</relatedItem>
<relatedItem type="references" ID="ref126" displayLabel="bib126">
<name type="personal">
<namePart type="family">CONNOLLY</namePart>
<namePart type="given">W.E.</namePart>
</name>
<titleInfo>
<title>The ethos of pluralization</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Connolly, W.E. 1995, The ethos of pluralization, University of Minnesota Press, Minneapolis, MN.</note>
<originInfo>
<publisher>University of Minnesota Press</publisher>
<place>
<placeTerm type="text">Minneapolis, MN</placeTerm>
</place>
</originInfo>
<part>
<date>1995</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref127" displayLabel="bib127">
<name type="personal">
<namePart type="family">CONNOLLY</namePart>
<namePart type="given">W.E.</namePart>
</name>
<titleInfo>
<title>Neuropolitics: thinking, culture, speed</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Connolly, W.E. 2002, Neuropolitics: thinking, culture, speed, University of Minnesota Press, Minneapolis, MN.</note>
<originInfo>
<publisher>University of Minnesota Press</publisher>
<place>
<placeTerm type="text">Minneapolis, MN</placeTerm>
</place>
</originInfo>
<part>
<date>2002</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref128" displayLabel="bib128">
<name type="personal">
<namePart type="family">COOPER</namePart>
<namePart type="given">R.</namePart>
</name>
<titleInfo>
<title>The breaking of nations: order and chaos in the twenty-first century</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Cooper, R. 2004, The breaking of nations: order and chaos in the twenty-first century, revised and updated edn, Atlantic Books, London.</note>
<originInfo>
<publisher>Atlantic Books</publisher>
<place>
<placeTerm type="text">London</placeTerm>
</place>
</originInfo>
<part>
<date>2004</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref129" displayLabel="bib129">
<titleInfo>
<title>Court grants urgent hearing on Hicks case</title>
</titleInfo>
<name type="personal">
<namePart type="family">COOREY</namePart>
<namePart type="given">P.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>Sydney Morning Herald</title>
</titleInfo>
<genre>other</genre>
<part>
<date>2006</date>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref130" displayLabel="bib130">
<name type="personal">
<namePart type="family">CORDESMAN</namePart>
<namePart type="given">A.H.</namePart>
</name>
<titleInfo>
<title>Qana and the lessons for modern war, Center for Strategic and International Studies</title>
</titleInfo>
<genre type="web">web</genre>
<note type="content-in-line">Cordesman, A.H. 2006, Qana and the lessons for modern war, Center for Strategic and International Studies, viewed 6 March 2007 .</note>
<part>
<date>2006</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref131" displayLabel="bib131">
<titleInfo>
<title>Terrorist Financing</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Council on Foreign Relations 2002, Terrorist Financing, Council on Foreign Relations Press, New York.</note>
<originInfo>
<publisher>Council on Foreign Relations Press</publisher>
<place>
<placeTerm type="text">New York</placeTerm>
</place>
</originInfo>
<part>
<date>2002</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref132" displayLabel="bib132">
<titleInfo>
<title>Update on the global campaign against terrorist financing</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Council on Foreign Relations 2004, Update on the global campaign against terrorist financing, Council on Foreign Relations Press, New York.</note>
<originInfo>
<publisher>Council on Foreign Relations Press</publisher>
<place>
<placeTerm type="text">New York</placeTerm>
</place>
</originInfo>
<part>
<date>2004</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref133" displayLabel="bib133">
<titleInfo>
<title>The Passion of World Politics: Propositions on Emotion and Emotional Relationships</title>
</titleInfo>
<name type="personal">
<namePart type="family">CRAWFORD</namePart>
<namePart type="given">N.C.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>International Security</title>
</titleInfo>
<genre>journal</genre>
<part>
<date>2000</date>
<detail type="volume">
<caption>vol.</caption>
<number>24</number>
</detail>
<detail type="issue">
<caption>no.</caption>
<number>4</number>
</detail>
<extent unit="pages">
<start>116</start>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref134" displayLabel="bib134">
<titleInfo>
<title>The Slippery Slope to Preventive War</title>
</titleInfo>
<name type="personal">
<namePart type="family">CRAWFORD</namePart>
<namePart type="given">N.C.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>Ethics and International Affairs</title>
</titleInfo>
<genre>journal</genre>
<part>
<date>2003</date>
<detail type="volume">
<caption>vol.</caption>
<number>17</number>
</detail>
<detail type="issue">
<caption>no.</caption>
<number>1</number>
</detail>
<extent unit="pages">
<start>30</start>
<end>6</end>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref135" displayLabel="bib135">
<titleInfo>
<title>Just War Theory and the US Counterterror War</title>
</titleInfo>
<name type="personal">
<namePart type="family">CRAWFORD</namePart>
<namePart type="given">N.C.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>Perspectives on Politics</title>
</titleInfo>
<genre>journal</genre>
<part>
<date>2003</date>
<detail type="volume">
<caption>vol.</caption>
<number>1</number>
</detail>
<detail type="issue">
<caption>no.</caption>
<number>1</number>
</detail>
<extent unit="pages">
<start>5</start>
<end>25</end>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref136" displayLabel="bib136">
<titleInfo>
<title>How al-Qaida Ends: The Decline and Demise of Terrorist Groups</title>
</titleInfo>
<name type="personal">
<namePart type="family">CRONIN</namePart>
<namePart type="given">A.K.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>International Security</title>
</titleInfo>
<genre>journal</genre>
<part>
<date>2006</date>
<detail type="volume">
<caption>vol.</caption>
<number>31</number>
</detail>
<detail type="issue">
<caption>no.</caption>
<number>1</number>
</detail>
<extent unit="pages">
<start>7</start>
<end>48</end>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref137" displayLabel="bib137">
<name type="personal">
<namePart type="family">CUELLAR</namePart>
<namePart type="given">M.-F.</namePart>
</name>
<titleInfo>
<title>The tenuous relationship between the flight against money laundering and the disruption of criminal finance, Research paper 64</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Cuellar, M.-F. 2003, The tenuous relationship between the flight against money laundering and the disruption of criminal finance, Research paper 64, Stanford Law School, Stanford.</note>
<originInfo>
<publisher>Stanford Law School</publisher>
<place>
<placeTerm type="text">Stanford</placeTerm>
</place>
</originInfo>
<part>
<date>2003</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref138" displayLabel="bib138">
<name type="personal">
<namePart type="family">DAALDER</namePart>
<namePart type="given">I.H.</namePart>
</name>
<name type="personal">
<namePart type="family">LINDSAY</namePart>
<namePart type="given">J.M.</namePart>
</name>
<titleInfo>
<title>America unbound: the Bush revolution in foreign policy</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Daalder, I.H. and Lindsay, J.M. 2003, America unbound: the Bush revolution in foreign policy, Brookings Institution, Washington, DC.</note>
<originInfo>
<publisher>Brookings Institution</publisher>
<place>
<placeTerm type="text">Washington, DC</placeTerm>
</place>
</originInfo>
<part>
<date>2003</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref139" displayLabel="bib139">
<titleInfo>
<title>The Executive Policy Toward Detention and Trial of Foreign Citizens at Guantanamo Bay</title>
</titleInfo>
<name type="personal">
<namePart type="family">DAHLSTROM</namePart>
<namePart type="given">E.K.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>Berkeley Journal of International Law</title>
</titleInfo>
<genre>journal</genre>
<part>
<date>2003</date>
<detail type="volume">
<caption>vol.</caption>
<number>21</number>
</detail>
<detail type="issue">
<caption>no.</caption>
<number>3</number>
</detail>
<extent unit="pages">
<start>662</start>
<end>82</end>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref140" displayLabel="bib140">
<titleInfo>
<title>The Reckoning: Official Inquiries and the Iraq War</title>
</titleInfo>
<name type="personal">
<namePart type="family">DANCHEV</namePart>
<namePart type="given">A.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>Intelligence and National Security</title>
</titleInfo>
<genre>journal</genre>
<part>
<date>2004</date>
<detail type="volume">
<caption>vol.</caption>
<number>19</number>
</detail>
<detail type="issue">
<caption>no.</caption>
<number>3</number>
</detail>
<extent unit="pages">
<start>436</start>
<end>466</end>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref141" displayLabel="bib141">
<name type="personal">
<namePart type="family">DANCHEV</namePart>
<namePart type="given">A.</namePart>
</name>
<name type="personal">
<namePart type="family">DANCHEV</namePart>
<namePart type="given">A.</namePart>
</name>
<name type="personal">
<namePart type="family">MACMILLAN</namePart>
<namePart type="given">J.</namePart>
</name>
<titleInfo>
<title>The Iraq war and democratic politics</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Danchev, A. 2005, ‘Story Development, or, Walter Mitty, the Undefeated’, in A. Danchev and J. MacMillan (eds), The Iraq war and democratic politics, Routledge, London.</note>
<originInfo>
<publisher>Routledge</publisher>
<place>
<placeTerm type="text">London</placeTerm>
</place>
</originInfo>
<part>
<date>2005</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref142" displayLabel="bib142">
<titleInfo>
<title>Like a Dog: Humiliation and Shame in the War on Terror</title>
</titleInfo>
<name type="personal">
<namePart type="family">DANCHEV</namePart>
<namePart type="given">A.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>Alternatives: Global, Local, Political</title>
</titleInfo>
<genre>journal</genre>
<part>
<date>2006</date>
<detail type="volume">
<caption>vol.</caption>
<number>31</number>
</detail>
<detail type="issue">
<caption>no.</caption>
<number>3</number>
</detail>
<extent unit="pages">
<start>259</start>
<end>83</end>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref143" displayLabel="bib143">
<name type="personal">
<namePart type="family">DANCHEV</namePart>
<namePart type="given">A.</namePart>
</name>
<name type="personal">
<namePart type="family">TSANG</namePart>
<namePart type="given">S.</namePart>
</name>
<titleInfo>
<title>Intelligence and human rights in the era of global terrorism</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Danchev, A. 2007, ‘Human Rights and Human Intelligence’, in S. Tsang (ed.), Intelligence and human rights in the era of global terrorism, Praeger, Westport, CT.</note>
<originInfo>
<publisher>Praeger</publisher>
<place>
<placeTerm type="text">Westport, CT</placeTerm>
</place>
</originInfo>
<part>
<date>2007</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref144" displayLabel="bib144">
<titleInfo>
<title>Torture and the truth</title>
</titleInfo>
<name type="personal">
<namePart type="family">DANNER</namePart>
<namePart type="given">M.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>New York Review of Books</title>
</titleInfo>
<genre>other</genre>
<part>
<date>2004</date>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref145" displayLabel="bib145">
<name type="personal">
<namePart type="family">DANNREUTHER</namePart>
<namePart type="given">R.</namePart>
</name>
<titleInfo>
<title>International security: the contemporary agenda</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Dannreuther, R. 2007, International security: the contemporary agenda, Polity Press, Cambridge.</note>
<originInfo>
<publisher>Polity Press</publisher>
<place>
<placeTerm type="text">Cambridge</placeTerm>
</place>
</originInfo>
<part>
<date>2007</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref146" displayLabel="bib146">
<titleInfo>
<title>Security, Spatiality and Social Suffering</title>
</titleInfo>
<name type="personal">
<namePart type="family">DARBY</namePart>
<namePart type="given">P.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>Alternatives: Global, Local, Political</title>
</titleInfo>
<genre>journal</genre>
<part>
<date>2006</date>
<detail type="volume">
<caption>vol.</caption>
<number>31</number>
</detail>
<detail type="issue">
<caption>no.</caption>
<number>4</number>
</detail>
<extent unit="pages">
<start>453</start>
<end>73</end>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref147" displayLabel="bib147">
<titleInfo>
<title>Israel’s Policy of Targeted Killing</title>
</titleInfo>
<name type="personal">
<namePart type="family">DAVID</namePart>
<namePart type="given">S.R.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>Ethics and International Affairs</title>
</titleInfo>
<genre>journal</genre>
<part>
<date>2003</date>
<detail type="volume">
<caption>vol.</caption>
<number>17</number>
</detail>
<detail type="issue">
<caption>no.</caption>
<number>1</number>
</detail>
<extent unit="pages">
<start>111</start>
<end>26</end>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref148" displayLabel="bib148">
<titleInfo>
<title>The Fight Against Global Terrorism: Self-Defense or Collective Security as International Police Action? Some Comments on the International Legal Implications of the “War Against Terrorism”</title>
</titleInfo>
<name type="personal">
<namePart type="family">DELBRüCK</namePart>
<namePart type="given">J.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>German Yearbook of International Law</title>
</titleInfo>
<genre>other</genre>
<part>
<date>2002</date>
<detail type="volume">
<caption>vol.</caption>
<number>44</number>
</detail>
<extent unit="pages">
<start>9</start>
<end>24</end>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref149" displayLabel="bib149">
<titleInfo>
<title>Advancing the national interest: Australia’s foreign and trade policy white paper</title>
</titleInfo>
<genre type="web">web</genre>
<note type="content-in-line">Department of Foreign Affairs and Trade 2002, Advancing the national interest: Australia’s foreign and trade policy white paper, viewed 20 February 2007 .</note>
<part>
<date>2002</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref150" displayLabel="bib150">
<titleInfo>
<title>Go Figure</title>
</titleInfo>
<name type="personal">
<namePart type="family">D’ESOPO</namePart>
<namePart type="given">M.</namePart>
</name>
<name type="personal">
<namePart type="family">NUZZO</namePart>
<namePart type="given">J.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>Biosecurity and Bioterrorism</title>
</titleInfo>
<genre>journal</genre>
<part>
<date>2004</date>
<detail type="volume">
<caption>vol.</caption>
<number>2</number>
</detail>
<detail type="issue">
<caption>no.</caption>
<number>2</number>
</detail>
<extent unit="pages">
<start>134</start>
<end>5</end>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref151" displayLabel="bib151">
<titleInfo>
<title>Decoding the National Security Strategy of the United States of America</title>
</titleInfo>
<name type="personal">
<namePart type="family">DER DERIAN</namePart>
<namePart type="given">J.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>Boundary 2</title>
</titleInfo>
<genre>journal</genre>
<part>
<date>2003</date>
<detail type="volume">
<caption>vol.</caption>
<number>30</number>
</detail>
<detail type="issue">
<caption>no.</caption>
<number>3</number>
</detail>
<extent unit="pages">
<start>19</start>
<end>27</end>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref152" displayLabel="bib152">
<name type="personal">
<namePart type="family">DERRIDA</namePart>
<namePart type="given">J.</namePart>
</name>
<titleInfo>
<title>Rogues: two essays on reason</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Derrida, J. 2005, Rogues: two essays on reason, Stanford University Press, Stanford, CA.</note>
<originInfo>
<publisher>Stanford University Press</publisher>
<place>
<placeTerm type="text">Stanford, CA</placeTerm>
</place>
</originInfo>
<part>
<date>2005</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref153" displayLabel="bib153">
<name type="personal">
<namePart type="family">DERSHOWITZ</namePart>
<namePart type="given">A.M.</namePart>
</name>
<titleInfo>
<title>Why terrorism works: understanding the threat, responding to the challenge</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Dershowitz, A.M. 2002, Why terrorism works: understanding the threat, responding to the challenge, Yale University Press, New Haven.</note>
<originInfo>
<publisher>Yale University Press</publisher>
<place>
<placeTerm type="text">New Haven</placeTerm>
</place>
</originInfo>
<part>
<date>2002</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref154" displayLabel="bib154">
<name type="personal">
<namePart type="family">DEVETAK</namePart>
<namePart type="given">R.</namePart>
</name>
<name type="personal">
<namePart type="family">DEVETAK</namePart>
<namePart type="given">R.</namePart>
</name>
<name type="personal">
<namePart type="family">HUGHES</namePart>
<namePart type="given">C.</namePart>
</name>
<titleInfo>
<title>The globalization of political violence: globalization’s shadow</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Devetak, R., forthcoming, ‘Globalization’s Shadow: An Introduction to the Globalization of Political Violence’, in R. Devetak and C. Hughes (eds), The globalization of political violence: globalization’s shadow, Routledge, London.</note>
<originInfo>
<publisher>Routledge</publisher>
<place>
<placeTerm type="text">London</placeTerm>
</place>
</originInfo>
</relatedItem>
<relatedItem type="references" ID="ref155" displayLabel="bib155">
<name type="personal">
<namePart type="family">DEVETAK</namePart>
<namePart type="given">R.</namePart>
</name>
<name type="personal">
<namePart type="family">HUGHES</namePart>
<namePart type="given">C.</namePart>
</name>
<titleInfo>
<title>The globalization of political violence: globalization’s shadow</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Devetak, R. and Hughes, C. forthcoming, The globalization of political violence: globalization’s shadow, Routledge, London.</note>
<originInfo>
<publisher>Routledge</publisher>
<place>
<placeTerm type="text">London</placeTerm>
</place>
</originInfo>
</relatedItem>
<relatedItem type="references" ID="ref156" displayLabel="bib156">
<titleInfo>
<title>US Department of Homeland Security Online</title>
</titleInfo>
<relatedItem type="host">
<titleInfo>
<title>Fact sheet: National Biodefense Analysis and Countermeasures Center</title>
</titleInfo>
<genre>web</genre>
<part>
<date>2005</date>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref157" displayLabel="bib157">
<name type="personal">
<namePart type="family">DINSTEIN</namePart>
<namePart type="given">Y.</namePart>
</name>
<titleInfo>
<title>War, aggression and self-defence</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Dinstein, Y. 1988, War, aggression and self-defence, Grotius Publications, Cambridge.</note>
<originInfo>
<publisher>Grotius Publications</publisher>
<place>
<placeTerm type="text">Cambridge</placeTerm>
</place>
</originInfo>
<part>
<date>1988</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref158" displayLabel="bib158">
<titleInfo>
<title>How Iraq Was Lost</title>
</titleInfo>
<name type="personal">
<namePart type="family">DODGE</namePart>
<namePart type="given">T.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>Survival</title>
</titleInfo>
<genre>journal</genre>
<part>
<date>2006</date>
<detail type="volume">
<caption>vol.</caption>
<number>48</number>
</detail>
<detail type="issue">
<caption>no.</caption>
<number>4</number>
</detail>
<extent unit="pages">
<start>157</start>
<end>72</end>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref159" displayLabel="bib159">
<name type="personal">
<namePart type="family">DOWNER</namePart>
<namePart type="given">A.</namePart>
</name>
<titleInfo>
<title>Meeting the challenges of a changing regional and global security outlook, speech to the World Affairs Council, Los Angeles</title>
</titleInfo>
<genre type="web">web</genre>
<note type="content-in-line">Downer, A. 2004, Meeting the challenges of a changing regional and global security outlook, speech to the World Affairs Council, Los Angeles, viewed 20 February 2007 .</note>
<part>
<date>2004</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref160" displayLabel="bib160">
<name type="personal">
<namePart type="family">DOWNER</namePart>
<namePart type="given">A.</namePart>
</name>
<titleInfo>
<title>Interview-ABC 702 David Hicks, Cronulla Disturbances</title>
</titleInfo>
<genre type="web">web</genre>
<note type="content-in-line">Downer, A. 2005a, Interview-ABC 702 David Hicks, Cronulla Disturbances, viewed 18 December 2006 .</note>
<part>
<date>2005</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref161" displayLabel="bib161">
<titleInfo>
<title>Securing Australia’s Interests – Australian Foreign Policy Priorities</title>
</titleInfo>
<name type="personal">
<namePart type="family">DOWNER</namePart>
<namePart type="given">A.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>Australian Journal of International Affairs</title>
</titleInfo>
<genre>journal</genre>
<part>
<date>2005</date>
<detail type="volume">
<caption>vol.</caption>
<number>59</number>
</detail>
<detail type="issue">
<caption>no.</caption>
<number>1</number>
</detail>
<extent unit="pages">
<start>7</start>
<end>12</end>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref162" displayLabel="bib162">
<titleInfo>
<title>Governing the Borderlands: Decoding the Power of Aid</title>
</titleInfo>
<name type="personal">
<namePart type="family">DUFFIELD</namePart>
<namePart type="given">M.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>Disasters</title>
</titleInfo>
<genre>journal</genre>
<part>
<date>2001</date>
<detail type="volume">
<caption>vol.</caption>
<number>25</number>
</detail>
<detail type="issue">
<caption>no.</caption>
<number>4</number>
</detail>
<extent unit="pages">
<start>308</start>
<end>20</end>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref163" displayLabel="bib163">
<titleInfo>
<title>War as a Network Enterprise: The New Security Terrain and Its Implications</title>
</titleInfo>
<name type="personal">
<namePart type="family">DUFFIELD</namePart>
<namePart type="given">M.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>Journal for Cultural Research</title>
</titleInfo>
<genre>journal</genre>
<part>
<date>2002</date>
<detail type="volume">
<caption>vol.</caption>
<number>6</number>
</detail>
<detail type="issue">
<caption>no.</caption>
<number>1</number>
</detail>
<extent unit="pages">
<start>153</start>
<end>65</end>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref164" displayLabel="bib164">
<titleInfo>
<title>Securing Humans in a Dangerous World</title>
</titleInfo>
<name type="personal">
<namePart type="family">DUFFIELD</namePart>
<namePart type="given">M.</namePart>
</name>
<name type="personal">
<namePart type="family">WADDELL</namePart>
<namePart type="given">N.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>International Politics</title>
</titleInfo>
<genre>journal</genre>
<part>
<date>2006</date>
<detail type="volume">
<caption>vol.</caption>
<number>43</number>
</detail>
<detail type="issue">
<caption>no.</caption>
<number>1</number>
</detail>
<extent unit="pages">
<start>1</start>
<end>23</end>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref165" displayLabel="bib165">
<name type="personal">
<namePart type="family">DUFFY</namePart>
<namePart type="given">H.</namePart>
</name>
<titleInfo>
<title>The ‘war on terror’ and the framework of international law</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Duffy, H. 2005, The ‘war on terror’ and the framework of international law, Cambridge University Press, New York.</note>
<originInfo>
<publisher>Cambridge University Press</publisher>
<place>
<placeTerm type="text">New York</placeTerm>
</place>
</originInfo>
<part>
<date>2005</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref166" displayLabel="bib166">
<titleInfo>
<title>What the Court Really Said</title>
</titleInfo>
<name type="personal">
<namePart type="family">DWORKIN</namePart>
<namePart type="given">R.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>New York Review of Books</title>
</titleInfo>
<genre>other</genre>
<part>
<date>2004</date>
<detail type="volume">
<caption>vol.</caption>
<number>51</number>
</detail>
<detail type="issue">
<caption>no.</caption>
<number>13</number>
</detail>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref167" displayLabel="bib167">
<titleInfo>
<title>Military Necessity and Due Process: The Place of Human Rights in the War on Terror</title>
</titleInfo>
<name type="personal">
<namePart type="family">DWORKIN</namePart>
<namePart type="given">R.</namePart>
</name>
<name type="personal">
<namePart type="family">WIPPMAN</namePart>
<namePart type="given">D.</namePart>
</name>
<name type="personal">
<namePart type="family">EVANGELISTA</namePart>
<namePart type="given">M.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>New wars, new laws? Applying the laws of war in 21st century conflicts</title>
</titleInfo>
<genre>other</genre>
<originInfo>
<publisher>Transnational Publishers, Ardley</publisher>
<place>
<placeTerm type="text">NY</placeTerm>
</place>
</originInfo>
<part>
<date>2005</date>
<extent unit="pages">
<start>53</start>
<end>74</end>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref168" displayLabel="bib168">
<titleInfo>
<title>An Acidic Message</title>
</titleInfo>
<relatedItem type="host">
<titleInfo>
<title>Washington Post</title>
</titleInfo>
<genre>other</genre>
<part>
<date>2005</date>
<extent unit="pages">
<start>A20</start>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref169" displayLabel="bib169">
<titleInfo>
<title>Forget Trauma? Responses to September 11</title>
</titleInfo>
<name type="personal">
<namePart type="family">EDKINS</namePart>
<namePart type="given">J.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>International Relations</title>
</titleInfo>
<genre>journal</genre>
<part>
<date>2002</date>
<detail type="volume">
<caption>vol.</caption>
<number>16</number>
</detail>
<detail type="issue">
<caption>no.</caption>
<number>2</number>
</detail>
<extent unit="pages">
<start>243</start>
<end>56</end>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref170" displayLabel="bib170">
<name type="personal">
<namePart type="family">EDKINS</namePart>
<namePart type="given">J.</namePart>
</name>
<titleInfo>
<title>Trauma and the memory of politics</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Edkins, J. 2003, Trauma and the memory of politics, Cambridge University Press, Cambridge, UK; New York.</note>
<originInfo>
<publisher>Cambridge University Press</publisher>
<place>
<placeTerm type="text">Cambridge, UK; New York</placeTerm>
</place>
</originInfo>
<part>
<date>2003</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref171" displayLabel="bib171">
<titleInfo>
<title>Ground Zero: Reflections on Trauma, In/distinction and Response</title>
</titleInfo>
<name type="personal">
<namePart type="family">EDKINS</namePart>
<namePart type="given">J.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>Journal for Cultural Research</title>
</titleInfo>
<genre>journal</genre>
<part>
<date>2004</date>
<detail type="volume">
<caption>vol.</caption>
<number>8</number>
</detail>
<detail type="issue">
<caption>no.</caption>
<number>3</number>
</detail>
<extent unit="pages">
<start>247</start>
<end>70</end>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref172" displayLabel="bib172">
<name type="personal">
<namePart type="family">EHRENFELD</namePart>
<namePart type="given">R.</namePart>
</name>
<titleInfo>
<title>Funding evil: how terrorism is financed-and how to stop it</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Ehrenfeld, R. 2003, Funding evil: how terrorism is financed-and how to stop it, Bonus Books, Chicago.</note>
<originInfo>
<publisher>Bonus Books</publisher>
<place>
<placeTerm type="text">Chicago</placeTerm>
</place>
</originInfo>
<part>
<date>2003</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref173" displayLabel="bib173">
<name type="personal">
<namePart type="family">ELSHTAIN</namePart>
<namePart type="given">J.B.</namePart>
</name>
<titleInfo>
<title>Just war theory</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Elshtain, J.B. 1992, Just war theory, Blackwell Press, Oxford.</note>
<originInfo>
<publisher>Blackwell Press</publisher>
<place>
<placeTerm type="text">Oxford</placeTerm>
</place>
</originInfo>
<part>
<date>1992</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref174" displayLabel="bib174">
<name type="personal">
<namePart type="family">ELSHTAIN</namePart>
<namePart type="given">J.B.</namePart>
</name>
<name type="personal">
<namePart type="family">BOOTH</namePart>
<namePart type="given">K.</namePart>
</name>
<name type="personal">
<namePart type="family">DUNNE</namePart>
<namePart type="given">T.</namePart>
</name>
<titleInfo>
<title>Worlds in collision: terror and the future of global order</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Elshtain, J.B. 2002, ‘How to Fight a Just War’, in K. Booth and T. Dunne (eds), Worlds in collision: terror and the future of global order, Palgrave Macmillan, Basingsoke and New York.</note>
<originInfo>
<publisher>Palgrave Macmillan</publisher>
<place>
<placeTerm type="text">Basingsoke and New York</placeTerm>
</place>
</originInfo>
<part>
<date>2002</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref175" displayLabel="bib175">
<name type="personal">
<namePart type="family">ELSHTAIN</namePart>
<namePart type="given">J.B.</namePart>
</name>
<titleInfo>
<title>Just war against terror: the burden of American power in a violent world</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Elshtain, J.B. 2004, Just war against terror: the burden of American power in a violent world, Basic Books, New York.</note>
<originInfo>
<publisher>Basic Books</publisher>
<place>
<placeTerm type="text">New York</placeTerm>
</place>
</originInfo>
<part>
<date>2004</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref176" displayLabel="bib176">
<name type="personal">
<namePart type="family">ELSTER</namePart>
<namePart type="given">J.</namePart>
</name>
<titleInfo>
<title>Alchemies of the mind: rationality and the emotions</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Elster, J. 1999, Alchemies of the mind: rationality and the emotions, Cambridge University Press, Cambridge, UK; New York.</note>
<originInfo>
<publisher>Cambridge University Press</publisher>
<place>
<placeTerm type="text">Cambridge, UK; New York</placeTerm>
</place>
</originInfo>
<part>
<date>1999</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref177" displayLabel="bib177">
<titleInfo>
<title>Has Biodefense Gone Overboard?</title>
</titleInfo>
<name type="personal">
<namePart type="family">ENSERINK</namePart>
<namePart type="given">M.</namePart>
</name>
<name type="personal">
<namePart type="family">KAISER</namePart>
<namePart type="given">J.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>Science</title>
</titleInfo>
<genre>journal</genre>
<part>
<date>2005</date>
<detail type="volume">
<caption>vol.</caption>
<number>307</number>
</detail>
<detail type="issue">
<caption>no.</caption>
<number>5714</number>
</detail>
<extent unit="pages">
<start>1396</start>
<end>8</end>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref178" displayLabel="bib178">
<name type="personal">
<namePart type="family">EUBEN</namePart>
<namePart type="given">R.L.</namePart>
</name>
<titleInfo>
<title>Enemy in the mirror: Islamic fundamentalism and the limits of modern rationalism</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Euben, R.L. 1999, Enemy in the mirror: Islamic fundamentalism and the limits of modern rationalism, Princeton University Press, Princeton, NJ.</note>
<originInfo>
<publisher>Princeton University Press</publisher>
<place>
<placeTerm type="text">Princeton, NJ</placeTerm>
</place>
</originInfo>
<part>
<date>1999</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref179" displayLabel="bib179">
<titleInfo>
<title>Killing (for) Politics: Jihad, Martyrdom and Political Action</title>
</titleInfo>
<name type="personal">
<namePart type="family">EUBEN</namePart>
<namePart type="given">R.L.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>Political Theory</title>
</titleInfo>
<genre>journal</genre>
<part>
<date>2002</date>
<detail type="volume">
<caption>vol.</caption>
<number>30</number>
</detail>
<detail type="issue">
<caption>no.</caption>
<number>1</number>
</detail>
<extent unit="pages">
<start>4</start>
<end>35</end>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref180" displayLabel="bib180">
<name type="personal">
<namePart type="family">FALK</namePart>
<namePart type="given">R.</namePart>
</name>
<titleInfo>
<title>Law, morality and war in the contemporary world</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Falk, R. 1963, Law, morality and war in the contemporary world, Paeger, New York.</note>
<originInfo>
<publisher>Paeger</publisher>
<place>
<placeTerm type="text">New York</placeTerm>
</place>
</originInfo>
<part>
<date>1963</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref181" displayLabel="bib181">
<titleInfo>
<title>Draft recommendations for a code of conduct for biodefense programs, Federation of American Scientists Online</title>
</titleInfo>
<genre type="web">web</genre>
<note type="content-in-line">FAS 2002, Draft recommendations for a code of conduct for biodefense programs, Federation of American Scientists Online, available at (accessed 30 May 2005).</note>
<part>
<date>2002</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref182" displayLabel="bib182">
<titleInfo>
<title>Draft Recommedations for a code of conduct for biodefense programs, Federation of American Scientists Online</title>
</titleInfo>
<genre type="web">web</genre>
<note type="content-in-line">FAS Draft Recommedations for a code of conduct for biodefense programs, Federation of American Scientists Online, viewed 30 May 2005 .</note>
</relatedItem>
<relatedItem type="references" ID="ref183" displayLabel="bib183">
<titleInfo>
<title>A Duty to Prevent</title>
</titleInfo>
<name type="personal">
<namePart type="family">FEINSTEIN</namePart>
<namePart type="given">L.</namePart>
</name>
<name type="personal">
<namePart type="family">SLAUGHTER</namePart>
<namePart type="given">A-M.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>Foreign Affairs</title>
</titleInfo>
<genre>journal</genre>
<part>
<date>2004</date>
<detail type="volume">
<caption>vol.</caption>
<number>83</number>
</detail>
<detail type="issue">
<caption>no.</caption>
<number>1</number>
</detail>
<extent unit="pages">
<start>136</start>
<end>50</end>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref184" displayLabel="bib184">
<titleInfo>
<title>The Law of the Exception: A Typology of Emergency Powers</title>
</titleInfo>
<name type="personal">
<namePart type="family">FEREJOHN</namePart>
<namePart type="given">John</namePart>
</name>
<name type="personal">
<namePart type="family">PASQUINO</namePart>
<namePart type="given">Pasquale</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>International Journal of Constitutional Law</title>
</titleInfo>
<genre>journal</genre>
<part>
<date>2004</date>
<detail type="volume">
<caption>vol.</caption>
<number>2</number>
</detail>
<detail type="issue">
<caption>no.</caption>
<number>2</number>
</detail>
<extent unit="pages">
<start>210</start>
<end>39</end>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref185" displayLabel="bib185">
<titleInfo>
<title>Whereof We Can Speak, Thereof We Must Not Be Silent: Trauma, Political Solipsism and War</title>
</titleInfo>
<name type="personal">
<namePart type="family">FIERKE</namePart>
<namePart type="given">K.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>Review of International Studies</title>
</titleInfo>
<genre>journal</genre>
<part>
<date>2004</date>
<detail type="volume">
<caption>vol.</caption>
<number>30</number>
</detail>
<detail type="issue">
<caption>no.</caption>
<number>4</number>
</detail>
<extent unit="pages">
<start>471</start>
<end>91</end>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref186" displayLabel="bib186">
<name type="personal">
<namePart type="family">FIERKE</namePart>
<namePart type="given">K.</namePart>
</name>
<titleInfo>
<title>Critical approaches to international security</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Fierke, K. 2007, Critical approaches to international security, Polity, Cambridge.</note>
<originInfo>
<publisher>Polity</publisher>
<place>
<placeTerm type="text">Cambridge</placeTerm>
</place>
</originInfo>
<part>
<date>2007</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref187" displayLabel="bib187">
<name type="personal">
<namePart type="family">FIORILL</namePart>
<namePart type="given">J.</namePart>
</name>
<titleInfo>
<title>US Plans to defend against engineered bioattack, Global Security Newswire Online</title>
</titleInfo>
<genre type="web">web</genre>
<note type="content-in-line">Fiorill, J. 2005, US Plans to defend against engineered bioattack, Global Security Newswire Online, viewed 1 July 2005 .</note>
<part>
<date>2005</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref188" displayLabel="bib188">
<name type="personal">
<namePart type="family">FISHER</namePart>
<namePart type="given">L.</namePart>
</name>
<titleInfo>
<title>Military tribunals and presidential power: American revolution to the war on terrorism</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Fisher, L. 2005, Military tribunals and presidential power: American revolution to the war on terrorism, University Press of Kansas, Kansas.</note>
<originInfo>
<publisher>University Press of Kansas</publisher>
<place>
<placeTerm type="text">Kansas</placeTerm>
</place>
</originInfo>
<part>
<date>2005</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref189" displayLabel="bib189">
<name type="personal">
<namePart type="family">FLETCHER</namePart>
<namePart type="given">G.P.</namePart>
</name>
<titleInfo>
<title>‘The Hamdan Case and Conspiracy as a War Crime: A New Beginning for International Law in the US’, Journal of International Criminal Justice</title>
</titleInfo>
<genre type="other">other</genre>
<note type="content-in-line">Fletcher, G.P. 2006, ‘The Hamdan Case and Conspiracy as a War Crime: A New Beginning for International Law in the US’, Journal of International Criminal Justice, vol. 4, no. 3, pp. 442–7.</note>
<part>
<date>2006</date>
<detail type="volume">
<caption>vol.</caption>
<number>4</number>
</detail>
<extent unit="pages">
<start>442</start>
<end>7</end>
</extent>
</part>
</relatedItem>
<relatedItem type="references" ID="ref190" displayLabel="bib190">
<name type="personal">
<namePart type="family">FOER</namePart>
<namePart type="given">J.S.</namePart>
</name>
<titleInfo>
<title>Extremely loud and incredibly close</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Foer, J.S. 2005, Extremely loud and incredibly close, Houghton Mifflin Company, Boston.</note>
<originInfo>
<publisher>Houghton Mifflin Company</publisher>
<place>
<placeTerm type="text">Boston</placeTerm>
</place>
</originInfo>
<part>
<date>2005</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref191" displayLabel="bib191">
<titleInfo>
<title>The Failed States Index</title>
</titleInfo>
<name type="personal">
<namePart type="family">POLICY</namePart>
<namePart type="given">Foreign</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>Foreign Policy</title>
</titleInfo>
<genre>other</genre>
<part>
<date>2005</date>
<detail type="volume">
<caption>vol.</caption>
<number>149</number>
</detail>
<extent unit="pages">
<start>56</start>
<end>65</end>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref192" displayLabel="bib192">
<name type="personal">
<namePart type="family">FOUCAULT</namePart>
<namePart type="given">M.</namePart>
</name>
<titleInfo>
<title>The history of secuality: volume 1, The will to knowledge</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Foucault, M. 1978, The history of secuality: volume 1, The will to knowledge, Penguin, Harmondsworth.</note>
<originInfo>
<publisher>Penguin</publisher>
<place>
<placeTerm type="text">Harmondsworth</placeTerm>
</place>
</originInfo>
<part>
<date>1978</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref193" displayLabel="bib193">
<name type="personal">
<namePart type="family">FRANCK</namePart>
<namePart type="given">T.M.</namePart>
</name>
<titleInfo>
<title>Recourse to force: state action against threats and armed attacks</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Franck, T.M. 2002, Recourse to force: state action against threats and armed attacks, Cambridge University Press, Cambridge.</note>
<originInfo>
<publisher>Cambridge University Press</publisher>
<place>
<placeTerm type="text">Cambridge</placeTerm>
</place>
</originInfo>
<part>
<date>2002</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref194" displayLabel="bib194">
<titleInfo>
<title>The Third World War?</title>
</titleInfo>
<name type="personal">
<namePart type="family">FREEDMAN</namePart>
<namePart type="given">L.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>Survival</title>
</titleInfo>
<genre>journal</genre>
<part>
<date>2001/2</date>
<detail type="volume">
<caption>vol.</caption>
<number>43</number>
</detail>
<detail type="issue">
<caption>no.</caption>
<number>4</number>
</detail>
<extent unit="pages">
<start>61</start>
<end>87</end>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref195" displayLabel="bib195">
<titleInfo>
<title>The Coming War on Terrorism</title>
</titleInfo>
<name type="personal">
<namePart type="family">FREEDMAN</namePart>
<namePart type="given">L.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>Political Quarterly</title>
</titleInfo>
<genre>journal</genre>
<part>
<date>2002</date>
<detail type="volume">
<caption>vol.</caption>
<number>73</number>
</detail>
<detail type="issue">
<caption>no.</caption>
<number>1</number>
</detail>
<extent unit="pages">
<start>40</start>
<end>56</end>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref196" displayLabel="bib196">
<name type="personal">
<namePart type="family">FREEDMAN</namePart>
<namePart type="given">L.</namePart>
</name>
<titleInfo>
<title>Deterrence</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Freedman, L. 2004a, Deterrence, Polity Press, Malden, MA.</note>
<originInfo>
<publisher>Polity Press</publisher>
<place>
<placeTerm type="text">Malden, MA</placeTerm>
</place>
</originInfo>
<part>
<date>2004</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref197" displayLabel="bib197">
<titleInfo>
<title>War in Iraq: Selling the Threat</title>
</titleInfo>
<name type="personal">
<namePart type="family">FREEDMAN</namePart>
<namePart type="given">L.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>Survival</title>
</titleInfo>
<genre>journal</genre>
<part>
<date>2004</date>
<detail type="volume">
<caption>vol.</caption>
<number>46</number>
</detail>
<detail type="issue">
<caption>no.</caption>
<number>2</number>
</detail>
<extent unit="pages">
<start>7</start>
<end>49</end>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref198" displayLabel="bib198">
<titleInfo>
<title>The Age of Liberal Wars</title>
</titleInfo>
<name type="personal">
<namePart type="family">FREEDMAN</namePart>
<namePart type="given">L.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>Review of International Studies</title>
</titleInfo>
<genre>other</genre>
<part>
<date>2005</date>
<detail type="volume">
<caption>vol.</caption>
<number>31</number>
</detail>
<extent unit="pages">
<start>93</start>
<end>107</end>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref199" displayLabel="bib199">
<titleInfo>
<title>The Transformation of Military Strategy</title>
</titleInfo>
<name type="personal">
<namePart type="family">FREEDMAN</namePart>
<namePart type="given">L.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>Adelphi Papers</title>
</titleInfo>
<genre>other</genre>
<part>
<date>2006</date>
<detail type="volume">
<caption>vol.</caption>
<number>379</number>
</detail>
<extent unit="pages">
<start>61</start>
<end>71</end>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref200" displayLabel="bib200">
<name type="personal">
<namePart type="family">FRUM</namePart>
<namePart type="given">D.</namePart>
</name>
<name type="personal">
<namePart type="family">PERLE</namePart>
<namePart type="given">R.</namePart>
</name>
<titleInfo>
<title>An end to evil: how to win the war on terror</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Frum, D. and Perle, R. 2004, An end to evil: how to win the war on terror, Random House, New York.</note>
<originInfo>
<publisher>Random House</publisher>
<place>
<placeTerm type="text">New York</placeTerm>
</place>
</originInfo>
<part>
<date>2004</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref201" displayLabel="bib201">
<name type="personal">
<namePart type="family">FUKUYAMA</namePart>
<namePart type="given">F.</namePart>
</name>
<titleInfo>
<title>The end of history and the last man</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Fukuyama, F. 1992, The end of history and the last man, Sage Press, New York.</note>
<originInfo>
<publisher>Sage Press</publisher>
<place>
<placeTerm type="text">New York</placeTerm>
</place>
</originInfo>
<part>
<date>1992</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref202" displayLabel="bib202">
<name type="personal">
<namePart type="family">FUKUYAMA</namePart>
<namePart type="given">F.</namePart>
</name>
<name type="personal">
<namePart type="family">BOOTH</namePart>
<namePart type="given">K.</namePart>
</name>
<name type="personal">
<namePart type="family">DUNNE</namePart>
<namePart type="given">T.</namePart>
</name>
<titleInfo>
<title>Worlds in collision: terror and the future of global order</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Fukuyama, F. 2002, ‘History and September 11’, in K. Booth and T. Dunne (eds), Worlds in collision: terror and the future of global order, Palgrave, London; New York.</note>
<originInfo>
<publisher>Palgrave</publisher>
<place>
<placeTerm type="text">London; New York</placeTerm>
</place>
</originInfo>
<part>
<date>2002</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref203" displayLabel="bib203">
<titleInfo>
<title>War and Innocence</title>
</titleInfo>
<name type="personal">
<namePart type="family">FULLINWINDER</namePart>
<namePart type="given">R.K.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>Philosophy and Public Affairs</title>
</titleInfo>
<genre>journal</genre>
<part>
<date>1975</date>
<detail type="volume">
<caption>vol.</caption>
<number>5</number>
</detail>
<detail type="issue">
<caption>no.</caption>
<number>1</number>
</detail>
<extent unit="pages">
<start>90</start>
<end>7</end>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref204" displayLabel="bib204">
<name type="personal">
<namePart type="family">GARAMONE</namePart>
<namePart type="given">J.</namePart>
</name>
<titleInfo>
<title>Bush says military commissions act will bring justice</title>
</titleInfo>
<genre type="web">web</genre>
<note type="content-in-line">Garamone, J. 2006, Bush says military commissions act will bring justice, viewed 1 December 2006 .</note>
<part>
<date>2006</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref205" displayLabel="bib205">
<titleInfo>
<title>Biosecurity and Research: Minimizing Adverse Impacts</title>
</titleInfo>
<name type="personal">
<namePart type="family">GAUDIOSO</namePart>
<namePart type="given">J.</namePart>
</name>
<name type="personal">
<namePart type="family">SALERNO</namePart>
<namePart type="given">R.M.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>Science</title>
</titleInfo>
<genre>journal</genre>
<part>
<date>2004</date>
<detail type="volume">
<caption>vol.</caption>
<number>304</number>
</detail>
<detail type="issue">
<caption>no.</caption>
<number>5671</number>
</detail>
<extent unit="pages">
<start>687</start>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref206" displayLabel="bib206">
<name type="personal">
<namePart type="family">GAZIT</namePart>
<namePart type="given">S.</namePart>
</name>
<titleInfo>
<title>Gazit, S. 2004, Interview with author, 25 August.</title>
</titleInfo>
<genre type="other">other</genre>
<note type="content-in-line">Gazit, S. 2004, Interview with author, 25 August.</note>
<part>
<date>2004</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref207" displayLabel="bib207">
<titleInfo>
<title>Treatment of Ebola Virus Infection With a Recombinant Inhibitor of Factor VIIA/Tissue Factor: a Study in Rhesus Monkeys</title>
</titleInfo>
<name type="personal">
<namePart type="family">GEISBERT</namePart>
<namePart type="given">T.W.</namePart>
</name>
<name type="personal">
<namePart type="family">HENSLEY</namePart>
<namePart type="given">L.E.</namePart>
</name>
<name type="personal">
<namePart type="family">JAHRLING</namePart>
<namePart type="given">P.B.</namePart>
</name>
<name type="personal">
<namePart type="family">LARSEN</namePart>
<namePart type="given">T.</namePart>
</name>
<name type="personal">
<namePart type="family">GEISBERT</namePart>
<namePart type="given">J.B.</namePart>
</name>
<name type="personal">
<namePart type="family">PARAGAS</namePart>
<namePart type="given">J.</namePart>
</name>
<name type="personal">
<namePart type="family">YOUNG</namePart>
<namePart type="given">H.A.</namePart>
</name>
<name type="personal">
<namePart type="family">FREDEKING</namePart>
<namePart type="given">T.M.</namePart>
</name>
<name type="personal">
<namePart type="family">ROTE</namePart>
<namePart type="given">W.E.</namePart>
</name>
<name type="personal">
<namePart type="family">VLASUK</namePart>
<namePart type="given">G.B.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>The Lancet</title>
</titleInfo>
<genre>journal</genre>
<part>
<date>2003</date>
<detail type="volume">
<caption>vol.</caption>
<number>362</number>
</detail>
<detail type="issue">
<caption>no.</caption>
<number>9400</number>
</detail>
<extent unit="pages">
<start>1953</start>
<end>8</end>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref208" displayLabel="bib208">
<titleInfo>
<title>Leo Strauss, Neoconservatism and US Foreign Policy: Esoteric Nihilism and the Bush Doctrine</title>
</titleInfo>
<name type="personal">
<namePart type="family">GEORGE</namePart>
<namePart type="given">J.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>International Politics</title>
</titleInfo>
<genre>journal</genre>
<part>
<date>2005</date>
<detail type="volume">
<caption>vol.</caption>
<number>42</number>
</detail>
<detail type="issue">
<caption>no.</caption>
<number>2</number>
</detail>
<extent unit="pages">
<start>174</start>
<end>202</end>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref209" displayLabel="bib209">
<name type="personal">
<namePart type="family">GILMORE</namePart>
<namePart type="given">W.C.</namePart>
</name>
<titleInfo>
<title>Dirty money: the evolution of money laundering counter-measures</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Gilmore, W.C. 1995, Dirty money: the evolution of money laundering counter-measures, Council of Europe, Strasbourg.</note>
<originInfo>
<publisher>Council of Europe</publisher>
<place>
<placeTerm type="text">Strasbourg</placeTerm>
</place>
</originInfo>
<part>
<date>1995</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref210" displayLabel="bib210">
<titleInfo>
<title>The Fog of Law: Self-Defense, Inherence, and Incoherence in Article 51 of the United Nations Charter</title>
</titleInfo>
<name type="personal">
<namePart type="family">GLENNON</namePart>
<namePart type="given">M.J.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>Harvard Journal of International Law and Public Policy</title>
</titleInfo>
<genre>journal</genre>
<part>
<date>2002</date>
<detail type="volume">
<caption>vol.</caption>
<number>25</number>
</detail>
<detail type="issue">
<caption>no.</caption>
<number>2</number>
</detail>
<extent unit="pages">
<start>541</start>
<end>9</end>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref211" displayLabel="bib211">
<titleInfo>
<title>Why the Security Council Failed</title>
</titleInfo>
<name type="personal">
<namePart type="family">GLENNON</namePart>
<namePart type="given">M.J.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>Foreign Affairs</title>
</titleInfo>
<genre>journal</genre>
<part>
<date>2003</date>
<detail type="volume">
<caption>vol.</caption>
<number>82</number>
</detail>
<detail type="issue">
<caption>no.</caption>
<number>3</number>
</detail>
<extent unit="pages">
<start>16</start>
<end>35</end>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref212" displayLabel="bib212">
<titleInfo>
<title>Ethics and Intelligence</title>
</titleInfo>
<name type="personal">
<namePart type="family">GODFREY</namePart>
<namePart type="given">E.D.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>Foreign Affairs</title>
</titleInfo>
<genre>journal</genre>
<part>
<date>1978</date>
<detail type="volume">
<caption>vol.</caption>
<number>56</number>
</detail>
<detail type="issue">
<caption>no.</caption>
<number>3</number>
</detail>
<extent unit="pages">
<start>624</start>
<end>42</end>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref213" displayLabel="bib213">
<name type="personal">
<namePart type="family">GOLDENBEG</namePart>
<namePart type="given">S.</namePart>
</name>
<titleInfo>
<title>Five US soldiers in Iraq rape and murder inquiry, Guardian Unlimited</title>
</titleInfo>
<genre type="web">web</genre>
<note type="content-in-line">Goldenbeg, S. 2006a, Five US soldiers in Iraq rape and murder inquiry, Guardian Unlimited, 1 July, viewed 26 April 2007 .</note>
<part>
<date>2006</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref214" displayLabel="bib214">
<name type="personal">
<namePart type="family">GOLDENBEG</namePart>
<namePart type="given">S.</namePart>
</name>
<titleInfo>
<title>Woman soldier refuses return to Iraq, claiming sexual harassment, Guardian Unlimited</title>
</titleInfo>
<genre type="web">web</genre>
<note type="content-in-line">Goldenbeg, S. 2006b, Woman soldier refuses return to Iraq, claiming sexual harassment, Guardian Unlimited, 21 June, viewed 26 April 2007 .</note>
<part>
<date>2006</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref215" displayLabel="bib215">
<titleInfo>
<title>A Tale of Two Worlds: Core and Periphery in the Post-Cold War Era</title>
</titleInfo>
<name type="personal">
<namePart type="family">GOLDGEIER</namePart>
<namePart type="given">J.M.</namePart>
</name>
<name type="personal">
<namePart type="family">MCFAUL</namePart>
<namePart type="given">M.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>International Organization</title>
</titleInfo>
<genre>journal</genre>
<part>
<date>1992</date>
<detail type="volume">
<caption>vol.</caption>
<number>46</number>
</detail>
<detail type="issue">
<caption>no.</caption>
<number>2</number>
</detail>
<extent unit="pages">
<start>467</start>
<end>91</end>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref216" displayLabel="bib216">
<name type="personal">
<namePart type="family">GOLDIE</namePart>
<namePart type="given">P.</namePart>
</name>
<titleInfo>
<title>The emotions: a philosophical exploration</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Goldie, P. 2002, The emotions: a philosophical exploration, Clarendon Press, Oxford.</note>
<originInfo>
<publisher>Clarendon Press</publisher>
<place>
<placeTerm type="text">Oxford</placeTerm>
</place>
</originInfo>
<part>
<date>2002</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref217" displayLabel="bib217">
<titleInfo>
<title>The Politics of Fear</title>
</titleInfo>
<name type="personal">
<namePart type="family">GORE</namePart>
<namePart type="given">A.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>Social Research</title>
</titleInfo>
<genre>journal</genre>
<part>
<date>2004</date>
<detail type="volume">
<caption>vol.</caption>
<number>71</number>
</detail>
<detail type="issue">
<caption>no.</caption>
<number>4</number>
</detail>
<extent unit="pages">
<start>779</start>
<end>98</end>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref218" displayLabel="bib218">
<titleInfo>
<title>Company formation: minimal company ownership information is collected and available</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Government Accounting Office 2006, Company formation: minimal company ownership information is collected and available, Government Accounting Office, Washington, DC.</note>
<originInfo>
<publisher>Government Accounting Office</publisher>
<place>
<placeTerm type="text">Washington, DC</placeTerm>
</place>
</originInfo>
<part>
<date>2006</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref219" displayLabel="bib219">
<name type="personal">
<namePart type="family">GRAY</namePart>
<namePart type="given">C.D.</namePart>
</name>
<titleInfo>
<title>International law and the use of force</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Gray, C.D. 2000, International law and the use of force, Oxford University Press, Oxford; New York.</note>
<originInfo>
<publisher>Oxford University Press</publisher>
<place>
<placeTerm type="text">Oxford; New York</placeTerm>
</place>
</originInfo>
<part>
<date>2000</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref220" displayLabel="bib220">
<name type="personal">
<namePart type="family">GRAY</namePart>
<namePart type="given">C.H.</namePart>
</name>
<titleInfo>
<title>Peace, war and computers</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Gray, C.H. 2005, Peace, war and computers, Routledge, London; New York.</note>
<originInfo>
<publisher>Routledge</publisher>
<place>
<placeTerm type="text">London; New York</placeTerm>
</place>
</originInfo>
<part>
<date>2005</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref221" displayLabel="bib221">
<name type="personal">
<namePart type="family">GREENBERG</namePart>
<namePart type="given">K.J.</namePart>
</name>
<name type="personal">
<namePart type="family">GREENBERG</namePart>
<namePart type="given">K.J.</namePart>
</name>
<titleInfo>
<title>The torture debate in America</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Greenberg, K.J. 2006, ‘Introduction’, in K.J. Greenberg (ed.), The torture debate in America, Cambridge University Press, Cambridge; New York.</note>
<originInfo>
<publisher>Cambridge University Press</publisher>
<place>
<placeTerm type="text">Cambridge; New York</placeTerm>
</place>
</originInfo>
<part>
<date>2006</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref222" displayLabel="bib222">
<titleInfo>
<title>‘Terrorism in the South Pacific? Thinking Critically About Approaches to Security in the Region’</title>
</titleInfo>
<name type="personal">
<namePart type="family">GREENER-BARCHAM</namePart>
<namePart type="given">Beth K.</namePart>
</name>
<name type="personal">
<namePart type="family">BARCHAM</namePart>
<namePart type="given">Manuhuia</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>Australian Journal of International Affairs</title>
</titleInfo>
<genre>journal</genre>
<part>
<date>2006</date>
<detail type="volume">
<caption>vol.</caption>
<number>60</number>
</detail>
<detail type="issue">
<caption>no.</caption>
<number>1</number>
</detail>
<extent unit="pages">
<start>67</start>
<end>82</end>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref223" displayLabel="bib223">
<titleInfo>
<title>International Law and the “War Against Terrorism</title>
</titleInfo>
<name type="personal">
<namePart type="family">GREENWOOD</namePart>
<namePart type="given">C.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>International Affairs</title>
</titleInfo>
<genre>journal</genre>
<part>
<date>2002</date>
<detail type="volume">
<caption>vol.</caption>
<number>78</number>
</detail>
<detail type="issue">
<caption>no.</caption>
<number>2</number>
</detail>
<extent unit="pages">
<start>301</start>
<end>17</end>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref224" displayLabel="bib224">
<titleInfo>
<title>International Law and the Pre-emptive Use of Force: Afghanistan, Al-Qaida, and Iraq</title>
</titleInfo>
<name type="personal">
<namePart type="family">GREENWOOD</namePart>
<namePart type="given">C.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>San Diego International Law Journal</title>
</titleInfo>
<genre>other</genre>
<part>
<date>2003</date>
<detail type="volume">
<caption>vol.</caption>
<number>7</number>
</detail>
<extent unit="pages">
<start>7</start>
<end>37</end>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref225" displayLabel="bib225">
<titleInfo>
<title>The Normless and Exeptionless Exception: Carl Schmitt’s Theory of Emergency Powers and the “Norm-Exception” Dichotomy</title>
</titleInfo>
<name type="personal">
<namePart type="family">GROSS</namePart>
<namePart type="given">O.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>Cardozo Law Review</title>
</titleInfo>
<genre>journal</genre>
<part>
<date>2000</date>
<detail type="volume">
<caption>vol.</caption>
<number>21</number>
</detail>
<detail type="issue">
<caption>no.</caption>
<number>5–6</number>
</detail>
<extent unit="pages">
<start>1825</start>
<end>68</end>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref226" displayLabel="bib226">
<titleInfo>
<title>What “Emergency” Regime?</title>
</titleInfo>
<name type="personal">
<namePart type="family">GROSS</namePart>
<namePart type="given">O.</namePart>
</name>
<name type="personal">
<namePart type="family">GROTIUS</namePart>
<namePart type="given">H.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>Constellations</title>
</titleInfo>
<titleInfo>
<title>De jure belli ac pacis libri tres</title>
</titleInfo>
<genre>journal</genre>
<originInfo>
<publisher>Carnegie Council</publisher>
<place>
<placeTerm type="text">Washington, DC</placeTerm>
</place>
</originInfo>
<part>
<date>2006</date>
<date>1913</date>
<detail type="volume">
<caption>vol.</caption>
<number>13</number>
</detail>
<detail type="issue">
<caption>no.</caption>
<number>1</number>
</detail>
<extent unit="pages">
<start>74</start>
<end>88</end>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref227" displayLabel="bib227">
<name type="personal">
<namePart type="family">GROSS</namePart>
<namePart type="given">O.</namePart>
</name>
<name type="personal">
<namePart type="family">HAAKONSSEN</namePart>
<namePart type="given">K.</namePart>
</name>
<name type="personal">
<namePart type="family">BARBEYRAC</namePart>
<namePart type="given">J.</namePart>
</name>
<titleInfo>
<title>Natural law and enlightenment classics</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Gross, O. 2005, ‘The rights of war and peace’, in K. Haakonssen and J. Barbeyrac (eds), Natural law and enlightenment classics, Liberty Fund Press, Indianapolis, IN.</note>
<originInfo>
<publisher>Liberty Fund Press</publisher>
<place>
<placeTerm type="text">Indianapolis, IN</placeTerm>
</place>
</originInfo>
<part>
<date>2005</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref228" displayLabel="bib228">
<titleInfo>
<title>Still No Arrests in Anthrax Probe, But “Progress” is Noted</title>
</titleInfo>
<name type="personal">
<namePart type="family">GUGLIOTTA</namePart>
<namePart type="given">G.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>Washington Post</title>
</titleInfo>
<genre>other</genre>
<part>
<date>2002</date>
<extent unit="pages">
<start>A08</start>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref229" displayLabel="bib229">
<name type="personal">
<namePart type="family">GUILLEMIN</namePart>
<namePart type="given">J.</namePart>
</name>
<titleInfo>
<title>Biological weapons: from the invention of state-sponsored programs to contemporary bioterrorism</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Guillemin, J. 2005, Biological weapons: from the invention of state-sponsored programs to contemporary bioterrorism, Columbia University Press, New York.</note>
<originInfo>
<publisher>Columbia University Press</publisher>
<place>
<placeTerm type="text">New York</placeTerm>
</place>
</originInfo>
<part>
<date>2005</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref230" displayLabel="bib230">
<titleInfo>
<title>Hamdan and the Guantanamo Detainees</title>
</titleInfo>
<name type="personal">
<namePart type="family">HAFETZ</namePart>
<namePart type="given">J.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>Jurist Forum</title>
</titleInfo>
<genre>web</genre>
<part>
<date>2006</date>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref231" displayLabel="bib231">
<name type="personal">
<namePart type="family">HALLIDAY</namePart>
<namePart type="given">F.</namePart>
</name>
<titleInfo>
<title>The Middle East in international relations: power, politics and ideology</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Halliday, F. 2005, The Middle East in international relations: power, politics and ideology, Cambridge University Press, Cambridge, UK; New York.</note>
<originInfo>
<publisher>Cambridge University Press</publisher>
<place>
<placeTerm type="text">Cambridge, UK; New York</placeTerm>
</place>
</originInfo>
<part>
<date>2005</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref232" displayLabel="bib232">
<name type="personal">
<namePart type="family">HALPER</namePart>
<namePart type="given">S.A.</namePart>
</name>
<name type="personal">
<namePart type="family">CLARKE</namePart>
<namePart type="given">J.</namePart>
</name>
<titleInfo>
<title>America alone: the neo-conservatives and the global order</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Halper, S.A. and Clarke, J. 2004, America alone: the neo-conservatives and the global order, Cambridge University Press, Cambridge.</note>
<originInfo>
<publisher>Cambridge University Press</publisher>
<place>
<placeTerm type="text">Cambridge</placeTerm>
</place>
</originInfo>
<part>
<date>2004</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref233" displayLabel="bib233">
<name type="personal">
<namePart type="family">HAMILTON</namePart>
<namePart type="given">B.</namePart>
</name>
<titleInfo>
<title>Political thought in sixteenth century Spain: a study of the political ideas of Vitoria, De Soto, Suárez, and Molina</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Hamilton, B. 1963, Political thought in sixteenth century Spain: a study of the political ideas of Vitoria, De Soto, Suárez, and Molina, Clarendon Press, Oxford.</note>
<originInfo>
<publisher>Clarendon Press</publisher>
<place>
<placeTerm type="text">Oxford</placeTerm>
</place>
</originInfo>
<part>
<date>1963</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref234" displayLabel="bib234">
<titleInfo>
<title>Militarism and Family Terrorism: a Critical Feminist Perspective</title>
</titleInfo>
<name type="personal">
<namePart type="family">HAMMER</namePart>
<namePart type="given">R.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>The Review of Education, Pedagogy and Cultural Studies</title>
</titleInfo>
<genre>other</genre>
<part>
<date>2003</date>
<detail type="volume">
<caption>vol.</caption>
<number>25</number>
</detail>
<extent unit="pages">
<start>231</start>
<end>56</end>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref235" displayLabel="bib235">
<titleInfo>
<title>Focus Shifts to Jail Abuse of Women</title>
</titleInfo>
<name type="personal">
<namePart type="family">HARDING</namePart>
<namePart type="given">L.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>Guardian</title>
</titleInfo>
<genre>web</genre>
<part>
<date>2004</date>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref236" displayLabel="bib236">
<titleInfo>
<title>The Other Prisoners</title>
</titleInfo>
<name type="personal">
<namePart type="family">HARDING</namePart>
<namePart type="given">L.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>Guardian</title>
</titleInfo>
<genre>web</genre>
<part>
<date>2004</date>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref237" displayLabel="bib237">
<name type="personal">
<namePart type="family">HARRé</namePart>
<namePart type="given">R.</namePart>
</name>
<titleInfo>
<title>The Social construction of emotions</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Harré, R. 1986, The Social construction of emotions, Basil Blackwell, Oxford.</note>
<originInfo>
<publisher>Basil Blackwell</publisher>
<place>
<placeTerm type="text">Oxford</placeTerm>
</place>
</originInfo>
<part>
<date>1986</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref238" displayLabel="bib238">
<name type="personal">
<namePart type="family">HIBBITTS</namePart>
<namePart type="given">B.</namePart>
</name>
<titleInfo>
<title>US assures Australia that Hicks will not face death penalty in new military trial</title>
</titleInfo>
<genre type="web">web</genre>
<note type="content-in-line">Hibbitts, B. 2006, US assures Australia that Hicks will not face death penalty in new military trial, viewed 7 November 2006 .</note>
<part>
<date>2006</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref239" displayLabel="bib239">
<name type="personal">
<namePart type="family">HILL</namePart>
<namePart type="given">R.</namePart>
</name>
<titleInfo>
<title>Terrorism and the new global security environment, speech at Murdoch University, Perth, 18 May</title>
</titleInfo>
<genre type="web">web</genre>
<note type="content-in-line">Hill, R. 2005, Terrorism and the new global security environment, speech at Murdoch University, Perth, 18 May, viewed 20 February 2007 .</note>
<part>
<date>2005</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref240" displayLabel="bib240">
<name type="personal">
<namePart type="family">HILLS</namePart>
<namePart type="given">A.</namePart>
</name>
<titleInfo>
<title>Future war in cities: rethinking a liberal dilemma</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Hills, A. 2004, Future war in cities: rethinking a liberal dilemma, Frank Cass Publishers, London.</note>
<originInfo>
<publisher>Frank Cass Publishers</publisher>
<place>
<placeTerm type="text">London</placeTerm>
</place>
</originInfo>
<part>
<date>2004</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref241" displayLabel="bib241">
<titleInfo>
<title>Fear and Loathing in Falluja</title>
</titleInfo>
<name type="personal">
<namePart type="family">HILLS</namePart>
<namePart type="given">A.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>Armed Forces and Society</title>
</titleInfo>
<genre>journal</genre>
<part>
<date>2006</date>
<detail type="volume">
<caption>vol.</caption>
<number>32</number>
</detail>
<detail type="issue">
<caption>no.</caption>
<number>4</number>
</detail>
<extent unit="pages">
<start>623</start>
<end>39</end>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref242" displayLabel="bib242">
<titleInfo>
<title>The Liberal Government of Unfreedom</title>
</titleInfo>
<name type="personal">
<namePart type="family">HINDESS</namePart>
<namePart type="given">B.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>Alternatives</title>
</titleInfo>
<genre>journal</genre>
<part>
<date>2001</date>
<detail type="volume">
<caption>vol.</caption>
<number>26</number>
</detail>
<detail type="issue">
<caption>no.</caption>
<number>2</number>
</detail>
<extent unit="pages">
<start>93</start>
<end>111</end>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref243" displayLabel="bib243">
<name type="personal">
<namePart type="family">HOCHSCHILD</namePart>
<namePart type="given">A.R.</namePart>
</name>
<name type="personal">
<namePart type="family">BENDELOW</namePart>
<namePart type="given">G.</namePart>
</name>
<name type="personal">
<namePart type="family">WILLIAMS</namePart>
<namePart type="given">S.J.</namePart>
</name>
<titleInfo>
<title>Emotions in social life: critical themes and contemporary issues</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Hochschild, A.R. 1998, ‘The Sociology of Emotions as a Way of Seeing’, in G. Bendelow and S.J. Williams (eds), Emotions in social life: critical themes and contemporary issues, Routledge, London, pp. 3–15.</note>
<originInfo>
<publisher>Routledge</publisher>
<place>
<placeTerm type="text">London</placeTerm>
</place>
</originInfo>
<part>
<date>1998</date>
<extent unit="pages">
<start>3</start>
<end>15</end>
</extent>
</part>
</relatedItem>
<relatedItem type="references" ID="ref244" displayLabel="bib244">
<titleInfo>
<title>Human Rights and Terrorism</title>
</titleInfo>
<name type="personal">
<namePart type="family">HOFFMAN</namePart>
<namePart type="given">P.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>Human Rights Quarterly</title>
</titleInfo>
<genre>journal</genre>
<part>
<date>2004</date>
<detail type="volume">
<caption>vol.</caption>
<number>26</number>
</detail>
<detail type="issue">
<caption>no.</caption>
<number>4</number>
</detail>
<extent unit="pages">
<start>932</start>
<end>55</end>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref245" displayLabel="bib245">
<name type="personal">
<namePart type="family">HOLMES</namePart>
<namePart type="given">S.</namePart>
</name>
<name type="personal">
<namePart type="family">GAMBETTA</namePart>
<namePart type="given">D.</namePart>
</name>
<titleInfo>
<title>Making sense of suicide missions</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Holmes, S. 2005, ‘Al Qaeda, September 11, 2001’, in D. Gambetta (ed.), Making sense of suicide missions, Oxford University Press, Oxford.</note>
<originInfo>
<publisher>Oxford University Press</publisher>
<place>
<placeTerm type="text">Oxford</placeTerm>
</place>
</originInfo>
<part>
<date>2005</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref246" displayLabel="bib246">
<name type="personal">
<namePart type="family">HOLMES</namePart>
<namePart type="given">S.</namePart>
</name>
<name type="personal">
<namePart type="family">GREENBERG</namePart>
<namePart type="given">K.J.</namePart>
</name>
<titleInfo>
<title>The torture debate in America</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Holmes, S. 2006, ‘Is Defiance of Law a Proof of Success? Magical Thinking in the War on Terror’, in K.J. Greenberg (ed.), The torture debate in America, Cambridge University Press, Cambridge; New York.</note>
<originInfo>
<publisher>Cambridge University Press</publisher>
<place>
<placeTerm type="text">Cambridge; New York</placeTerm>
</place>
</originInfo>
<part>
<date>2006</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref247" displayLabel="bib247">
<name type="personal">
<namePart type="family">HOMES</namePart>
<namePart type="given">S.</namePart>
</name>
<titleInfo>
<title>Passions and constraint: on the theory of liberal democracy</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Homes, S. 1995, Passions and constraint: on the theory of liberal democracy, University of Chicago Press, Chicago, IL.</note>
<originInfo>
<publisher>University of Chicago Press</publisher>
<place>
<placeTerm type="text">Chicago, IL</placeTerm>
</place>
</originInfo>
<part>
<date>1995</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref248" displayLabel="bib248">
<titleInfo>
<title>Temporality, Proximity and Security: Terror in a Media-Drenched Age</title>
</titleInfo>
<name type="personal">
<namePart type="family">HOSKINS</namePart>
<namePart type="given">A.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>International Relations</title>
</titleInfo>
<genre>journal</genre>
<part>
<date>2006</date>
<detail type="volume">
<caption>vol.</caption>
<number>20</number>
</detail>
<detail type="issue">
<caption>no.</caption>
<number>4</number>
</detail>
<extent unit="pages">
<start>453</start>
<end>66</end>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref249" displayLabel="bib249">
<name type="personal">
<namePart type="family">HOVELL</namePart>
<namePart type="given">D.</namePart>
</name>
<titleInfo>
<title>Justice at Guantanamo? The Paradox of David Hicks</title>
</titleInfo>
<genre type="web">web</genre>
<note type="content-in-line">Hovell, D. 2005, Justice at Guantanamo? The Paradox of David Hicks, viewed 7 November 2006 .</note>
<part>
<date>2005</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref250" displayLabel="bib250">
<titleInfo>
<title>Australia in the World</title>
</titleInfo>
<name type="personal">
<namePart type="family">HOWARD</namePart>
<namePart type="given">J.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>Address by the Prime Minister, the Hon John Howard MP to the Lowy Institute for International Policy</title>
</titleInfo>
<genre>web</genre>
<part>
<date>2005</date>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref251" displayLabel="bib251">
<name type="personal">
<namePart type="family">HOWARD</namePart>
<namePart type="given">J.</namePart>
</name>
<titleInfo>
<title>Interview: John Howard</title>
</titleInfo>
<genre type="web">web</genre>
<note type="content-in-line">Howard, J. 2007, Interview: John Howard, Sunday, 11 February, viewed 26 March 2007 .</note>
<part>
<date>2007</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref252" displayLabel="bib252">
<titleInfo>
<title>What’s in a Name? How to Fight Terrorism</title>
</titleInfo>
<name type="personal">
<namePart type="family">HOWARD</namePart>
<namePart type="given">M.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>Foreign Affairs</title>
</titleInfo>
<genre>journal</genre>
<part>
<date>2002</date>
<detail type="volume">
<caption>vol.</caption>
<number>81</number>
</detail>
<detail type="issue">
<caption>no.</caption>
<number>1</number>
</detail>
<extent unit="pages">
<start>8</start>
<end>13</end>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref253" displayLabel="bib253">
<name type="personal">
<namePart type="family">HOWARD</namePart>
<namePart type="given">M.E.</namePart>
</name>
<titleInfo>
<title>War and the liberal conscience</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Howard, M.E. 1978, War and the liberal conscience, Temple Smith, London.</note>
<originInfo>
<publisher>Temple Smith</publisher>
<place>
<placeTerm type="text">London</placeTerm>
</place>
</originInfo>
<part>
<date>1978</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref254" displayLabel="bib254">
<name type="personal">
<namePart type="family">HOWEIDY</namePart>
<namePart type="given">A.</namePart>
</name>
<titleInfo>
<title>Balfour to Bush</title>
</titleInfo>
<genre type="web">web</genre>
<note type="content-in-line">Howeidy, A. 2004, Balfour to Bush, Al-Ahram Weekly, viewed 6 March 2007 .</note>
<originInfo>
<publisher>Al-Ahram Weekly</publisher>
</originInfo>
<part>
<date>2004</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref255" displayLabel="bib255">
<titleInfo>
<title>A Double-Edged Sword: Globalization and Biosecurity</title>
</titleInfo>
<name type="personal">
<namePart type="family">HOYT</namePart>
<namePart type="given">K.</namePart>
</name>
<name type="personal">
<namePart type="family">BROOKS</namePart>
<namePart type="given">S.G.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>International Security</title>
</titleInfo>
<genre>journal</genre>
<part>
<date>2004</date>
<detail type="volume">
<caption>vol.</caption>
<number>28</number>
</detail>
<detail type="issue">
<caption>no.</caption>
<number>3</number>
</detail>
<extent unit="pages">
<start>123</start>
<end>48</end>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref256" displayLabel="bib256">
<titleInfo>
<title>From Terror to Trauma: Commissioning Truth for National Reconciliation</title>
</titleInfo>
<name type="personal">
<namePart type="family">HUMPHREY</namePart>
<namePart type="given">M.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>Social Identities</title>
</titleInfo>
<genre>journal</genre>
<part>
<date>2000</date>
<detail type="volume">
<caption>vol.</caption>
<number>6</number>
</detail>
<detail type="issue">
<caption>no.</caption>
<number>1</number>
</detail>
<extent unit="pages">
<start>7</start>
<end>27</end>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref257" displayLabel="bib257">
<name type="personal">
<namePart type="family">HUMPHREY</namePart>
<namePart type="given">M.</namePart>
</name>
<titleInfo>
<title>The politics of atrocity and reconciliation: from terror to trauma</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Humphrey, M. 2002, The politics of atrocity and reconciliation: from terror to trauma, Routledge, London; New York.</note>
<originInfo>
<publisher>Routledge, London</publisher>
<place>
<placeTerm type="text">New York</placeTerm>
</place>
</originInfo>
</relatedItem>
<relatedItem type="references" ID="ref258" displayLabel="bib258">
<titleInfo>
<title>Legalizing Lawlessness: On Giorgio Agamben’s State of Exception</title>
</titleInfo>
<name type="personal">
<namePart type="family">HUMPHREYS</namePart>
<namePart type="given">S.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>European Journal of International Law</title>
</titleInfo>
<genre>journal</genre>
<part>
<date>2006</date>
<detail type="volume">
<caption>vol.</caption>
<number>17</number>
</detail>
<detail type="issue">
<caption>no.</caption>
<number>3</number>
</detail>
<extent unit="pages">
<start>677</start>
<end>87</end>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref259" displayLabel="bib259">
<titleInfo>
<title>Iraq’s Excluded Women</title>
</titleInfo>
<name type="personal">
<namePart type="family">HUNT</namePart>
<namePart type="given">S.</namePart>
</name>
<name type="personal">
<namePart type="family">POSA</namePart>
<namePart type="given">C.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>Foreign Policy</title>
</titleInfo>
<genre>other</genre>
<part>
<date>2004</date>
<detail type="volume">
<caption>vol.</caption>
<number>143</number>
</detail>
<extent unit="pages">
<start>40</start>
<end>5</end>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref260" displayLabel="bib260">
<name type="personal">
<namePart type="family">HUNTINGTON</namePart>
<namePart type="given">S.P.</namePart>
</name>
<titleInfo>
<title>The clash of civilizations and the remaking of world order</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Huntington, S.P. 1996, The clash of civilizations and the remaking of world order, Simon and Schuster, New York.</note>
<originInfo>
<publisher>Simon and Schuster</publisher>
<place>
<placeTerm type="text">New York</placeTerm>
</place>
</originInfo>
<part>
<date>1996</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref261" displayLabel="bib261">
<titleInfo>
<title>There Are No Rules’ (George W. Bush): International Order after</title>
</titleInfo>
<name type="personal">
<namePart type="family">HURRELL</namePart>
<namePart type="given">A.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>International Relations</title>
</titleInfo>
<genre>journal</genre>
<part>
<date>2002</date>
<detail type="volume">
<caption>vol.</caption>
<number>16</number>
</detail>
<detail type="issue">
<caption>no.</caption>
<number>2</number>
</detail>
<extent unit="pages">
<start>185</start>
<end>204</end>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref262" displayLabel="bib262">
<titleInfo>
<title>ICRC 2005, US detention related to the events of 11 September 2001 and its aftermath – the role of the ICRC, viewed 1 December 2006 .</title>
</titleInfo>
<genre type="web">web</genre>
<note type="content-in-line">ICRC 2005, US detention related to the events of 11 September 2001 and its aftermath – the role of the ICRC, viewed 1 December 2006 .</note>
<part>
<date>2005</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref263" displayLabel="bib263">
<name type="personal">
<namePart type="family">IGNATIEFF</namePart>
<namePart type="given">M.</namePart>
</name>
<titleInfo>
<title>The warrior’s honor: ethnic war and the modern conscience</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Ignatieff, M. 1997, The warrior’s honor: ethnic war and the modern conscience, Metropolitan Books, New York.</note>
<originInfo>
<publisher>Metropolitan Books</publisher>
<place>
<placeTerm type="text">New York</placeTerm>
</place>
</originInfo>
<part>
<date>1997</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref264" displayLabel="bib264">
<name type="personal">
<namePart type="family">IGNATIEFF</namePart>
<namePart type="given">M.</namePart>
</name>
<titleInfo>
<title>Empire lite: nation building in Bosnia, Kosovo and Afghanistan</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Ignatieff, M. 2003, Empire lite: nation building in Bosnia, Kosovo and Afghanistan, Vintage, London.</note>
<originInfo>
<publisher>Vintage</publisher>
<place>
<placeTerm type="text">London</placeTerm>
</place>
</originInfo>
<part>
<date>2003</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref265" displayLabel="bib265">
<name type="personal">
<namePart type="family">IGNATIEFF</namePart>
<namePart type="given">M.</namePart>
</name>
<titleInfo>
<title>The lesser evil: political ethics in an age of terror</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Ignatieff, M. 2004, The lesser evil: political ethics in an age of terror, Edinburgh University Press, Edinburgh.</note>
<originInfo>
<publisher>Edinburgh University Press</publisher>
<place>
<placeTerm type="text">Edinburgh</placeTerm>
</place>
</originInfo>
<part>
<date>2004</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref266" displayLabel="bib266">
<titleInfo>
<title>The End of the Neo-Conservative Moment</title>
</titleInfo>
<name type="personal">
<namePart type="family">IKENBERRY</namePart>
<namePart type="given">J.G.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>Survival</title>
</titleInfo>
<genre>journal</genre>
<part>
<date>2004</date>
<detail type="volume">
<caption>vol.</caption>
<number>46</number>
</detail>
<detail type="issue">
<caption>no.</caption>
<number>1</number>
</detail>
<extent unit="pages">
<start>7</start>
<end>22</end>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref267" displayLabel="bib267">
<titleInfo>
<title>The way forward – a new approach</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Iraq Study Group 2006, The way forward – a new approach, Vintage, New York.</note>
<originInfo>
<publisher>Vintage</publisher>
<place>
<placeTerm type="text">New York</placeTerm>
</place>
</originInfo>
<part>
<date>2006</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref268" displayLabel="bib268">
<titleInfo>
<title>Iraq: focus on increasing domestic violence</title>
</titleInfo>
<genre type="web">web</genre>
<note type="content-in-line">IRIN 2006a, Iraq: focus on increasing domestic violence, IRNInews.org, 24 November, viewed 26 April 2007 .</note>
<part>
<date>2006</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref269" displayLabel="bib269">
<titleInfo>
<title>Iraq: widow numbers rise in wake of violence</title>
</titleInfo>
<genre type="web">web</genre>
<note type="content-in-line">IRIN 2006b, Iraq: widow numbers rise in wake of violence, IRINnews.org, 26 April, viewed 26 April 2007 .</note>
<part>
<date>2006</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref270" displayLabel="bib270">
<titleInfo>
<title>Iraq: lawyers killed for defending cases ‘against Islam’</title>
</titleInfo>
<genre type="web">web</genre>
<note type="content-in-line">IRIN 2006c, Iraq: lawyers killed for defending cases ‘against Islam’, IRINnews. org, 6 November, viewed 25 November 2006 .</note>
<part>
<date>2006</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref271" displayLabel="bib271">
<titleInfo>
<title>Sex traffickers target women in war-torn Iraq</title>
</titleInfo>
<genre type="web">web</genre>
<note type="content-in-line">IRIN 2006d, Sex traffickers target women in war-torn Iraq, electronicIraq.net, 26 October, viewed 26 April 2007 .</note>
<part>
<date>2006</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref272" displayLabel="bib272">
<name type="personal">
<namePart type="family">JACKSON</namePart>
<namePart type="given">R.</namePart>
</name>
<titleInfo>
<title>Writing the war on terrorism: language, politics and counter-terrorism</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Jackson, R. 2005, Writing the war on terrorism: language, politics and counter-terrorism, Manchester University Press, Manchester; New York.</note>
<originInfo>
<publisher>Manchester University Press</publisher>
<place>
<placeTerm type="text">Manchester; New York</placeTerm>
</place>
</originInfo>
<part>
<date>2005</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref273" displayLabel="bib273">
<titleInfo>
<title>Expression of Mouse Interleukin-4 by a Recombinant Ectromelia Virus Suppresses Cytolytic Lymphocyte Responses and Overcomes Genetic Resistance to Mousepox</title>
</titleInfo>
<name type="personal">
<namePart type="family">JACKSON</namePart>
<namePart type="given">R.J.</namePart>
</name>
<name type="personal">
<namePart type="family">RAMSAY</namePart>
<namePart type="given">A.J.</namePart>
</name>
<name type="personal">
<namePart type="family">CHRISTENSEN</namePart>
<namePart type="given">C.D.</namePart>
</name>
<name type="personal">
<namePart type="family">BEATON</namePart>
<namePart type="given">S.</namePart>
</name>
<name type="personal">
<namePart type="family">HALL</namePart>
<namePart type="given">D.F.</namePart>
</name>
<name type="personal">
<namePart type="family">RAMSHAW</namePart>
<namePart type="given">I.A.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>Journal of Virology</title>
</titleInfo>
<genre>journal</genre>
<part>
<date>2001</date>
<detail type="volume">
<caption>vol.</caption>
<number>75</number>
</detail>
<detail type="issue">
<caption>no.</caption>
<number>3</number>
</detail>
<extent unit="pages">
<start>1205</start>
<end>10</end>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref274" displayLabel="bib274">
<name type="personal">
<namePart type="family">JAGGAR</namePart>
<namePart type="given">A.M.</namePart>
</name>
<name type="personal">
<namePart type="family">BORDO</namePart>
<namePart type="given">S.</namePart>
</name>
<name type="personal">
<namePart type="family">JAGGAR</namePart>
<namePart type="given">A.M.</namePart>
</name>
<titleInfo>
<title>Gender/body/knowledge: feminist reconstructions of being and knowing</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Jaggar, A.M. 1989, ‘Love and Knowledge: Emotion in Feminist Epistemology’, in S. Bordo and A.M. Jaggar (eds), Gender/body/knowledge: feminist reconstructions of being and knowing, Rutgers University Press, New Brunswick, NJ, pp. 145–71.</note>
<originInfo>
<publisher>Rutgers University Press</publisher>
<place>
<placeTerm type="text">New Brunswick, NJ</placeTerm>
</place>
</originInfo>
<part>
<date>1989</date>
<extent unit="pages">
<start>145</start>
<end>71</end>
</extent>
</part>
</relatedItem>
<relatedItem type="references" ID="ref275" displayLabel="bib275">
<titleInfo>
<title>Anti-bioterror Labs Raise Risk to US, Critics Say</title>
</titleInfo>
<name type="personal">
<namePart type="family">JAMES</namePart>
<namePart type="given">F.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>Chicago Tribune</title>
</titleInfo>
<genre>other</genre>
<part>
<date>2004</date>
<extent unit="pages">
<start>9</start>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref276" displayLabel="bib276">
<titleInfo>
<title>Torture: An Unwarranted Case</title>
</titleInfo>
<name type="personal">
<namePart type="family">JAMES</namePart>
<namePart type="given">N.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>Defender</title>
</titleInfo>
<genre>journal</genre>
<part>
<date>2005</date>
<detail type="volume">
<caption>vol.</caption>
<number>22</number>
</detail>
<detail type="issue">
<caption>no.</caption>
<number>2</number>
</detail>
<extent unit="pages">
<start>25</start>
<end>7</end>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref277" displayLabel="bib277">
<name type="personal">
<namePart type="family">JAMIESON</namePart>
<namePart type="given">K.H.</namePart>
</name>
<titleInfo>
<title>Dirty politics: deception, distraction, and democracy</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Jamieson, K.H. 1992, Dirty politics: deception, distraction, and democracy, Oxford University Press, New York.</note>
<originInfo>
<publisher>Oxford University Press</publisher>
<place>
<placeTerm type="text">New York</placeTerm>
</place>
</originInfo>
<part>
<date>1992</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref278" displayLabel="bib278">
<name type="personal">
<namePart type="family">JELENIEWSKI SEIDLER</namePart>
<namePart type="given">V.</namePart>
</name>
<name type="personal">
<namePart type="family">BENDELOW</namePart>
<namePart type="given">G.</namePart>
</name>
<name type="personal">
<namePart type="family">WILLIAMS</namePart>
<namePart type="given">S.J.</namePart>
</name>
<titleInfo>
<title>Emotions in social life: critical themes and contemporary issues</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Jeleniewski Seidler, V. 1998, ‘Masculinity, Violence and Emotional Life’, in G. Bendelow and S.J. Williams (eds), Emotions in social life: critical themes and contemporary issues, Routledge, London; New York, pp. 193–210.</note>
<originInfo>
<publisher>Routledge</publisher>
<place>
<placeTerm type="text">London; New York</placeTerm>
</place>
</originInfo>
<part>
<date>1998</date>
<extent unit="pages">
<start>193</start>
<end>210</end>
</extent>
</part>
</relatedItem>
<relatedItem type="references" ID="ref279" displayLabel="bib279">
<titleInfo>
<title>Guantanamo Bay and the Annihilation of the Exception</title>
</titleInfo>
<name type="personal">
<namePart type="family">JOHNS</namePart>
<namePart type="given">F.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>European Journal of International Law</title>
</titleInfo>
<genre>journal</genre>
<part>
<date>2005</date>
<detail type="volume">
<caption>vol.</caption>
<number>16</number>
</detail>
<detail type="issue">
<caption>no.</caption>
<number>4</number>
</detail>
<extent unit="pages">
<start>613</start>
<end>35</end>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref280" displayLabel="bib280">
<titleInfo>
<title>Blacklisting: Initial Results, Responses and Repercussions</title>
</titleInfo>
<name type="personal">
<namePart type="family">JOHNSON</namePart>
<namePart type="given">J.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>Journal of Money Laundering Control</title>
</titleInfo>
<genre>journal</genre>
<part>
<date>2001</date>
<detail type="volume">
<caption>vol.</caption>
<number>4</number>
</detail>
<detail type="issue">
<caption>no.</caption>
<number>2</number>
</detail>
<extent unit="pages">
<start>211</start>
<end>25</end>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref281" displayLabel="bib281">
<name type="personal">
<namePart type="family">JOHNSON</namePart>
<namePart type="given">J.T.</namePart>
</name>
<titleInfo>
<title>Ideology, reason, and the limitation of war: religious and secular concepts, 1200–1740</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Johnson, J.T. 1975, Ideology, reason, and the limitation of war: religious and secular concepts, 1200–1740, Princeton University Press, Princeton, NJ.</note>
<originInfo>
<publisher>Princeton University Press</publisher>
<place>
<placeTerm type="text">Princeton, NJ</placeTerm>
</place>
</originInfo>
<part>
<date>1975</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref282" displayLabel="bib282">
<name type="personal">
<namePart type="family">JOHNSON</namePart>
<namePart type="given">J.T.</namePart>
</name>
<titleInfo>
<title>Just war tradition and the restraint of war: a moral and historical inquiry</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Johnson, J.T. 1981, Just war tradition and the restraint of war: a moral and historical inquiry, Princeton University Press, Princeton, NJ.</note>
<originInfo>
<publisher>Princeton University Press</publisher>
<place>
<placeTerm type="text">Princeton, NJ</placeTerm>
</place>
</originInfo>
<part>
<date>1981</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref283" displayLabel="bib283">
<titleInfo>
<title>The Broken Tradition</title>
</titleInfo>
<name type="personal">
<namePart type="family">JOHNSON</namePart>
<namePart type="given">J.T.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>The National Interest</title>
</titleInfo>
<genre>other</genre>
<part>
<date>1996</date>
<detail type="volume">
<caption>vol.</caption>
<number>45</number>
</detail>
<extent unit="pages">
<start>27</start>
<end>37</end>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref284" displayLabel="bib284">
<name type="personal">
<namePart type="family">JOHNSON</namePart>
<namePart type="given">J.T.</namePart>
</name>
<titleInfo>
<title>Morality and contemporary warfare</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Johnson, J.T. 1999, Morality and contemporary warfare, Yale University Press, New Haven, CT.</note>
<originInfo>
<publisher>Yale University Press</publisher>
<place>
<placeTerm type="text">New Haven, CT</placeTerm>
</place>
</originInfo>
<part>
<date>1999</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref285" displayLabel="bib285">
<name type="personal">
<namePart type="family">JOHNSON</namePart>
<namePart type="given">J.T.</namePart>
</name>
<titleInfo>
<title>The war to oust Saddam Hussein: just war and the face of new conflict</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Johnson, J.T. 2005, The war to oust Saddam Hussein: just war and the face of new conflict, Rowman and Littlefield, Lanham, MD.</note>
<originInfo>
<publisher>Rowman and Littlefield</publisher>
<place>
<placeTerm type="text">Lanham, MD</placeTerm>
</place>
</originInfo>
<part>
<date>2005</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref286" displayLabel="bib286">
<titleInfo>
<title>Humanitarian Intervention after Iraq: Just War and International Law Perspectives</title>
</titleInfo>
<name type="personal">
<namePart type="family">JOHNSON</namePart>
<namePart type="given">J.T.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>Journal of Military Ethics</title>
</titleInfo>
<genre>journal</genre>
<part>
<date>2006</date>
<detail type="volume">
<caption>vol.</caption>
<number>5</number>
</detail>
<detail type="issue">
<caption>no.</caption>
<number>2</number>
</detail>
<extent unit="pages">
<start>114</start>
<end>27</end>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref287" displayLabel="bib287">
<titleInfo>
<title>US–UN Relations after Iraq: The End of the World (Order) as We Know It?</title>
</titleInfo>
<name type="personal">
<namePart type="family">JOHNSTONE</namePart>
<namePart type="given">I.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>European Journal of International Law</title>
</titleInfo>
<genre>journal</genre>
<part>
<date>2004</date>
<detail type="volume">
<caption>vol.</caption>
<number>15</number>
</detail>
<detail type="issue">
<caption>no.</caption>
<number>4</number>
</detail>
<extent unit="pages">
<start>813</start>
<end>38</end>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref288" displayLabel="bib288">
<name type="personal">
<namePart type="family">JONES</namePart>
<namePart type="given">R.V.</namePart>
</name>
<titleInfo>
<title>Reflections on intelligence</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Jones, R.V. 1989, Reflections on intelligence, Heinemann, London.</note>
<originInfo>
<publisher>Heinemann</publisher>
<place>
<placeTerm type="text">London</placeTerm>
</place>
</originInfo>
<part>
<date>1989</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref289" displayLabel="bib289">
<name type="personal">
<namePart type="family">JONES</namePart>
<namePart type="given">R.V.</namePart>
</name>
<titleInfo>
<title>Some Lessons in Intelligence, Studies in Intelligence</title>
</titleInfo>
<genre type="web">web</genre>
<note type="content-in-line">Jones, R.V. 1995, Some Lessons in Intelligence, Studies in Intelligence, viewed 15 March 2007 .</note>
<part>
<date>1995</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref290" displayLabel="bib290">
<titleInfo>
<title>Averting Failure in Afghanistan</title>
</titleInfo>
<name type="personal">
<namePart type="family">JONES</namePart>
<namePart type="given">S.G.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>Survival</title>
</titleInfo>
<genre>journal</genre>
<part>
<date>2006</date>
<detail type="volume">
<caption>vol.</caption>
<number>48</number>
</detail>
<detail type="issue">
<caption>no.</caption>
<number>1</number>
</detail>
<extent unit="pages">
<start>111</start>
<end>27</end>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref291" displayLabel="bib291">
<name type="personal">
<namePart type="family">KAGAN</namePart>
<namePart type="given">R.</namePart>
</name>
<titleInfo>
<title>Of paradise and power: America and Europe in the new world order, 1st Vintage Books with a new afterword</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Kagan, R. 2003, Of paradise and power: America and Europe in the new world order, 1st Vintage Books with a new afterword, Atlantic Books, London.</note>
<originInfo>
<publisher>Atlantic Books</publisher>
<place>
<placeTerm type="text">London</placeTerm>
</place>
</originInfo>
<part>
<date>2003</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref292" displayLabel="bib292">
<titleInfo>
<title>Citizens Sue to Block Montana Biodefense Lab</title>
</titleInfo>
<name type="personal">
<namePart type="family">KAISER</namePart>
<namePart type="given">J.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>Science</title>
</titleInfo>
<genre>journal</genre>
<part>
<date>2004</date>
<detail type="volume">
<caption>vol.</caption>
<number>305</number>
</detail>
<detail type="issue">
<caption>no.</caption>
<number>5687</number>
</detail>
<extent unit="pages">
<start>1088</start>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref293" displayLabel="bib293">
<name type="personal">
<namePart type="family">KALDOR</namePart>
<namePart type="given">M.</namePart>
</name>
<titleInfo>
<title>New and old wars: organized violence in a global age, reprinted with a new afterword</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Kaldor, M. 1999, New and old wars: organized violence in a global age, reprinted with a new afterword, Polity Press, Cambridge.</note>
<originInfo>
<publisher>Polity Press</publisher>
<place>
<placeTerm type="text">Cambridge</placeTerm>
</place>
</originInfo>
<part>
<date>1999</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref294" displayLabel="bib294">
<name type="personal">
<namePart type="family">KALDOR</namePart>
<namePart type="given">M.</namePart>
</name>
<titleInfo>
<title>Global civil society: an answer to war</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Kaldor, M. 2003, Global civil society: an answer to war, Polity Press, Cambridge.</note>
<originInfo>
<publisher>Polity Press</publisher>
<place>
<placeTerm type="text">Cambridge</placeTerm>
</place>
</originInfo>
<part>
<date>2003</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref295" displayLabel="bib295">
<name type="personal">
<namePart type="family">KALDOR</namePart>
<namePart type="given">M.</namePart>
</name>
<titleInfo>
<title>New and old wars: organized violence in a global era</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Kaldor, M. 2006, New and old wars: organized violence in a global era, 2nd edn, Polity Press, Cambridge.</note>
<originInfo>
<edition>2nd</edition>
<publisher>Polity Press</publisher>
<place>
<placeTerm type="text">Cambridge</placeTerm>
</place>
</originInfo>
<part>
<date>2006</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref296" displayLabel="bib296">
<titleInfo>
<title>Where is Guantanamo?</title>
</titleInfo>
<name type="personal">
<namePart type="family">KAPLAN</namePart>
<namePart type="given">A.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>American Quarterly</title>
</titleInfo>
<genre>journal</genre>
<part>
<date>2005</date>
<detail type="volume">
<caption>vol.</caption>
<number>57</number>
</detail>
<detail type="issue">
<caption>no.</caption>
<number>3</number>
</detail>
<extent unit="pages">
<start>831</start>
<end>58</end>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref297" displayLabel="bib297">
<name type="personal">
<namePart type="family">KAROUBI</namePart>
<namePart type="given">M.T.</namePart>
</name>
<titleInfo>
<title>Just or unjust war?: international law and unilateral use of armed force by states at the turn of the 20th century</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Karoubi, M.T. 2004, Just or unjust war?: international law and unilateral use of armed force by states at the turn of the 20th century, Ashgate, Aldershot; Burlington, VT.</note>
<originInfo>
<publisher>Ashgate</publisher>
<place>
<placeTerm type="text">Aldershot; Burlington, VT</placeTerm>
</place>
</originInfo>
<part>
<date>2004</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref298" displayLabel="bib298">
<titleInfo>
<title>Bush sets defense as space priority</title>
</titleInfo>
<name type="personal">
<namePart type="family">KAUFMAN</namePart>
<namePart type="given">M.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>The Washington Post</title>
</titleInfo>
<genre>other</genre>
<part>
<date>2006</date>
<extent unit="pages">
<start>A01</start>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref299" displayLabel="bib299">
<titleInfo>
<title>What’s Wrong with Preventive War? The Moral and Legal Basis for the Preventive Use of Force</title>
</titleInfo>
<name type="personal">
<namePart type="family">KAUFMAN</namePart>
<namePart type="given">W.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>Ethics and International Affairs</title>
</titleInfo>
<genre>journal</genre>
<part>
<date>2005</date>
<detail type="volume">
<caption>vol.</caption>
<number>19</number>
</detail>
<detail type="issue">
<caption>no.</caption>
<number>3</number>
</detail>
<extent unit="pages">
<start>23</start>
<end>38</end>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref300" displayLabel="bib300">
<titleInfo>
<title>To Speak in a Language that Needs no Translation</title>
</titleInfo>
<name type="personal">
<namePart type="family">KEENAN</namePart>
<namePart type="given">T.</namePart>
</name>
<titleInfo>
<title>Keenan, T. 2004, ‘To Speak in a Language that Needs no Translation’, unpublished paper.</title>
</titleInfo>
<genre type="other">other</genre>
<note type="content-in-line">Keenan, T. 2004, ‘To Speak in a Language that Needs no Translation’, unpublished paper.</note>
<part>
<date>2004</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref301" displayLabel="bib301">
<name type="personal">
<namePart type="family">KEENE</namePart>
<namePart type="given">E.</namePart>
</name>
<titleInfo>
<title>Beyond the anarchical society: Grotius, colonialism and order in world politics</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Keene, E. 2002, Beyond the anarchical society: Grotius, colonialism and order in world politics, Cambridge University Press, Cambridge; New York.</note>
<originInfo>
<publisher>Cambridge University Press</publisher>
<place>
<placeTerm type="text">Cambridge; New York</placeTerm>
</place>
</originInfo>
<part>
<date>2002</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref302" displayLabel="bib302">
<titleInfo>
<title>Mixing Bugs and Bombs</title>
</titleInfo>
<name type="personal">
<namePart type="family">KELLEY</namePart>
<namePart type="given">M.</namePart>
</name>
<name type="personal">
<namePart type="family">COGHLAN</namePart>
<namePart type="given">J.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>Bulletin of the Atomic Scientists</title>
</titleInfo>
<genre>journal</genre>
<part>
<date>2003</date>
<detail type="volume">
<caption>vol.</caption>
<number>59</number>
</detail>
<detail type="issue">
<caption>no.</caption>
<number>5</number>
</detail>
<extent unit="pages">
<start>24</start>
<end>31</end>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref303" displayLabel="bib303">
<name type="personal">
<namePart type="family">KELLOGG</namePart>
<namePart type="given">F.B.</namePart>
</name>
<titleInfo>
<title>Proceedings of the American Society of International Law</title>
</titleInfo>
<genre type="conf-proc">conf-proc</genre>
<note type="content-in-line">Kellogg, F.B. 1928, ‘Address of the Hon. Frank B. Kellogg, 28 April 1928’, Proceedings of the American Society of International Law, vol. 22, pp. 141–3.</note>
<part>
<date>1928</date>
<detail type="volume">
<caption>vol.</caption>
<number>22</number>
</detail>
<extent unit="pages">
<start>141</start>
<end>3</end>
</extent>
</part>
</relatedItem>
<relatedItem type="references" ID="ref304" displayLabel="bib304">
<titleInfo>
<title>Collective Security and Collective Self-Defense Under the Charter</title>
</titleInfo>
<name type="personal">
<namePart type="family">KELSEN</namePart>
<namePart type="given">H.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>American Journal of International Law</title>
</titleInfo>
<genre>other</genre>
<part>
<date>1948</date>
<detail type="volume">
<caption>vol.</caption>
<number>42</number>
</detail>
<detail type="issue">
<caption>no.</caption>
<number>3</number>
</detail>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref305" displayLabel="bib305">
<name type="personal">
<namePart type="family">KILCULLEN</namePart>
<namePart type="given">D.</namePart>
</name>
<titleInfo>
<title>Redux’, Survival</title>
</titleInfo>
<genre type="other">other</genre>
<note type="content-in-line">Kilcullen, D. 2006, ‘Counter-insurgency Redux’, Survival, vol. 48, no. 4, pp. 111–30.</note>
<part>
<date>2006</date>
<detail type="volume">
<caption>vol.</caption>
<number>48</number>
</detail>
<extent unit="pages">
<start>111</start>
<end>30</end>
</extent>
</part>
</relatedItem>
<relatedItem type="references" ID="ref306" displayLabel="bib306">
<name type="personal">
<namePart type="family">KISSINGER</namePart>
<namePart type="given">H.A.</namePart>
</name>
<titleInfo>
<title>National Security Decision Memorandum (NSDM) 35, United States Policy on Chemical Warfare Program and Bacteriological/Biological Research Program, from National Security Advisor Henry A Kissinger to the Vice President, the Secretary of State, the Secretary of Defense, etc., George Washington University National Security Archive Online</title>
</titleInfo>
<genre type="web">web</genre>
<note type="content-in-line">Kissinger, H.A. 1969, National Security Decision Memorandum (NSDM) 35, United States Policy on Chemical Warfare Program and Bacteriological/Biological Research Program, from National Security Advisor Henry A Kissinger to the Vice President, the Secretary of State, the Secretary of Defense, etc., George Washington University National Security Archive Online, viewed 27 May 2005 .</note>
<part>
<date>1969</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref307" displayLabel="bib307">
<titleInfo>
<title>Comprehending “Evil”: Challenges for Law and Policy</title>
</titleInfo>
<name type="personal">
<namePart type="family">KLUSMEYER</namePart>
<namePart type="given">D.</namePart>
</name>
<name type="personal">
<namePart type="family">SUHRKE</namePart>
<namePart type="given">A.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>Ethics and International Affairs</title>
</titleInfo>
<genre>journal</genre>
<part>
<date>2002</date>
<detail type="volume">
<caption>vol.</caption>
<number>16</number>
</detail>
<detail type="issue">
<caption>no.</caption>
<number>1</number>
</detail>
<extent unit="pages">
<start>27</start>
<end>42</end>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref308" displayLabel="bib308">
<name type="personal">
<namePart type="family">KOH</namePart>
<namePart type="given">H.H.</namePart>
</name>
<name type="personal">
<namePart type="family">IGNATIEFF</namePart>
<namePart type="given">M.</namePart>
</name>
<titleInfo>
<title>American exceptionalism and human rights</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Koh, H.H. 2005, ‘America’s Jekyll-and-Hyde Exceptionalism’, in M. Ignatieff (ed.), American exceptionalism and human rights, Princeton University Press, New Jersey, pp. 111–43.</note>
<originInfo>
<publisher>Princeton University Press</publisher>
<place>
<placeTerm type="text">New Jersey</placeTerm>
</place>
</originInfo>
<part>
<date>2005</date>
<extent unit="pages">
<start>111</start>
<end>43</end>
</extent>
</part>
</relatedItem>
<relatedItem type="references" ID="ref309" displayLabel="bib309">
<name type="personal">
<namePart type="family">KOMP</namePart>
<namePart type="given">C.</namePart>
</name>
<titleInfo>
<title>Domestic abuse in military families growing ‘systemic’, The New Standard</title>
</titleInfo>
<genre type="web">web</genre>
<note type="content-in-line">Komp, C. 2006, Domestic abuse in military families growing ‘systemic’, The New Standard, 6 June, viewed 26 April 2007 .</note>
<part>
<date>2006</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref310" displayLabel="bib310">
<name type="personal">
<namePart type="family">KORCH</namePart>
<namePart type="given">G.</namePart>
</name>
<titleInfo>
<title>Leading edge of biodefense: The National Biodefense Analysis and Countermeasures Center, Lecture to the Department of Defense Pest Management Workshop, Jacksonville Naval Air Station, Bioweapons and Biodefense Freedom of Information Fund Online</title>
</titleInfo>
<genre type="web">web</genre>
<note type="content-in-line">Korch, G. 2004, Leading edge of biodefense: The National Biodefense Analysis and Countermeasures Center, Lecture to the Department of Defense Pest Management Workshop, Jacksonville Naval Air Station, Bioweapons and Biodefense Freedom of Information Fund Online, viewed 26 May 2005 .</note>
<part>
<date>2004</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref311" displayLabel="bib311">
<name type="personal">
<namePart type="family">KOSKENNIEMI</namePart>
<namePart type="given">M.</namePart>
</name>
<titleInfo>
<title>From apology to Utopia: the structure of international legal argument</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Koskenniemi, M. 2005, From apology to Utopia: the structure of international legal argument, 2nd edn, Cambridge University Press, Cambridge.</note>
<originInfo>
<edition>2nd</edition>
<publisher>Cambridge University Press</publisher>
<place>
<placeTerm type="text">Cambridge</placeTerm>
</place>
</originInfo>
<part>
<date>2005</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref312" displayLabel="bib312">
<titleInfo>
<title>Global Anti-Money Laundering Survey 2004: how banks are facing up to the challenge</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">KPMG 2004, Global Anti-Money Laundering Survey 2004: how banks are facing up to the challenge, KPMG International.</note>
<originInfo>
<place>
<placeTerm type="text">KPMG International</placeTerm>
</place>
</originInfo>
<part>
<date>2004</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref313" displayLabel="bib313">
<titleInfo>
<title>Addressing State Failure</title>
</titleInfo>
<name type="personal">
<namePart type="family">KRASNER</namePart>
<namePart type="given">S.D.</namePart>
</name>
<name type="personal">
<namePart type="family">PASCUAL</namePart>
<namePart type="given">C.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>Foreign Affairs</title>
</titleInfo>
<genre>journal</genre>
<part>
<date>2005</date>
<detail type="volume">
<caption>vol.</caption>
<number>84</number>
</detail>
<detail type="issue">
<caption>no.</caption>
<number>4</number>
</detail>
<extent unit="pages">
<start>153</start>
<end>63</end>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref314" displayLabel="bib314">
<titleInfo>
<title>Broadening the Agenda of Security Studies: Politics and Methods</title>
</titleInfo>
<name type="personal">
<namePart type="family">KRAUSE</namePart>
<namePart type="given">K.</namePart>
</name>
<name type="personal">
<namePart type="family">WILLIAMS</namePart>
<namePart type="given">M.C.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>Mershon International Studies Review</title>
</titleInfo>
<genre>journal</genre>
<part>
<date>1996</date>
<detail type="volume">
<caption>vol.</caption>
<number>40</number>
</detail>
<detail type="issue">
<caption>no.</caption>
<number>2</number>
</detail>
<extent unit="pages">
<start>229</start>
<end>54</end>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref315" displayLabel="bib315">
<titleInfo>
<title>War Propaganda and the (Ab)uses of Women, Media Constructions of the Jessica Lynch story</title>
</titleInfo>
<name type="personal">
<namePart type="family">KUMAR</namePart>
<namePart type="given">D.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>Feminist Media Studies</title>
</titleInfo>
<genre>journal</genre>
<part>
<date>2004</date>
<detail type="volume">
<caption>vol.</caption>
<number>4</number>
</detail>
<detail type="issue">
<caption>no.</caption>
<number>3</number>
</detail>
<extent unit="pages">
<start>297</start>
<end>313</end>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref316" displayLabel="bib316">
<titleInfo>
<title>Individual and Collective Self-Defence in Article 51 of the Charter of the United Nations</title>
</titleInfo>
<name type="personal">
<namePart type="family">KUNZ</namePart>
<namePart type="given">J.L.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>American Journal of International Law</title>
</titleInfo>
<genre>journal</genre>
<part>
<date>1947</date>
<detail type="volume">
<caption>vol.</caption>
<number>41</number>
</detail>
<detail type="issue">
<caption>no.</caption>
<number>4</number>
</detail>
<extent unit="pages">
<start>872</start>
<end>9</end>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref317" displayLabel="bib317">
<titleInfo>
<title>The Bush Doctrine</title>
</titleInfo>
<name type="personal">
<namePart type="family">LAFEBER</namePart>
<namePart type="given">W.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>Diplomatic History</title>
</titleInfo>
<genre>journal</genre>
<part>
<date>2002</date>
<detail type="volume">
<caption>vol.</caption>
<number>26</number>
</detail>
<detail type="issue">
<caption>no.</caption>
<number>4</number>
</detail>
<extent unit="pages">
<start>543</start>
<end>58</end>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref318" displayLabel="bib318">
<titleInfo>
<title>Billions for Biodefense: Federal Agency Biodefense Funding, FY2006-FY2007</title>
</titleInfo>
<name type="personal">
<namePart type="family">LAM</namePart>
<namePart type="given">C.</namePart>
</name>
<name type="personal">
<namePart type="family">FRANCO</namePart>
<namePart type="given">C.</namePart>
</name>
<name type="personal">
<namePart type="family">SCHULER</namePart>
<namePart type="given">A.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>Biosecurity and Bioterrorism</title>
</titleInfo>
<genre>journal</genre>
<part>
<date>2006</date>
<detail type="volume">
<caption>vol.</caption>
<number>4</number>
</detail>
<detail type="issue">
<caption>no.</caption>
<number>2</number>
</detail>
<extent unit="pages">
<start>113</start>
<end>27</end>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref319" displayLabel="bib319">
<name type="personal">
<namePart type="family">LANG</namePart>
<namePart type="given">A.F.</namePart>
</name>
<titleInfo>
<title>‘The Illegality of Punishing States – from Grotius to the ILC’</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Lang, A.F. 2004, ‘The Illegality of Punishing States – from Grotius to the ILC’, paper presented to International Studies Association, Montreal.</note>
<originInfo>
<publisher>paper presented to International Studies Association</publisher>
<place>
<placeTerm type="text">Montreal</placeTerm>
</place>
</originInfo>
<part>
<date>2004</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref320" displayLabel="bib320">
<name type="personal">
<namePart type="family">LASKY</namePart>
<namePart type="given">M.P.</namePart>
</name>
<titleInfo>
<title>Iraq women under siege, Cope Pink/Global Exchange</title>
</titleInfo>
<genre type="web">web</genre>
<note type="content-in-line">Lasky, M.P. 2006, Iraq women under siege, Cope Pink/Global Exchange, viewed 26 April 2007 .</note>
<part>
<date>2006</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref321" displayLabel="bib321">
<name type="personal">
<namePart type="family">LAWRENCE</namePart>
<namePart type="given">B.</namePart>
</name>
<titleInfo>
<title>Message to the world: the statements of Osama Bin Laden</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Lawrence, B. 2005, Message to the world: the statements of Osama Bin Laden, Verso, London; New York.</note>
<originInfo>
<publisher>Verso</publisher>
<place>
<placeTerm type="text">London; New York</placeTerm>
</place>
</originInfo>
<part>
<date>2005</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref322" displayLabel="bib322">
<name type="personal">
<namePart type="family">LEIGHTON</namePart>
<namePart type="given">S.R.</namePart>
</name>
<titleInfo>
<title>Philosophy and the emotions: a reader</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Leighton, S.R. 2003, Philosophy and the emotions: a reader, Broadview Press, Peterborough, Ont.</note>
<originInfo>
<publisher>Broadview Press</publisher>
<place>
<placeTerm type="text">Peterborough, Ont</placeTerm>
</place>
</originInfo>
<part>
<date>2003</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref323" displayLabel="bib323">
<titleInfo>
<title>Distinguishing Offensive From Defensive Biological Weapons Research</title>
</titleInfo>
<name type="personal">
<namePart type="family">LEITENBERG</namePart>
<namePart type="given">M.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>Critical Reviews in Microbiology</title>
</titleInfo>
<genre>journal</genre>
<part>
<date>2003</date>
<detail type="volume">
<caption>vol.</caption>
<number>29</number>
</detail>
<detail type="issue">
<caption>no.</caption>
<number>3</number>
</detail>
<extent unit="pages">
<start>223</start>
<end>57</end>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref324" displayLabel="bib324">
<titleInfo>
<title>Combating Terrorism: The Consequences of Moving from Law Enforcement to War</title>
</titleInfo>
<name type="personal">
<namePart type="family">LEITZAU</namePart>
<namePart type="given">W.</namePart>
</name>
<name type="personal">
<namePart type="family">WIPPMAN</namePart>
<namePart type="given">D.</namePart>
</name>
<name type="personal">
<namePart type="family">EVANGELISTA</namePart>
<namePart type="given">M.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>New wars, new laws?: applying the laws of war in 21st century conflicts, Transnational Publishers, Ardley</title>
</titleInfo>
<genre>other</genre>
<originInfo>
<place>
<placeTerm type="text">NY</placeTerm>
</place>
</originInfo>
<part>
<date>2005</date>
<extent unit="pages">
<start>31</start>
<end>52</end>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref325" displayLabel="bib325">
<titleInfo>
<title>An Open Letter to Elias Zerhouni (multiple authors)</title>
</titleInfo>
<relatedItem type="host">
<titleInfo>
<title>Science</title>
</titleInfo>
<genre>journal</genre>
<part>
<date>2005</date>
<detail type="volume">
<caption>vol.</caption>
<number>307</number>
</detail>
<detail type="issue">
<caption>no.</caption>
<number>5714</number>
</detail>
<extent unit="pages">
<start>1409</start>
<end>10</end>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref326" displayLabel="bib326">
<titleInfo>
<title>Terrorist Finance, Money Laundering and the Rise and Rise of Mutual Evaluation: A New Paradigm for Crime Control</title>
</titleInfo>
<name type="personal">
<namePart type="family">LEVI</namePart>
<namePart type="given">M.</namePart>
</name>
<name type="personal">
<namePart type="family">GILMORE</namePart>
<namePart type="given">W.C.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>European Journal of Law Reform</title>
</titleInfo>
<genre>journal</genre>
<part>
<date>2002</date>
<detail type="volume">
<caption>vol.</caption>
<number>4</number>
</detail>
<detail type="issue">
<caption>no.</caption>
<number>2</number>
</detail>
<extent unit="pages">
<start>337</start>
<end>64</end>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref327" displayLabel="bib327">
<name type="personal">
<namePart type="family">LEVINAS</namePart>
<namePart type="given">E.</namePart>
</name>
<titleInfo>
<title>Totality and infinity: an essay on exteriority</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Levinas, E. 1969, Totality and infinity: an essay on exteriority, Duquesne University Press The Hague; M. Nijhoff, Pittsburgh, PA.</note>
<originInfo>
<publisher>Duquesne University Press</publisher>
<place>
<placeTerm type="text">Hague; M. Nijhoff, Pittsburgh, PA</placeTerm>
</place>
</originInfo>
<part>
<date>1969</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref328" displayLabel="bib328">
<name type="personal">
<namePart type="family">LEVINAS</namePart>
<namePart type="given">E.</namePart>
</name>
<titleInfo>
<title>Time and the other [and additional essays]</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Levinas, E. 1987, Time and the other [and additional essays], Duquesne University Press, Pittsburgh, PA.</note>
<originInfo>
<publisher>Duquesne University Press</publisher>
<place>
<placeTerm type="text">Pittsburgh, PA</placeTerm>
</place>
</originInfo>
<part>
<date>1987</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref329" displayLabel="bib329">
<name type="personal">
<namePart type="family">LEVINAS</namePart>
<namePart type="given">E.</namePart>
</name>
<name type="personal">
<namePart type="family">PEPERZAK</namePart>
<namePart type="given">A.T.</namePart>
</name>
<name type="personal">
<namePart type="family">CRITCHLEY</namePart>
<namePart type="given">S.</namePart>
</name>
<name type="personal">
<namePart type="family">BERNASCONI</namePart>
<namePart type="given">R.</namePart>
</name>
<titleInfo>
<title>Emmanuel Levinas: basic philosophical writings</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Levinas, E. 1996, ‘Peace and Proximity’, in A.T. Peperzak, S. Critchley and R. Bernasconi (eds), Emmanuel Levinas: basic philosophical writings, Indiana University Press, Bloomington, IN.</note>
<originInfo>
<publisher>Indiana University Press</publisher>
<place>
<placeTerm type="text">Bloomington, IN</placeTerm>
</place>
</originInfo>
<part>
<date>1996</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref330" displayLabel="bib330">
<titleInfo>
<title>Preserving Constitutional Norms in Times of Permanent Emergencies</title>
</titleInfo>
<name type="personal">
<namePart type="family">LEVINSON</namePart>
<namePart type="given">S.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>Constellations</title>
</titleInfo>
<genre>journal</genre>
<part>
<date>2006</date>
<detail type="volume">
<caption>vol.</caption>
<number>13</number>
</detail>
<detail type="issue">
<caption>no.</caption>
<number>1</number>
</detail>
<extent unit="pages">
<start>59</start>
<end>73</end>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref331" displayLabel="bib331">
<titleInfo>
<title>Gazing at Ground Zero: Tourism, Voyeurism and Spectacle</title>
</titleInfo>
<name type="personal">
<namePart type="family">LISLE</namePart>
<namePart type="given">D.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>Journal for Cultural Research</title>
</titleInfo>
<genre>journal</genre>
<part>
<date>2004</date>
<detail type="volume">
<caption>vol.</caption>
<number>8</number>
</detail>
<detail type="issue">
<caption>no.</caption>
<number>1</number>
</detail>
<extent unit="pages">
<start>3</start>
<end>21</end>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref332" displayLabel="bib332">
<titleInfo>
<title>The Iraq Crisis: What Now?</title>
</titleInfo>
<name type="personal">
<namePart type="family">LOWE</namePart>
<namePart type="given">V.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>International and Comparative Law Quarterly</title>
</titleInfo>
<genre>journal</genre>
<part>
<date>2003</date>
<detail type="volume">
<caption>vol.</caption>
<number>52</number>
</detail>
<detail type="issue">
<caption>no.</caption>
<number>4</number>
</detail>
<extent unit="pages">
<start>859</start>
<end>71</end>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref333" displayLabel="bib333">
<name type="personal">
<namePart type="family">LUBAN</namePart>
<namePart type="given">D.</namePart>
</name>
<name type="personal">
<namePart type="family">TUSHNET</namePart>
<namePart type="given">M.V.</namePart>
</name>
<titleInfo>
<title>The constitution in wartime: beyond alarmism and complacency</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Luban, D. 2005, ‘The War on Terrorism and the End of Human Rights’, in M.V. Tushnet (ed.), The constitution in wartime: beyond alarmism and complacency, Duke University Press, Durham, NC.</note>
<originInfo>
<publisher>Duke University Press</publisher>
<place>
<placeTerm type="text">Durham, NC</placeTerm>
</place>
</originInfo>
<part>
<date>2005</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref334" displayLabel="bib334">
<name type="personal">
<namePart type="family">LUBAN</namePart>
<namePart type="given">D.</namePart>
</name>
<name type="personal">
<namePart type="family">GREENBERG</namePart>
<namePart type="given">K.J.</namePart>
</name>
<titleInfo>
<title>The torture debate in America</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Luban, D. 2006, ‘Liberalism, Torture, and the Ticking Bomb’, in K.J. Greenberg (ed.), The torture debate in America, Cambridge University Press, Cambridge; New York.</note>
<originInfo>
<publisher>Cambridge University Press</publisher>
<place>
<placeTerm type="text">Cambridge; New York</placeTerm>
</place>
</originInfo>
<part>
<date>2006</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref335" displayLabel="bib335">
<titleInfo>
<title>The Role of the “International Community” in Just War Tradition – Confronting the Challenges of Humanitarian Intervention and Preemptive War</title>
</titleInfo>
<name type="personal">
<namePart type="family">LUCAS</namePart>
<namePart type="given">G.R.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>Journal of Military Ethics</title>
</titleInfo>
<genre>journal</genre>
<part>
<date>2003</date>
<detail type="volume">
<caption>vol.</caption>
<number>2</number>
</detail>
<detail type="issue">
<caption>no.</caption>
<number>2</number>
</detail>
<extent unit="pages">
<start>122</start>
<end>44</end>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref336" displayLabel="bib336">
<titleInfo>
<title>Liberal Democratic Torture</title>
</titleInfo>
<name type="personal">
<namePart type="family">LUKES</namePart>
<namePart type="given">S.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>British Journal of Political Science</title>
</titleInfo>
<genre>journal</genre>
<part>
<date>2005</date>
<detail type="volume">
<caption>vol.</caption>
<number>36</number>
</detail>
<detail type="issue">
<caption>no.</caption>
<number>1</number>
</detail>
<extent unit="pages">
<start>1</start>
<end>16</end>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref337" displayLabel="bib337">
<name type="personal">
<namePart type="family">LUSTGARTEN</namePart>
<namePart type="given">L.</namePart>
</name>
<name type="personal">
<namePart type="family">LEIGH</namePart>
<namePart type="given">I.</namePart>
</name>
<titleInfo>
<title>In from the cold: national security and parliamentary democracy</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Lustgarten, L. and Leigh, I. 1994, In from the cold: national security and parliamentary democracy, Clarendon Press, Oxford.</note>
<originInfo>
<publisher>Clarendon Press</publisher>
<place>
<placeTerm type="text">Oxford</placeTerm>
</place>
</originInfo>
<part>
<date>1994</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref338" displayLabel="bib338">
<name type="personal">
<namePart type="family">LUTZ</namePart>
<namePart type="given">C.A.</namePart>
</name>
<name type="personal">
<namePart type="family">ABU-LUGHOD</namePart>
<namePart type="given">L.</namePart>
</name>
<titleInfo>
<title>Language and the politics of emotion</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Lutz, C.A. and Abu-Lughod, L. 1990, Language and the politics of emotion, Cambridge University Press, Cambridge; Paris: Éditions de la maison des sciences de l’homme, New York.</note>
<originInfo>
<publisher>Cambridge University Press</publisher>
<place>
<placeTerm type="text">Cambridge; Paris: Éditions de la maison des sciences de l’homme, New York</placeTerm>
</place>
</originInfo>
<part>
<date>1990</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref339" displayLabel="bib339">
<name type="personal">
<namePart type="family">MACDONALD</namePart>
<namePart type="given">H.</namePart>
</name>
<name type="personal">
<namePart type="family">GREENBERG</namePart>
<namePart type="given">K.J.</namePart>
</name>
<titleInfo>
<title>The torture debate in America</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">MacDonald, H. 2006, ‘How to Interrogate Terrorists’, in K.J. Greenberg (ed.), The torture debate in America, Cambridge University Press, Cambridge; New York.</note>
<originInfo>
<publisher>Cambridge University Press</publisher>
<place>
<placeTerm type="text">Cambridge; New York</placeTerm>
</place>
</originInfo>
<part>
<date>2006</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref340" displayLabel="bib340">
<titleInfo>
<title>Post-Westphalian Crime</title>
</titleInfo>
<name type="personal">
<namePart type="family">MCALEA</namePart>
<namePart type="given">D.</namePart>
</name>
<name type="personal">
<namePart type="family">WIPPMAN</namePart>
<namePart type="given">D.</namePart>
</name>
<name type="personal">
<namePart type="family">EVANGELISTA</namePart>
<namePart type="given">M.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>New wars, new laws: applying the laws of war in 21st century conflicts</title>
</titleInfo>
<genre>other</genre>
<originInfo>
<publisher>Transnational Publishers</publisher>
<place>
<placeTerm type="text">Ardley, NY</placeTerm>
</place>
</originInfo>
<part>
<date>2005</date>
<extent unit="pages">
<start>111</start>
<end>34</end>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref341" displayLabel="bib341">
<name type="personal">
<namePart type="family">MCCLINTOCK</namePart>
<namePart type="given">A.</namePart>
</name>
<titleInfo>
<title>Imperial leather: race, gender, and sexuality in the colonial conquest</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">McClintock, A. 1995, Imperial leather: race, gender, and sexuality in the colonial conquest, Routledge, New York.</note>
<originInfo>
<publisher>Routledge</publisher>
<place>
<placeTerm type="text">New York</placeTerm>
</place>
</originInfo>
<part>
<date>1995</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref342" displayLabel="bib342">
<name type="personal">
<namePart type="family">MCCORMACK</namePart>
<namePart type="given">T.L.H</namePart>
</name>
<titleInfo>
<title>Self-defence in international law: the Israeli raid on the Iraqi nuclear reactor</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">McCormack, T.L.H 1996, Self-defence in international law: the Israeli raid on the Iraqi nuclear reactor, St Martin’s Press, Oxford.</note>
<originInfo>
<publisher>St Martin’s Press</publisher>
<place>
<placeTerm type="text">Oxford</placeTerm>
</place>
</originInfo>
<part>
<date>1996</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref343" displayLabel="bib343">
<titleInfo>
<title>The Soviet-Cuban Quarantine and Self-Defence</title>
</titleInfo>
<name type="personal">
<namePart type="family">MCDOUGAL</namePart>
<namePart type="given">M.S.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>American Journal of International Law</title>
</titleInfo>
<genre>journal</genre>
<part>
<date>1963</date>
<detail type="volume">
<caption>vol.</caption>
<number>57</number>
</detail>
<detail type="issue">
<caption>no.</caption>
<number>2</number>
</detail>
<extent unit="pages">
<start>597</start>
<end>604</end>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref344" displayLabel="bib344">
<name type="personal">
<namePart type="family">MCDOUGAL</namePart>
<namePart type="given">M.S.</namePart>
</name>
<name type="personal">
<namePart type="family">FELICIANO</namePart>
<namePart type="given">F.P.</namePart>
</name>
<titleInfo>
<title>Law and minimum world public order: the legal regulation of international coercion</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">McDougal, M.S. and Feliciano, F.P. 1961, Law and minimum world public order: the legal regulation of international coercion, Yale University Press, New Haven, CT.</note>
<originInfo>
<publisher>Yale University Press</publisher>
<place>
<placeTerm type="text">New Haven, CT</placeTerm>
</place>
</originInfo>
<part>
<date>1961</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref345" displayLabel="bib345">
<name type="personal">
<namePart type="family">MCKELVEY</namePart>
<namePart type="given">T.</namePart>
</name>
<titleInfo>
<title>A soldier’s tale: Lynndie England, Marie Claire</title>
</titleInfo>
<genre type="web">web</genre>
<note type="content-in-line">McKelvey, T. 2005, A soldier’s tale: Lynndie England, Marie Claire, viewed 26 April 2007 .</note>
<part>
<date>2005</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref346" displayLabel="bib346">
<name type="personal">
<namePart type="family">MACKEY</namePart>
<namePart type="given">C.</namePart>
</name>
<titleInfo>
<title>The interrogator’s war: inside the secret war against Iraq</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Mackey, C. 2004, The interrogator’s war: inside the secret war against Iraq, John Murray, London.</note>
<originInfo>
<publisher>John Murray</publisher>
<place>
<placeTerm type="text">London</placeTerm>
</place>
</originInfo>
<part>
<date>2004</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref347" displayLabel="bib347">
<titleInfo>
<title>Globalisation and Insurgency</title>
</titleInfo>
<name type="personal">
<namePart type="family">MACKINLAY</namePart>
<namePart type="given">J.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>Adelphi Papers</title>
</titleInfo>
<genre>other</genre>
<part>
<date>2002</date>
<detail type="volume">
<caption>vol.</caption>
<number>352</number>
</detail>
<extent unit="pages">
<start>5</start>
<end>116</end>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref348" displayLabel="bib348">
<titleInfo>
<title>Illegal Imprisonment at Guantanamo Bay</title>
</titleInfo>
<name type="personal">
<namePart type="family">MCNALLY</namePart>
<namePart type="given">N.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>Law Society Journal</title>
</titleInfo>
<genre>journal</genre>
<part>
<date>2004</date>
<detail type="volume">
<caption>vol.</caption>
<number>42</number>
</detail>
<detail type="issue">
<caption>no.</caption>
<number>3</number>
</detail>
<extent unit="pages">
<start>78</start>
<end>82</end>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref349" displayLabel="bib349">
<titleInfo>
<title>Emotions in Politics</title>
</titleInfo>
<name type="personal">
<namePart type="family">MARCUS</namePart>
<namePart type="given">G.E.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>Annual Review of Political Science</title>
</titleInfo>
<genre>other</genre>
<part>
<date>2000</date>
<detail type="volume">
<caption>vol.</caption>
<number>3</number>
</detail>
<extent unit="pages">
<start>21</start>
<end>50</end>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref350" displayLabel="bib350">
<titleInfo>
<title>State-Centrism, International Law, and the Anxieties of Influence</title>
</titleInfo>
<name type="personal">
<namePart type="family">MARKS</namePart>
<namePart type="given">S.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>Leiden Journal of International Law</title>
</titleInfo>
<genre>journal</genre>
<part>
<date>2006</date>
<detail type="volume">
<caption>vol.</caption>
<number>39</number>
</detail>
<detail type="issue">
<caption>no.</caption>
<number>2</number>
</detail>
<extent unit="pages">
<start>339</start>
<end>47</end>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref351" displayLabel="bib351">
<titleInfo>
<title>A Name that Lives in Infamy: the Destruction of Falluja was an Act of Barbarism that Ranks Alongside My Lai, Guernica and Halabja</title>
</titleInfo>
<name type="personal">
<namePart type="family">MARQUSEE</namePart>
<namePart type="given">M.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>Guardian</title>
</titleInfo>
<genre>other</genre>
<part>
<date>2005</date>
<extent unit="pages">
<start>32</start>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref352" displayLabel="bib352">
<name type="personal">
<namePart type="family">MARTYN</namePart>
<namePart type="given">A.</namePart>
</name>
<titleInfo>
<title>Progress of the military trial of David Hicks</title>
</titleInfo>
<genre type="web">web</genre>
<note type="content-in-line">Martyn, A. 2005, Progress of the military trial of David Hicks, viewed 7 November 2006 .</note>
<part>
<date>2005</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref353" displayLabel="bib353">
<titleInfo>
<title>Anthrax Powder: State of the Art?</title>
</titleInfo>
<name type="personal">
<namePart type="family">MATSUMOTO</namePart>
<namePart type="given">G.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>Science</title>
</titleInfo>
<genre>journal</genre>
<part>
<date>2003</date>
<detail type="volume">
<caption>vol.</caption>
<number>302</number>
</detail>
<detail type="issue">
<caption>no.</caption>
<number>5650</number>
</detail>
<extent unit="pages">
<start>1492</start>
<end>7</end>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref354" displayLabel="bib354">
<titleInfo>
<title>Why We Will Soon Miss the Cold War</title>
</titleInfo>
<name type="personal">
<namePart type="family">MEARSHEIMER</namePart>
<namePart type="given">J.J.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>The Atlantic</title>
</titleInfo>
<genre>journal</genre>
<part>
<date>1990</date>
<detail type="volume">
<caption>vol.</caption>
<number>266</number>
</detail>
<detail type="issue">
<caption>no.</caption>
<number>2</number>
</detail>
<extent unit="pages">
<start>35</start>
<end>50</end>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref355" displayLabel="bib355">
<titleInfo>
<title>’War”? Legal Semantics and the Move to Violence</title>
</titleInfo>
<name type="personal">
<namePart type="family">MEGRET</namePart>
<namePart type="given">F.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>European Journal of International Law</title>
</titleInfo>
<genre>journal</genre>
<part>
<date>2002</date>
<detail type="volume">
<caption>vol.</caption>
<number>13</number>
</detail>
<detail type="issue">
<caption>no.</caption>
<number>2</number>
</detail>
<extent unit="pages">
<start>361</start>
<end>99</end>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref356" displayLabel="bib356">
<titleInfo>
<title>Somalia: State Collapse and the Threat of Terrorism</title>
</titleInfo>
<name type="personal">
<namePart type="family">MENKHAUS</namePart>
<namePart type="given">K.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>Adelphi Papers</title>
</titleInfo>
<genre>other</genre>
<part>
<date>2004</date>
<detail type="volume">
<caption>vol.</caption>
<number>364</number>
</detail>
<extent unit="pages">
<start>7</start>
<end>92</end>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref357" displayLabel="bib357">
<name type="personal">
<namePart type="family">MENKHAUS</namePart>
<namePart type="given">K.</namePart>
</name>
<name type="personal">
<namePart type="family">ROTBERG</namePart>
<namePart type="given">R.I.</namePart>
</name>
<titleInfo>
<title>Battling Terrorism in the Horn of Africa</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Menkhaus, K. 2005, ‘Somalia and Somaliland’, in R.I. Rotberg (ed.), Battling Terrorism in the Horn of Africa, Brookings Institution Press, Washington, DC.</note>
<originInfo>
<publisher>Brookings Institution Press</publisher>
<place>
<placeTerm type="text">Washington, DC</placeTerm>
</place>
</originInfo>
<part>
<date>2005</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref358" displayLabel="bib358">
<name type="personal">
<namePart type="family">MERCER</namePart>
<namePart type="given">J.</namePart>
</name>
<titleInfo>
<title>International Studies Association Conference, San Diego, California</title>
</titleInfo>
<genre type="conf-proc">conf-proc</genre>
<note type="content-in-line">Mercer, J. 1996. ‘Approaching Emotion in International Politics’, paper presented and the International Studies Association Conference, San Diego, California, 25 April.</note>
<part>
<date>1996</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref359" displayLabel="bib359">
<titleInfo>
<title>Rationality and Psychology in International Politics</title>
</titleInfo>
<name type="personal">
<namePart type="family">MERCER</namePart>
<namePart type="given">J.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>International Organization</title>
</titleInfo>
<genre>journal</genre>
<part>
<date>2005</date>
<detail type="volume">
<caption>vol.</caption>
<number>59</number>
</detail>
<detail type="issue">
<caption>no.</caption>
<number>1</number>
</detail>
<extent unit="pages">
<start>77</start>
<end>106</end>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref360" displayLabel="bib360">
<titleInfo>
<title>Timeline of legal and judicial events related to Guantanamo Bay</title>
</titleInfo>
<genre type="web">web</genre>
<note type="content-in-line">Miami Herald 2005, Timeline of legal and judicial events related to Guantanamo Bay, viewed 3 March 2006 .</note>
<part>
<date>2005</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref361" displayLabel="bib361">
<name type="personal">
<namePart type="family">MILES</namePart>
<namePart type="given">D.</namePart>
</name>
<titleInfo>
<title>Bush Reacts to Supreme Court ruling on military tribunals</title>
</titleInfo>
<genre type="web">web</genre>
<note type="content-in-line">Miles, D. 2006, Bush Reacts to Supreme Court ruling on military tribunals, viewed 1 December 2006 .</note>
<part>
<date>2006</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref362" displayLabel="bib362">
<name type="personal">
<namePart type="family">MILES</namePart>
<namePart type="given">S.H.</namePart>
</name>
<titleInfo>
<title>Oath betrayed: torture, medical complicity, and the war on terror</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Miles, S.H. 2006, Oath betrayed: torture, medical complicity, and the war on terror, Random House, New York.</note>
<originInfo>
<publisher>Random House</publisher>
<place>
<placeTerm type="text">New York</placeTerm>
</place>
</originInfo>
<part>
<date>2006</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref363" displayLabel="bib363">
<name type="personal">
<namePart type="family">MILLER</namePart>
<namePart type="given">J.</namePart>
</name>
<titleInfo>
<title>To Terror’s Source</title>
</titleInfo>
<genre type="web">web</genre>
<note type="content-in-line">Miller, J. 1998, To Terror’s Source, ABC news.com, viewed 6 March 2007 .</note>
<part>
<date>1998</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref364" displayLabel="bib364">
<titleInfo>
<title>Scientist Files Suit Over Anthrax Inquiry</title>
</titleInfo>
<name type="personal">
<namePart type="family">MILLER</namePart>
<namePart type="given">J.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>New York Times</title>
</titleInfo>
<genre>other</genre>
<part>
<date>2003</date>
<extent unit="pages">
<start>A13</start>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref365" displayLabel="bib365">
<titleInfo>
<title>US Germ Warfare Research Pushes Treaty Limits</title>
</titleInfo>
<name type="personal">
<namePart type="family">MILLER</namePart>
<namePart type="given">J.</namePart>
</name>
<name type="personal">
<namePart type="family">ENGELBERG</namePart>
<namePart type="given">S.</namePart>
</name>
<name type="personal">
<namePart type="family">BROAD</namePart>
<namePart type="given">W.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>New York Times</title>
</titleInfo>
<genre>other</genre>
<part>
<date>2001</date>
<extent unit="pages">
<start>A1</start>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref366" displayLabel="bib366">
<titleInfo>
<title>The Return of the Camp</title>
</titleInfo>
<name type="personal">
<namePart type="family">MINCA</namePart>
<namePart type="given">C.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>Progress in Human Geography</title>
</titleInfo>
<genre>journal</genre>
<part>
<date>2005</date>
<detail type="volume">
<caption>vol.</caption>
<number>29</number>
</detail>
<detail type="issue">
<caption>no.</caption>
<number>4</number>
</detail>
<extent unit="pages">
<start>405</start>
<end>12</end>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref367" displayLabel="bib367">
<titleInfo>
<title>The Clash of Emotions</title>
</titleInfo>
<name type="personal">
<namePart type="family">MOïSI</namePart>
<namePart type="given">D.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>Foreign Affairs</title>
</titleInfo>
<genre>journal</genre>
<part>
<date>2007</date>
<detail type="volume">
<caption>vol.</caption>
<number>86</number>
</detail>
<detail type="issue">
<caption>no.</caption>
<number>1</number>
</detail>
<extent unit="pages">
<start>8</start>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref368" displayLabel="bib368">
<titleInfo>
<title>Behind the Phosphorous Clouds are War Crimes within War Crimes</title>
</titleInfo>
<name type="personal">
<namePart type="family">MONBIOT</namePart>
<namePart type="given">G.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>Guardian</title>
</titleInfo>
<genre>web</genre>
<part>
<date>2005</date>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref369" displayLabel="bib369">
<titleInfo>
<title>Ringing in Proliferation: How to Dismantle an Atomic Bomb Network</title>
</titleInfo>
<name type="personal">
<namePart type="family">MONTGOMERY</namePart>
<namePart type="given">A.H.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>International Security</title>
</titleInfo>
<genre>journal</genre>
<part>
<date>2005</date>
<detail type="volume">
<caption>vol.</caption>
<number>30</number>
</detail>
<detail type="issue">
<caption>no.</caption>
<number>2</number>
</detail>
<extent unit="pages">
<start>153</start>
<end>87</end>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref370" displayLabel="bib370">
<name type="personal">
<namePart type="family">MORGENTHAU</namePart>
<namePart type="given">H.J.</namePart>
</name>
<name type="personal">
<namePart type="family">MORGENTHAU</namePart>
<namePart type="given">H.J.</namePart>
</name>
<titleInfo>
<title>The decline of democratic politics</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Morgenthau, H.J. 1962, ‘The Escape From Power’, in H.J. Morgenthau (ed.), The decline of democratic politics, University of Chicago, Chicago, IL.</note>
<originInfo>
<publisher>University of Chicago</publisher>
<place>
<placeTerm type="text">Chicago, IL</placeTerm>
</place>
</originInfo>
<part>
<date>1962</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref371" displayLabel="bib371">
<name type="personal">
<namePart type="family">MORI</namePart>
<namePart type="given">M.</namePart>
</name>
<titleInfo>
<title>‘Lecture for the Australian Lawyers’</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Mori, M. 2006, ‘Lecture for the Australian Lawyers’, paper presented to Australian Lawyers Alliance, Brisbane Convention Centre, Australia, 3 November.</note>
<originInfo>
<publisher>Brisbane Convention Centre</publisher>
<place>
<placeTerm type="text">Australia</placeTerm>
</place>
</originInfo>
<part>
<date>2006</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref372" displayLabel="bib372">
<name type="personal">
<namePart type="family">MORRIS</namePart>
<namePart type="given">D.B.</namePart>
</name>
<titleInfo>
<title>The culture of pain</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Morris, D.B. 1993, The culture of pain, University of California Press, Berkeley, CA.</note>
<originInfo>
<publisher>University of California Press</publisher>
<place>
<placeTerm type="text">Berkeley, CA</placeTerm>
</place>
</originInfo>
<part>
<date>1993</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref373" displayLabel="bib373">
<titleInfo>
<title>A False Sense of Insecurity</title>
</titleInfo>
<name type="personal">
<namePart type="family">MUELLER</namePart>
<namePart type="given">J.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>Regulation</title>
</titleInfo>
<genre>journal</genre>
<part>
<date>2004</date>
<detail type="volume">
<caption>vol.</caption>
<number>27</number>
</detail>
<detail type="issue">
<caption>no.</caption>
<number>3</number>
</detail>
<extent unit="pages">
<start>42</start>
<end>6</end>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref374" displayLabel="bib374">
<name type="personal">
<namePart type="family">MUGGLETON</namePart>
<namePart type="given">P.</namePart>
</name>
<titleInfo>
<title>Certain legal and ethical aspects of contemporary ADF operations, Command Papers</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Muggleton, P. 2006, Certain legal and ethical aspects of contemporary ADF operations, Command Papers, Centre for Defence Leadership Studies, Australian Defence College, Canberra.</note>
<originInfo>
<publisher>Australian Defence College</publisher>
<place>
<placeTerm type="text">Canberra</placeTerm>
</place>
</originInfo>
<part>
<date>2006</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref375" displayLabel="bib375">
<name type="personal">
<namePart type="family">MULLERSON</namePart>
<namePart type="given">R.</namePart>
</name>
<name type="personal">
<namePart type="family">SCHEFFER</namePart>
<namePart type="given">D.J.</namePart>
</name>
<name type="personal">
<namePart type="family">DAMROSCH</namePart>
<namePart type="given">L.F.</namePart>
</name>
<titleInfo>
<title>Law and force in the new international order</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Mullerson, R. 1991, ‘Self-defense in the contemporary world’, in D.J. Scheffer and L.F. Damrosch (eds), Law and force in the new international order, Westview Press, Boulder, CO, pp. 13–15.</note>
<originInfo>
<publisher>Westview Press</publisher>
<place>
<placeTerm type="text">Boulder, CO</placeTerm>
</place>
</originInfo>
<part>
<date>1991</date>
<extent unit="pages">
<start>13</start>
<end>15</end>
</extent>
</part>
</relatedItem>
<relatedItem type="references" ID="ref376" displayLabel="bib376">
<titleInfo>
<title>The Twin Tower Attack: An Unlimited Right to Self-Defence</title>
</titleInfo>
<name type="personal">
<namePart type="family">MYJER</namePart>
<namePart type="given">E.P.J.</namePart>
</name>
<name type="personal">
<namePart type="family">WHITE</namePart>
<namePart type="given">N.D.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>Journal of Conflict and Security Law</title>
</titleInfo>
<genre>journal</genre>
<part>
<date>2002</date>
<detail type="volume">
<caption>vol.</caption>
<number>7</number>
</detail>
<detail type="issue">
<caption>no.</caption>
<number>1</number>
</detail>
<extent unit="pages">
<start>5</start>
<end>17</end>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref377" displayLabel="bib377">
<titleInfo>
<title>Biotechnology research in the age of terrorism</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">NAS 2004, Biotechnology research in the age of terrorism, National Academy of Sciences, Washington, DC.</note>
<originInfo>
<publisher>National Academy of Sciences</publisher>
<place>
<placeTerm type="text">Washington, DC</placeTerm>
</place>
</originInfo>
<part>
<date>2004</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref378" displayLabel="bib378">
<titleInfo>
<title>Cosmopolitan Political Community: Why Does It Feel So Right?</title>
</titleInfo>
<name type="personal">
<namePart type="family">NASH</namePart>
<namePart type="given">K.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>Constellations</title>
</titleInfo>
<genre>journal</genre>
<part>
<date>2003</date>
<detail type="volume">
<caption>vol.</caption>
<number>10</number>
</detail>
<detail type="issue">
<caption>no.</caption>
<number>4</number>
</detail>
<extent unit="pages">
<start>506</start>
<end>18</end>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref379" displayLabel="bib379">
<titleInfo>
<title>9/11 investigations</title>
</titleInfo>
<genre type="other">other</genre>
<note type="content-in-line">National Commission on Terrorist Attacks Upon the United States 2004, 9/11 investigations, National Commission on Terrorist Attacks Upon the United States (9-11 Commission), New York.</note>
<originInfo>
<place>
<placeTerm type="text">New York</placeTerm>
</place>
</originInfo>
</relatedItem>
<relatedItem type="references" ID="ref380" displayLabel="bib380">
<titleInfo>
<title>National security strategy of the United States of America</title>
</titleInfo>
<genre type="web">web</genre>
<note type="content-in-line">National Security Council (NSC) 2002, National security strategy of the United States of America, viewed 20 February 2007 .</note>
<part>
<date>2002</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref381" displayLabel="bib381">
<titleInfo>
<title>National strategy for combating terrorism</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">National Security Council (NSC) 2003, National strategy for combating terrorism, The White House, Washington. DC.</note>
<originInfo>
<publisher>The White House</publisher>
<place>
<placeTerm type="text">Washington. DC</placeTerm>
</place>
</originInfo>
<part>
<date>2003</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref382" displayLabel="bib382">
<titleInfo>
<title>National security strategy of the United States of America</title>
</titleInfo>
<genre type="web">web</genre>
<note type="content-in-line">National Security Council (NSC) 2006a, National security strategy of the United States of America, viewed 20 February 2007 .</note>
<part>
<date>2006</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref383" displayLabel="bib383">
<titleInfo>
<title>National strategy for combating terrorism</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">National Security Council (NSC) 2006b, National strategy for combating terrorism, The White House, Washington, DC.</note>
<originInfo>
<publisher>The White House</publisher>
<place>
<placeTerm type="text">Washington, DC</placeTerm>
</place>
</originInfo>
<part>
<date>2006</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref384" displayLabel="bib384">
<name type="personal">
<namePart type="family">NAYLOR</namePart>
<namePart type="given">R.T.</namePart>
</name>
<titleInfo>
<title>Wages of crime: black markets, illegal finance and the underworld economy</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Naylor, R.T. 2004, Wages of crime: black markets, illegal finance and the underworld economy, revised edn, Cornell University Press, Ithaca,NY.</note>
<originInfo>
<publisher>Cornell University Press</publisher>
<place>
<placeTerm type="text">Ithaca,NY</placeTerm>
</place>
</originInfo>
<part>
<date>2004</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref385" displayLabel="bib385">
<name type="personal">
<namePart type="family">NEIMAN</namePart>
<namePart type="given">S.</namePart>
</name>
<titleInfo>
<title>Evil in modern thought: an alternative history of philosophy</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Neiman, S. 2003, Evil in modern thought: an alternative history of philosophy, Scribe Publications, Melbourne.</note>
<originInfo>
<publisher>Scribe Publications</publisher>
<place>
<placeTerm type="text">Melbourne</placeTerm>
</place>
</originInfo>
<part>
<date>2003</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref386" displayLabel="bib386">
<titleInfo>
<title>Biosafety Laboratories Proliferate Across the USA</title>
</titleInfo>
<name type="personal">
<namePart type="family">NELSON</namePart>
<namePart type="given">R.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>The Lancet Infectious Diseases</title>
</titleInfo>
<genre>journal</genre>
<part>
<date>2004</date>
<detail type="volume">
<caption>vol.</caption>
<number>4</number>
</detail>
<detail type="issue">
<caption>no.</caption>
<number>10</number>
</detail>
<extent unit="pages">
<start>596</start>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref387" displayLabel="bib387">
<titleInfo>
<title>The Problem with Normality: Taking Exception to “Permanent Emergency”</title>
</titleInfo>
<name type="personal">
<namePart type="family">NEOCLEOUS</namePart>
<namePart type="given">M.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>Alternatives</title>
</titleInfo>
<genre>journal</genre>
<part>
<date>2006</date>
<detail type="volume">
<caption>vol.</caption>
<number>31</number>
</detail>
<detail type="issue">
<caption>no.</caption>
<number>2</number>
</detail>
<extent unit="pages">
<start>191</start>
<end>213</end>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref388" displayLabel="bib388">
<titleInfo>
<title>How Terror Feeds on Hope</title>
</titleInfo>
<name type="personal">
<namePart type="family">NETANYAHU</namePart>
<namePart type="given">B.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>The Age</title>
</titleInfo>
<genre>other</genre>
<part>
<date>2002</date>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref389" displayLabel="bib389">
<titleInfo>
<title>The “New Wars” Debate: A Historical Perspective Is Needed</title>
</titleInfo>
<name type="personal">
<namePart type="family">NEWMAN</namePart>
<namePart type="given">E.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>Security Dialogue</title>
</titleInfo>
<genre>journal</genre>
<part>
<date>2004</date>
<detail type="volume">
<caption>vol.</caption>
<number>35</number>
</detail>
<detail type="issue">
<caption>no.</caption>
<number>2</number>
</detail>
<extent unit="pages">
<start>173</start>
<end>89</end>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref390" displayLabel="bib390">
<titleInfo>
<title>Unlawful Belligerency After September 11: History Revisited and Law Revised</title>
</titleInfo>
<name type="personal">
<namePart type="family">NEWTON</namePart>
<namePart type="given">M.</namePart>
</name>
<name type="personal">
<namePart type="family">WIPPMAN</namePart>
<namePart type="given">D.</namePart>
</name>
<name type="personal">
<namePart type="family">EVANGELISTA</namePart>
<namePart type="given">M.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>New wars, new laws?: applying the laws of war in 21st century conflicts</title>
</titleInfo>
<genre>other</genre>
<originInfo>
<publisher>Transnational Publishers</publisher>
<place>
<placeTerm type="text">Ardley, NY</placeTerm>
</place>
</originInfo>
<part>
<date>2005</date>
<extent unit="pages">
<start>75</start>
<end>110</end>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref391" displayLabel="bib391">
<titleInfo>
<title>NIAID funds construction of biosafety laboratories, National Institutes of Health</title>
</titleInfo>
<genre type="web">web</genre>
<note type="content-in-line">NIH 2003, NIAID funds construction of biosafety laboratories, National Institutes of Health Online, viewed 10 May 2005 .</note>
<part>
<date>2003</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref392" displayLabel="bib392">
<titleInfo>
<title>NIAID awards first $27 million using new bioshield authorities, National Institutes of Health</title>
</titleInfo>
<genre type="web">web</genre>
<note type="content-in-line">NIH 2005, NIAID awards first $27 million using new bioshield authorities, National Institutes of Health Online, viewed 9 June 2005 .</note>
<part>
<date>2005</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref393" displayLabel="bib393">
<name type="personal">
<namePart type="family">NUSSBAUM</namePart>
<namePart type="given">M.C.</namePart>
</name>
<titleInfo>
<title>Love’s knowledge: essays on philosophy and literature</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Nussbaum, M.C. 1990, Love’s knowledge: essays on philosophy and literature, Oxford University Press, New York.</note>
<originInfo>
<publisher>Oxford University Press</publisher>
<place>
<placeTerm type="text">New York</placeTerm>
</place>
</originInfo>
<part>
<date>1990</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref394" displayLabel="bib394">
<name type="personal">
<namePart type="family">NUSSBAUM</namePart>
<namePart type="given">M.C.</namePart>
</name>
<name type="personal">
<namePart type="family">NUSSBAUM</namePart>
<namePart type="given">M.C.</namePart>
</name>
<titleInfo>
<title>Poetic justice: the literary imagination and public life</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Nussbaum, M.C. 1995a, ‘Rational Emotions’, in M.C. Nussbaum (ed.), Poetic justice: the literary imagination and public life, Beacon Press, Boston, MA, pp. 53–78.</note>
<originInfo>
<publisher>Beacon Press</publisher>
<place>
<placeTerm type="text">Boston</placeTerm>
</place>
</originInfo>
<part>
<date>1995</date>
<extent unit="pages">
<start>53</start>
<end>78</end>
</extent>
</part>
</relatedItem>
<relatedItem type="references" ID="ref395" displayLabel="bib395">
<name type="personal">
<namePart type="family">NUSSBAUM</namePart>
<namePart type="given">M.C.</namePart>
</name>
<name type="personal">
<namePart type="family">NUSSBAUM</namePart>
<namePart type="given">M.C.</namePart>
</name>
<name type="personal">
<namePart type="family">GLOVER</namePart>
<namePart type="given">J.</namePart>
</name>
<titleInfo>
<title>Women, culture, and development: a study of human capabilities</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Nussbaum, M.C. 1995b, ‘Emotions and Women’s Capabilities’, in M.C. Nussbaum and J. Glover (eds), Women, culture, and development: a study of human capabilities, Oxford University Press, New York, pp. 360–95.</note>
<originInfo>
<publisher>Oxford University Press</publisher>
<place>
<placeTerm type="text">New York</placeTerm>
</place>
</originInfo>
<part>
<date>1995</date>
<extent unit="pages">
<start>360</start>
<end>95</end>
</extent>
</part>
</relatedItem>
<relatedItem type="references" ID="ref396" displayLabel="bib396">
<name type="personal">
<namePart type="family">NUSSBAUM</namePart>
<namePart type="given">M.C.</namePart>
</name>
<titleInfo>
<title>Upheavals of thought: the intelligence of emotions</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Nussbaum, M.C. 2001, Upheavals of thought: the intelligence of emotions, Cambridge University Press, Cambridge.</note>
<originInfo>
<publisher>Cambridge University Press</publisher>
<place>
<placeTerm type="text">Cambridge</placeTerm>
</place>
</originInfo>
<part>
<date>2001</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref397" displayLabel="bib397">
<name type="personal">
<namePart type="family">OBER</namePart>
<namePart type="given">J.</namePart>
</name>
<name type="personal">
<namePart type="family">HOWARD</namePart>
<namePart type="given">M.E.</namePart>
</name>
<name type="personal">
<namePart type="family">ANDREOPOULOS</namePart>
<namePart type="given">G.J.</namePart>
</name>
<name type="personal">
<namePart type="family">SHULMAN</namePart>
<namePart type="given">M.R.</namePart>
</name>
<titleInfo>
<title>The laws of war: constraints on warfare in the Western world</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Ober, J. 1994, ‘Classical Greek Times’, in M.E. Howard, G.J. Andreopoulos and M.R. Shulman (eds), The laws of war: constraints on warfare in the Western world, Yale University Press, New Haven, CT, pp. 12–26.</note>
<originInfo>
<publisher>Yale University Press</publisher>
<place>
<placeTerm type="text">New Haven, CT</placeTerm>
</place>
</originInfo>
<part>
<date>1994</date>
<extent unit="pages">
<start>12</start>
<end>26</end>
</extent>
</part>
</relatedItem>
<relatedItem type="references" ID="ref398" displayLabel="bib398">
<name type="personal">
<namePart type="family">O’BRIEN</namePart>
<namePart type="given">W.V.</namePart>
</name>
<titleInfo>
<title>The conduct of just and limited wars</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">O’Brien, W.V. 1981, The conduct of just and limited wars, Praeger, New York.</note>
<originInfo>
<publisher>Praeger</publisher>
<place>
<placeTerm type="text">New York</placeTerm>
</place>
</originInfo>
<part>
<date>1981</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref399" displayLabel="bib399">
<name type="personal">
<namePart type="family">O’DONOVAN</namePart>
<namePart type="given">O.</namePart>
</name>
<titleInfo>
<title>The just war revisited</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">O’Donovan, O. 2003, The just war revisited, Cambridge University Press, Cambridge.</note>
<originInfo>
<publisher>Cambridge University Press</publisher>
<place>
<placeTerm type="text">Cambridge</placeTerm>
</place>
</originInfo>
<part>
<date>2003</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref400" displayLabel="bib400">
<titleInfo>
<title>Re-negotiating the Just War: The Invasion of Iraq and Punitive War</title>
</titleInfo>
<name type="personal">
<namePart type="family">O’DRISCOLL</namePart>
<namePart type="given">C.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>Cambridge Review of International Affairs</title>
</titleInfo>
<genre>journal</genre>
<part>
<date>2006</date>
<detail type="volume">
<caption>vol.</caption>
<number>19</number>
</detail>
<detail type="issue">
<caption>no.</caption>
<number>3</number>
</detail>
<extent unit="pages">
<start>405</start>
<end>20</end>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref401" displayLabel="bib401">
<titleInfo>
<title>Military transformation: a strategic approach</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Office of Force Transformation 2003, Military transformation: a strategic approach, Office of the Secretary of Defense, Washington, DC.</note>
<originInfo>
<publisher>Office of the Secretary of Defense</publisher>
<place>
<placeTerm type="text">Washington, DC</placeTerm>
</place>
</originInfo>
<part>
<date>2003</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref402" displayLabel="bib402">
<name type="personal">
<namePart type="family">O’MALLEY</namePart>
<namePart type="given">S.</namePart>
</name>
<titleInfo>
<title>Bush promises trial for Hicks</title>
</titleInfo>
<genre type="web">web</genre>
<note type="content-in-line">O’Malley, S. 2006, Bush promises trial for Hicks, viewed 1 December 2006 .</note>
<part>
<date>2006</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref403" displayLabel="bib403">
<name type="personal">
<namePart type="family">ONLINE</namePart>
<namePart type="given">B.N.</namePart>
</name>
<titleInfo>
<title>Cherie Blair attacks Taliban cruelty</title>
</titleInfo>
<genre type="web">web</genre>
<note type="content-in-line">Online, B.N. 2001, Cherie Blair attacks Taliban cruelty, BBC News, 19 November, viewed 26 April 2007 .</note>
<part>
<date>2001</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref404" displayLabel="bib404">
<name type="personal">
<namePart type="family">OSGOOD</namePart>
<namePart type="given">R.E.</namePart>
</name>
<titleInfo>
<title>Limited war: the challenge to American strategy</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Osgood, R.E. 1957, Limited war: the challenge to American strategy, University of Chicago Press, Chicago, IL.</note>
<originInfo>
<publisher>University of Chicago Press</publisher>
<place>
<placeTerm type="text">Chicago, IL</placeTerm>
</place>
</originInfo>
<part>
<date>1957</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref405" displayLabel="bib405">
<name type="personal">
<namePart type="family">OSGOOD</namePart>
<namePart type="given">R.E.</namePart>
</name>
<name type="personal">
<namePart type="family">OSGOOD</namePart>
<namePart type="given">R.E.</namePart>
</name>
<name type="personal">
<namePart type="family">TUCKER</namePart>
<namePart type="given">R.W.</namePart>
</name>
<titleInfo>
<title>Limited war revisited</title>
</titleInfo>
<titleInfo>
<title>Force, order and justice</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Osgood, R.E. 1979, Limited war revisited, Westview Press, Boulder, CO. Osgood, R.E. and Tucker, R.W. 1967, Force, order and justice, Johns Hopkins University Press, Baltimore, MD.</note>
<originInfo>
<publisher>Westview Press</publisher>
<publisher>Johns Hopkins University Press</publisher>
<place>
<placeTerm type="text">Boulder, CO</placeTerm>
</place>
<place>
<placeTerm type="text">Baltimore, MD</placeTerm>
</place>
</originInfo>
<part>
<date>1979</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref406" displayLabel="bib406">
<name type="personal">
<namePart type="family">PANTESCO</namePart>
<namePart type="given">J.</namePart>
</name>
<titleInfo>
<title>Australia repeats intent to seek Hicks return if charges not laid soon</title>
</titleInfo>
<genre type="web">web</genre>
<note type="content-in-line">Pantesco, J. 2006, Australia repeats intent to seek Hicks return if charges not laid soon, viewed 14 November 2006 .</note>
<part>
<date>2006</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref407" displayLabel="bib407">
<titleInfo>
<title>What’s Wrong with Torture?</title>
</titleInfo>
<name type="personal">
<namePart type="family">PASKINS</namePart>
<namePart type="given">B.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>British Journal of International Studies</title>
</titleInfo>
<genre>journal</genre>
<part>
<date>1976</date>
<detail type="volume">
<caption>vol.</caption>
<number>2</number>
</detail>
<detail type="issue">
<caption>no.</caption>
<number>2</number>
</detail>
<extent unit="pages">
<start>141</start>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref408" displayLabel="bib408">
<titleInfo>
<title>Weak States and Global Threats: Fact or Fiction?</title>
</titleInfo>
<name type="personal">
<namePart type="family">PATRICK</namePart>
<namePart type="given">S.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>Washington Quarterly</title>
</titleInfo>
<genre>journal</genre>
<part>
<date>2006</date>
<detail type="volume">
<caption>vol.</caption>
<number>29</number>
</detail>
<detail type="issue">
<caption>no.</caption>
<number>2</number>
</detail>
<extent unit="pages">
<start>27</start>
<end>53</end>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref409" displayLabel="bib409">
<titleInfo>
<title>Looking for Answers</title>
</titleInfo>
<genre type="other">other</genre>
<note type="content-in-line">PBS 2001, Looking for Answers, 9 October.</note>
<part>
<date>2001</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref410" displayLabel="bib410">
<titleInfo>
<title>“Repugnant Philosophy”: Ethics, Espionage, and Covert Action</title>
</titleInfo>
<name type="personal">
<namePart type="family">PERRY</namePart>
<namePart type="given">D.L.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>Journal of Conflict Studies</title>
</titleInfo>
<genre>journal</genre>
<part>
<date>1995</date>
<detail type="volume">
<caption>vol.</caption>
<number>15</number>
</detail>
<detail type="issue">
<caption>no.</caption>
<number>1</number>
</detail>
<extent unit="pages">
<start>92</start>
<end>115</end>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref411" displayLabel="bib411">
<titleInfo>
<title>Feminist International Relations after 9/11</title>
</titleInfo>
<name type="personal">
<namePart type="family">PETTMAN</namePart>
<namePart type="given">J.J.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>Brown Journal of World Affairs</title>
</titleInfo>
<genre>journal</genre>
<part>
<date>2004</date>
<detail type="volume">
<caption>vol.</caption>
<number>10</number>
</detail>
<detail type="issue">
<caption>no.</caption>
<number>2</number>
</detail>
<extent unit="pages">
<start>85</start>
<end>96</end>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref412" displayLabel="bib412">
<titleInfo>
<title>Just war tradition and the new war on terrorism</title>
</titleInfo>
<genre type="web">web</genre>
<note type="content-in-line">Pew Forum on Religion and Public Life 2002, Just war tradition and the new war on terrorism, viewed 27 February 2007 .</note>
<part>
<date>2002</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref413" displayLabel="bib413">
<titleInfo>
<title>The Ethics of Espionage</title>
</titleInfo>
<name type="personal">
<namePart type="family">PFAFF</namePart>
<namePart type="given">T.</namePart>
</name>
<name type="personal">
<namePart type="family">TIEL</namePart>
<namePart type="given">J.R.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>Journal of Military Ethics</title>
</titleInfo>
<genre>journal</genre>
<part>
<date>2004</date>
<detail type="volume">
<caption>vol.</caption>
<number>3</number>
</detail>
<detail type="issue">
<caption>no.</caption>
<number>1</number>
</detail>
<extent unit="pages">
<start>6</start>
<end>10</end>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref414" displayLabel="bib414">
<name type="personal">
<namePart type="family">PHILP</namePart>
<namePart type="given">C.</namePart>
</name>
<titleInfo>
<title>Iraq’s women of power who tolerate wife-beating and promote polygamy</title>
</titleInfo>
<genre type="web">web</genre>
<note type="content-in-line">Philp, C. 2005, Iraq’s women of power who tolerate wife-beating and promote polygamy, TimesOnline, 31 March, viewed 26 April 2007 .</note>
<originInfo>
<publisher>TimesOnline</publisher>
</originInfo>
<part>
<date>2005</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref415" displayLabel="bib415">
<titleInfo>
<title>Financing of Terrorism: Following the Money</title>
</titleInfo>
<name type="personal">
<namePart type="family">PIETH</namePart>
<namePart type="given">M.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>European Journal of Law Reform</title>
</titleInfo>
<genre>journal</genre>
<part>
<date>2002</date>
<detail type="volume">
<caption>vol.</caption>
<number>4</number>
</detail>
<detail type="issue">
<caption>no.</caption>
<number>2</number>
</detail>
<extent unit="pages">
<start>365</start>
<end>76</end>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref416" displayLabel="bib416">
<titleInfo>
<title>Intelligence, Policy, and the War in Iraq</title>
</titleInfo>
<name type="personal">
<namePart type="family">PILLAR</namePart>
<namePart type="given">P.R.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>Foreign Affairs</title>
</titleInfo>
<genre>journal</genre>
<part>
<date>2006</date>
<detail type="volume">
<caption>vol.</caption>
<number>85</number>
</detail>
<detail type="issue">
<caption>no.</caption>
<number>2</number>
</detail>
<extent unit="pages">
<start>15</start>
<end>28</end>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref417" displayLabel="bib417">
<titleInfo>
<title>Pacific a soft terror target: US</title>
</titleInfo>
<genre type="web">web</genre>
<note type="content-in-line">Port Villa Presse 2004, Pacific a soft terror target: US, viewed 20 February 2007 .</note>
<part>
<date>2004</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref418" displayLabel="bib418">
<titleInfo>
<title>The USA Patriot Act: New Adventures in American Extraterritoriality</title>
</titleInfo>
<name type="personal">
<namePart type="family">PRESTON</namePart>
<namePart type="given">E.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>Journal of Financial Crime</title>
</titleInfo>
<genre>journal</genre>
<part>
<date>2002</date>
<detail type="volume">
<caption>vol.</caption>
<number>10</number>
</detail>
<detail type="issue">
<caption>no.</caption>
<number>2</number>
</detail>
<extent unit="pages">
<start>104</start>
<end>16</end>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref419" displayLabel="bib419">
<name type="personal">
<namePart type="family">PUFENDORF</namePart>
<namePart type="given">S.</namePart>
</name>
<name type="personal">
<namePart type="family">CARR</namePart>
<namePart type="given">C.L.</namePart>
</name>
<titleInfo>
<title>The political writings of Samuel Pufendorf</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Pufendorf, S. 1994, ‘On the Law of War’, in C.L. Carr (ed.), The political writings of Samuel Pufendorf, Oxford University Press, Oxford, p. 285.</note>
<originInfo>
<publisher>Oxford University Press</publisher>
<place>
<placeTerm type="text">Oxford</placeTerm>
</place>
</originInfo>
<part>
<date>1994</date>
<extent unit="pages">
<start>285</start>
</extent>
</part>
</relatedItem>
<relatedItem type="references" ID="ref420" displayLabel="bib420">
<titleInfo>
<title>Boost to US National Security With Signing of Bioshield</title>
</titleInfo>
<name type="personal">
<namePart type="family">QUIRK</namePart>
<namePart type="given">M.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>The Lancet Infectious Diseases</title>
</titleInfo>
<genre>journal</genre>
<part>
<date>2004</date>
<detail type="volume">
<caption>vol.</caption>
<number>4</number>
</detail>
<detail type="issue">
<caption>no.</caption>
<number>9</number>
</detail>
<extent unit="pages">
<start>540</start>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref421" displayLabel="bib421">
<titleInfo>
<title>Comparative Genome Sequencing for Discovery of novel Polymorphisms in Bacillus Anthracis</title>
</titleInfo>
<name type="personal">
<namePart type="family">READ</namePart>
<namePart type="given">T.D.</namePart>
</name>
<name type="personal">
<namePart type="family">SALZBERG</namePart>
<namePart type="given">S.L.</namePart>
</name>
<name type="personal">
<namePart type="family">POP</namePart>
<namePart type="given">M.</namePart>
</name>
<name type="personal">
<namePart type="family">SHUMWAY</namePart>
<namePart type="given">M.</namePart>
</name>
<name type="personal">
<namePart type="family">UMAYAM</namePart>
<namePart type="given">L.</namePart>
</name>
<name type="personal">
<namePart type="family">JIANG</namePart>
<namePart type="given">L.</namePart>
</name>
<name type="personal">
<namePart type="family">HOLTZAPPLE</namePart>
<namePart type="given">E.</namePart>
</name>
<name type="personal">
<namePart type="family">BUSCH</namePart>
<namePart type="given">J.D.</namePart>
</name>
<name type="personal">
<namePart type="family">SMITH</namePart>
<namePart type="given">K.L.</namePart>
</name>
<name type="personal">
<namePart type="family">SCHUPP</namePart>
<namePart type="given">J.M.</namePart>
</name>
<name type="personal">
<namePart type="family">SOLOMON</namePart>
<namePart type="given">D.</namePart>
</name>
<name type="personal">
<namePart type="family">KEIM</namePart>
<namePart type="given">P.</namePart>
</name>
<name type="personal">
<namePart type="family">FRASER</namePart>
<namePart type="given">C.M.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>Science</title>
</titleInfo>
<genre>journal</genre>
<part>
<date>2002</date>
<detail type="volume">
<caption>vol.</caption>
<number>296</number>
</detail>
<detail type="issue">
<caption>no.</caption>
<number>5575</number>
</detail>
<extent unit="pages">
<start>2028</start>
<end>33</end>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref422" displayLabel="bib422">
<name type="personal">
<namePart type="family">RECORD</namePart>
<namePart type="given">J.</namePart>
</name>
<titleInfo>
<title>Bounding the war on terrorism</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Record, J. 2003, Bounding the war on terrorism, US Army War College Strategic Studies Institute, Carlisle, PA.</note>
<originInfo>
<publisher>US Army War College Strategic Studies Institute</publisher>
<place>
<placeTerm type="text">Carlisle, PA</placeTerm>
</place>
</originInfo>
<part>
<date>2003</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref423" displayLabel="bib423">
<name type="personal">
<namePart type="family">REINHART</namePart>
<namePart type="given">T.</namePart>
</name>
<titleInfo>
<title>Road map to nowhere</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Reinhart, T. 2006, Road map to nowhere, Verso, London; New York.</note>
<originInfo>
<publisher>Verso</publisher>
<place>
<placeTerm type="text">London; New York</placeTerm>
</place>
</originInfo>
<part>
<date>2006</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref424" displayLabel="bib424">
<titleInfo>
<title>Just a War against Terror? Jean Bethke Elshtain’s Burden and American Power</title>
</titleInfo>
<name type="personal">
<namePart type="family">RENGGER</namePart>
<namePart type="given">N.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>International Affairs</title>
</titleInfo>
<genre>journal</genre>
<part>
<date>2004</date>
<detail type="volume">
<caption>vol.</caption>
<number>80</number>
</detail>
<detail type="issue">
<caption>no.</caption>
<number>1</number>
</detail>
<extent unit="pages">
<start>107</start>
<end>16</end>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref425" displayLabel="bib425">
<name type="personal">
<namePart type="family">RENTOUL</namePart>
<namePart type="given">J.</namePart>
</name>
<titleInfo>
<title>Tony Blair: prime minister</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Rentoul, J. 2001, Tony Blair: prime minister, Little, Brown, and Company, London.</note>
<originInfo>
<publisher>Little, Brown</publisher>
<place>
<placeTerm type="text">Company, London</placeTerm>
</place>
</originInfo>
<part>
<date>2001</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref426" displayLabel="bib426">
<titleInfo>
<title>Liberal Hierarchy and the Licence to Use Force</title>
</titleInfo>
<name type="personal">
<namePart type="family">REUS-SMIT</namePart>
<namePart type="given">C.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>Review of International Studies</title>
</titleInfo>
<genre>other</genre>
<part>
<date>2005</date>
<detail type="volume">
<caption>vol.</caption>
<number>31</number>
</detail>
<extent unit="pages">
<start>71</start>
<end>92</end>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref427" displayLabel="bib427">
<name type="personal">
<namePart type="family">REUS-SMIT</namePart>
<namePart type="given">C.</namePart>
</name>
<name type="personal">
<namePart type="family">BURCHILL</namePart>
<namePart type="given">S.</namePart>
</name>
<titleInfo>
<title>Theories of international relations</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Reus-Smit, C. 2005, ‘Constructivism’, in S. Burchill (ed.), Theories of international relations, 3rd edn, Palgrave Macmillan, London.</note>
<originInfo>
<edition>3rd</edition>
<publisher>Palgrave Macmillan</publisher>
<place>
<placeTerm type="text">London</placeTerm>
</place>
</originInfo>
<part>
<date>2005</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref428" displayLabel="bib428">
<titleInfo>
<title>Old Allies, New Friends: Intelligence-Sharing in the War on Terror</title>
</titleInfo>
<name type="personal">
<namePart type="family">REVERON</namePart>
<namePart type="given">D.S.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>Orbis: a journal of world affairs</title>
</titleInfo>
<genre>journal</genre>
<part>
<date>2006</date>
<detail type="volume">
<caption>vol.</caption>
<number>50</number>
</detail>
<detail type="issue">
<caption>no.</caption>
<number>3</number>
</detail>
<extent unit="pages">
<start>453</start>
<end>68</end>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref429" displayLabel="bib429">
<name type="personal">
<namePart type="family">RICHARDSON</namePart>
<namePart type="given">L.</namePart>
</name>
<titleInfo>
<title>What terrorists want: understanding the terrorist threat</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Richardson, L. 2006, What terrorists want: understanding the terrorist threat, John Murray, London.</note>
<originInfo>
<publisher>John Murray</publisher>
<place>
<placeTerm type="text">London</placeTerm>
</place>
</originInfo>
<part>
<date>2006</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref430" displayLabel="bib430">
<name type="personal">
<namePart type="family">RIDER</namePart>
<namePart type="given">B.A.K.</namePart>
</name>
<name type="personal">
<namePart type="family">MASCIANDARO</namePart>
<namePart type="given">D.</namePart>
</name>
<titleInfo>
<title>Global financial crime: terrorism, money laundering, and off shore centres</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Rider, B.A.K. 2004, ‘Law: the War on Terror and Crime and the Offshore Centres: the “New” Perspective’, in D. Masciandaro (ed.), Global financial crime: terrorism, money laundering, and off shore centres, Ashgate, Aldershot; Burlington, VT, pp. X, 256.</note>
<originInfo>
<publisher>Ashgate, Aldershot</publisher>
<place>
<placeTerm type="text">Burlington, VT</placeTerm>
</place>
</originInfo>
<part>
<date>2004</date>
<extent unit="pages">
<start>X</start>
<end>256</end>
</extent>
</part>
</relatedItem>
<relatedItem type="references" ID="ref431" displayLabel="bib431">
<titleInfo>
<title>Righting Wrongs or Wronging Rights? The United States and Human Rights Post-September 11</title>
</titleInfo>
<name type="personal">
<namePart type="family">ROBERTS</namePart>
<namePart type="given">A.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>European Journal of International Law</title>
</titleInfo>
<genre>journal</genre>
<part>
<date>2004</date>
<detail type="volume">
<caption>vol.</caption>
<number>15</number>
</detail>
<detail type="issue">
<caption>no.</caption>
<number>4</number>
</detail>
<extent unit="pages">
<start>721</start>
<end>49</end>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref432" displayLabel="bib432">
<titleInfo>
<title>The “War on Terror” in Historical Perspective</title>
</titleInfo>
<name type="personal">
<namePart type="family">ROBERTS</namePart>
<namePart type="given">A.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>Survival</title>
</titleInfo>
<genre>journal</genre>
<part>
<date>2005</date>
<detail type="volume">
<caption>vol.</caption>
<number>47</number>
</detail>
<detail type="issue">
<caption>no.</caption>
<number>2</number>
</detail>
<extent unit="pages">
<start>101</start>
<end>30</end>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref433" displayLabel="bib433">
<titleInfo>
<title>The Counterproliferation Self-Help Paradigm: A Legal Regime for Enforcing the Norm Prohibiting the Proliferation of Weapons of Mass Destruction</title>
</titleInfo>
<name type="personal">
<namePart type="family">ROBERTS</namePart>
<namePart type="given">G.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>Denver Journal of International Law and Policy</title>
</titleInfo>
<genre>journal</genre>
<part>
<date>1999</date>
<detail type="volume">
<caption>vol.</caption>
<number>27</number>
</detail>
<detail type="issue">
<caption>no.</caption>
<number>3</number>
</detail>
<extent unit="pages">
<start>483</start>
<end>518</end>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref434" displayLabel="bib434">
<name type="personal">
<namePart type="family">ROBIN</namePart>
<namePart type="given">C.</namePart>
</name>
<titleInfo>
<title>Fear: the history of a political idea</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Robin, C. 2004, Fear: the history of a political idea, Oxford University Press, Oxford.</note>
<originInfo>
<publisher>Oxford University Press</publisher>
<place>
<placeTerm type="text">Oxford</placeTerm>
</place>
</originInfo>
<part>
<date>2004</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref435" displayLabel="bib435">
<name type="personal">
<namePart type="family">ROGERS</namePart>
<namePart type="given">P.</namePart>
</name>
<titleInfo>
<title>Iraq and the war on terror: twelve months of insurgency 2004/2005</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Rogers, P. 2006, Iraq and the war on terror: twelve months of insurgency 2004/2005, I.B. Tauris, London.</note>
<originInfo>
<publisher>I.B. Tauris</publisher>
<place>
<placeTerm type="text">London</placeTerm>
</place>
</originInfo>
<part>
<date>2006</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref436" displayLabel="bib436">
<name type="personal">
<namePart type="family">RORTY</namePart>
<namePart type="given">R.</namePart>
</name>
<titleInfo>
<title>Contingency, irony, and solidarity</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Rorty, R. 1989, Contingency, irony, and solidarity, Cambridge University Press, Cambridge; New York.</note>
<originInfo>
<publisher>Cambridge University Press</publisher>
<place>
<placeTerm type="text">Cambridge; New York</placeTerm>
</place>
</originInfo>
<part>
<date>1989</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref437" displayLabel="bib437">
<name type="personal">
<namePart type="family">ROSS</namePart>
<namePart type="given">A.A.G.</namePart>
</name>
<titleInfo>
<title>Affective states: rethinking passion in global politics</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Ross, A.A.G. 2005, Affective states: rethinking passion in global politics, John Hopkins University Press, PhD dissertation.</note>
<originInfo>
<publisher>John Hopkins University Press</publisher>
<place>
<placeTerm type="text">PhD dissertation</placeTerm>
</place>
</originInfo>
<part>
<date>2005</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref438" displayLabel="bib438">
<titleInfo>
<title>Coming in from the Cold: Constructivism and Emotions</title>
</titleInfo>
<name type="personal">
<namePart type="family">ROSS</namePart>
<namePart type="given">A.A.G.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>European Journal of International Relations</title>
</titleInfo>
<genre>journal</genre>
<part>
<date>2006</date>
<detail type="volume">
<caption>vol.</caption>
<number>12</number>
</detail>
<detail type="issue">
<caption>no.</caption>
<number>2</number>
</detail>
<extent unit="pages">
<start>197</start>
<end>222</end>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref439" displayLabel="bib439">
<titleInfo>
<title>Globalization, Governance and Guns: Some Reflections on the South Pacific in the 1990s</title>
</titleInfo>
<name type="personal">
<namePart type="family">ROSS</namePart>
<namePart type="given">K.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>The Round Table</title>
</titleInfo>
<genre>journal</genre>
<part>
<date>2003</date>
<detail type="volume">
<caption>vol.</caption>
<number>92</number>
</detail>
<detail type="issue">
<caption>no.</caption>
<number>372</number>
</detail>
<extent unit="pages">
<start>687</start>
<end>96</end>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref440" displayLabel="bib440">
<titleInfo>
<title>Constitutional Dictatorship in the Atomic Age</title>
</titleInfo>
<name type="personal">
<namePart type="family">ROSSITER</namePart>
<namePart type="given">CL</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>The Review of Politics</title>
</titleInfo>
<genre>journal</genre>
<part>
<date>1949</date>
<detail type="volume">
<caption>vol.</caption>
<number>11</number>
</detail>
<detail type="issue">
<caption>no.</caption>
<number>4</number>
</detail>
<extent unit="pages">
<start>395</start>
<end>418</end>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref441" displayLabel="bib441">
<titleInfo>
<title>Failed States in a World of Terror</title>
</titleInfo>
<name type="personal">
<namePart type="family">ROTBERG</namePart>
<namePart type="given">R.I.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>Foreign Affairs</title>
</titleInfo>
<genre>journal</genre>
<part>
<date>2002</date>
<detail type="volume">
<caption>vol.</caption>
<number>81</number>
</detail>
<detail type="issue">
<caption>no.</caption>
<number>4</number>
</detail>
<extent unit="pages">
<start>127</start>
<end>40</end>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref442" displayLabel="bib442">
<name type="personal">
<namePart type="family">ROTHWELL</namePart>
<namePart type="given">D.</namePart>
</name>
<titleInfo>
<title>David Hicks and the US military commissions process: next steps</title>
</titleInfo>
<genre type="web">web</genre>
<note type="content-in-line">Rothwell, D. 2006, David Hicks and the US military commissions process: next steps, viewed 7 November 2006 .</note>
<part>
<date>2006</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref443" displayLabel="bib443">
<name type="personal">
<namePart type="family">RUMSFELD</namePart>
<namePart type="given">D.</namePart>
</name>
<titleInfo>
<title>Remarks at stakeout outside ABC TV studio</title>
</titleInfo>
<genre type="web">web</genre>
<note type="content-in-line">Rumsfeld, D. 2001, Remarks at stakeout outside ABC TV studio, 28 October, viewed 3 February 2005 .</note>
<part>
<date>2001</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref444" displayLabel="bib444">
<name type="personal">
<namePart type="family">SAFRAN FOER</namePart>
<namePart type="given">J.</namePart>
</name>
<titleInfo>
<title>Extremely loud and extremely close</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Safran Foer, J. 2005, Extremely loud and extremely close. Boston, MA: Houghton Mifflin Company.</note>
<originInfo>
<publisher>Houghton Mifflin Company</publisher>
<place>
<placeTerm type="text">Boston, MA</placeTerm>
</place>
</originInfo>
<part>
<date>2005</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref445" displayLabel="bib445">
<titleInfo>
<title>How to Keep the Bomb From Iran</title>
</titleInfo>
<name type="personal">
<namePart type="family">SAGAN</namePart>
<namePart type="given">S.D.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>Foreign Affairs</title>
</titleInfo>
<genre>journal</genre>
<part>
<date>2006</date>
<detail type="volume">
<caption>vol.</caption>
<number>85</number>
</detail>
<detail type="issue">
<caption>no.</caption>
<number>5</number>
</detail>
<extent unit="pages">
<start>45</start>
<end>59</end>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref446" displayLabel="bib446">
<name type="personal">
<namePart type="family">SAGEMAN</namePart>
<namePart type="given">M.</namePart>
</name>
<titleInfo>
<title>Understanding terror networks</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Sageman, M. 2004, Understanding terror networks, University of Pennsylvania Press, Philadelphia.</note>
<originInfo>
<publisher>University of Pennsylvania Press</publisher>
<place>
<placeTerm type="text">Philadelphia</placeTerm>
</place>
</originInfo>
<part>
<date>2004</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref447" displayLabel="bib447">
<name type="personal">
<namePart type="family">SARTRE</namePart>
<namePart type="given">J.-P.</namePart>
</name>
<titleInfo>
<title>Sketch for a theory of the emotions</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Sartre, J.-P. 2002, Sketch for a theory of the emotions, Routledge, London.</note>
<originInfo>
<publisher>Routledge</publisher>
<place>
<placeTerm type="text">London</placeTerm>
</place>
</originInfo>
<part>
<date>2002</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref448" displayLabel="bib448">
<titleInfo>
<title>You Dissin Me? Humiliation and Post 9/11 Global Politics</title>
</titleInfo>
<name type="personal">
<namePart type="family">SAURETTE</namePart>
<namePart type="given">P.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>Review of International Studies</title>
</titleInfo>
<genre>journal</genre>
<part>
<date>2006</date>
<detail type="volume">
<caption>vol.</caption>
<number>32</number>
</detail>
<detail type="issue">
<caption>no.</caption>
<number>3</number>
</detail>
<extent unit="pages">
<start>495</start>
<end>522</end>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref449" displayLabel="bib449">
<name type="personal">
<namePart type="family">SCARRY</namePart>
<namePart type="given">E.</namePart>
</name>
<titleInfo>
<title>The body in pain: the making and unmaking of the world</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Scarry, E. 1985, The body in pain: the making and unmaking of the world, Oxford University Press, New York.</note>
<originInfo>
<publisher>Oxford University Press</publisher>
<place>
<placeTerm type="text">New York</placeTerm>
</place>
</originInfo>
<part>
<date>1985</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref450" displayLabel="bib450">
<name type="personal">
<namePart type="family">SCHAAP</namePart>
<namePart type="given">Andrew.</namePart>
</name>
<titleInfo>
<title>Political reconciliation</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Schaap, Andrew. 2005. Political reconciliation. London: Routledge.</note>
<originInfo>
<publisher>Routledge</publisher>
<place>
<placeTerm type="text">London</placeTerm>
</place>
</originInfo>
<part>
<date>2005</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref451" displayLabel="bib451">
<name type="personal">
<namePart type="family">SCHEFF</namePart>
<namePart type="given">T.J.</namePart>
</name>
<name type="personal">
<namePart type="family">CALHOUN</namePart>
<namePart type="given">C.J.</namePart>
</name>
<titleInfo>
<title>Social theory and the politics of identity</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Scheff, T.J. 1994a, ‘Emotions and Identity: A Theory of Ethnic Nationalism’, in C.J. Calhoun (ed.), Social theory and the politics of identity, Blackwell, Oxford, pp. 277–303.</note>
<originInfo>
<publisher>Blackwell</publisher>
<place>
<placeTerm type="text">Oxford</placeTerm>
</place>
</originInfo>
<part>
<date>1994</date>
<extent unit="pages">
<start>277</start>
<end>303</end>
</extent>
</part>
</relatedItem>
<relatedItem type="references" ID="ref452" displayLabel="bib452">
<name type="personal">
<namePart type="family">SCHEFF</namePart>
<namePart type="given">T.J.</namePart>
</name>
<titleInfo>
<title>Bloody revenge: emotions, nationalism and war</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Scheff, T.J. 1994b, Bloody revenge: emotions, nationalism and war, Westview Press, Boulder, Colorado.</note>
<originInfo>
<publisher>Westview Press</publisher>
<place>
<placeTerm type="text">Boulder, Colorado</placeTerm>
</place>
</originInfo>
<part>
<date>1994</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref453" displayLabel="bib453">
<name type="personal">
<namePart type="family">SCHELLING</namePart>
<namePart type="given">T.C.</namePart>
</name>
<name type="personal">
<namePart type="family">AFFAIRS</namePart>
<namePart type="given">HUCfI</namePart>
</name>
<titleInfo>
<title>Arms and influence</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Schelling, T.C. and Affairs, HUCfI 1966, Arms and influence, Yale University Press, New Haven, CT.</note>
<originInfo>
<publisher>Yale University Press</publisher>
<place>
<placeTerm type="text">New Haven, CT</placeTerm>
</place>
</originInfo>
<part>
<date>1966</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref454" displayLabel="bib454">
<name type="personal">
<namePart type="family">SCHEUERMAN</namePart>
<namePart type="given">W.E.</namePart>
</name>
<titleInfo>
<title>Between the norm and exception: the Frankfurt School and the rule of law</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Scheuerman, W.E. 1994, Between the norm and exception: the Frankfurt School and the rule of law, MIT Press, Cambridge, MA</note>
<originInfo>
<publisher>MIT Press</publisher>
<place>
<placeTerm type="text">Cambridge, MA</placeTerm>
</place>
</originInfo>
<part>
<date>1994</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref455" displayLabel="bib455">
<titleInfo>
<title>Carl Schmitt and the Road to Abu Ghraib</title>
</titleInfo>
<name type="personal">
<namePart type="family">SCHEUERMAN</namePart>
<namePart type="given">W.E.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>Constellations</title>
</titleInfo>
<genre>journal</genre>
<part>
<date>2006</date>
<detail type="volume">
<caption>vol.</caption>
<number>13</number>
</detail>
<detail type="issue">
<caption>no.</caption>
<number>1</number>
</detail>
<extent unit="pages">
<start>108</start>
<end>24</end>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref456" displayLabel="bib456">
<name type="personal">
<namePart type="family">SCHMITT</namePart>
<namePart type="given">C.</namePart>
</name>
<titleInfo>
<title>Political theology: four chpaters on the concept of sovereignty</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Schmitt, C. 1985, Political theology: four chpaters on the concept of sovereignty, MIT Press, Cambridge, MA.</note>
<originInfo>
<publisher>MIT Press</publisher>
<place>
<placeTerm type="text">Cambridge, MA</placeTerm>
</place>
</originInfo>
<part>
<date>1985</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref457" displayLabel="bib457">
<titleInfo>
<title>’She Was Fighting to the Death”; Details Emerging of W. Va. Soldier’s Capture and Rescue</title>
</titleInfo>
<name type="personal">
<namePart type="family">SCHMIDT</namePart>
<namePart type="given">S.</namePart>
</name>
<name type="personal">
<namePart type="family">LEOB</namePart>
<namePart type="given">V.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>Washignton Post</title>
</titleInfo>
<genre>other</genre>
<part>
<date>2003</date>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref458" displayLabel="bib458">
<name type="personal">
<namePart type="family">SCHMIDT</namePart>
<namePart type="given">S.</namePart>
</name>
<name type="personal">
<namePart type="family">LEOB</namePart>
<namePart type="given">V.</namePart>
</name>
<titleInfo>
<title>The concept of the political</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Schmidt, S. and Leob, V. 1996, The concept of the political, University of Chicago Press, Chicago, IL.</note>
<originInfo>
<publisher>University of Chicago Press</publisher>
<place>
<placeTerm type="text">Chicago, IL</placeTerm>
</place>
</originInfo>
<part>
<date>1996</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref459" displayLabel="bib459">
<name type="personal">
<namePart type="family">SCHWARZENBERGER</namePart>
<namePart type="given">G.</namePart>
</name>
<name type="personal">
<namePart type="family">SCHWARZENBERGER</namePart>
<namePart type="given">G.</namePart>
</name>
<name type="personal">
<namePart type="family">SIJTHOFF</namePart>
<namePart type="given">A.W.</namePart>
</name>
<titleInfo>
<title>Recueil des Cours</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Schwarzenberger, G. 1955, ‘The Fundamental Principles of International Law’, in G. Schwarzenberger (ed.), Recueil des Cours, A.W. Sijthoff, Leiden, pp. 195–383.</note>
<originInfo>
<place>
<placeTerm type="text">Leiden</placeTerm>
</place>
</originInfo>
<part>
<date>1955</date>
<extent unit="pages">
<start>195</start>
<end>383</end>
</extent>
</part>
</relatedItem>
<relatedItem type="references" ID="ref460" displayLabel="bib460">
<titleInfo>
<title>Biodefense: a Plague of Researchers</title>
</titleInfo>
<name type="personal">
<namePart type="family">SCHWELLENBACH</namePart>
<namePart type="given">N.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>Bulletin of the Atomic Scientists</title>
</titleInfo>
<genre>journal</genre>
<part>
<date>2005</date>
<detail type="volume">
<caption>vol.</caption>
<number>61</number>
</detail>
<detail type="issue">
<caption>no.</caption>
<number>3</number>
</detail>
<extent unit="pages">
<start>14</start>
<end>16</end>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref461" displayLabel="bib461">
<name type="personal">
<namePart type="family">SCOTT</namePart>
<namePart type="given">J.B.</namePart>
</name>
<titleInfo>
<title>The Spanish origins of international law: Francisco De Vitoria and his law of nations</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Scott, J.B. 1934, The Spanish origins of international law: Francisco De Vitoria and his law of nations, Clarendon Press, Oxford.</note>
<originInfo>
<publisher>Clarendon Press</publisher>
<place>
<placeTerm type="text">Oxford</placeTerm>
</place>
</originInfo>
<part>
<date>1934</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref462" displayLabel="bib462">
<name type="personal">
<namePart type="family">SHANE</namePart>
<namePart type="given">S.</namePart>
</name>
<titleInfo>
<title>Bioterror fight may spawn new risks, Baltimore Sun Online</title>
</titleInfo>
<genre type="web">web</genre>
<note type="content-in-line">Shane, S. 2004, Bioterror fight may spawn new risks, Baltimore Sun Online, viewed 29 June 2004 .</note>
<part>
<date>2004</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref463" displayLabel="bib463">
<titleInfo>
<title>An Exotic Tool for Espionage: Moral Compass</title>
</titleInfo>
<name type="personal">
<namePart type="family">SHANE</namePart>
<namePart type="given">S.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>The New York Times</title>
</titleInfo>
<genre>other</genre>
<part>
<date>2006</date>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref464" displayLabel="bib464">
<titleInfo>
<title>Terrorist Organizations Inefficiencies and Vulnerabilities</title>
</titleInfo>
<name type="personal">
<namePart type="family">SHAPIRO</namePart>
<namePart type="given">J.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>paper presented to International Studies Association, San Diego</title>
</titleInfo>
<genre>other</genre>
<part>
<date>2006</date>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref465" displayLabel="bib465">
<name type="personal">
<namePart type="family">SHAPIRO</namePart>
<namePart type="given">M.J.</namePart>
</name>
<titleInfo>
<title>Violent cartographies: mapping cultures of war</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Shapiro, M.J. 1997, Violent cartographies: mapping cultures of war, University of Minnesota Press, Minneapolis, MN.</note>
<originInfo>
<publisher>University of Minnesota Press</publisher>
<place>
<placeTerm type="text">Minneapolis, MN</placeTerm>
</place>
</originInfo>
<part>
<date>1997</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref466" displayLabel="bib466">
<name type="personal">
<namePart type="family">SHARMAN</namePart>
<namePart type="given">J.C.</namePart>
</name>
<titleInfo>
<title>Havens in a storm: the struggle for global tax regulation</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Sharman, J.C. 2006, Havens in a storm: the struggle for global tax regulation, Cornell University Press, Ithaca, NY.</note>
<originInfo>
<publisher>Cornell University Press</publisher>
<place>
<placeTerm type="text">Ithaca, NY</placeTerm>
</place>
</originInfo>
<part>
<date>2006</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref467" displayLabel="bib467">
<name type="personal">
<namePart type="family">SHARMAN</namePart>
<namePart type="given">J.C.</namePart>
</name>
<name type="personal">
<namePart type="family">MISTRY</namePart>
<namePart type="given">P.S.</namePart>
</name>
<name type="personal">
<namePart type="family">SHEEHAN</namePart>
<namePart type="given">M.</namePart>
</name>
<titleInfo>
<title>Developmental Implications of Recent International</title>
</titleInfo>
<titleInfo>
<title>International security: an analytical survey</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Sharman, J.C. and Mistry, P.S. 2006, Developmental Implications of Recent International Sheehan, M. 2005, International security: an analytical survey, Lynne Rienner Publishers, Boulder, CO.</note>
<originInfo>
<publisher>Lynne Rienner Publishers</publisher>
<place>
<placeTerm type="text">Boulder, CO</placeTerm>
</place>
</originInfo>
<part>
<date>2006</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref468" displayLabel="bib468">
<name type="personal">
<namePart type="family">SHEHADI</namePart>
<namePart type="given">N.</namePart>
</name>
<titleInfo>
<title>Interview with author</title>
</titleInfo>
<genre type="other">other</genre>
<note type="content-in-line">Shehadi, N. 2004, Interview with author, 30 July.</note>
<part>
<date>2004</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref469" displayLabel="bib469">
<titleInfo>
<title>Emotions, Embodiment and the Sensation of Society</title>
</titleInfo>
<name type="personal">
<namePart type="family">SHILLING</namePart>
<namePart type="given">C.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>Sociological Review</title>
</titleInfo>
<genre>journal</genre>
<part>
<date>1997</date>
<detail type="volume">
<caption>vol.</caption>
<number>45</number>
</detail>
<detail type="issue">
<caption>no.</caption>
<number>2</number>
</detail>
<extent unit="pages">
<start>195</start>
<end>219</end>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref470" displayLabel="bib470">
<name type="personal">
<namePart type="family">SHKLAR</namePart>
<namePart type="given">J.N.</namePart>
</name>
<titleInfo>
<title>Ordinary vices</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Shklar, J.N. 1984, Ordinary vices, Belknap Press of Harvard University Press, Cambridge, MA; London.</note>
<originInfo>
<publisher>Belknap Press of Harvard University Press</publisher>
<place>
<placeTerm type="text">Cambridge, MA; London</placeTerm>
</place>
</originInfo>
<part>
<date>1984</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref471" displayLabel="bib471">
<name type="personal">
<namePart type="family">SHLAIM</namePart>
<namePart type="given">A.</namePart>
</name>
<titleInfo>
<title>The iron wall: Israel and the Arab world</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Shlaim, A. 2000, The iron wall: Israel and the Arab world, London: Penguin</note>
<originInfo>
<publisher>Penguin</publisher>
<place>
<placeTerm type="text">London</placeTerm>
</place>
</originInfo>
<part>
<date>2000</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref472" displayLabel="bib472">
<titleInfo>
<title>Torture</title>
</titleInfo>
<name type="personal">
<namePart type="family">SHUE</namePart>
<namePart type="given">H.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>Philosophy and Public Affairs</title>
</titleInfo>
<genre>journal</genre>
<part>
<date>1978</date>
<detail type="volume">
<caption>vol.</caption>
<number>7</number>
</detail>
<detail type="issue">
<caption>no.</caption>
<number>2</number>
</detail>
<extent unit="pages">
<start>124</start>
<end>43</end>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref473" displayLabel="bib473">
<name type="personal">
<namePart type="family">SHULSKY</namePart>
<namePart type="given">A.N.</namePart>
</name>
<titleInfo>
<title>Silent warfare: understanding the world of intelligence</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Shulsky, A.N. 1993, Silent warfare: understanding the world of intelligence, Brassey’s, Washington, DC.</note>
<originInfo>
<publisher>Brassey’s</publisher>
<place>
<placeTerm type="text">Washington, DC</placeTerm>
</place>
</originInfo>
<part>
<date>1993</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref474" displayLabel="bib474">
<titleInfo>
<title>Rise of Extremism, Islamic Law Threaten Iraqi Women</title>
</titleInfo>
<name type="personal">
<namePart type="family">SHUMWAY</namePart>
<namePart type="given">C.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>The New Standard</title>
</titleInfo>
<genre>web</genre>
<part>
<date>2005</date>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref475" displayLabel="bib475">
<titleInfo>
<title>Cleaning the Laundry: States and the Monitoring of the Financial System</title>
</titleInfo>
<name type="personal">
<namePart type="family">SICA</namePart>
<namePart type="given">V.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>Millennium</title>
</titleInfo>
<genre>journal</genre>
<part>
<date>2000</date>
<detail type="volume">
<caption>vol.</caption>
<number>29</number>
</detail>
<detail type="issue">
<caption>no.</caption>
<number>1</number>
</detail>
<extent unit="pages">
<start>47</start>
<end>72</end>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref476" displayLabel="bib476">
<name type="personal">
<namePart type="family">SIDEL</namePart>
<namePart type="given">V.</namePart>
</name>
<name type="personal">
<namePart type="family">WRIGHT</namePart>
<namePart type="given">S.</namePart>
</name>
<titleInfo>
<title>Biological warfare and disarmament: new problems, new perspectives</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Sidel, V. 2002, ‘Defense Against Biological Weapons: Can Immunization and Secondary Prevention Succeed?’ in S. Wright (ed.), Biological warfare and disarmament: new problems, new perspectives, Rowman and Littlefield, Lanham, MD.</note>
<originInfo>
<publisher>Rowman and Littlefield</publisher>
<place>
<placeTerm type="text">Lanham, MD</placeTerm>
</place>
</originInfo>
<part>
<date>2002</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref477" displayLabel="bib477">
<name type="personal">
<namePart type="family">SILKE</namePart>
<namePart type="given">A.</namePart>
</name>
<name type="personal">
<namePart type="family">BJøRGO</namePart>
<namePart type="given">T.</namePart>
</name>
<titleInfo>
<title>Root causes of terrorism: myths, reality, and ways forward</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Silke, A. 2005, ‘Fire of Iolaus: The Role of Countermeasures in Causing Terrorism and What Needs to be Done’, in T. Bjørgo (ed.), Root causes of terrorism: myths, reality, and ways forward, Routledge, London; New York.</note>
<originInfo>
<publisher>Routledge</publisher>
<place>
<placeTerm type="text">London; New York</placeTerm>
</place>
</originInfo>
<part>
<date>2005</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref478" displayLabel="bib478">
<name type="personal">
<namePart type="family">SIMMA</namePart>
<namePart type="given">B.</namePart>
</name>
<titleInfo>
<title>The charter of the United Nations: a commentary</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Simma, B. 2002, The charter of the United Nations: a commentary, Oxford University Press, Oxford.</note>
<originInfo>
<publisher>Oxford University Press</publisher>
<place>
<placeTerm type="text">Oxford</placeTerm>
</place>
</originInfo>
<part>
<date>2002</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref479" displayLabel="bib479">
<name type="personal">
<namePart type="family">SINGER</namePart>
<namePart type="given">P.</namePart>
</name>
<titleInfo>
<title>The president of good and evil: the ethics of George W. Bush</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Singer, P. 2004, The president of good and evil: the ethics of George W. Bush, Dutton, New York.</note>
<originInfo>
<publisher>Dutton</publisher>
<place>
<placeTerm type="text">New York</placeTerm>
</place>
</originInfo>
<part>
<date>2004</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref480" displayLabel="bib480">
<titleInfo>
<title>International Law in a World of Liberal States</title>
</titleInfo>
<name type="personal">
<namePart type="family">SLAUGHTER</namePart>
<namePart type="given">A.-M.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>European Journal of International Law</title>
</titleInfo>
<genre>journal</genre>
<part>
<date>1995</date>
<detail type="volume">
<caption>vol.</caption>
<number>6</number>
</detail>
<detail type="issue">
<caption>no.</caption>
<number>3</number>
</detail>
<extent unit="pages">
<start>503</start>
<end>38</end>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref481" displayLabel="bib481">
<name type="personal">
<namePart type="family">SLAUGHTER</namePart>
<namePart type="given">A.-M.</namePart>
</name>
<titleInfo>
<title>Proceedings of the American Society of International Law</title>
</titleInfo>
<genre type="conf-proc">conf-proc</genre>
<note type="content-in-line">Slaughter, A.-M. 2000, ‘A Liberal Theory of International Law’, Proceedings of the American Society of International Law, vol. 94, pp. 240–9.</note>
<part>
<date>2000</date>
<detail type="volume">
<caption>vol.</caption>
<number>94</number>
</detail>
<extent unit="pages">
<start>240</start>
<end>9</end>
</extent>
</part>
</relatedItem>
<relatedItem type="references" ID="ref482" displayLabel="bib482">
<titleInfo>
<title>Leading Through Law</title>
</titleInfo>
<name type="personal">
<namePart type="family">SLAUGHTER</namePart>
<namePart type="given">A.-M.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>The Wilson Quarterly</title>
</titleInfo>
<genre>journal</genre>
<part>
<date>2003</date>
<detail type="volume">
<caption>vol.</caption>
<number>27</number>
</detail>
<detail type="issue">
<caption>no.</caption>
<number>4</number>
</detail>
<extent unit="pages">
<start>37</start>
<end>44</end>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref483" displayLabel="bib483">
<name type="personal">
<namePart type="family">SLAUGHTER</namePart>
<namePart type="given">A.-M.</namePart>
</name>
<name type="personal">
<namePart type="family">IGNATIEFF</namePart>
<namePart type="given">M.</namePart>
</name>
<titleInfo>
<title>American exceptionalism and human rights</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Slaughter, A.-M. 2005, ‘A Brave New Judicial World’, in M. Ignatieff (ed.), American exceptionalism and human rights, Princeton University Press, Princeton, NJ, pp. 277–303.</note>
<originInfo>
<publisher>Princeton University Press</publisher>
<place>
<placeTerm type="text">Princeton, NJ</placeTerm>
</place>
</originInfo>
<part>
<date>2005</date>
<extent unit="pages">
<start>277</start>
<end>303</end>
</extent>
</part>
</relatedItem>
<relatedItem type="references" ID="ref484" displayLabel="bib484">
<name type="personal">
<namePart type="family">SMITH</namePart>
<namePart type="given">R.</namePart>
</name>
<titleInfo>
<title>The utility of force: the art of war in the modern world</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Smith, R. 2005, The utility of force: the art of war in the modern world, Allen Lane, London.</note>
<originInfo>
<publisher>Allen Lane</publisher>
<place>
<placeTerm type="text">London</placeTerm>
</place>
</originInfo>
<part>
<date>2005</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref485" displayLabel="bib485">
<name type="personal">
<namePart type="family">SMITH</namePart>
<namePart type="given">S.</namePart>
</name>
<name type="personal">
<namePart type="family">BOOTH</namePart>
<namePart type="given">K.</namePart>
</name>
<titleInfo>
<title>Critical security studies and world politics</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Smith, S. 2005, ‘The Contested Concept of Security’, in K. Booth (ed.), Critical security studies and world politics, Lynne Rienner Publishers, Boulder, CO, pp. 47–63.</note>
<originInfo>
<publisher>Lynne Rienner Publishers</publisher>
<place>
<placeTerm type="text">Boulder, CO</placeTerm>
</place>
</originInfo>
<part>
<date>2005</date>
<extent unit="pages">
<start>47</start>
<end>63</end>
</extent>
</part>
</relatedItem>
<relatedItem type="references" ID="ref486" displayLabel="bib486">
<name type="personal">
<namePart type="family">SNOW</namePart>
<namePart type="given">T.</namePart>
</name>
<titleInfo>
<title>Interview with the Vice-President by Tony Snow</title>
</titleInfo>
<genre type="web">web</genre>
<note type="content-in-line">Snow, T. 2006, Interview with the Vice-President by Tony Snow, 29 March, March 2007 .</note>
<part>
<date>2006</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref487" displayLabel="bib487">
<titleInfo>
<title>Imperial Temptations</title>
</titleInfo>
<name type="personal">
<namePart type="family">SNYDER</namePart>
<namePart type="given">J.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>National Interest</title>
</titleInfo>
<genre>other</genre>
<part>
<date>2003</date>
<detail type="volume">
<caption>vol.</caption>
<number>71</number>
</detail>
<extent unit="pages">
<start>29</start>
<end>40</end>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref488" displayLabel="bib488">
<titleInfo>
<title>Terrorism and the Law</title>
</titleInfo>
<name type="personal">
<namePart type="family">SOFAER</namePart>
<namePart type="given">A.D.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>Foreign Affairs</title>
</titleInfo>
<genre>journal</genre>
<part>
<date>1986</date>
<detail type="volume">
<caption>vol.</caption>
<number>64</number>
</detail>
<detail type="issue">
<caption>no.</caption>
<number>5</number>
</detail>
<extent unit="pages">
<start>901</start>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref489" displayLabel="bib489">
<titleInfo>
<title>On the Necessity of Pre-Emption</title>
</titleInfo>
<name type="personal">
<namePart type="family">SOFAER</namePart>
<namePart type="given">A.D.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>European Journal of International Law</title>
</titleInfo>
<genre>journal</genre>
<part>
<date>2003</date>
<detail type="volume">
<caption>vol.</caption>
<number>14</number>
</detail>
<detail type="issue">
<caption>no.</caption>
<number>2</number>
</detail>
<extent unit="pages">
<start>209</start>
<end>26</end>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref490" displayLabel="bib490">
<name type="personal">
<namePart type="family">SOLOMON</namePart>
<namePart type="given">R.C.</namePart>
</name>
<titleInfo>
<title>The passions: emotions and the meaning of life</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Solomon, R.C. 1993, The passions: emotions and the meaning of life, 2nd edn, Hackett, Indianapolis.</note>
<originInfo>
<edition>2nd</edition>
<publisher>Hackett</publisher>
<place>
<placeTerm type="text">Indianapolis</placeTerm>
</place>
</originInfo>
<part>
<date>1993</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref491" displayLabel="bib491">
<name type="personal">
<namePart type="family">SOLOMON</namePart>
<namePart type="given">R.C.</namePart>
</name>
<titleInfo>
<title>Not passion’s slave: emotions and choice</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Solomon, R.C. 2003, Not passion’s slave: emotions and choice, Oxford University Press, Oxford.</note>
<originInfo>
<publisher>Oxford University Press</publisher>
<place>
<placeTerm type="text">Oxford</placeTerm>
</place>
</originInfo>
<part>
<date>2003</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref492" displayLabel="bib492">
<titleInfo>
<title>Unveiling Imperialism: Media, Gender, and the War on Afghanistan</title>
</titleInfo>
<name type="personal">
<namePart type="family">STABILE</namePart>
<namePart type="given">C.A.</namePart>
</name>
<name type="personal">
<namePart type="family">KUMAR</namePart>
<namePart type="given">D.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>Media, Culture and Society</title>
</titleInfo>
<genre>journal</genre>
<part>
<date>2005</date>
<detail type="volume">
<caption>vol.</caption>
<number>27</number>
</detail>
<detail type="issue">
<caption>no.</caption>
<number>5</number>
</detail>
<extent unit="pages">
<start>765</start>
<end>82</end>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref493" displayLabel="bib493">
<name type="personal">
<namePart type="family">STALENHEIM</namePart>
<namePart type="given">P.</namePart>
</name>
<name type="personal">
<namePart type="family">FRUCHART</namePart>
<namePart type="given">D.</namePart>
</name>
<name type="personal">
<namePart type="family">OMITOOGUN</namePart>
<namePart type="given">W.</namePart>
</name>
<name type="personal">
<namePart type="family">PERDOMO</namePart>
<namePart type="given">C.</namePart>
</name>
<titleInfo>
<title>SIPRI yearbook 2006</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Stalenheim, P., Fruchart, D., Omitoogun, W. and Perdomo, C. 2006, ‘Military Expenditure’, in Stockholm International Peace Research Institute (SIPRI) (ed.), SIPRI yearbook 2006, Oxford University Press, Oxford.</note>
<originInfo>
<publisher>Oxford University Press</publisher>
<place>
<placeTerm type="text">Oxford</placeTerm>
</place>
</originInfo>
<part>
<date>2006</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref494" displayLabel="bib494">
<name type="personal">
<namePart type="family">STEPHENS</namePart>
<namePart type="given">A.</namePart>
</name>
<name type="personal">
<namePart type="family">CONNERY</namePart>
<namePart type="given">D.</namePart>
</name>
<name type="personal">
<namePart type="family">BALL</namePart>
<namePart type="given">D.</namePart>
</name>
<name type="personal">
<namePart type="family">AYSON</namePart>
<namePart type="given">R.</namePart>
</name>
<titleInfo>
<title>Strategy and security in the Asia Pacific</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Stephens, A. and Connery, D. 2006, ‘Defence Transformation’, in D. Ball and R. Ayson (eds), Strategy and security in the Asia Pacific, Allen and Unwin, Sydney.</note>
<originInfo>
<publisher>Allen and Unwin</publisher>
<place>
<placeTerm type="text">Sydney</placeTerm>
</place>
</originInfo>
<part>
<date>2006</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref495" displayLabel="bib495">
<name type="personal">
<namePart type="family">STEPHENS</namePart>
<namePart type="given">P.</namePart>
</name>
<titleInfo>
<title>Tony Blair: the price of leadership</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Stephens, P. 2004, Tony Blair: the price of leadership, Politico’s, London.</note>
<originInfo>
<publisher>Politico’s</publisher>
<place>
<placeTerm type="text">London</placeTerm>
</place>
</originInfo>
<part>
<date>2004</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref496" displayLabel="bib496">
<name type="personal">
<namePart type="family">STEVENS</namePart>
<namePart type="given">K.R.</namePart>
</name>
<titleInfo>
<title>Border diplomacy: the Caroline and McLeod affairs in Anglo-American-Canadian relations</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Stevens, K.R. 2004, Border diplomacy: the Caroline and McLeod affairs in Anglo-American-Canadian relations, University of Alabama Press, Montgomery, AL.</note>
<originInfo>
<publisher>University of Alabama Press</publisher>
<place>
<placeTerm type="text">Montgomery, AL</placeTerm>
</place>
</originInfo>
<part>
<date>2004</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref497" displayLabel="bib497">
<titleInfo>
<title>Rethinking Guantanamo: Unlawful Confinement as Applied in International Criminal Law</title>
</titleInfo>
<name type="personal">
<namePart type="family">STEWART</namePart>
<namePart type="given">J.G.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>Journal of International Criminal Justice</title>
</titleInfo>
<genre>journal</genre>
<part>
<date>2006</date>
<detail type="volume">
<caption>vol.</caption>
<number>4</number>
</detail>
<detail type="issue">
<caption>no.</caption>
<number>1</number>
</detail>
<extent unit="pages">
<start>12</start>
<end>30</end>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref498" displayLabel="bib498">
<titleInfo>
<title>Guantanamo Bay: The Legal Black Hole</title>
</titleInfo>
<name type="personal">
<namePart type="family">STEYN</namePart>
<namePart type="given">J.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>International and Comparative Law Quarterly</title>
</titleInfo>
<genre>journal</genre>
<part>
<date>2004</date>
<detail type="volume">
<caption>vol.</caption>
<number>53</number>
</detail>
<detail type="issue">
<caption>no.</caption>
<number>1</number>
</detail>
<extent unit="pages">
<start>1</start>
<end>15</end>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref499" displayLabel="bib499">
<titleInfo>
<title>The Protected, the Protector, the Defender</title>
</titleInfo>
<name type="personal">
<namePart type="family">STIEHM</namePart>
<namePart type="given">J.H.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>Women’s Studies International Forum</title>
</titleInfo>
<genre>journal</genre>
<part>
<date>1982</date>
<detail type="volume">
<caption>vol.</caption>
<number>5</number>
</detail>
<detail type="issue">
<caption>no.</caption>
<number>3/4</number>
</detail>
<extent unit="pages">
<start>367</start>
<end>76</end>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref500" displayLabel="bib500">
<name type="personal">
<namePart type="family">SUáREZ</namePart>
<namePart type="given">F.</namePart>
</name>
<titleInfo>
<title>Selections from three works: De triplici virtute theologica, fide, spe, et caritate</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Suárez, F. 1944a, Selections from three works: De triplici virtute theologica, fide, spe, et caritate, Carnegie Classics on International Law, New York.</note>
<originInfo>
<publisher>Carnegie Classics on International Law</publisher>
<place>
<placeTerm type="text">New York</placeTerm>
</place>
</originInfo>
<part>
<date>1944</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref501" displayLabel="bib501">
<name type="personal">
<namePart type="family">SUáREZ</namePart>
<namePart type="given">F.</namePart>
</name>
<name type="personal">
<namePart type="family">WILLIAMS</namePart>
<namePart type="given">G.</namePart>
</name>
<titleInfo>
<title>Selections from three works</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Suárez, F. 1944b, ‘On war’, in G. Williams (ed.), Selections from three works, Oxford University Press, Oxford.</note>
<originInfo>
<publisher>Oxford University Press</publisher>
<place>
<placeTerm type="text">Oxford</placeTerm>
</place>
</originInfo>
<part>
<date>1944</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref502" displayLabel="bib502">
<titleInfo>
<title>Accelerated Vaccination for Ebola Virus Haemorrhagic Fever in Non-Human Primates</title>
</titleInfo>
<name type="personal">
<namePart type="family">SULLIVAN</namePart>
<namePart type="given">N.J.</namePart>
</name>
<name type="personal">
<namePart type="family">GEISBERT</namePart>
<namePart type="given">T.W.</namePart>
</name>
<name type="personal">
<namePart type="family">GEISBERT</namePart>
<namePart type="given">J.B.</namePart>
</name>
<name type="personal">
<namePart type="family">XU</namePart>
<namePart type="given">L.</namePart>
</name>
<name type="personal">
<namePart type="family">YANG</namePart>
<namePart type="given">Z.</namePart>
</name>
<name type="personal">
<namePart type="family">ROEDERER</namePart>
<namePart type="given">M.</namePart>
</name>
<name type="personal">
<namePart type="family">KOUP</namePart>
<namePart type="given">R.A.</namePart>
</name>
<name type="personal">
<namePart type="family">JAHRLING</namePart>
<namePart type="given">P.B.</namePart>
</name>
<name type="personal">
<namePart type="family">NABEL</namePart>
<namePart type="given">G.J.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>Nature</title>
</titleInfo>
<genre>journal</genre>
<part>
<date>2003</date>
<detail type="volume">
<caption>vol.</caption>
<number>424</number>
</detail>
<detail type="issue">
<caption>no.</caption>
<number>6949</number>
</detail>
<extent unit="pages">
<start>681</start>
<end>4</end>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref503" displayLabel="bib503">
<titleInfo>
<title>Hamdan v. Rumsfeld, Secretary of Defense</title>
</titleInfo>
<relatedItem type="host">
<titleInfo>
<title>Bench Opinion. Cited as: 548 US 2006</title>
</titleInfo>
<genre>other</genre>
<part>
<date>2006</date>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref504" displayLabel="bib504">
<titleInfo>
<title>How Habib Became one of the “Worst of the Worst”</title>
</titleInfo>
<relatedItem type="host">
<titleInfo>
<title>Sydney Morning Herald</title>
</titleInfo>
<genre>web</genre>
<part>
<date>2005</date>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref505" displayLabel="bib505">
<titleInfo>
<title>Hicks’ Lawyers in Bid to Bring Him Home</title>
</titleInfo>
<relatedItem type="host">
<titleInfo>
<title>Sydney Morning Herald</title>
</titleInfo>
<genre>web</genre>
<part>
<date>2006</date>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref506" displayLabel="bib506">
<titleInfo>
<title>Jessica Lynch and the Regeneration of American Identity and Power Post 9/11</title>
</titleInfo>
<name type="personal">
<namePart type="family">TAKACS</namePart>
<namePart type="given">S.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>Feminist Media Studies</title>
</titleInfo>
<genre>journal</genre>
<part>
<date>2005</date>
<detail type="volume">
<caption>vol.</caption>
<number>5</number>
</detail>
<detail type="issue">
<caption>no.</caption>
<number>3</number>
</detail>
<extent unit="pages">
<start>297</start>
<end>310</end>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref507" displayLabel="bib507">
<titleInfo>
<title>Cold War Spies: Why They Spied and How They Got Caught</title>
</titleInfo>
<name type="personal">
<namePart type="family">TAYLOR</namePart>
<namePart type="given">S.A.</namePart>
</name>
<name type="personal">
<namePart type="family">SNOW</namePart>
<namePart type="given">D.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>Intelligence and National Security</title>
</titleInfo>
<genre>journal</genre>
<part>
<date>1997</date>
<detail type="volume">
<caption>vol.</caption>
<number>12</number>
</detail>
<detail type="issue">
<caption>no.</caption>
<number>2</number>
</detail>
<extent unit="pages">
<start>101</start>
<end>25</end>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref508" displayLabel="bib508">
<name type="personal">
<namePart type="family">TESóN</namePart>
<namePart type="given">F.R.</namePart>
</name>
<titleInfo>
<title>A philosophy of international law</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Tesón, F.R. 1998, A philosophy of international law, Westview Press, Boulder, CO.</note>
<originInfo>
<publisher>Westview Press</publisher>
<place>
<placeTerm type="text">Boulder, CO</placeTerm>
</place>
</originInfo>
<part>
<date>1998</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref509" displayLabel="bib509">
<titleInfo>
<title>Ending Tyranny in Iraq</title>
</titleInfo>
<name type="personal">
<namePart type="family">TESóN</namePart>
<namePart type="given">F.R.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>Ethics and International Affairs</title>
</titleInfo>
<genre>journal</genre>
<part>
<date>2005</date>
<detail type="volume">
<caption>vol.</caption>
<number>19</number>
</detail>
<detail type="issue">
<caption>no.</caption>
<number>2</number>
</detail>
<extent unit="pages">
<start>1</start>
<end>20</end>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref510" displayLabel="bib510">
<titleInfo>
<title>The charges against David Hicks</title>
</titleInfo>
<genre type="web">web</genre>
<note type="content-in-line">The Age 2004, The charges against David Hicks, viewed 1 December 2006 .</note>
<part>
<date>2004</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref511" displayLabel="bib511">
<titleInfo>
<title>Terrorism, State Responsibility, and the Use of Military Force</title>
</titleInfo>
<name type="personal">
<namePart type="family">TRAVALIO</namePart>
<namePart type="given">G.</namePart>
</name>
<name type="personal">
<namePart type="family">ALTENBURG</namePart>
<namePart type="given">J.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>Chicago Journal of International Law</title>
</titleInfo>
<genre>journal</genre>
<part>
<date>2003</date>
<detail type="volume">
<caption>vol.</caption>
<number>4</number>
</detail>
<detail type="issue">
<caption>no.</caption>
<number>1</number>
</detail>
<extent unit="pages">
<start>97</start>
<end>119</end>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref512" displayLabel="bib512">
<titleInfo>
<title>Biological Threat Assessment: Is the Cure Worse Than the Disease?</title>
</titleInfo>
<name type="personal">
<namePart type="family">TUCKER</namePart>
<namePart type="given">J.B.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>Arms Control Today</title>
</titleInfo>
<genre>journal</genre>
<part>
<date>2004</date>
<detail type="volume">
<caption>vol.</caption>
<number>34</number>
</detail>
<detail type="issue">
<caption>no.</caption>
<number>8</number>
</detail>
<extent unit="pages">
<start>13</start>
<end>9</end>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref513" displayLabel="bib513">
<name type="personal">
<namePart type="family">TUCKER</namePart>
<namePart type="given">R.W.</namePart>
</name>
<titleInfo>
<title>The just war: a study in contemporary doctrine</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Tucker, R.W. 1960, The just war: a study in contemporary doctrine, Johns Hopkins University Press, Baltimore, MD.</note>
<originInfo>
<publisher>Johns Hopkins University Press</publisher>
<place>
<placeTerm type="text">Baltimore, MD</placeTerm>
</place>
</originInfo>
<part>
<date>1960</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref514" displayLabel="bib514">
<name type="personal">
<namePart type="family">TUSHNET</namePart>
<namePart type="given">M.V.</namePart>
</name>
<name type="personal">
<namePart type="family">TUSHNET</namePart>
<namePart type="given">M.V.</namePart>
</name>
<titleInfo>
<title>The constitution in wartime: beyond alarmism and complacency</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Tushnet, M.V. 2005, ‘Emergencies and the Idea of Constitutionalism’, in M.V. Tushnet (ed.), The constitution in wartime: beyond alarmism and complacency, Duke University Press, Durham NC, pp. 39–54.</note>
<originInfo>
<publisher>Duke University Press</publisher>
<place>
<placeTerm type="text">Durham NC</placeTerm>
</place>
</originInfo>
<part>
<date>2005</date>
<extent unit="pages">
<start>39</start>
<end>54</end>
</extent>
</part>
</relatedItem>
<relatedItem type="references" ID="ref515" displayLabel="bib515">
<titleInfo>
<title>Financial havens, bank secrecy and money laundering, United Nations Office on Drug Control and Crime Prevention</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">United Nations 1998, Financial havens, bank secrecy and money laundering, United Nations Office on Drug Control and Crime Prevention, Vienna.</note>
<originInfo>
<place>
<placeTerm type="text">Vienna</placeTerm>
</place>
</originInfo>
<part>
<date>1998</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref516" displayLabel="bib516">
<titleInfo>
<title>A more secure world our shared responsibility: report of the High-level Panel on Threats, Challenges, and Change, United Nations</title>
</titleInfo>
<genre type="web">web</genre>
<note type="content-in-line">United Nations High-level Panel on Threats Challenges and Change 2004, A more secure world our shared responsibility: report of the High-level Panel on Threats, Challenges, and Change, United Nations .</note>
<part>
<date>2004</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref517" displayLabel="bib517">
<titleInfo>
<title>Charge sheet – David Hicks</title>
</titleInfo>
<genre type="web">web</genre>
<note type="content-in-line">United Sates Department of Defense 2004, Charge sheet – David Hicks, viewed 7 November 2006 .</note>
<part>
<date>2004</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref518" displayLabel="bib518">
<titleInfo>
<title>JTF-GTMO information on detainees</title>
</titleInfo>
<genre type="web">web</genre>
<note type="content-in-line">United Sates Department of Defense 2005a, JTF-GTMO information on detainees, viewed 7 November 2006 .</note>
<part>
<date>2005</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref519" displayLabel="bib519">
<titleInfo>
<title>The national defense strategy of the United States of America</title>
</titleInfo>
<genre type="web">web</genre>
<note type="content-in-line">United Sates Department of Defense 2005b, The national defense strategy of the United States of America, viewed 26 March 2007 .</note>
<part>
<date>2005</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref520" displayLabel="bib520">
<titleInfo>
<title>Quadrennial defense review report</title>
</titleInfo>
<genre type="web">web</genre>
<note type="content-in-line">United Sates Department of Defense 2006a, Quadrennial defense review report, viewed 1 March 2007 .</note>
<part>
<date>2006</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref521" displayLabel="bib521">
<titleInfo>
<title>Detainee transfer announced</title>
</titleInfo>
<genre type="web">web</genre>
<note type="content-in-line">United Sates Department of Defense 2006b, Detainee transfer announced, viewed 1 December 2006 .</note>
<part>
<date>2006</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref522" displayLabel="bib522">
<titleInfo>
<title>Military commissions fact sheet</title>
</titleInfo>
<genre type="web">web</genre>
<note type="content-in-line">United Sates Department of Defense 2006c, Military commissions fact sheet, viewed 1 December 2006 .</note>
<part>
<date>2006</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref523" displayLabel="bib523">
<titleInfo>
<title>Commission transcripts, exhibits, and allied papers – David Hicks</title>
</titleInfo>
<genre type="web">web</genre>
<note type="content-in-line">United Sates Department of Defense 2006d, Commission transcripts, exhibits, and allied papers – David Hicks, viewed 1 December 2006 .</note>
<part>
<date>2006</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref524" displayLabel="bib524">
<titleInfo>
<title>The national security strategy of the United States of America</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">US 2002, The national security strategy of the United States of America, Washington, DC, September.</note>
<originInfo>
<place>
<placeTerm type="text">Washington, DC</placeTerm>
</place>
</originInfo>
<part>
<date>2002</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref525" displayLabel="bib525">
<titleInfo>
<title>Victims of trafficking and violence protection act of 2000: trafficking in persons report</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">US Department of State 2005, Victims of trafficking and violence protection act of 2000: trafficking in persons report, US Department of State, Washington.</note>
<originInfo>
<publisher>US Department of State</publisher>
<place>
<placeTerm type="text">Washington</placeTerm>
</place>
</originInfo>
<part>
<date>2005</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref526" displayLabel="bib526">
<titleInfo>
<title>Money laundering threat assessment</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">US Treasury 2005, Money laundering threat assessment, US Treasury, Washington, DC.</note>
<originInfo>
<publisher>US Treasury</publisher>
<place>
<placeTerm type="text">Washington, DC</placeTerm>
</place>
</originInfo>
<part>
<date>2005</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref527" displayLabel="bib527">
<titleInfo>
<title>Fragile states strategy</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">USAID 2005, Fragile states strategy, USAID, Washington, DC.</note>
<originInfo>
<place>
<placeTerm type="text">USAID, Washington, DC</placeTerm>
</place>
</originInfo>
<part>
<date>2005</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref528" displayLabel="bib528">
<name type="personal">
<namePart type="family">VAN CREVELD</namePart>
<namePart type="given">M.L.</namePart>
</name>
<titleInfo>
<title>The transformation of war</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Van Creveld, M.L. 1991, The transformation of war, Free Press; Collier Macmillan Canada; Maxwell Macmillan International, New York; Toronto.</note>
<originInfo>
<publisher>Free Press</publisher>
<place>
<placeTerm type="text">Collier Macmillan Canada; Maxwell Macmillan International, New York; Toronto</placeTerm>
</place>
</originInfo>
<part>
<date>1991</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref529" displayLabel="bib529">
<titleInfo>
<title>Why Europe Matters, Why the Third World Doesn’t: American Grand Strategy After the Cold War</title>
</titleInfo>
<name type="personal">
<namePart type="family">VAN EVERA</namePart>
<namePart type="given">S.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>Journal of Strategic Studies</title>
</titleInfo>
<genre>journal</genre>
<part>
<date>1990</date>
<detail type="volume">
<caption>vol.</caption>
<number>13</number>
</detail>
<detail type="issue">
<caption>no.</caption>
<number>2</number>
</detail>
<extent unit="pages">
<start>1</start>
<end>51</end>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref530" displayLabel="bib530">
<titleInfo>
<title>Bush Administration, Weak on Terror</title>
</titleInfo>
<name type="personal">
<namePart type="family">VAN EVERA</namePart>
<namePart type="given">S.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>Middle East Policy</title>
</titleInfo>
<genre>journal</genre>
<part>
<date>2006</date>
<detail type="volume">
<caption>vol.</caption>
<number>13</number>
</detail>
<detail type="issue">
<caption>no.</caption>
<number>4</number>
</detail>
<extent unit="pages">
<start>28</start>
<end>38</end>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref531" displayLabel="bib531">
<titleInfo>
<title>Money Laundering, Global Financial Instability and Tax Havens in the Pacific Islands</title>
</titleInfo>
<name type="personal">
<namePart type="family">VAN FOSSEN</namePart>
<namePart type="given">A.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>Contemporary Pacific</title>
</titleInfo>
<genre>journal</genre>
<part>
<date>2003</date>
<detail type="volume">
<caption>vol.</caption>
<number>15</number>
</detail>
<detail type="issue">
<caption>no.</caption>
<number>2</number>
</detail>
<extent unit="pages">
<start>237</start>
<end>75</end>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref532" displayLabel="bib532">
<name type="personal">
<namePart type="family">VATTEL</namePart>
<namePart type="given">E.</namePart>
</name>
<titleInfo>
<title>The law of nations and the principles of natural law applied to the conduct and to the affairs of nations and sovereigns</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Vattel, E. 1916, The law of nations and the principles of natural law applied to the conduct and to the affairs of nations and sovereigns, Carnegie Institution, Washington, DC.</note>
<originInfo>
<publisher>Carnegie Institution</publisher>
<place>
<placeTerm type="text">Washington, DC</placeTerm>
</place>
</originInfo>
<part>
<date>1916</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref533" displayLabel="bib533">
<name type="personal">
<namePart type="family">VERNANT</namePart>
<namePart type="given">J-P.</namePart>
</name>
<titleInfo>
<title>The origins of Greek thought</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Vernant, J-P. 1982, The origins of Greek thought, Cornell University Press, Ithaca, NY.</note>
<originInfo>
<publisher>Cornell University Press</publisher>
<place>
<placeTerm type="text">Ithaca, NY</placeTerm>
</place>
</originInfo>
<part>
<date>1982</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref534" displayLabel="bib534">
<name type="personal">
<namePart type="family">VITORIA</namePart>
<namePart type="given">F.D.</namePart>
</name>
<name type="personal">
<namePart type="family">PAGDEN</namePart>
<namePart type="given">Anthony</namePart>
</name>
<titleInfo>
<title>Vitoria: Political writings</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Vitoria, F.D. 1991, Vitoria: Political writings edited and translated by Anthony Pagden, Cambridge: Cambridge University Press.</note>
<originInfo>
<publisher>Cambridge University Press</publisher>
<place>
<placeTerm type="text">Cambridge</placeTerm>
</place>
</originInfo>
<part>
<date>1991</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref535" displayLabel="bib535">
<name type="personal">
<namePart type="family">WALT</namePart>
<namePart type="given">S.M.</namePart>
</name>
<titleInfo>
<title>Taming American power: the global response to US primacy</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Walt, S.M. 2006, Taming American power: the global response to US primacy, W.W. Norton, New York.</note>
<originInfo>
<publisher>W.W. Norton</publisher>
<place>
<placeTerm type="text">New York</placeTerm>
</place>
</originInfo>
<part>
<date>2006</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref536" displayLabel="bib536">
<titleInfo>
<title>Political Action: the Problem of Dirty Hands</title>
</titleInfo>
<name type="personal">
<namePart type="family">WALZER</namePart>
<namePart type="given">M.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>Philosophy and Public Affairs</title>
</titleInfo>
<genre>journal</genre>
<part>
<date>1973</date>
<detail type="volume">
<caption>vol.</caption>
<number>2</number>
</detail>
<detail type="issue">
<caption>no.</caption>
<number>2</number>
</detail>
<extent unit="pages">
<start>160</start>
<end>80</end>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref537" displayLabel="bib537">
<name type="personal">
<namePart type="family">WALZER</namePart>
<namePart type="given">M.</namePart>
</name>
<titleInfo>
<title>Just and unjust wars: a moral argument with historical illustrations</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Walzer, M. 1977, Just and unjust wars: a moral argument with historical illustrations, Basic Books, New York.</note>
<originInfo>
<publisher>Basic Books</publisher>
<place>
<placeTerm type="text">New York</placeTerm>
</place>
</originInfo>
<part>
<date>1977</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref538" displayLabel="bib538">
<name type="personal">
<namePart type="family">WALZER</namePart>
<namePart type="given">M.</namePart>
</name>
<titleInfo>
<title>Just and unjust wars: a moral argument with historical illustrations</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Walzer, M. 1992, Just and unjust wars: a moral argument with historical illustrations, 2nd edn, Basic Books, New York.</note>
<originInfo>
<edition>2nd</edition>
<publisher>Basic Books</publisher>
<place>
<placeTerm type="text">New York</placeTerm>
</place>
</originInfo>
<part>
<date>1992</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref539" displayLabel="bib539">
<name type="personal">
<namePart type="family">WALZER</namePart>
<namePart type="given">M.</namePart>
</name>
<titleInfo>
<title>Arguing about war</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Walzer, M. 2004, Arguing about war, Yale University Press, New Haven, CT; London.</note>
<originInfo>
<publisher>Yale University Press</publisher>
<place>
<placeTerm type="text">New Haven, CT; London</placeTerm>
</place>
</originInfo>
<part>
<date>2004</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref540" displayLabel="bib540">
<titleInfo>
<title>The Secretive Fight Against Bioterror</title>
</titleInfo>
<name type="personal">
<namePart type="family">WARRICK</namePart>
<namePart type="given">J.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>Washington Post</title>
</titleInfo>
<genre>other</genre>
<part>
<date>2006</date>
<extent unit="pages">
<start>A01</start>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref541" displayLabel="bib541">
<name type="personal">
<namePart type="family">WEBSTER</namePart>
<namePart type="given">D.</namePart>
</name>
<name type="personal">
<namePart type="family">SHEWMAKER</namePart>
<namePart type="given">K.E.</namePart>
</name>
<titleInfo>
<title>The Papers of Daniel Webster: Diplomatic Papers, Volume</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Webster, D. 1983, ‘Letter to Sir Henry Stephen Fox’, in K.E. Shewmaker (ed.), The Papers of Daniel Webster: Diplomatic Papers, Volume 1: 1841–1843, University of New England Press, Armidale.</note>
<originInfo>
<publisher>University of New England Press</publisher>
<place>
<placeTerm type="text">Armidale</placeTerm>
</place>
</originInfo>
<part>
<date>1983</date>
<detail type="volume">
<caption>vol.</caption>
<number>1</number>
</detail>
<extent unit="pages">
<start>1841</start>
<end>1843</end>
</extent>
</part>
</relatedItem>
<relatedItem type="references" ID="ref542" displayLabel="bib542">
<titleInfo>
<title>Follow the Money</title>
</titleInfo>
<name type="personal">
<namePart type="family">WECHSLER</namePart>
<namePart type="given">W.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>Foreign Affairs</title>
</titleInfo>
<genre>other</genre>
<part>
<date>2001</date>
<detail type="volume">
<caption>vol.</caption>
<number>80</number>
</detail>
<extent unit="pages">
<start>40</start>
<end>57</end>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref543" displayLabel="bib543">
<name type="personal">
<namePart type="family">WEEKS</namePart>
<namePart type="given">L.</namePart>
</name>
<titleInfo>
<title>Silence no longer an option, says Fonda, The Sydney Morning Herald</title>
</titleInfo>
<genre type="web">web</genre>
<note type="content-in-line">Weeks, L. 2007, Silence no longer an option, says Fonda, The Sydney Morning Herald, 29 January, viewed 26 April 2007 .</note>
<part>
<date>2007</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref544" displayLabel="bib544">
<titleInfo>
<title>Pre-emption Evolves from an Idea to Official Action</title>
</titleInfo>
<name type="personal">
<namePart type="family">WEISMAN</namePart>
<namePart type="given">S.R.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>New York Times</title>
</titleInfo>
<genre>other</genre>
<part>
<date>2003</date>
<extent unit="pages">
<start>B1</start>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref545" displayLabel="bib545">
<name type="personal">
<namePart type="family">WHEELER</namePart>
<namePart type="given">N.J.</namePart>
</name>
<titleInfo>
<title>Saving strangers: humanitarian intervention in international society</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Wheeler, N.J. 2000, Saving strangers: humanitarian intervention in international society, Oxford University Press, Oxford; New York.</note>
<originInfo>
<publisher>Oxford University Press</publisher>
<place>
<placeTerm type="text">Oxford; New York</placeTerm>
</place>
</originInfo>
<part>
<date>2000</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref546" displayLabel="bib546">
<titleInfo>
<title>Statement of the Atlantic Summit: A vision for Iraq and the Iraqi people</title>
</titleInfo>
<genre type="web">web</genre>
<note type="content-in-line">White House 2003, Statement of the Atlantic Summit: A vision for Iraq and the Iraqi people, 16 March, viewed 25 March 2007. </note>
<part>
<date>2003</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref547" displayLabel="bib547">
<titleInfo>
<title>President Bush Signs Military Commissions Act of 2006, Office of the Press Secretary</title>
</titleInfo>
<genre type="web">web</genre>
<note type="content-in-line">White House 2006a, President Bush Signs Military Commissions Act of 2006, Office of the Press Secretary, viewed 1 December 2006 .</note>
<part>
<date>2006</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref548" displayLabel="bib548">
<titleInfo>
<title>President discusses creation of military commissions to try suspected terrorists, Office of the Press Secretary</title>
</titleInfo>
<genre type="web">web</genre>
<note type="content-in-line">White House 2006b, President discusses creation of military commissions to try suspected terrorists, Office of the Press Secretary, viewed 15 March 2007 .</note>
<part>
<date>2006</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref549" displayLabel="bib549">
<name type="personal">
<namePart type="family">WILKINSON</namePart>
<namePart type="given">M.</namePart>
</name>
<name type="personal">
<namePart type="family">PEARLMANN</namePart>
<namePart type="given">J.</namePart>
</name>
<titleInfo>
<title>Military trial only option for Hicks, says Ruddock</title>
</titleInfo>
<genre type="web">web</genre>
<note type="content-in-line">Wilkinson, M. and Pearlmann, J. 2004, Military trial only option for Hicks, says Ruddock, viewed 18 December 2006 .</note>
<part>
<date>2004</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref550" displayLabel="bib550">
<name type="personal">
<namePart type="family">WILLIAMS</namePart>
<namePart type="given">C.</namePart>
</name>
<name type="personal">
<namePart type="family">BALL</namePart>
<namePart type="given">D.</namePart>
</name>
<name type="personal">
<namePart type="family">AYSON</namePart>
<namePart type="given">R.</namePart>
</name>
<titleInfo>
<title>Strategy and security in the Asia Pacific</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Williams, C. 2006, ‘Terrorism’, in D. Ball and R. Ayson (eds), Strategy and security in the Asia Pacific, Allen and Unwin, Sydney.</note>
<originInfo>
<publisher>Allen and Unwin</publisher>
<place>
<placeTerm type="text">Sydney</placeTerm>
</place>
</originInfo>
<part>
<date>2006</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref551" displayLabel="bib551">
<name type="personal">
<namePart type="family">WILLIAMS</namePart>
<namePart type="given">S.J.</namePart>
</name>
<titleInfo>
<title>Emotion and social theory: corporeal reflections on the (ir)rational</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Williams, S.J. 2001, Emotion and social theory: corporeal reflections on the (ir)rational, Sage, London; Thousand Oaks, CA.</note>
<originInfo>
<place>
<placeTerm type="text">Sage, London; Thousand Oaks, CA</placeTerm>
</place>
</originInfo>
<part>
<date>2001</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref552" displayLabel="bib552">
<titleInfo>
<title>Globalization, Terrorist Finance, and Global Conflict: Time for a White List?</title>
</titleInfo>
<name type="personal">
<namePart type="family">WINER</namePart>
<namePart type="given">J.M.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>European Journal of Law Reform</title>
</titleInfo>
<genre>journal</genre>
<part>
<date>2002</date>
<detail type="volume">
<caption>vol.</caption>
<number>4</number>
</detail>
<detail type="issue">
<caption>no.</caption>
<number>2</number>
</detail>
<extent unit="pages">
<start>255</start>
<end>90</end>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref553" displayLabel="bib553">
<name type="personal">
<namePart type="family">WIPPMAN</namePart>
<namePart type="given">D.</namePart>
</name>
<name type="personal">
<namePart type="family">WIPPMAN</namePart>
<namePart type="given">D.</namePart>
</name>
<name type="personal">
<namePart type="family">EVANGELISTA</namePart>
<namePart type="given">M.</namePart>
</name>
<titleInfo>
<title>New wars, new laws?: applying the laws of war in 21st century conflicts</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Wippman, D. 2005, ‘Introduction: Do New Wars Call for New Laws?’ in D. Wippman and M. Evangelista (eds), New wars, new laws?: applying the laws of war in 21st century conflicts, Transnational Publishers, Ardley, NY, pp. 1–28.</note>
<originInfo>
<publisher>Transnational Publishers</publisher>
<place>
<placeTerm type="text">Ardley, NY</placeTerm>
</place>
</originInfo>
<part>
<date>2005</date>
<extent unit="pages">
<start>1</start>
<end>28</end>
</extent>
</part>
</relatedItem>
<relatedItem type="references" ID="ref554" displayLabel="bib554">
<name type="personal">
<namePart type="family">WOLFF</namePart>
<namePart type="given">C.</namePart>
</name>
<titleInfo>
<title>Jus gentium</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Wolff, C. 1934, Jus gentium, Carnegie Classics on International Law, New York.</note>
<originInfo>
<publisher>Carnegie Classics on International Law</publisher>
<place>
<placeTerm type="text">New York</placeTerm>
</place>
</originInfo>
<part>
<date>1934</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref555" displayLabel="bib555">
<titleInfo>
<title>The Shifting Politics of Foreign Aid</title>
</titleInfo>
<name type="personal">
<namePart type="family">WOODS</namePart>
<namePart type="given">N.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>International Affairs</title>
</titleInfo>
<genre>journal</genre>
<part>
<date>2005</date>
<detail type="volume">
<caption>vol.</caption>
<number>81</number>
</detail>
<detail type="issue">
<caption>no.</caption>
<number>2</number>
</detail>
<extent unit="pages">
<start>393</start>
<end>409</end>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref556" displayLabel="bib556">
<name type="personal">
<namePart type="family">WOODWARD</namePart>
<namePart type="given">B.</namePart>
</name>
<titleInfo>
<title>Plan of attack</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Woodward, B. 2004, Plan of attack, Simon and Schuster, New York.</note>
<originInfo>
<publisher>Simon and Schuster</publisher>
<place>
<placeTerm type="text">New York</placeTerm>
</place>
</originInfo>
<part>
<date>2004</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref557" displayLabel="bib557">
<titleInfo>
<title>Iraq was motive for bombing: suspect</title>
</titleInfo>
<name type="personal">
<namePart type="family">WROE</namePart>
<namePart type="given">D.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>The Age</title>
</titleInfo>
<genre>other</genre>
<part>
<date>2005</date>
<extent unit="pages">
<start>1</start>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref558" displayLabel="bib558">
<name type="personal">
<namePart type="family">YOCH JR</namePart>
<namePart type="given">J.M.</namePart>
</name>
<titleInfo>
<title>Hicks to challenge US military commissions law</title>
</titleInfo>
<genre type="web">web</genre>
<note type="content-in-line">Yoch Jr, J.M. 2006, Hicks to challenge US military commissions law, viewed 7 November 2006 .</note>
<part>
<date>2006</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref559" displayLabel="bib559">
<titleInfo>
<title>Using Force</title>
</titleInfo>
<name type="personal">
<namePart type="family">YOO</namePart>
<namePart type="given">J.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>The University of Chicago Law Review</title>
</titleInfo>
<genre>other</genre>
<part>
<date>2004</date>
<detail type="volume">
<caption>vol.</caption>
<number>71</number>
</detail>
<detail type="issue">
<caption>no.</caption>
<number>3</number>
</detail>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref560" displayLabel="bib560">
<name type="personal">
<namePart type="family">YOO</namePart>
<namePart type="given">J.</namePart>
</name>
<titleInfo>
<title>War by other means: an insider’s account of the war on terror</title>
</titleInfo>
<genre type="book">book</genre>
<note type="content-in-line">Yoo, J. 2006, War by other means: an insider’s account of the war on terror, Atlantic Monthly Press, New York.</note>
<originInfo>
<publisher>Atlantic Monthly Press</publisher>
<place>
<placeTerm type="text">New York</placeTerm>
</place>
</originInfo>
<part>
<date>2006</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref561" displayLabel="bib561">
<titleInfo>
<title>Feminist Reactions to the Contemporary Security Regime</title>
</titleInfo>
<name type="personal">
<namePart type="family">YOUNG</namePart>
<namePart type="given">I.M.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>Hypatia</title>
</titleInfo>
<genre>journal</genre>
<part>
<date>2003</date>
<detail type="volume">
<caption>vol.</caption>
<number>18</number>
</detail>
<detail type="issue">
<caption>no.</caption>
<number>1</number>
</detail>
<extent unit="pages">
<start>223</start>
<end>31</end>
</extent>
</part>
</relatedItem>
</relatedItem>
<relatedItem type="references" ID="ref562" displayLabel="bib562">
<titleInfo>
<title>Five years later, Afghanistan still in flames</title>
</titleInfo>
<genre type="web">web</genre>
<note type="content-in-line">Zoya 2006, Five years later, Afghanistan still in flames, 7 October, viewed 26 April 2007 .</note>
<part>
<date>2006</date>
</part>
</relatedItem>
<relatedItem type="references" ID="ref563" displayLabel="bib563">
<titleInfo>
<title>Mediating Murder: Ethics, Trauma and the Price of Death</title>
</titleInfo>
<name type="personal">
<namePart type="family">ZYLINSKA</namePart>
<namePart type="given">J.</namePart>
</name>
<relatedItem type="host">
<titleInfo>
<title>Journal of Cultural Research</title>
</titleInfo>
<genre>journal</genre>
<part>
<date>2004</date>
<detail type="volume">
<caption>vol.</caption>
<number>8</number>
</detail>
<detail type="issue">
<caption>no.</caption>
<number>3</number>
</detail>
<extent unit="pages">
<start>232</start>
<end>35</end>
</extent>
</part>
</relatedItem>
</relatedItem>
<identifier type="istex">6DC88EF2BD07378714288E1CF248E10685AEA5B7</identifier>
<identifier type="ark">ark:/67375/T1V-NRX7TW73-5</identifier>
<identifier type="DOI">10.4324/9780203028094</identifier>
<accessCondition type="use and reproduction" contentType="copyright">2008</accessCondition>
<accessCondition type="use and reproduction" contentType="statement">© Alex J. Bellamy, Roland Bleiker, Sara E. Davies, Richard Devetak for editorial selection; individual chapters, the contributors</accessCondition>
<accessCondition type="use and reproduction" contentType="holder">Alex J. Bellamy, Roland Bleiker, Sara E. Davies, Richard Devetak</accessCondition>
<accessCondition type="use and reproduction" contentType="other">First published 2008</accessCondition>
<accessCondition type="use and reproduction" contentType="other">Simultaneously published in the USA and Canada</accessCondition>
<accessCondition type="use and reproduction" contentType="moralrightsassertion">This edition published in the Taylor & Francis e-Library, 2007.</accessCondition>
<accessCondition type="use and reproduction" contentType="other">“To purchase your own copy of this or any of Taylor & Francis or Routledge’s collection of thousands of eBooks please go to www.eBookstore.tandf.co.uk.”</accessCondition>
<accessCondition type="use and reproduction" contentType="imprintstatement">Routledge is an imprint of the Taylor & Francis Group, an informa business</accessCondition>
<accessCondition type="use and reproduction" contentType="reproductionstatement">All rights reserved. No part of this book may be reprinted or reproduced or utilised in any form or by any electronic, mechanical, or other means, now known or hereafter invented, including photocopying and recording, or in any information storage or retrieval system, without permission in writing from the publishers.</accessCondition>
<accessCondition type="use and reproduction" contentType="britishlibrary">A catalogue record for this book is available from the British Library</accessCondition>
<accessCondition type="use and reproduction" contentType="cip">Security and the war on terror / edited by Alex J. Bellamy … [et al.].   p. cm.  Includes bibliographical references.  1. Security, International. 2. War on Terrorism, 2001–  I. Bellamy, Alex J., 1975 JZ5588.S4295 2007 909.83’1–dc22                    2007018593</accessCondition>
<accessCondition type="use and reproduction" contentType="other">ISBN 0-203-02809-0 Master e-book ISBN</accessCondition>
<accessCondition type="use and reproduction" contentType="other">ISBN10: 0-415-36844-8 (hbk)</accessCondition>
<accessCondition type="use and reproduction" contentType="other">ISBN10: 0-415-36845-6 (pbk)</accessCondition>
<accessCondition type="use and reproduction" contentType="other">ISBN10: 0-203-02809-0 (ebk)</accessCondition>
<accessCondition type="use and reproduction" contentType="other">ISBN13: 978-0-415-36844-5 (hbk)</accessCondition>
<accessCondition type="use and reproduction" contentType="other">ISBN13: 978-0-415-36845-2 (pbk)</accessCondition>
<accessCondition type="use and reproduction" contentType="other">ISBN13: 978-0-203-02809-4 (ebk)</accessCondition>
<recordInfo>
<recordContentSource authority="ISTEX" authorityURI="https://loaded-corpus.data.istex.fr" valueURI="https://loaded-corpus.data.istex.fr/ark:/67375/XBH-QGNTS49S-T">Taylor-Francis</recordContentSource>
<recordOrigin>Converted from (version 1.2.8) to MODS version 3.6.</recordOrigin>
<recordCreationDate encoding="w3cdtf">2020-03-04</recordCreationDate>
</recordInfo>
</mods>
<json:item>
<extension>json</extension>
<original>false</original>
<mimetype>application/json</mimetype>
<uri>https://api.istex.fr/ark:/67375/T1V-NRX7TW73-5/record.json</uri>
</json:item>
</metadata>
<author></author>
<serie></serie>
</istex>
</record>

Pour manipuler ce document sous Unix (Dilib)

EXPLOR_STEP=$WICRI_ROOT/Sante/explor/SrasV1/Data/Istex/Corpus
HfdSelect -h $EXPLOR_STEP/biblio.hfd -nk 001F66 | SxmlIndent | more

Ou

HfdSelect -h $EXPLOR_AREA/Data/Istex/Corpus/biblio.hfd -nk 001F66 | SxmlIndent | more

Pour mettre un lien sur cette page dans le réseau Wicri

{{Explor lien
   |wiki=    Sante
   |area=    SrasV1
   |flux=    Istex
   |étape=   Corpus
   |type=    RBID
   |clé=     ISTEX:6DC88EF2BD07378714288E1CF248E10685AEA5B7
   |texte=   Security and the War on Terror
}}

Wicri

This area was generated with Dilib version V0.6.33.
Data generation: Tue Apr 28 14:49:16 2020. Site generation: Sat Mar 27 22:06:49 2021