78
Past as Prologue The Evolution of Domestic Counterterrorism Policy in the United States, United Kingdom, and Spain in Response to Political Terrorism Masters Tutorial 8/13/2012

Past as Prologue

Embed Size (px)

Citation preview

Past as Prologue The Evolution of Domestic Counterterrorism Policy in the United States, United Kingdom, and Spain in Response to Political Terrorism

Masters Tutorial 8/13/2012

1

Table of Contents Introduction .......................................................................................................................................................... 2

The Definition ...................................................................................................................................................... 6

Counterterrorism Policy Components ................................................................................................. 19

Illustrative Examples .................................................................................................................................... 23

The United States ..................................................................................................................................23

The United Kingdom ............................................................................................................................37

Spain ..........................................................................................................................................................54

Lessons Learned? ............................................................................................................................................ 66

Appendix 1: The 3 Rules of Counterterrorism Policy .................................................................. 74

Appendix 2: Acronyms .................................................................................................................................. 75

Bibliography ...................................................................................................................................................... 76

2

“Virtue, without which terror is fatal; terror, without which virtue is impotent. Terror

is nothing but prompt, severe, inflexible justice; it is therefore an emanation of virtue. It is less

a special principle than a consequence of the general principle of democracy applied to our

country's most pressing needs.”

- Maximilien Robespierre; The Political Philosophy of Terror, 1794

3

It is hard to imagine a world where the events of September 11, 2001 did not

happen. More than 10 years later, it still impacts lives on a daily basis and there is no

reversing the destruction reaped at the hands of the men that planned and executed the

attack. This was a show of contemporary political terror. Maximilien Robespierre, who

talked on the subject of terror, as used by the state during the French Revolution in the

1790s, had extolled the use of it as an emanation of virtue. One wonders would he would

say now given how much it has changed since then.

It is that very nature of change that drives the study of counterterrorism in political

science. Political violence, including political terrorism, is unlike any other subfield because

in that it deals so directly with the finality of life and actively tries to outwit it. Included in

the subfield are areas ranging from psychology and microbiology to disaster response and

foreign policy, but this paper will examine with the use of policy in outwitting terrorism.

It is important to note here that terrorism is not something that can be beaten or

completely wiped out. There will never be a Victory Over Terrorism day, like there was a

Victory Over Japan day at the end of World War II. Terrorism will continue to evolve. The

challenge of counterterrorism is to predict that evolution and try to stifle it as much as

possible.

The question this paper seeks to answer is why and how a country responds

domestically to an act of political terror on its own soil. The why will examine the history of

country through a specific political terror phenomenon and how the ontology gained

through those experiences shaped its response to a modern political terrorism attack.

4

The how will examine the specific policy and institutional changes since in the

response to one group in the past and one attack in the present Three countries will serve

as illustrative examples : The United States, The United Kingdom, and Spain. These three

countries were chosen because of the long engagement between the central governments

and domestic political terrorist groups in the past and the large events that happened in

2001, 2005, and 2004, respectively. While many other countries may have served as

appropriate cases studies, his paper sought to focus on European and American responses

because they offer some of the most stable political climates to judge change in.

This question arises because of the constant need to evaluate current policies and

gain fresh perspectives. An unfortunate reality of the subject is that within a couple years of

being published, laws can change and invalidate claims and predictions. This is not a bad

thing, but it does call for an evolving study.

Section I will explore the definition of terrorism. The struggle to define it is often as

hard if not harder than the struggle against it and if there is a failure to define, then there is

a failure to defend. Section II will discuss the three rules of counterterrorism. Section III

will go on to cover the three illustrative examples mentioned earlier. Each of those will

include a history of terror in the country and its policy response to a modern event. Finally,

Section IV will evaluate each illustrative example’s adherence to the three rules and offer

the opinion of the author. This section will deal more with the changes seen and not the

related outcomes. It will show the how of the change and not if that change was successful.

Two appendices are also included. Appendix 1 is a list of the three rules; Appendix 2 is a list

5

of acronyms used throughout the paper. The ultimate goal of this paper is to give a holistic

view to both the nature of the problem and the way in which it is dealt with.

6

I. The Definition

The following exchange took place between Ned Walker, then Assistant to the

Undersecretary for Middle East Affairs at the U.S. State Department and Lee Hamilton, then

Chairman of the subcommittee on Europe and the Middle East, as they discussed the

background to the talks between the United States and Palestinian Liberation Organization

(PLO):

Hamilton: Well, how do you define terrorism, do you define it in terms of noncombatance?

Walker: The State Department definition which is included in the terrorism report annually defines it in terms of politically motivated attacks on noncombatant targets.

Hamilton: So an attack on a military unit in Israel will not be terrorism? Walker: It does not necessarily mean that it would not have a very major impact on

whatever we were proposing to do with the PLO. Hamilton: I understand that, but it would not be terrorism. Walker: An attack on a military target. Not according to the definition. Now wait a

minute; that is not quite correct. You know attacks can be made on military targets which clearly are terrorism. It depends on the individual circumstance.

Hamilton: Now wait a minute. I thought that you just gave me the State Department definition.

Walker: Noncombatant is the terminology, not military or civilian. Hamilton: All right. So any attack on a noncombatant could be terrorism? Walker: That is right. Hamilton: And a noncombatant could include military? Walker: Of course. Hamilton: It certainly would include civilian, right? Walker: Right. Hamilton: But an attack on a military unit would not be terrorism? Walker: It would depend on the circumstances. Hamilton: And what are those circumstances? Walker: I do not think it will be productive to get into a description of the various

terms and conditions under which we are going to define an act by the PLO as terrorism (Committee on Foreign Affairs, 1989: 66).

7

With the amount of time given to the subject of terrorism, it can be easy to assume

that there is a standard definition. This, as shown above, is far from the truth. Entire books

have been written trying to boil it down to a few sentences that act as a grand definition.

But, definitions or statements that are short are not necessarily easier to interpret or apply

to a particular circumstance and definitions that are over-specific are not helpful either.

Nonetheless, this paper and the larger discipline do deserve some sort of definition; if not

for the ability to categorize terrorist acts as being such, but so that there is some measure

of a shared jumping off point. And while starting at the same point is a small step, it is an

important one.

This section will look at three aspects of the word terrorism, starting with its history.

Terrorism is not the same as it was 218 years ago when Maximilien Robespierre remarked

on the political philosophy of terror during the French Revolution. Neither will it be the

same 218 years in the future. It evolves. Understanding this evolution will glean some

insight into why states react the way they do to present day terrorism. The second part will

cover what a terrorist act is. Criminalizing the acts of terrorism is one of the most widely

used counterterrorism practices, but if ‘one man’s freedom fighter is another man’s

terrorist’, how do you decide what a terrorist act is? To answer this question, it is

important to look at universally acknowledged criminal/unacceptable acts as well as

distinguish terrorism from guerilla warfare or criminal acts. The final part will offer a

definition which will act as the base for the rest of the paper. The goal of this section is not

to offer a grand definition that can be used for any and all purposes, but rather a simple,

appropriate definition with which to contextualize the events and responses in the United

States, U.K. and Spain.

8

So, why start with history? After a three video break down of the French Revolution,

New York Times best-selling author John Green says, “And to answer the inevitable student

question of why do we even have to study this stuff, that would be my first answer. The

past isn’t past; it’s still shaping the present” (Vlogbrothers, 2010b). Any good definition

takes history into account, and terrorism is no different.

Terrorism is one of the world’s oldest professions. Historians often identify the

Sicarii and the Zealots, Jewish groups opposed to the Roman occupation, as the earliest

practitioners. It would crop up again through the 8th to 14th centuries with the Assassins, a

small Islamic splinter group based in Persia who engaged in a slew of killings and sabotage

(Bosco, 2006). This sort of terrorism, however, is not the base of present day terrorism,

which comes, instead, from the French Revolution.

To oversimplify the narrative, the people of France were starving, the country was

in a massive sovereign debt, and the citizenry was not content to let a rich King sit on the

throne while they starved. A series of agreements and breaking of those agreements lead to

the regular use of terror by anarchists as a means to change their situation. (This should

sound familiar because it is reminiscent of modern day terrorism. This integration of

history into modern day terrorism will happen many times as the methodology of

terrorism evolves over the next 218 years.) The conclusion of those acts of anarchism often

ended in many lives lost and a different form of government in power ranging from a

constitutional monarchy “to a country where a bunch of armed peasant women could

functionally put the King under house arrest. A country where no one quite knew who was

running the show and everyone had guns” (Vlogbrothers, 2010a).

9

Terror, at this time, was a positive term associated with anarchy of the people. The

pinnacle of this type of terror came during the Maximilien Robespierre, leader of The

Committee of Public Safety and orchestrator of the Régime de la Terreur. At the beginning

of his regime, he saw what his was doing as right. He was helping the cause and killing

those who he thought were loyal to the King. As seen his quote above, Robespierre saw the

systematic use of terror as a vital part and virtue of the revolution. Terror tactics were

meant to be a saving grace. Nonetheless, there were those that disagreed and chastised him

saying he let loose “thousands of [his] Hell hounds called Terrorists” (Hoffman, 2003). The

well-meaning terror meant to set the people free from the bondage of monarchy had

changed. At the time of his beheading in 1974, Robespierre had overseen the guillotining

of over 16,000 people, many of whom had no direct involvement with the revolution

(Vlogbrothers, 2010b).

In the first of five changes, terror had morphed to include the abuse of office and/or

power, often with criminal implications, but still of a revolutionary context. This fever of

revolution would soon spread to countries across the U.K. and later after one more change

in definition, to Russia (Hoffman, 2003). As will soon be shown through the next four

changes, the modern day idea of terrorism did not disavow its historical roots; they are still

part of its meaning.

The second change would add a vital new part to terrorism. On June 28, 1914 after

the assassination of Archduke Franz Ferdinand terror no longer meant revolution, but

targeted assassinations as a vehicle with which to achieve a political aim. However, the

spirit of terrorism as an integral part of revolution was not lost. Russian anarchists

10

received the title of terrorist willingly and favored assassination of Russian leaders as a

preferred tactic. “The movement punishes only those who are really responsible for the evil

deed” (Bosco, 2006). In an effort to stifle these blatant attacks against the state, the ill-fated

League of Nations attempted to define the problem. If they could define it, they could

punish it, or even better, end it Terrorism was now a global threat and was recognized by

many states as a threat from their citizenry. The result was this definition of an act of

terror: “criminal acts directed against a State and intended or calculated to create a state of

terror in the minds of particular persons, or a group of persons or the general public”

(Bosco, 2006). Their definition was not inherently bad or good, but given that only a few

countries signed the treaty it was never put into effect as an enforceable definition.

The next two changes would happen after World Wars I & II. In the 1930s, the threat

of terror changed from citizenry directed towards governments and leaders to totalitarian

leaders or states using terror against their citizens. This was not unlike the Régime de la

Terreur of revolutionary France. Classic examples of this type of terror include Fascist Italy,

Nazi Germany, and Stalinist Russia. These states did not see themselves as carrying out

terrorist acts; they truly believed what they were doing was right and necessary. Stalin

transformed Russia’s government into an organ of coercion, enforcement and repression.

The spirit of revolution that Russians were fighting for a decade before was lost and they

had become the very thing they were fighting against. This type of state terror has never

gone away and is correctly associated with countries today.

The fourth change post World War II would see a lot of similarities to past

incarnations. Terrorism regained its revolutionary roots that it still maintains today. In the

11

1940s and 1950s, the struggle against colonialism offered the perfect stage for new

revolutions. On July 22, 1946 explosives placed in the King David Hotel in Jerusalem

exploded, killing 91 and injuring 45. The bombings were directed at the British military

command and the British Criminal Investigation Division which, at the time of the bombing,

was housing information about Jewish Agency operations. This included information about

intelligence activities in Arab countries (“The bombing of”, 2012). At the same time, in

Algeria, militants waged a destructive and bloody campaign against French authorities that

included frequent assassinations, torture, and the brutalization of civilians (Bosco, 2006).

This type of revolutionary terrorism continued on through the 1970s and would

include organizations like the PLO, the Basque Homeland and Freedom (ETA) and Weather

Underground (WU) in the United States. In November of 1974, Yassir Arafat addressed the

UN defending his choice of methods, that to many, included terrorism: “The difference

between the revolutionary and the terrorist lies in the reason for which each fights. For

whoever stands by a just cause and fights for freedom and liberation of his land by

invaders, the settlers and the colonists, cannot possibly be called a terrorist” (Hoffman,

2003). The application of the word terrorism is subjective and while not all those that

employ terror as a tactic are terrorists, all terrorist employ terror as a tactic.

Looking back on past incarnations of terrorism, this particular type has elements

from the French Revolution and the Russian anarchists. Each thought that was they were

doing was right and each had a specific, well thought-out agenda. As with any other

evolution, this past never completely disappears, instead it is part of the present.

12

The final change isn’t so much a change as a branching off. In the 1980s terrorism

came to denote a broader, less distinct phenomenon and was a way to destabilize the West.

During this time the ‘Terror Network’ was born. Network here, not only refers to a network

of different terrorist organizations or cells, but in the way they branched out. Narco-

terrorism in the 1990s brought strategic alliances between criminal and terrorist groups.

This short history of the terrorism and the changes it went through shows an

important fact mentioned many times, but it worth mentioning again: terrorism evolves.

Without an understanding of the reasons for those changes, defining it becomes and

impossible guessing game of what to include without any substantive thought involved.

The reasons that the starving peasants of France rose up against the monarchy should have

been able help colonizing nations think through motivation as they fought against terrorist

organization in the 1950s. There is always something that can be learned from the history

that can be applied to a current problem. But even with the understanding of where it came

from does not offer an appropriate definition of terrorism because there are simply too

many different motivations; this is not to say, however, that motivation will play no part in

the definition.

The next logical step taken by many governments and scholars is instead of trying to

define it through motivations, of which there are too many and are extremely subjective, is

to instead try and define terrorism through its actions. The many incarnation of terrorism

throughout history share some common tactics or crime that are reasonably punishable.

The questions involved in how to distinguish terrorism include how terrorism different to

13

guerilla warfare and how is terrorism different from criminal acts? If it is possible to

determine what it isn’t, it becomes easier to determine what it is.

First, distinguishing terrorism from guerilla warfare or organized crime is

important because they can be unintentionally interchanged. Criminal acts tend to be more

egotistical than guerilla warfare or terrorism while guerilla warfare is typically not

preoccupied with acquiring money in response to actions. It is expressed in the Venn

diagram below:

Fig. 1.1

Guerilla warfare or criminal action can be tools of terrorism, but only if they meet

the standards of s terrorist act. Those distinctions make terrorism what it is and distinguish

it from an assassination or loose political extremist movement. Of the four points in

terrorism, the first, third, and fifth are the most important and without them, any particular

* denotes rarity

Diagram is the creation of the author using information from Hoffman’s 2003 ‘Defining Terrorism’ chapter.

14

act will not qualify as political terrorism. These three points come from the history of

terrorism discussed above. Many scholars and governments would argue that motivation

has no place in the definition because it can present a ‘gap problem’. The ‘gap problem’ is

when terrorism is defined so loosely that a legal loop hole can be exploited which can offer

an excuse for terrorist organizations. This is a large reason why motivation does not play a

large role in definitions. But, as mentioned above, while it might not be the most important

part of the definition, it does distinguish it from criminal or guerilla warfare activities.

Fear, as mentioned in the third bullet is either threatened fear or realized fear.

Threatened fear refers to fear gained from the knowledge that a certain act can or will

happen. This is often present after a terrorist attack. For example after 9/11, flying, to

many, seems like impossibility. Customers might have known in their reasoned mind that

they were safe, but that nagging feeling that someone might hijack their plane was not

uncommon. Realized fear, on the other hand, is fear during the act of terrorism. The fear

experienced by survivors of a hostage situation during the attack can be used by terrorists

to manipulate them to change viewpoints or promise to complete a task. Once the situation

is over and the terrorists are gone, realized fear morphs into threated fear. If it can happen

once, it can happen again.

Now having looked at the history of terrorism and why it is different from other

destructive acts, it is time to decide on a definition. All the while remembering at the same

time that the terrorism defined today is different than the terrorism defined yesterday or

tomorrow and that it is not an enemy, but a method.

15

Attempting to construct a definition by studying what others have used proves to be

an enormous task. Every agency, government, or group has their own definition engineered

to meet their specific needs. Trying to find a thread of commonality in all that is hard.

Mentioned in 2003 in Hoffman’s chapter in Terrorism and Counterterrorism: Understanding

the New Security Environment titled “Defining Terrorism”, Alex P. Schmid and Albert J.

Jongman, et all, studied 109 different definitions of terrorism and found the top six words:

Element Frequency (%) 1. Violence, force 83.5 2. Political 65 3. Fear, terror emphasized 51 4. Threat 47 5. (Psychological) effects and (anticipated) reactions 41.5 6. Victim-target differentiation 37.5

(Hoffman, 2003)

By this account, there is some mutual understanding of what should be included in a

definition. All the important elements are there and they make sense given the five changes

in terrorism’s history. Of the 109 definitions studied and subsequent attempts by

governments, agencies, and scholars, the U.N. Security Council in 2004 came the closest to a

definition that takes both history and methods into account while remaining neutral in

motivation:

“[Terrorism is] any act intended to cause death or serious injury

to civilians or taking of hostages with the purpose to provoke a state of terror,

intimidate a population or compel a government or an international

organization to do or to abstain from doing any act.” (Bosco, 2006)

16

This definition has all the important and distinctive aspects of terrorism; some type

of political coercion, the threat of fear through intimidation, and specific mention of the

type of target. But why not use a country-specific definition for each of the illustrative

examples ? First, it would be not be proper to compare different countries using different

definitions. The UN Security Council’s 2004 definition offers a necessary level of neutrality.

It is not subject to the priorities or policies of a particular state government because it was

agreed upon by many countries.

An example of a definition suited specifically to an agency is the definition used by

the Department of Defense (DOD) in the U.S. It reads:

“The unlawful use of – or threatened use of – force or violence

against individuals or property to coerce governments or societies, often to

achieve political religious, or ideological objectives” (The US Department of

Defense, 2012).

The DOD definition is, arguably, very close to the UN Security Council definition.

Both include the use or threatened use of force against individuals and both have political

change or lack thereof as an end. But the largest difference is that the DOD specifically

mentions motivations and offers up a chance to take advantage of the ‘gap problem.’ Since

the DOD does not specifically mention social motivations, it can be argued that if a group is

socially motivated and using terrorist means, they cannot be a terrorist group because their

motivation does not fit into the definition. Motivation neutrality proves to be the clincher

here.

17

Also unlike the DOD definition, the UN Security Council definition is able to evolve

alongside what it is defining, and does not suffer from the ‘gap problem’ mentioned earlier.

When motivations for using terrorism change, the DOD definition will have to change with

it. The UN Security Council definition, since it does not mention motivations, it able to adapt

more readily. No definition is completely infallible, but this particular one is not riddled

with the holes of others.

Now knowing what the definition of terrorism is allows for the quick explanation of

different levels of terrorism. This is different from the different acts of terrorism

(bombings, hostage-taking, etc…). Scholars and governments relish the opportunity to

apply labels so it is not surprising that a few common labels have gained traction. Elisabeth

Symeonidou-Kastanidou of the Aristotle University of Thessaloniki divides it simply into

State and sub-State terrorism. State terrorism essentially entails “the use of violence by the

organs of the State or by groups related to it; such use of violence is normally directed

against the State’s own population or against the population of some occupied territory,

aiming largely at the extermination of the political opponents of the government and, in

due course, at the suppression of the resistance put up by the people.”

Sub-State terrorism acts as a catch-all for everything else, but can be divided into

four categories: I. Cases of resistance against dictatorships, aiming at re-establishing

democracy or at replacing the regime with a new dictatorship, which harkens back to the

French Revolution, II. Self-determination of national liberation movements, aiming at

achieving the autonomy of certain regions or the creation of new countries, for example,

the Irish Republican Army (IRA) in England or ETA in Spain, III. ‘imported terrorism’, i.e.

18

terrorism generated in one country and directed against the government of another

country, the attack in Munich during the 1968 Olympic games, or al-Qaeda are classic

examples here, IV. Use of violence for the purpose of enforcing an alternative political

proposal within a democracy, which was popular in the 1970s throughout Europe, in

particular the ‘Red Army’ in Germany or ‘17th November’ in Greece (Symeonidou-

Kastanidou, 2004). Sub-State terrorism includes both one-State or international terrorism.

This definitional journey is vital in counterterrorism. It is not enough to employ the

late Justice Potter Stewart’s approach towards pornography: that “it is unnecessary to go to

great lengths to define it, because one knows it when one sees it” and simply apply it to

terrorism. As shown in the earlier exchange between Ned Walker and Lee Hamilton, to just

figure it out on the fly doesn’t work. Justice Stewart’s assertion is a cop-out of the lazy or

unsure when it comes to counterterrorism. A government or international organization is

useless in a counterterrorism capacity unless it can figure out and define what it is trying to

prevent. “Terrorism is a problem of what people do rather than who they are or what they

are trying to achieve” (Pillar, 2003). In order to punish, protect, and prevent, a body must

have an understanding of why and how terrorism formed. The next section will look at

three countries and how they have used history as pretext in their effort to combat

terrorism.

19

II. Counterterrorism Policy Components

The three rules outlines here are not unique to counterterrorism policy. Each one of

them can be applied to disaster response, any type of foreign policy, and down to local level

policy. Nonetheless, all three must be seen in any one counterterrorism policy in order for

it to continue to work.

The first rule of counterterrorism policy is that must be able to adapt and evolve.

Static policies that can become outdates quickly will not function well in a

counterterrorism setting. A policy that is so specific that it cannot function in a crisis to

bring criminals to justice or keep citizens safe is not a counterterrorism policy that should

be on the books. Albeit, there are certain instances were a very specific policy is needed for

a very specific, known and stable threat, but that is not what is referenced here. If a

government is unable to look seriously into its own belly to scrutinize the way terrorism is

handled, including the ever protected intelligence or police community, then something

needs to change. This is true for individuals well up to the top brass. Changes that come out

of that scrutinizing don’t have to be enormous. Sometimes complete overhauls are needed

and necessary, but small steps are steps nonetheless. If it becomes completely impossible

to write and implement a policy that can evolve, then policies need to be able to be changed

regularly. That is where constant, constructive scrutiny comes into play. A perfect policy

evolves by itself and when perfect is just unattainable, the easy, constructive, small changes

will do.

The second rule is that it should endeavor to gain a holistic view of the problem at

hand. If a counterterrorism policy or strategy is purely reactive, it will not work and will

20

eventually backfire. The same goes for pursuing only one path towards interdiction. Tunnel

vision can become a serious problem for policy makers or representatives of people and

that is natural. It is natural to want to protect what is closest, but that is not helpful in the

long run. Understanding the lifecycle of terrorism is the key to this, as is the key to most

policy making. Gaining understanding of the motivations for the attacks will give more

information on how to predict and stop the next attack.

If, for example, a group is working towards an independent country for their

particular group (e.g. the Basque group in Spain or the Irish from the U.K.), they should be

treated with a different set of understandings than if a group simply wants to kill people. A

government should be able to recognize those differences. Past interactions with similar or

dissimilar groups should be the pretext to policy. There is always something that can be

learned from a situation that can help complete the bigger picture.

Also important is to understand how attacks work; which can help protect

infrastructure and civilians. Practice can be seen as a nuisance, but knowing what to do in

the event of an attack can save hundreds of lives. And finally, understanding how to deal

with the aftermath might not help prevent the next attack, but it can help the wounded heal

and evacuate the fear that follows in the wake of events. A government must be able to use

what they have learned in the past that either went well or poorly to improve future

responses and fill in gaps in perspective.

Also in this rule is the ability to analyze and synthesize information that can be

shared with other agencies or police systems. A large problem is that hindsight inevitably

shows that an agency or government had one piece of information that should have been

21

connected with another agency easily if someone had looked. The ‘connect the dots’

problem requires a lot of work to conquer, but that doesn’t mean it isn’t worth it in the end.

Rule number three is that counterterrorism policy is not something that can be

handled by a single agency or special working group at a high level. Policy as complicated

as counterterrorism requires a lot of manpower and a lot of time and millions of people

work to stop its use around the world each day. Counterterrorism is no place for a God

complex. It is a place for teamwork.

Big policies are not the only way to deal with terrorism and in the aftermath of

arrests or attacks, a government needs to have some sort of conviction policy or law in

place. Conviction policies in counterterrorism often take one of two general forms: criminal

and war, however they are not mutually exclusive. In the case of domestic terrorism,

criminal convictions are the best option. Treating a person as a war criminal after a

terrorist attack presupposes that this person is at war or that the country attacked is at

war. It is appropriate for war crimes to be treated as such. Terrorism should be treated as a

unique event. Each one deserves severe attention to detail.

Aftermath polices also deserve detail and fall into two categories: internal and

external. The process a country goes through after a terrorist attack is somewhat like the

grieving cycle. Once worked through, a government must not forget to plan ahead. In

regards to internal polices, these are things like the promotion of assimilation and

economic and social integration. The balance can be tricky and can be taken quite far, as in

the cases of Turkey and France where there is an explicit secularization of public life. Other

22

internal policy examples are direct engagement, increased surveillance, and an increase in

border security and restrictions on visas.

External policies can take a myriad of forms. Some examples are cultural or

education exchanges (e.g. the Fulbright scholarship program or the Israeli-Palestinian

Orchestra), public diplomacy, targeted bilateral foreign assistance, and investment in

infrastructure or training (Banks, et a, 2008). Each one of these polices must be tailored to

specific events and should follow the three rules of counterterrorism policy. The three

illustrative examples below will take a look at these three rules in action.

23

Section III: Illustrative Examples

1: The United States

This first example will look at how the United States used what it learned from

combating the Weather Underground in the 60s and 70s to combat domestic terrorism in

the 90s and beyond. The United States was chosen as an example because it was the first to

be a large victim of a terrorist attack on large cities carried out by men who lived in

country. It is the first of the three examples because 9/11 took place before the other.

Knowing what happens during the 9/11 attacks provides an insight into the mindset of the

other two examples when they were attacked.

This section will first look at the interaction between the Weather Underground and

the United States central government. It will then go on to discuss how the US used its

failures in that interaction to prepare themselves to combat terrorism in the 90s and

beyond. The Weather Underground was chosen because of the amount of destruction

carried out by bombings and targeting of police as a way to carry out political change. Al-

Qaeda was chosen because it claimed responsibility for the 9/11 attacks.

The United States do not have the kind of history with domestic terrorism that the

United Kingdom or Ireland has, however, that does not mean that its counterterrorism

strategy is any less comprehensive. The first act of counterterrorism in the United States

dates back to the same year at Robespierre spoke on the virtue of terrorism. In 1794

George Washington dealt with the Whiskey Rebellion and President Thomas Jefferson used

naval forces to fight off the Barbary pirates (Banks, et al, 2008). The United States was not

24

unaccustomed to the use of terrorism directed towards the country, just terrorism directed

at Americans on United States soil.

One of the most destructive terrorist groups of the late 60s and early 70s was

Weather Underground. Throughout their history, the Weather Underground (WU) took a

violent stance against the Vietnam War and the United States government. They used

bombs, warning messages delivered to newspapers, destruction of property and violent

protests to make their message known. As an undergraduate student at Miami University

from 1972-1976, JoAnn Chonoska remembers how Weather Underground fit into the social

and political unrest of the era: “[There] was a fear of what they might do; that they would

take matters into their own hands and undermine all the different kinds of non-violent

protests. I knew about them through media and college newspapers; they were the dark

underbelly of protest and were never really well-defined. They used force or fear or

weapons as a show of power; they were a scary unknown” (Chonoska, 2012).

The WU saw its first steps of independent life in Chicago during the late 1960s. In

1969, WU split from the national Student for a Democratic Society (SDS) during the annual

conference, which took place in Chicago that year. The SDS had drawn inspiration from the

non-violent protests of the civil rights movement, especially Martin Luther King Jr. Those

that would form the WU were frustrated with the lack of results in stopping the Vietnam

War and thought they only way they would be able to truly get their point across was

through more and more violent means. The split would later be remember as

‘organizational piracy’ as the SDS began to fall to the way side as WU gained more status.

25

Among the members of WU were the rock stars of the 60s revolutions who regularly

engaged in hard drugs. In the same year of their formation, the members moved into

collective houses in major cities around the country from Chicago to New York City to San

Francisco. Their goals were to make the war visible in the United States and to rally the

white, middle and upper class youth of the country to follow them into revolution.

Their first major event announced was the ‘Days of Rage.’ Unsatisfied with the non-

violent protests, those involved were willing and able to engage violently with the Chicago

police. When the turnout was less than excepted (only around 200 youth showed as

opposed to the thousands they were hoping for) the WU took to the streets, marching

through Chicago, vandalizing and smashing store fronts. When they were eventually

confronted by the police, a violent altercation erupted with many injuries and arrests.

After the ‘Days of Rage’ failed to muster support for their cause, the WU felt

increasingly isolated and came to the conclusion that the rest of the country had been

bought off by the government. When Black Panther leader Fred Hampton, who the WU had

admired, was murdered in his apartment by the Chicago police, the WU snapped. They felt

that they bigger the mess they could make the better and that none were safe. Anyone in

the country that was not up to par or was apathetic to their cause of revolution was subject

to attack.

Terry Collins, a leader in the WU decided more violent action was needed and began

constructing a bomb in what was known as the ‘Townhouse’ in New York City. Collins

planned to plant the bomb at the non-commissioned officer’s ball at Fort Hicks. On March 6,

1970, during the construction of the device, it exploded and killed 3 members of WU. The

26

goal of making the United States unlivable had faltered, but members were now more

determined than ever. They began to say goodbye to family and friends and move

underground; not in the sense of geography, but in the sense of information deprivation.

Members only communicated with other members on a need to know basis and no one saw

their families.

It was at this turning point that WU came to the conclusion that they were

dangerously close to terrorism and decided that before going further, they needed to know

exactly what they were going to do. This did not deter them, for they were not opposed to

the use of terrorism, just the use of unplanned terrorism. They did not want to harm

civilians, but were willing to do what was necessary to further their cause.

Their first successful bombing took place in 1970 when they planted and detonated

a device in the Department of Prisons office in the Ferry Building in response to the killing

of George Jackson. Bombings continued from 1970 to 1975. Targets included National

Guard headquarters in 1970 in response to the Kent State killings, the Harvard Center for

International Affairs in 1971 to protest Vietnam, the United States Capitol Building in 1971

in response to the invasion of Laos, the 103rd precinct in New York City in response to the

killing of a black 10 year old boy by the police, and the Department of State in 1975 in

response to the escalation in Vietnam. During this period, WU was a force worthy of the

attention of the FBI that they established Squad 47 whose specific task was to track, find,

and arrest WU members. WU was a criminal problem using terrorist methods but were

treated as a purely criminal problem.

27

The WU unraveled in the early 1970s for many of the same reasons it had been so

effective. The information control and need to know tactics used by the ‘Weather Bureau,’

the committee in charge of WU had backfired. Members were unsure was what was

happening nation-wide and had no way of transmitting ideas back and forth. The FBI had

come close to catching them through the use of undercover agents, but in the end, courts

could not use much of the information gathered, as it was obtained illegally.

Members were also growing older and starting families. With the high

unemployment of the 70’s, they came to realize that the skill set acquired as a

revolutionary did not translate into a blue collar job. When the Vietnam War ended in

1975, their ultimate goal of bringing the United States to its knees had failed. The

leadership was criticized and members turned themselves into police. Many members

started their lives with a new light or disappeared (Ettinger, et al, 2002). WU has stayed

dormant for years and recently has reengaged through the Occupy movement in 2011,

though in a much more peaceful way.

WU’s classification as a terrorist group was applied in subsequent years, but with

their tactics of fear, the ultimate political goal of ending the Vietnam War, and the targeting

of civilians this should not be a surprise. The United States government had chosen to

combat them with criminal proceedings, but without a well thought-out plan that was

unable to adapt to changing tactics, they ultimately failed. In the two other illustrative

examples in the following sections, this will become a reoccurring theme. The first attempt

at counterterrorism is usually to use the criminal code to punish the acts, but this does not

obey the three rules in the previous section. A purely criminal-based mission statement

28

cannot evolve correctly, it only covers one aspect of the problem, and it fails to incorporate

other agencies into the solution. This is the natural progression of policies, but as seen with

WU, it doesn’t always work in time.

The U.S. slowly began to learn that using the same tactics that had failed them in

dealing with the WU would not work in the future as more and more terrorist attacks were

being aimed at the U.S. Criminal laws alone were not going to cut it. The first specific

counterterrorism policies in the United States came after foreign attacks on United States.

The 1983 car bombing of the United States Embassy in Beirut set the wheels in motion.

Having learned from the past that a purely criminal set of standards would not work,

Congress passed an Omnibus Diplomatic Security and Antiterrorism Act in 1986.

Terrorism was squarely on US radar. Had WU employed bombing tactics post-1986

they would have been treated much differently, if not more successfully. It was also at this

time that Congress authorized the FBI to investigate overseas and established the Counter

Terrorism Center (CTC) at the CIA. The CTC was designed to address the deficiencies seen

earlier when several federal departments and agencies processed intelligence within their

own facilities, but failed to consolidate and analyze information (Banks, et al, 2008). The

way it was organized was also a big change for the CIA. The CTC and its analysts were

housed within the agencies operational directorate, which broke the long standing

bureaucratic norm at Langley of keeping analysts and operations officers separate. The

goal of this was to focus analytic efforts more effectively on time-sensitive threats and, in

turn, ensure that counterterrorism operations were better informed (Schmitt, 2010).

29

The next events that forced the United States counterterrorism policy to change

were the 1993 Ramzi Yousef attacks on the World Trade Center in New York City and the

Oklahoma City bombing by McVeigh and Nichols in 1995. The counterterrorism policy born

out of a foreign attack in Beirut had failed to stop those two substantial attacks on United

States soil. The changes seen in this decade would be drastic, but necessary. They would

also use the lessons learned from the WU in these endeavors.

In 1994, the threat of al-Qaeda was being to loom more steadily both in the United

States and abroad. Any ‘material support’ to terrorism was explicitly outlawed, making it a

federal crime to aid or abet terrorist activities. The FBI was also given more abilities to

conduct electronic surveillance by requiring telecommunications companies and

equipment manufacturers to have built-in, inherent surveillance systems and services. This

meant that, with the approval of a court order, agents could now follow phone, internet,

and other traffic in real time (Schmitt, 2010).

The entire 1990’s followed along this same event and reaction format. After

Oklahoma City, the ‘material support’ legislation was modified and expanded and the CTC

created a special unit focused on Osama bin Laden. In 1998 came truck bombings on United

States embassies; in 1999 the Millennium plot against LAX was foiled; in 2000 the USS Cole

was attack in Yemen. From 1998-2000, the FBI also created a stand-alone counterterrorism

division. With all the new legislation and agencies, it can be easy to say that United States

counterterrorism was evolving and adapting, which it was. But it was failing in a large way

at the same time. Information was not bridging the gaps between agencies.

30

In 1998, George Tenent, the nominal head of the United States intelligence

community, sent a memo stating: “We are at war…I want no resources or people

spared…either inside the CIA or the Community” (Schmitt, 2010). This memo had little

impact on the intelligence community and was not even read by many key players. There

had not been consistent attention given to counterterrorism and the United States fell into

a state of complacency. They had only recently changed surveillance procedures and were

failing to continually re-evaluate important guidelines. Then in 2001, an FBI agent in

Phoenix sent a memo to the FBI Headquarters and to two agents on the international

terrorism squads in the New York field office, advising the “possibility of a coordinated

effort by Usama Bin Ladin” (National Commission, 2004). No one was connecting the dots.

The 9/11 attacks fell into a void that had formed between foreign and domestic

threats. “The Foreign intelligence agencies were watching overseas, alert to foreign threats

to United States interest there. The domestic agencies were waiting for evidence of a

domestic threat from sleeper cells within the United States. No one was looking for a

foreign threat on domestic targets. The threat that was coming was not from sleeper cells.

It was foreign – but from foreigners who had infiltrated into the United States” (National

Commission, 2004). There was no plan or direction in the event of a large scale domestic

attack by foreign operatives; the U.S. was beginning to apply the three rules to their mode

of thinking, but no in time to stop the 9/11 attacks.

Of the three illustrative examples contained in this paper, the 9/11 attacks took

place over the longest amount of time: 102 minutes. At 8:46am, the hijacked American

Airlines Flight 11 flew into the upper portion of the North Tower, cutting through floors 93

31

to 99. A jet fuel fireball erupted upon impact and shot down at least one bank of elevators

and exploded through multiple floors. At 8:57am, the Fire Department of New York (FDNY)

chiefs had instructed the Port Authority Police Department (PAPD) and the building

personnel to evacuate the South Tower as well, because of the magnitude of damage caused

by the first plane’s impact. By 9:00am, many senior FDNY leaders, including 7 of the 11

most highly ranked chiefs in the department, as well as the Commissioner and many of his

deputies and assistants, had begun to respond from headquarters in Brooklyn. During this

time massive amounts of first responders were dispatched throughout the scene.

At 9:03am the hijacked United Airlines Flight 175 hit the South Tower, from the

south, crashing through the 77th to 85th floors. What had been the largest and most

complicated rescue operation in city history had just doubled in magnitude. Over the next

45 minutes, the emergency response escalated and became much more difficult to control.

Radio problems and an overwhelming response from first responders from New York and

New Jersey made a critical situation nearly impossible to completely control.

32

The World Trade Center Complex as of 9/11 – 9/11 Commission Report

At 9:37am, the west wall of the Pentagon was hit by hijacked American Airlines

Flight 77. The crash caused immediate and catastrophic damage killing all 64 on board as

well as 125 people inside the Pentagon.

At 9:58am the South Tower of the World Trade Center collapsed into itself causing a

ferocious windstorm and creating a massive debris cloud. A half hour later at 10:58am the

North Tower collapsed. All told, on September 11, the United States suffered the largest

loss of life on its soil as a result of hostile attack in its history. The total was 2,973 dead

(National Commission, 2004).

The counterterrorism policy of the United States had failed in a massive way, but

that doesn’t mean that it was useless or that it is not capable of doing its job, just that it was

incomplete. The events leading up to 9/11 have been scrutinized en masse using the finest

academic and governmental microscopes. This section will focus on legislation passed in

33

the wake of 9/11 which resulted in the creation of many new agencies including, but not

limited to the Department of Homeland Security (DHS) and the expansion of the fusion

center network, and briefly, how those changes followed the three rules and learned from

the past.

The first big of legislation to pass through Congress as the result of 9/11 was the

Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept

and Obstruct Terrorism Act (USA Patriot Act) of 2001. The act was less a complete

revamping of counterterrorism, which wasn’t needed, but an opportunity to update

legislation and plug holes. The purely criminal approach seen in the past would not work

with the new nature of the terrorist threat. What will soon become a theme in post-event

counterterrorism policy, the Patriot Act was slammed through the legislature because

emotions were running high and elected officials wanted to do something to alleviate

immediate fears. Later down the line, the act would be amended and expanded.

Among the most controversial aspects of the Patriot Act was the expansion of the

FBI and other executive branch authorities who were now able to acquire third-party

business and transactional information in support of counterterrorism investigations

through the modification of National Security Letters (NSLs). NSL now required only a

field-level approval and were not subject to review and once in possession of an NSL to use,

it can be given to telecommunications providers, banks, or credit card companies to

demand record and data associated with an individual, even if that individual was not the

target of a full-blown investigation. The reasoning behind this new power was that the FBI

needed the ability to develop cases, generate leads, and provide general data for

34

intelligence analysts and by 2004, over fifty-six thousand were issued; as opposed to the

eighty-five hundred issued in 2000 (Schmitt, 2010).

The intentions behind NSLs were admirable. The government was attempting to get

ahead of the terrorism curve and subvert the next attack while it was in the works.

Agencies had realized that they were not in possession of the entire picture and this was an

opportunity to complete it. This also showed that the United States government was willing

to self-criticize, which is pursuant to the rules of counterterrorism policy.

One of the most significant changes to changes to come out of 9/11 was the creation

of the Department of Homeland Security (DHS) thanks to the Homeland Security Act of

2002. It consolidated 180,000 employees and 22 different agencies and this was the biggest

restructuring in Washington since 1947 when the Department of Defense was created.

Former DHS secretary Michael Chernoff describes the four core missions as keeping

dangerous people out of the country, keeping dangerous materials out of the country,

protecting critical infrastructure, and building an agency capable of responding effectively

to attacks or disasters (Schmitt, 2010).

The United States had the presence of mind at this time to adapt and evolve in an

enormous way. One huge advantage of the DHS was its ability to act as a fusion center for

agencies. Before, any sort of intelligence sharing might be on a case-by-case basis, as ‘turf

wars’ were abundant. Customs Enforcement, FEMA, TSA, INS, and the National Guard could

generate a mosaic of information on a daily basis concerning who was entering the country,

any new threats, and who was leaving. While they were still separate agencies, living under

the same department forced a certain level of cooperation. The God complex of pre 9/11

35

information hoarding had made way for a certain level of teamwork that was greatly

needed; a large step towards following rule three.

To help this along, the DHS placed personnel with other federal and local

counterterrorism centers and set up liaison relations with DHS centers in individual states.

Fusion center became a huge part of this. A fusion center acts as a sort of melting pot for

information and intelligence collected at the field level. It produces analyses for agents and

officers to use and has the ability to share information across a large computer server

system that connects federal agencies with lower level officials. While not a direct result of

the creation of DHS, new life was breathed into them once the importance of sharing

information was brought to the forefront.

Fusion centers also do a lot to support state, local, and tribal authorities at their

collections. Each fusion center operates in a unique way that is best suited to the area they

are covering. The fusion center of Montana would not be able to function well in Huston.

There are, of course, concerns with civil liberties concerning the collection of data, but

fusion centers adapt and do what they can to alleviate fears as well as following strict

guidelines concerning those who are able to access data contained within the server.

Of all the different legislative and institutional changes, the construction of the DHS

and increased use of fusion center have been the most important in the United States

counterterrorism policy because they address all three rules mentioned above. The

willingness to evolve is not easy by any means and sometimes the trauma of a catastrophic

even is the only way it will happen. Unfortunately, this is a common occurrence in the

evolution of counterterrorism policies and will be seen in both Spain and the U.K. Stresses

36

and traumas are both important, but what lasts when they are over are the changes

brought on by self-criticism of the events that just took place.

When it comes to the second rule of gaining a holistic view, the United States has

done well in expanding community policing efforts to gather ground intelligence, making

sure that all different forms of intelligence are shared as freely as possible, and that the

‘turf wars’ that plagued the intelligence community were slowly dissolved. This also shows

a willingness to not fall into a God complex trap. Especially in intelligence, it can be easy to

think that a particular agency is the best and has all the information needed to bring down

a criminal or terrorist. The FBI fell into this trap during the time of WU and suffered

because of it. They failed to learn take into account the many reasons that the WU used the

tactics that they did and they failed to work with other agencies or the local police to take

them down. Knowing that they had failed in such a massive way in the past helped put

intelligence community egos into perspective and foster some much needed teamwork.

They had learned that the FBI/criminal centric ways of combating terrorist groups in the

pat just won’t work in the future. The next two illustrative examples of the U.K. and Spain

will continue to look at how past experiences with terrorist groups shaped the way a

government responded to a massive attack on the capital city.

37

2: The United Kingdom

This second example will look at how the United Kingdom took what it learned from

engaging with the Irish Republican Army from the 1910’s up to 2005. The United Kingdom

was chosen as the second example because of its massive level of experience with

counterterrorism. It is placed as the second of three examples because in the timeline of

large attacks on western nations post 2000, it came second with the attack in 2005. The

United Kingdom also serves as an interesting counter-point to the United States in

particular.

This section will first look at the involved history surround the British mainland and

the island of Ireland. Much like the history of terrorism, understanding the many steps that

the British government has taken to quell the Irish ‘troubles’ will provide some light into

why they chose to handle the 2005 attacks the way they did. The second part of this section

will look at the 2005 attacks and how the United Kingdom used the lessons it learned in

dealing successfully and unsuccessfully with the IRA, in its current endeavors.

The IRA has been the pivotal source for the development of counterterrorism

strategy in the United Kingdom and that has led to a solid development of policies. Just as

with terrorism itself, the history of the IRA’s movements and destruction tells a lot about

how the U.K. reacts to current domestic terrorism.

The attacks date back more than 70 years and have spanned the range of vicious

and deadly strategies. The IRA lives under the class of sub-state terrorism and is squarely

in the nationalist box. The beginning of the IRA finds its roots in 1914, when the Protestant

38

elite, who were the ruling government in Ireland, lost their grasp on power due to the

Home Rule Bill out of the British government. It had allowed for Irish self-government, but

was suspended during the First World War (“The IRA”, 2008). In 1916, in what was dubbed

the Easter Rising, a group of Irish nationalists living in Ireland, then a colony of the British

Empire, seized control of the General post office in Dublin. Unimpressed, the British

government took down the rebellion ruthlessly and within a few days the leaders were

executed. Having been involved with Ireland since the 12th century, disloyalty was not

tolerated from their oldest colony.

When there was a general election in Ireland in 1918, the Protestant elite found that

they had lost their majority thanks to the new group Sinn Féin, the nationalist Catholic

group, who won a majority of the Irish seats in Westminster. However, they refused to take

the seats. Instead, they declared a republic of their own, meant to be government for and by

Irishmen and women, with Eamon de Valera as their president. The British were furious

and the two sides collided. This immediately sent the IRA to arms, who began a deadly

fight. By the middle of the summer of 1920, the Irish War of Independence was in full swing

and showed little signs of an end. During the first phase, 55 policemen were killed and 16

barracks were destroyed. Britain was understandably nervous and dispensed a volunteer

police force to Ireland. The Irish were quite literally beaten into submission by the ‘Black

and Tans’, nicknamed such because of their black and tan uniforms. Those fighting for the

independence of Ireland were now much more sympathetic to the cause. By December of

that year, the Prime Minister of the U.K. realized, mercifully, that this state of affairs could

not continue. He declared that the 26 predominately Roman Catholic counties in the south

would form the Irish Free State and former IRA leader Michael Collins would be Prime

39

Minister. At the same time the 6 Protestant counties in the North would have their own

parliament, but would remain soundly tucked in the U.K..

The deal was happily received as it meant a possible end to the violence, but to the

Irish nationalists, only a completely free Ireland would be an acceptable resolution. De

Valera resigned in disgust and the beginning of the next war was not far behind, but this

time it was not directly at the U.K., but rather a battle of northern Protestants against

southern Catholics. The IRA would be defeated not 2 years later after fighting to their

deaths. In 1932, De Valera had broken away from Sinn Féin and had formed another

government. Five years later, he declared the South a republic; they were not a “free state”

anymore.

But, by the end of WWII, the IRA was falling apart and their membership dropped to

a mere 200. They were short of weapons and munitions, so they decided to carry out a

series of raids on the British Army Barracks and other installations in the North. They

seized what was needed to defend and defeat: anti-tank guns, mortars, sub-machine guns

and rifles. With a new sense of determination and a new arsenal, they were back on the war

path against the British. This is now the classic IRA that the world knows. They carried out

attacks on military bases; they blew craters in roads, burnt police stations and court

houses, and fire on troops and police. By the year 1962, the ‘Border Campaign,’ as it had

come to be known, was failing. They had carried out around 500 incidents, but had not

made any significant progress.

At the same time, a different movement, that for the civil rights and equal treatment

of the northern Catholics, was gaining force. They tried to separate themselves from the

40

violence of the IRA, however most large protests ended in bloody battles. The current

Prime Minister, Harold Wilson, sent troops to the streets of Northern Ireland after a cry for

help came from the Northern Irish Government. Frustrated by this lack of willpower, a

small splinter group, the PIRA, broke off from the IRA. They declared that their main aim

was to send the British troops out the North. They begin what is one of the longest,

bloodiest, and most violent terror campaigns the world has ever seen (“The IRA”, 2008).

The Global Terrorism Database out of the University of Maryland has records on

terrorism incidents from 1970 to 2010. In regards to the IRA, there is a staggering 2,673

incidents associated with the group over those years.

IRA incidents by year – Global Terrorism Database

A big change had come in the way that the British would handle the IRA, soon to be

nicknamed “The Troubles.” The approach went from ‘peace-keeping’ to ‘counter-

insurgency.’ The British government was learning from past mistakes. Even so, only a year

later, the British government realized how much it would take for a full defeat and

switched to the goal of bringing it to an acceptable level (Parker, 2010). To do this, one of

41

the measures enacted by the British government was a broad ban on marches of any kind

as well as instituting internment camps for those associated with the IRA. In direct defiance

of this, on January 20th, 1972, a large group of anti-internment civil rights protestors took

the streets of Londonberry. The British government responded by sending in the Parachute

Regiment, one of Britain’s toughest army units, to disperse the crowd. While it started

peacefully, like many other protests in the past, rocks and missiles were used against the

military. And suddenly, according the troops present, they were fired upon. They returned

fire and hit some of the crowd and within minutes, 13 people were dead and another 13

were wounded on ‘Bloody Sunday’. Any hope of bringing the counter-insurgency to an

accepted level of troubles in the view of the British government was lost. The situation was

getting worse too quickly.

The British policy was following rule one: policy must evolve. They were learning

that is a policy did not work; it needed to change, sometimes quite dramatically. Four

months later, an official inquest into the incident concluded that the military had indeed

been fired on first. The catholic community saw this as a white washing and more young

people flocked to the PIRA and a bomb was planted at the Parachute Regiment’s

headquarters in Aldershot. Seven people were killed, but they were not the intended

targets. The victims included five women cleaners, a catholic chaplain, and the gardener. In

May, the IRA also launched an attack that backfired. They had executed a 19 year old

British soldier who was visiting his parents in Londberry. The official IRA leadership

decided to declare an indefinite ceasefire, the first of many. The campaign to wrench the

North from the hands of the British was now with the PIRA and they took incidents to an

42

entire other level. Two crowded pubs, on in Gilford, and the other in Birmingham were

bombed, killing 24 and injuring 226 (“The IRA”, 2008).

After the bombings came the first act of parliament aimed specifically at terrorism:

the Prevention of Terror Act 1974. The act contained specific requirements for the label of

terrorism and “gave power to exclude certain persons from Great Britain or the United

Kingdom in order to prevent acts of terrorism, and for connected purposes.” The British

government had finally begun to realize that there was more than one aspect to this

problem and it would take the passing of an Act that took this into account to end ‘the

troubles.’ However, the government would continue to see Irish terrorism as a purely

criminal act, which would hinder its formation of a holistic view.

There were three sections to the Act. The first covers ‘proscribed organizations’,

which refers to terrorist organizations. Specifically what the punishment is for belonging to

an organization and what should happen to those who show public support for it. The

second sections deals with exclusion orders, including powers of removal from the U.K. and

the ability to block entry to the country. The third section details the powers of arrest and

detention, financial provision and that the act extends to the Channel Islands and the Isle of

Man (Prevention of Terrorism Act 1974).

The 1980s would usher in a brand new kind of counterterrorism policies under the

tutelage of Margaret Thatcher. The reason for this came in August of 1979 when a bomb

was placed on a small boat off the coast of County Sligo in the south which killed four

people, one of which was 79 year old Lord Louis Mountbatten, the Queen’s uncle. Margaret

Thatcher decided that enough was enough. The time for bringing ‘the troubles’ to an

43

acceptable level was over. She rapidly went after IRA members and before long, many were

in jail.

In 1984, a bomb went off at the Grand Hotel in Brighton, England, killing five people

staying there during the conservative party’s conference. Thatcher was unwavered and

was quoted saying, “You hear about these atrocities, these bombs, you don’t expect them to

happen to you. But life must go on as usual…Conference will go on. The conference…alright,

alright, the conference will go on as usual” (“The IRA”, 2008). Not more than four years

later, the IRA was learning that as unflinching as their hearts may be, their tactics of

assassination and targeting civilians through terrorism was not bringing the ends they

wished for. The British government had carried out extremely successful anti-terror sting

operations and widiling down the IRA. In 1988, secret talks began between Gerry Adams,

president of the IRA’s political party Sinn Féin, and John Hume, the leader of the Social

Democratic and Labour Party in Northern Ireland. Adams and Hume knew the only way out

of this was though a political process and they eventually reached terms that would lead to

a ceasefire in 1994 (“The IRA”, 2008).

Prior to that ceasefire, three important changes occurred in the ever-evolving

British counterterrorism strategy. First, in 1989, Thatcher’s government passed the

Security Service (known as MI5) Act, which specifically mentions terrorism as a crime, a

theme that has been present throughout the British counterterrorism strategy. The act is

brief but vital, with its mission statement reading, “The function of the Security Service

shall be the protection against threats from espionage, terrorism, and sabotage, from the

activities of agents of foreign powers and from actions intended to overthrow or

44

undermine parliamentary democracy by political, industrial, or violent means” (Security

Service Act 1989). It is important here to know that counterterrorism in not concentrated

within a single body, which directly addresses rule three. Within the U.K. government each

agency that has a counterterrorism function operates in a unique way. This is similar to the

United States as it combats terrorism now, but this has been present in the British

government much earlier on.

The Security Service had no executive powers. When that sort of power was needed

it fell to other agencies. For example, the Home Office may seek to deport terrorists, the

Foreign Office may refuse entry visas, and the police and the Crown Prosecution Service

can pursue criminal charges (Parker, 2010). Also in this time span, MI5 had a major change.

The Security Service’s mission changed from Cold War era counterintelligence to a full

focus on counterterrorism. From 1992-1994 their counterterrorism budget doubled with

the result being an increase in the number of preventive disruptions (Parker, 2010).

That doubling of the budget was needed in 1996 when the 1994 ceasefire ended

abruptly with a bombing in Canary Warf, in London’s docklands. This led to another year of

terror until July 1997 when the PIRA announced another ceasefire and begins discussions

to decommission their weapons. Tony Blair was now Prime Minister and was fervently

determined to get the peace process back on course, no matter what. He had recognized

that the current counterterrorism strategy was stalemated and needed a serious boost.

During a speech he laid out his terms frankly, “My message to Sinn Féin is clear. The

settlement train is leaving, I want you on that train but it is leaving anyway and I will not

allow it to wait for you” (“The IRA”, 2008).

45

This call to action was answered by Sinn Féin and Northern Ireland with the Good

Friday Agreement. While it might not have been directly with the British government, it

still steamed the fighting by effectively nullifying the IRA’s combative branch through its

Declaration of Support: “The tragedies of the past have left a deep and profoundly

regrettable legacy of suffering…we can better honour them through a fresh start, in which

we firmly dedicated ourselves to the achievement of reconciliation, tolerance, and mutual

trust…We affirm our total and absolute commitment to exclusively democratic and

peaceful means of resolving differences on political issues, and our opposition to any use or

threat of force by others for any political purpose…” (“Good Friday agreement,” 1998). The

Good Friday agreement has endured well since.

The agreement did not mean, however, that the IRA was completely gone. Four

months after the agreement was signed in April, a car bomb exploded in County Tyrone

killing 29 and injuring 220. This was the worst terrorist attack ever carried out in Northern

Ireland. Responsibility was claimed by the Real IRA (RIRA), a splinter group of the PIRA.

This was the last straw and the RIRA announces a ceasefire. Negotiations finally lead to an

official ceasefire on July 28th, 2005 when spokesmen Shauna Welch confirmed the decision

in public (“The IRA”, 2008).

The British government’s counterterrorism strategy had survived attacks by the

IRA, PIRA, and RIRA intact. There were now laws in place that criminalized terrorism and

the acts associated with it, however, they followed a traditional ‘temporary permanence’

structure. In 1997, Blair implemented recommendations that came out of an investigation

associated with the IRA and in 1998; the government passes the Criminal Justice

46

(Terrorism and Conspiracy) Act. ‘Temporary permanence’ was discontinued with the 2001

Terrorism Act (TACT), which also included new criminal offences relating to terrorism.

With the 9/11 attacks, the U.K. experienced an unwelcome trauma to their

counterterrorism strategy that was outside the range of their range of history with the IRA.

More British citizens were killed in 9/11 than any other terrorist attack in the U.K.. The

British government responded in a visceral way, much like the United States did, by

slamming through the Anti-Terrorism, Crime, and Security Act (ATSCA) in 2001. This piece

of legislation would take rule two straight to its heart. It created new penalties for crimes

aggravated by racial or religious hatred and permitted the freezing of suspected terrorist

assets at the outset of an investigation. Terrorism was no longer one dimensional.

One of the most controversial aspects was the new ability to hold foreign nationals

suspected of terrorism involvement for an undetermined amount of time without the right

of Habeas Corpus. The House of Lords would eventually add 70 amendments to the original

bill and in 2004 the Law Lords ruled that ATSCA was unjustifiably discriminatory.

Other acts, strategies, and agencies to be put into practice between 9/11 and the

2005 bombings included the Counter-Terrorism Strategy (CONTEST) in 2002 again with

the aim of a holistic strategy including all the arms of government, the establishment of the

Joint Terrorism Analysis Center (JTAC) in 2003, the Civil Contingencies Act in 2004, and the

Terrorism Bill in 2005, which was later rejected and transformed into a new bill. The

Metropolitan Police (the “Met) also had an increase in competency. The Anti-Terror branch,

known as SO13, continued to be responsible for immediate response to incidents or

investigations. The Covert Ops (SO10) and Intelligence (SO11) were restructured to focus

47

more on counterterrorism (Van de Linde, 2002). The U.K. government was adept at

treating terrorism as a crime. It had worked in the years fighting and negotiating with the

IRA, and it was working against foreign terrorists perpetrating offences in the U.K.. The

attacks in 2005 brought about another wave of emotional and sometimes not well thought

out reactions that would change the tactics of the U.K. again.

The July 7th attacks (referred to as 7/7) happened over the span of 56 minutes. The

first three explosions happened almost simultaneously. At 8:50am local time, there was an

explosion on a Circle Line train between Aldgate Station and Liverpool Street Station. The

second came from the Circle Line outside Edgeware Road. The third blast was from a train

on the Piccadilly Line between King’s Cross and Russell Square stations. At 9:47, 56

minutes later, there was a fourth explosion on the upper deck of the No. 30 bus in Tavistock

Square. 56 people, including the bombers, died in the attacks and more than 700 were

injured (“Report of the,” 2006). The bombs were revealed to be quite amateurish compared

to the Madrid bombings the previous year (Don Van & Johnston, 2005). Each bomb

contained less than 10 pounds of high explosive (Cowell, 2005).

The police response to the attacks was fast and accurate. At 9:33am, the London

Underground services were put on amber level alert and the trains were evacuated. At

10:00am six mainline stations (Euston, King’s Cross, St. Pancras, Victoria, Paddington, and

Liverpool St) closed. At 11:00am the public was told not to travel to London and at

11:08am bus services in Zone 1, at the center of London, were suspended. These services

were opened again later in the day after it was deemed safe. (“How the day,” 2005). Two

48

make shift mortuaries were set up in two nearby hotels: The Royal National Hotel as well

as the Holiday Inn in Bloomsbury (“Transport Chaos,” 2005).

News of the bombings was relayed to Prime Minister Tony Blair while he was

attending the G8 summit in Gleneagles, Scotland. After reading a joint statement from the

G8 leaders on the attacks, he rushed back to London for meetings with security and

intelligence chiefs. In the afternoon, Blair met with COBRA (short for Cabinet Office Briefing

Room A), which includes the Deputy Prime Minister, Cabinet Secretary, the Chancellor,

Defense Secretary, Home Secretary, the Chief or the Defense staff, the Chairman of the Joint

Intelligence Committee and the Chief Foreign Policy Adviser to the Prime Minster (Van de

Linde, et al, 2002). They worked to secure more detailed plans for the rest of the day (Muir

& Cowan, 2005).

The claim of responsibility for the attacks came later in the afternoon. At 1:27pm the

Islamist website of the ‘Secret Organization Group of al-Qaeda of Jihad Organization in

Europe’ published a 200 word statement saying it had carried out the attacks. Four men

were eventually discovered to have carried out the attacks: Mohammad Sidique Khan (the

leader of the group), Shehzad Tanweer, Jermaine Lindsay, and Hasib Hussain. The best

indication of the group’s motivations were set out in Khan’s video statement, which first

aired on the Arabic television channel, Al Jazeera on September 1, as well as in his will,

which was discovered by the police after the bombings. The focus of the video was on the

‘perceived injustices carried out by the West against Muslims’, which according to Khan,

justified violence through his interpretation of Islam. After the attacks in Madrid, Spain

withdrew its troops from Iraq without subsequent terrorist incidents, whereas Britain has

49

remained committed to Operation Iraqi Freedom, hence the attack on London

(Dannenbaum, 2011).

With the U.K.’s history of counterterrorism, they approached this attack with tools

already in place, although not without some gross mistakes due to emotional involvement,

similarly to the U.S. directly after 9/11. A poignant example of this is the Prevention of

Terrorism Bill of 2005, which was slammed through similarly to one in 2001 after 9/11. It

tried to fulfill the need to pass something tangible that would show the British citizenry

that the government was capable of continuing protecting them; just as they had with the

IRA.

The original intention of the act was to deal with the Law Lord’s ruling in 2004 that

the detention of foreigners at Belmarsh Prison under Part 4 of the Anti-Terrorism, Crime

and Security Act of 2001 was unlawful and was incompatible with European human rights

laws. Instead, the Home Secretary was allowed to impose ‘control orders’ on people who

were suspected of involvement in terrorism (“Prevention of terrorism,” 2012). Control

orders allow the U.K. government to restrict an individual’s liberty for the purpose of

‘protecting members of the public from a risk of terrorism’ and provides for extremely

limited rights of appeal and the absence of double jeopardy restrictions (“Control Order,”

2011).

The Act fell on critical ears after the initial passing. Many claimed that human rights

were being violated through the control orders. This was a problem because among the

first things mentioned in the bill is the statement made by then Home Secretary Clarke

concerning the European Convention on Human Rights: “In my view the provisions of the

50

Prevention of Terrorism Bill are compatible with the Convention rights” (Act of Parliament:

Prevention of Terrorism Act of 2005). In April 2006, High Court Justice Sullivan described

the entire bill as an “affront to justice” (Dodd & Bailey, 2006).

Almost a year after 7/7, 11 control orders had been issued. Another judge who ruled

on a control order case said that the anti-terrorism measures were “conspicuously unfair.”

Human rights infringements happened twice in less than a year of implementation. Justice

Sullivan concluded: “Controllees’ rights…are being determined not by an independent

court…but by executive decision making untrammeled by any prospect of effective judicial

supervision” (Dodd & Bailey, 2006). Many renowned human rights organizations –

Amnesty International, Human Rights Watch, JUSTICE, and Liberty – also outwardly

opposed the Act. There were complaints about the wide range of restrictions attached to

the Act, the use of closed proceedings and special advocates to hear secret evidence which

the defendant was not able to see, and the possibility that evidence was obtained through

torture via third countries (“Prevention of terrorism,” 2012).

It is widely recognized that the Act was rushed through, which caused many of the

problems and those that opposed the Act did not want the replacement to fall into the same

problem; a rush of emotion just to have another bill pass quickly was not the solution. The

Parliament had recognized that it was in need of legislation that could evolve and was not

just the immediate response of angry and grief-ridden representatives. Lord Carlile, an

independent reviewer of the government’s anti-terrorism laws told the BBC, “I hope we

will not get another piece of rushed legislation. I think this really does need mature

reflection” (Dodd & Bailey, 2006). The Prevention of Terrorism Act of 2005 was repealed

51

on December 14, 2011 and was replaced by the Terrorism Prevention and Investigation

Measures Act of 2011.

In addition to legislation, 7/7 brought about many institutional changes, many to do

with rule three and the importance of substantive teamwork. Having failed to stop the

attack, the security and intelligence community underwent a major overhaul. In 2006, the

Intelligence and Security committee issued the Report into the Terrorist Attacks 7 July 2005.

Before 7/7, there was a large lack of communication and coordination between polices

forces and the security and intelligence community and this was acknowledged in the

report: “Inter-Agency collaboration and co-operation with others…continuing this

improvement must be at the heart of future efforts…More needs to be done to improve the

way that the Security Service and Special Branches come together in a combined and

coherent way” (“Report of the”, 2006). Different institutional priorities and responsibilities

had encouraged a disconnected approach to the investigation of terror suspects. Post 7/7,

this changed to acknowledge that action needed to be taken much earlier in the process of

radicalization, recruitment, and attack-planning, which addresses rules two and three.

MI5 exploded with the creation of six new regional stations, the Met merged SO13

with Special Branch to form a ‘Counter Terrorism Command’ known as SO15, a number of

new Counter Terrorism Units (CTU) were set up to provide coordination and special

support to police, and a number of analytical ‘fusion centers’ were established with the aim

of facilitating better cooperation and coordination between different counter terrorism

agencies (Field, 2009). The intelligence community it seemed had learned that the

investigational skills they had acquired during the IRA area were not immediately

52

transferrable to a new threat; much like the U.S. had learned the tactics used in

investigating the WU in the 60s and 70s would not work in the 00s.

Translating criminal procedures to cover an outside source of terrorism however,

proved to be much simpler. Acts associated with terrorism were outlawed during the IRA

era, but any community policing and cultural support needed to evolve in order to fit a new

era in domestic terrorism was not there. This change was first acknowledged after 9/11

with the religious or racial motivation clause in ATSCA. It was furthered after 7/7 to

extended police powers and active engagement with the Muslim community throughout

the country. The British government quickly realized that confronting the task of reducing

radicalization was too large for any one part of the government to handle, so in Mid-August

of 2005, several members of Parliament (MPs) went on a “listening-tour” in towns and

cities with large Muslim communities while the government launched a consultation

initiative with Muslim communities. A task force consisting of seven Working Groups and

over 100 Muslim community leaders was also created to make recommendations for

combating political extremism (Klausen, 2007).

The aim of community policing was to facilitate information sharing, build trust in

cases of arrests and operations, and to mitigate the negative impact of enforcement on the

Muslim community at large. In addition, it was also a solution to many other problems

including the need to improve communication with Muslim communities, finding ways to

marginalize the extremists, and ultimately promote social integration (Klausen, 2009). The

general thought behind community policing is outlined as: “We listen and solve crime in the

neighborhood. Terrorism is not so different. Terrorists live somewhere. They park their car

53

and store their stuff somewhere. There are people who know about this. National security

in the end will depend upon solving neighborhood crime” (Klausen, 2007). From the

community end, police partnerships with mosque groups were developed for the purpose

of providing religious re-education for inmates in prison and to young people who were

deemed likely to hold extremist sympathies (Klausen, 2007).

The path the U.K. government has taken with its counterterrorism strategy has been

extremely varied, but it evolved as the threat evolved. The same tactics used to quell the

Easter Uprising in 1916 would not have worked the 1970 or 2005. This ability to evolve

has also been key to successful protection of British citizens. However, it has often taken

large, costly events for counterterrorism strategy to take a leap forward. This was seen in

the United States after 9/11 and will be seen, though not so strongly in Spain after the 2007

attacks. This is an unfortunate reality to counterterrorism in any country. It is easy to fall

into complacency knowing how many plots have been foiled within a country. And while it

is great that methods are working against current threats, there needs to be enough

willingness to adjust when the time comes. The U.K. did this after large IRA events, after

9/11, and after 7/7. Realizing the needs to overhaul intelligence services to address rules

two and three were big steps and that is important to recognize. This sort of flexibility

needs to continue if the U.K., or any of the other examples, is to successfully combat future

attacks.

54

3: Spain

The last illustrative example included in this paper is Spain, which also has a history

of domestic terrorism coupled with a large terrorist event in the capital city. The first part

of this section will discuss the history between the Spanish central government and ETA

and the legislation used by the former against the later. In the second part of this section,

Spain’s legislative and institutional changes will be examined to see if they have learned

from the past to help confront the most recent attacks. All the while, as with the other

sections, noting if a particular instance falls into line with one or all of the three rules.

ETA, while also a nationalist European terrorist group like the IRA, is much different

in tactics. The Basque people are ancient, even being mentioned by the Romans, and have

defended their territory for centuries. As legends go, the Basques are to have defeated

Roland, Charlemagne’s rear guard, at the formation of France. They enjoyed considerable

autonomy from 1371 to 1876 and have seven provinces that make up the Basque

homeland. In 2002, the population was around 2 million, although many are not Basque.

Four of the provinces are in Spain and three are in France. Altogether, ETA claims there are

around 1 million Basques living in Spain and 200,000 in France.

Given this massive history of autonomy, it is not surprising that ETA fights for an

independent Basque nation. During and after the Spanish Civil War Francisco Franco bore

out atrocities against the Basque peoples, the most celebrated of which was the bombing of

the town of Guernica in 1937 by Nazi Germany. The Basque people believed that Franco

was trying to eliminate them as he repressed their culture, language, and political rights.

After the end of World War II, ETA formed in 1952 as a response to this (Shepard, 2002).

55

Overtime the group would come to be associated with constant conflict, the want to

establish an independent Basque nation, and the rejection of foreign investment in the

region, NATO, and United States military in the region. Violent, organized attacks became

their weapon of choice. Throughout their history they were a terrorism group as defined at

the end of Section I. They sought a political end through fear and the killing of innocents on

both sides of the conflict.

ETA was official on July 13, 1959, the Saint’s Day of Ignatius Loyola, the most well-

known Basque martyr and founder of the Jesuit order. In 1968, the first killings under the

auspice of ETA took place. At a roadblock a member of the three-man ‘executive committee’

in charge of ETA was stopped by a Guardia Civil (the police). He killed the police officer and

was later killed himself. Type of assassination should not sound unfamiliar to the history of

terrorism as it was carried out successfully by the IRA and the Russians. Other killings

followed, but they were more targeted, aimed at Franco’s regime and those that oppressed

the Basques.

This bears a striking similarity to the beginning of the IRA. They wished to gain

independence by any means necessary and assassinations seemed the more direct route.

And just as the IRA targeted Margaret Thatcher, so too did ETA target the Spanish Prime

Minster at the time, Admiral Luis Carrero Blanco, who succeeded Franco. Unlike the IRA

however, ETA was successful in their operation. Blanco was killed on December 20, 1973

with the help of 165 pounds of dynamite planted in the street under his car. With the

success of this assassination, ETA’s resolve only deepened and expanded to include more

and more deadly attacks. Over time they would target politicians, reporters, businessmen

56

who refused to pay extortion demands, and the public at large. By 1968, ETA had killed an

estimated 800 people. They also attempted to kill King Juan Carlos multiple times, but did

not succeed. Then in 1974 ETA extremists go on a terror rampage that lasts years.

ETA Attacks by Year: Global Terrorism Database

It is important to note that the ETA did not speak for the entire Basque community

and many condemned their actions. “The Basque question for nationhood may be quixotic,

but it does not lack logic, and it enjoys popular support, quite apart from the terrorist

methods of ETA” (Shepard, 2002). Democratic methods were used often in the Basque

struggle, most notably in the new Constitution of post-Franco Spain in 1978. Because of

that, the Basque began to enjoy extensive autonomy again with its own parliament, police

force (the Ertaintza), tax collection system, health system, and public education system in

the Basque language. Some powers did remain with the Spanish central government; for

example, foreign and defense policy, and national security. But even though the Spanish

central government conceded on some serious points in favor of the Basque people, the

simple fact it that there will never be an autonomous state without a serious change to the

57

present condition. If a referendum passes and the Basque community separates, other

regions in Spanish, such as Catalonia and Galicia will likely follow suit (Shepard, 2002).

The Parliament created in 1978 sought continual peaceful means towards a

solution, but ETA was undeterred and the violence continued, reminiscent of the PIRA or

RIRA in Ireland, they would only be content when their ultimate goal was reached. Serious

repression was still the standard tool used by the Spanish central government as the

attacks continued throughout the 1980s and 1990s. In 1998, in the wake of two pivotal

murders surrounding the ETA violence, the group did declared a truce, which held until

1999. Killings started again in 2000, but were markedly different. This round included car

bombs outside popular Madrid department story and incendiary devices at Spanish airport.

ETA is often compared with the IRA and it is easy to see why.

The leading political party in the Basque parliament, the Basque National Party

(Partido Nacionalista Vasco, or PNV) lead by Juan Jose Ibarretxe, remained in power during

that time and won the elections in 2001. Throughout their time in power, the PNV actively

stood against ETA violence, especially after the brutal murders in the 1990s. They did so by

continually condemning ETA violence and backing independence by legal means. At one

point, they tried to isolate ETA to persuade its members to disarm. But beginning in 2001,

Ibarretxe started to use the Basque police forces to crack down on ETA through a series of

raids.

Perhaps the more irritating fact from the view point of those trying to end ETA reign

of violence was the fact that the group could regenerate, despite having their leaders killed

or imprisoned. They had a steady supply of capital through extortion, kidnapping and

58

forced payments of “revolutionary taxes” and their three men ‘executive committee’ could

replace any member at a moment’s notice. But should they be so foolish as to pursue their

goal of “Let us get our way, or things will get much worse” and attack tourists, particularly

American tourists, any chance of benevolent government action would cease to exist

(Shepard, 2002). With this understanding came the need to create legislation that would

ardently adhere to rules one and two.

With this sort of history, Spain has had a counterterrorism strategy that is centered

on criminal punishments and has evolved, and in so doing following rule one, although not

as much as the U.K. or U.S. did. In 1977, during the height of ETA attacks, the Spanish

central government established the National Court to try ETA criminals away from

sympathetic peers, going as far to house ETA criminals outside of the Basque Provinces in

different prisons throughout the country. In 2000, the extolling of terrorism through

speech or other forms of public expression was outlawed (Bardaji & Cosido, 2003).

After 9/11, Spain found itself in a unique position. It had experience in

counterterrorism and was the current Presidency rotation of the European Council. Its

initial support came in accompanying the United States during the beginning of the War in

Iraq. In regards to police force, it was where counterterrorism strategy was formed during

ETA attacks and that is where it remained. It is possible to say that Spain was not evolving

their counterterrorism policy in a manner befitting this new threat or falling into a bit of a

God complex problem, but that could also be said of the other two examples in this paper

before their large attacks in 2001 and 2005. Spain simply had not yet received the trauma

necessary for a large scale evolutionary step. Nevertheless, post 9/11 Spain did focused on

59

augmenting current policies and a few new institutions were made to handle the ‘new

threats.’ The trauma experienced by another nation coupled with its own experience with

ETA had shown that small, constructive change was needed.

At the time there were only three institutions that handled counterterrorism, which

is drastically different from the United States or the U.K.. Spain is following rule three in the

way that works best for it. First was the Cuerpo National de Policia (the Urban Police, the

Guardia Civil (the Civil Guard, responsible for the country side), and the Audiencia National

(the National Court which operates within the Ministry of the Interior and tries all

terrorism cases). The only new additions came when older institutions received a breath of

fresh air. The chemical, radiological, biological, and nuclear (CRBN) operation was renewed

and Spain’s Higher Defense Intelligence Center was reorganized and renamed the National

Center of Intelligence (Van de Linde, 2002).

The attacks of March 11, 2004 (known as 11M (Marzo)) had a relatively short

timeline compared to other major global attacks. Three commuter trains left the station at

Alcala de Henares, about 12 km east of Madrid, while a fourth left from Guadalajara; all

within 15 minutes of each other with the first leaving at 6:00am GMT (see map on

following page). As each of the trains passed through Alacala de Henares, backpacks

containing 22lbs of explosives and nails (Hamilos & Tran, 2007) were loaded on board into

specific carriages. At 6:39am local time the first train arrived at Atocha station and three

bombs exploded in the third, fourth, and sixth carriages, killing at 34 people.

Simultaneously on a second train outside Atocha station, four bombs exploded in the first,

fourth, and sixth carriages, killing at least 59.

60

At 6:41am, as the third train passed through El Pozo station, two bombs exploded in

the fourth and fifth carriages, killing at least 70. And finally at 6:42am, as the fourth train

passed through Santa Eugenia station, a bomb exploded in the fourth carriage, killing at

least 17 (“Madrid attacks timeline”, 2004). Each device was detonated by a mobile phone

and used a dynamite-like explosive like Goma 2-E, a gelatinous, nitroglycerin-based

explosive that is typically used in mining (Golden & Johnson, 2004) or Titadine (Golden &

Don Van, 2004). At 9:27am, all incoming trains to Madrid were stopped due to the fear of

further explosions. The official toll was 191 dead and around 1,800 wounded (“Madrid

attacks timeline,” 2004).

Map of the Madrid Bombings (Scioline, 2004)

The first days after the attacks consisted of investigation, identifications, and the

entire country taking the time to mourn the fallen. King Juan Carlos urged calm saying,

“Men, women, children, free citizens of all ages and occupation, even from other countries,

on their way to their destinations, schools and work, have found themselves brutally

confronted with death and suffering. [Our only course of action] is unity, firmness, and

serenity” (Scioline, 2004).

61

The initial suspects in the bombings were ETA because the group had been known

to use Goma 2-E (Golden &Johnson, 2004), the bombings came three days before the

national elections which are a point of tension for the group, and on the previous Christmas

Eve, two ETA collaborators planted backpack bombs on a train headed from the northern

city of Irun towards Madrid. However, two events changed the initial blame. The first was a

claim of responsibility in the name of al-Qaeda which was received by al-Quds al-Arabi, an

Arabic newspaper in London (Vitzthum, Johnson & Champion, 2004). The second was the

discovery of a van in Alacla de Henares which contained the detonators to the bombs and a

tape with verses from the Qur’an (Goldmen & Johnson, 2004). The standing theory for the

reasoning behind the attacks is because of Spain’s support for the United States invasion of

Iraq in 2003.

In October 2007, a Spanish judge found 21 people guilty and acquitted seven. Three

of the eight main suspects received sentences of nearly 40,000 years each, but under

Spanish law could only serve the maximum sentence of 40 years. Four other lead

defendants were acquitted of murder, but convicted of lesser charges and fourteen others

were found guilty of lesser charges such as belonging to a terrorist group. Despite evidence

linking them to Islamic terrorist groups, there are still lingering doubts among academics

that ETA was in fact, behind the attacks, but given the monumental amount of evidence to

the contrary, many believe that the defendants were rightly accused and convicted

(Hamilos & Tran, 2007).

Just like the U.K. after 7/7 and the United States after 9/11, Spain was hit with an

emotional need to protect their citizens by pushing through legislation. However, Spain

62

was not so overcome that the huge pieces of legislation passed were later completely

repealed. They did stick with what they knew had worked against ETA and augmented it to

fight a specific hole; Spain’s policy was evolving.

Naturally, the police force received the biggest and quickest boost through budget

increases and subsequently more personnel; newly appointed Minister of the Interior Jose

Antonia Alonse saw to that. This was because of the role that the police force had played in

the past combating terrorism. In one of his first post-11M speeches, he said: “…the Police

and Guardia Civil information services have told us two things: one, that we clearly have to

increase the resources and personnel available to the eternal information units…and two,

they always told us that we should create a professional structure that can receive

information, analyze it, assess the risks of the new terrorism, [and] consequently, make

operational recommendations to the police and Guardia Civil” (Reinares, 2009). Rules to

and three were hit square on the head.

Because of this, the police started pursuing al-Qaeda related leads immediately

following the attacks, which lead to the aforementioned convictions (Dannenbaum, 2011).

An earlier change to the penal code in response to 7/7 had allowed the Spanish

government to evolve to handle a new threat in a manner that would integrate well into

existing procedures. The penal code had been amended to cover “the manufacture,

manipulations, transport, possession or marketing of (I) explosives, (II)flammable,

corrosive, toxic or asphyxiating substances, or (III) any other matter, device or artifice that

may cause destruction” (Gómez-Céspedes & Domínguez, 2006).

63

Following along similar lines to the U.K. and the United States, Spain also saw that a

lack of intelligence cooperation had led to the attacks and to combat that from happening in

the future, new provisions had to be made going along with rule three. This took the form

of the Comité Ejecutivo para el Mando Unificado (the executive committee for the unified

command of the national security forces, CEMU) and subsequently, El Centro National de

Coordinación Antiterrorista (National Counter-Terrorism Center, CNCA). Among the

reports on 11M, coordination both among police forces and from within them was a serious

problem in the aftermath of the attack. CEMU was a direct result of this. It is aimed at

preventing and responding to the different varieties of terrorism that pose challenges to

Spain, including ETA, with specific attention given to al-Qaeda-related terrorism.

The CNCA grew out of the CEMU. Its functions include “regular assessments of

terrorism risks and threats to Spain, assessments that provide high-quality strategic

intelligence that includes possible scenarios for intervention and operational

recommendations for dealing with such risks and threats” (Reinares, 2004). The CNCA

functions much like a large fusion center in the United States and not surprisingly has

regular contact with similar institutions in other European, Western, Arab, and Asian

countries. This center is a huge step forward for Spanish intelligence cooperation. Although

the Spanish authorities had decades of dealings with ETA, it was not until the bombings in

Madrid that the decision was made to create a special institution with members of various

security forces that could jointly access the situation and coordinate counterterrorism

activities.

64

The ability of Spain’s counterterrorism policy to readily accommodate a new type of

threat shows that it is very adaptable, fulfilling rule one. A large reason for this is that it is

geared more towards criminal activities than to terrorism in general. As seen in the first

section, nailing down a definition of terrorism can lead to an inability to deal with a

problem. With Spain, this was not an issue because the crimes were ultimately what the

courts and government punished. There is no ‘gap problem’ for someone to wiggle their

way out of a conviction. The laws are solid and do their job well and thanks to the new

intelligence community reforms it should continue to thrive.

65

IV. Lesson Learned?

The two large questions to be answered here are: did in fact each central

government of the specific country learn from the impact of historical terrorist groups and

apply those lessons to the future interactions with modern terrorist groups and did those

changes follow the three rules as outlined above? Using the detailed examples above, the

answer to the first question is yes and the reason for that answer will be covered in the first

part of this section. As for the second question, the answer is a conditional yes. Each

country did apply the rules, but on different levels. The reasoning for this answer will be

covered in the later part of this section.

The overarching theme of this paper was to see if a country can indeed learn from

its past. This is an important aspect of any life and is equally as important in the life of a

government and counterterrorism policy. Each of the examples above has shown that they

have learned from the past. In the case of the United States they learned that the God

complex that the FBI can suffer from when pursuing a terrorist group is neither helpful or a

productive use of time. After the failure to arrest members of the WU because of illegally

obtained evidence, the U.S. government sought better and more reliable means to stop and

catch terrorist acts. More responsibility was given to different agencies and the workload

was spread out and not contained in a small Squad 47 style. The U.S. does suffer from a lack

of sustained, concentrated domestic terrorism, the likes of which are seen in the U.K. or

Spain.

Reflecting on the example of the U.K., the lessons learned in the struggle against the

IRA have helped in the struggle against al-Qaeda terrorism. Though the lesson learned are

66

not perfectly transmissible, they are useful to apply in a broad context. One of the lessons

that the U.K. learned and has since applied is that a pure fight against a terrorist threat

doesn’t work. Terrorism is not something that can be beaten into submission like the Black

and Tans tried to do in Ireland. Instead, counterterrorism is something that requires

constant community interaction on the ground level.

Another lesson learned by the U.K. that has subsequently been applied is that in

order to end the use of terrorism by a specific group, you need to understand where the

group is coming from; what is its history? At the beginning of their counterterrorism

strategy, the U.K. thought that Irish nationalism would just go away if it beat it down hard

enough. After years of trying that strategy, the British government learned that it needed to

talk with the other side and figure out something that worked, if only partially, for both

sides. Only then would a ceasefire last and political progress through Sein Fein take the

front seat.

Finally, the lessons learned from Spain’s dealing with ETA are sometimes you need

to go backwards in order to go forwards. Unlike the U.S. and the U.K., Spain benefitted from

going backward. For centuries, the Basque homeland had enjoyed independence. When the

Spanish central government had tried and failed to stop ETA’s violent ways, they decided

that perhaps the past didn’t just offer lessons, but rather a direct plan of action. A level of

Basque independence has served both parties well.

Seeing how each of three illustrative examples have evolved and adapted

throughout their experiences dealing with terrorism shows a lot about how future

incidents will be dealt with. They have each strived to improve the nature of their

67

counterterrorism polices. The United States learned that one agency hunting down the WU

through illegal means won’t work, the British government learned that attempting to beat

your colony into submission is not a means to a fruitful end, and Spain learned that

sometimes historical precedent can be the answer. This section will begin with comparing

the three cases studies and how well the follow the rules and end by answering one final

question about counterterrorism policy.

Three Rules:

1. Counterterrorism policies must be able to evolve and adapt.

2. Counterterrorism policies must endeavor to gain a holistic view of the situation.

3. Counterterrorism cannot be handled by one agency. It is no place for a God complex. It is a place for teamwork.

Rule one is the easiest to measure. Each country inevitably evolves with their

policies, which is a good thing. But it is the nature of that evolution that can bring more

troubles. In a 2006 article, Amy Zegart discusses adaptation, as it related to evolution of

policy, as displaying a magnitude of change and that the changes must result in an

improved fit. The magnitude of change can involve a large change or a series of small

changes, either is acceptable. When organizational boundaries shift, or gain major, new,

nonroutine tasks or when they go about their old tasks with a substantially different

structures, process, or belief, they have gone through adaptation, and not just a simple

change.

The improved fit can also be a deal-breaker. If a policy has a series of small changes,

but they fail to address the problems that lead to a change then it has failed to adapt. An

68

improved fit can come through a change in organizational structure or fitting a new policy

to combat a new threat. Each case is unique.

The United States has had a very tough time adapting their counterterrorism policy

over the years, but not entirely by their fault. The WU presents a very different threat than

al-Qaeda. Had the two been more similar, the policy might have transferred more readily.

Nonetheless, as the al-Qaeda threat evolved, the United States did make massive attempts

to adapt with new legislation and creating new working groups like the CTC to specifically

manage the problem at hand. However, the United States tends to make sweeping changes

to counterterrorism policies only after a trauma; that reactionary process backfires when

emotions run high as seen with the Patriot Act. Over all the US is good at realizing that

changes are needed, but the follow-through is lacking. Once the emotions dissipate, The

United States cannot afford to fall into complacency. Each policy must be continually

evaluated.

The U.K. has also managed to evolve, but on a much smaller scale due to their

experience with terrorism and the IRA. Massive changes have occurred in rare instances,

but it has been more a case of small changes over a long period of time. As discussed above,

the massive changes due to the Prevention of Terrorism Act in 2005 were rushed through,

just like the Patriot Act in the United States. Again, this has a lot to do with emotions in the

span right after the event. The legislative changes that have occurred since 2005 show a

much more measured tone; with Parliament even going so far to say that they recognize

the mistakes of passing a large piece of legislation quickly in a time of high emotion. Part of

adapting is recognizing this fact and reconciling it through future legislation. Over all the

69

U.K. has done a better job here than the United States, but also cannot afford to let

legislation fall by the wayside once it has been passed.

Lastly, Spain has similar markings in this rule to the U.K.. The small changes and

relative simplicity of the counterterrorism policies have made it easy to adapt as the threat

evolves. When specific changes were needed in relation to explosives, post 11-M, those

changes were made. The ultimate change, however, came when Spain came to the

conclusion that to go forward, they must go backwards. The counterterrorism policy

evolved in both a large and small way at the same time, a feat that has not been matched by

the other two countries.

With reference to the second rule of endeavoring to gain a holistic view, each

country receives high marks. Community policing has increased as well as cultural

awareness, which are so vital to counterterrorism. There have been problems with civil

liberties in this area especially because community policing and increased ground

intelligence is tricky when it comes to finding an appropriate balance between fishing

expeditions and legitimate investigations.

The U.S.’s efforts to expand its community policing efforts and increased ground

surveillance have shown its willingness to understand the problem in addition to dealing

with it criminally. This can also be seen in the U.K.’s expanded community policing efforts,

and especially in its specific community outreaches. Both countries know that to prevent

the next attack they must know why the attack to place, why those specific people were

involved, and what might be done at the ground level to help those prone to terrorist

methods to choose a more peaceful resolution. Spain has followed rule two as well, but in a

70

much different way. Instead of adding, it subtracted and replaced government policing

inside Basque country with Basque police inside Basque country. This works alongside the

level of independence afforded to the Basques.

Finally, all three countries have done well in disappearing their God complexes of

old, though some hints do linger. In the United States, this is shown most effectively

through the fusion process that has flourished recently. The massive network of fusion

centers in the United States not to mention the mosaic of the DHS has greatly increased the

understanding of different terrorist organizations. In Spain the way that the Spanish police,

Basque police, and Ministry of the Interior functions as a unit that know that it cannot

possibly cover all of Spain shows vast improvement. Along with this is the delegation of

certain powers and responsibilities to the Basque region which shows not only that the

central government accepts that they cannot coexist with the Basque people without some

sort of compromise, but that they are confident a previously hostile enemy has changed in

a massive way. The U.K. has also shown this in a huge way by the combining of special

operating groups that now fall under the same mandate.

This paper sought to not look at the outcomes of change, but rather the change itself.

The outcomes maybe covered at other times, but how countries change as a result of

actions is the purpose here. Each country, through many leaders and political parties took

away something different from events. What Margaret Thatcher took away from the

bombings in Brighton is completely different from what Tony Blair took away from his time

and experience with the IRA. The same goes for the other two countries.

71

When it comes to comparing the three countries side by side, it is impossible to

completely compare every aspect of the events and lessons. There are too many variables

to consider. But, the wide comparisons made within this paper do offer some insight into

counterterrorism policy and that was the goal here. This paper was intended to give a

broad overview of the situation and lessons that can be learned.

Each person in a country is an important part of the policy and there is always some

new, innovative idea. This topic will be covered as long as terrorism is alive in the world.

Lessons learned at all level of counterterrorism are important to continuing debate

surround the policies. At the conclusion of this paper, the author hopes that the second rule

of counterterrorism, the endeavor to present a holistic view, has been fulfilled.

72

Appendix 1: The 3 Rules of Counterterrorism Policy

Rule 1: Counterterrorism policies must be able to evolve. In the absence of the prefect

evolutionary policy, small, constant, constructive changes are acceptable.

Rule 2: Counterterrorism policies must endeavor to gain a holistic view of the problem at

hand.

Rule 3: Counterterrorism is not to be handled by a single entity. It is no place for a God

complex. It is a place for teamwork.

73

Appendix 2: ACRONYMS

11M: 11 Marzo (March 11, 2007 Madrid Bombings) CEMU: Comité Ejecutivo para el Mando Unificado (the executive committee

for the unified command of the national security forces, Spain) CNCA: El Centro National de Coordinación Antiterrorista (National Counter-

Terrorism Center, Spain) COBRA: Cabinet Office Briefing Room A (UK) CONTEST: Counter-Terrorism Strategy (UK, 2002 & 2005) CRBN: Chemical, Radiological, Biological, and Nuclear CTC: Counter Terrorism Center (US) CTU: Counter Terrorism Unit (UK) DHS: Department of Homeland Security (US) DOD: Department of Defense (US) ETA: Euskadi Ta Askatasuna (Basque Homeland and Freedom, Spain) FDNY: Fire Department of New York IRA: Irish Republican Army IRTPA: Intelligence Reform and Terrorism Prevention Act (US, 2004) JTAC: Joint Terrorism Action Center (UK, 2003) NSL: National Security Letter (US) PAPD: Port Authority Police Department (US) PIRA: Provisional Irish Republican Army PLO: Palestinian Liberation Organization PNV: Partido Nacionalista Vasco (Basque Nationalist Party, Spain) PTA: Prevention of Terrorism Act (UK, 2005) RIRA: Real Irish Republican Army TACT: Terrorism Act (UK, 2001) USA PATRIOT ACT: Uniting and Strengthening American by Providing Appropriate Tools

Required to Intercept and Obstruct Terrorism Act (US, 2001) WU: Weather Underground (US)

74

BIBLIOGRAPHY

Ahmad, E. (2003). Terrorism: Theirs & ours. In R. Howard & R. Sawyer (Eds.), Terrorism and Counterterrorism: Understanding the New Security Environment (pp. 46- 53). Guilford, Connecticut: McGraw-Hill/Dushkin.

Banks, W. C., Nevers, R., & Wallerstein, M. B. (2008). Combating terrorism: Strategies and approaches. Washington, DC: CQ Press.

Bardaji, R., & Cosido, I. (2003). Spain: From 9/11 to 3/11 and beyond. In G. Schmitt (Ed.), Safety, liberty and Islamic terrorism (pp. 48-61). Washington, DC: American Enterprise Institute for Public Policy Research.

Bosco, D. (2006). An indefinable problem. Bulletin of the Atomic Scientists, 62(1), 44-51.

Chonoska, J. (2012, July 20). Interview by K Rogers [Personal Interview].

Control order. (2011, November 11). Retrieved from http://en.wikipedia.org/wiki/Control_order.

Cowell, A. (2005, July 8). First details of bombs emerge; tool reaches 49 and some bodies aren't yet recovered. New York Times, p. A7.

Dodd, V., & Bailey, C. (2006, April 12). Terror law an affront to justice - judge. The Guardian. Retrieved from http://www.guardian.co.uk/politics/2006/apr/13/humanrights.terrorism.

Don Van, N., & Johnston, D. (2005, July 9). London bombs seen as crude; Death toll rises to 49. New York Times, p. A1.

Ettinger, C. (Producer), Harron, M. (Producer), & McCann, S. E. (Producer) (2002). The weather underground [DVD].

Field, A. (2009). Tracking terrorist networks: problems of intelligence sharing within the UK intelligence community. Review of International Studies, 35, 997-1009. doi: 10.1017/S0260210509990416

Golden, T., & Don Van, N. (2004, March 12). Carnage yields conflicting clues as officials search for culprits. New York Times, p. A1.

Golden, T., & Johnson, D. (2004, March 16). Officials tending to blame Qaeda for Madrid

attack. New York Times, p. A17.

75

Hamilos, P., & Tran, M. (2007, October 31). 21 guilty, seven cleared over Madrid train bombings. . Retrieved from http://www.guardian.co.uk/world/2007/oct/31/spain.marktran.

Hoffman, B. (2003). Defining terrorism. In R. Howard & R. Sawyer (Eds.), Terrorism and Counterterrorism: Understanding the New Security Environment (pp. 3-24). Guilford, Connecticut: McGraw-Hill/Dushkin.

How the day unfolded - London bombs. (2005, July 8). The Times. Retrieved from http://infoweb.newsbank.com.proxy.lib.muohio.edu/iw-search/we/InfoWeb?p_theme=aggregated5&d_articleFolderId=&p_action=doc&p_product=AWNB&p_docid=10B3D46EAFAF1B88&f_lastaction=savedarticles.

Klausen, J. (2009). British counter-terrorism after 7/7: Adapting community policing to the

fight against domestic terrorism. Journal of Ethnic and Migration Studies, 35(3), 403-420. doi: 10.1080/13691830802704566.

Klausen, J. (2007, February). British counter-terrorism after the July 2005 attacks. Retrieved

from http://www.usip.org/publications/british-counter-terrorism-after-july-2005-attacks.

Kline, R. (Writer), & Dekmejian, R. H. (Writer) (2001). Ethnic terrorism [Television series episode]. In Kline, R. (Executive Producer), Terrorism: A world in shadows. Ambrose Video. Retrieved from http://dmc.ohiolink.edu.proxy.lib.muohio.edu/cgi/i/image/image-idx?cc=dvc;view=entry;entryid=x-6458237

London Assembly, (2006a). Report of the 7 July review committee. Retrieved from Greater London Authority website: http://legacy.london.gov.uk/assembly/reports/7july/report.pdf

Madrid attacks timeline. (2004, March 12). BBC News. Retrieved from

http://news.bbc.co.uk/go/pr/fr/-/2/hi/europe/3504912.stm.

Maximilien, R. (1794, February 5). The political philosophy of terror. Retrieved from http://www.worldfuturefund.org/wffmaster/Reading/Communism/ROBESPIERRE'S SPEECH.htm

Muir, H., & Cowan, R. (2005, July 8). Four bombs in 50 minutes - Britain suffers its worst-ever terror attack. The Guardian. Retrieved from http://infoweb.newsbank.com.proxy.lib.muohio.edu/iw-search/we/InfoWeb?p_theme=aggregated5&d_articleFolderId=&p_action=doc&p_product=AWNB&p_docid=10B39AC2DD09DA68&f_lastaction=savedarticles.

National Commission on Terrorist Attacks upon the United States (2004). The 9/11 commission report: Final report of the National Commission on Terrorist Attacks upon

76

the United States. Washing, DC: National Commission on Terrorist Attacks upon the United States.

Northern Ireland Assembly, (1998). Good Friday agreement. Retrieved from website: http://www.sinnfein.ie/files/2009/goodfriday.pdf

Parker, T. (2010). United Kingdom: Once more unto the breach. In G. Scmitt (Ed.), Safety, liberty and Islamic terrorism (pp. 8-30). Washington, DC: American Institute for Public Policy Research.

Pillar, P. (2003). The dimensions of terrorism and counterterrorism. In R. Howard & R. Sawyer (Eds.), Terrorism and Counterterrorism: Understanding the New Security Environment (pp. 24-46). Guilford, Connecticut: McGraw-Hill/Dushkin.

Prevention of terrorism act 2005. (2012, March 6). Retrieved from http://en.wikipedia.org/wiki/Prevention_of_Terrorism_Act_2005

Schmitt, G. (2010). United states: Facing the threat at home. In G. Schmitt (Ed.), Safety, liberty, and Islamic terrorism (pp. 81-104). Washington, DC: American Enterprise Institute for Public Policy Research.

Scioline, E. (2004, March 12). 10 bombs shatter trains in Madrid, killing 192. New York Times, p. A1.

Symeonidou-Kastanidou, E. (2004). Defining terrorism. European Journal of Crime, 12(1),

14-35. The bombing of the King David Hotel. (2012). Retrieved from

http://www.jewishvirtuallibrary.org/jsource/History/King_David.html

The IRA [Television series episode]. (2008). In World History in Video. London: The BBC.

Retrieved from http://whiv.alexanderstreet.com.proxy.lib.muohio.edu/View/1520657

The Stationary Office, (2006). Report of the official account of the bombings in London on 7th July 2005. Retrieved from: http://www.fas.org/irp/world/uk/7-july-report.pdf.

The US Department of Defense. (2012, July 15). DOD dictionary of military terms. Retrieved

from http://www.dtic.mil/doctrine/dod_dictionary/data/t/7591.html

Transport chaos: 9.17am circle line train at Edgeware road seven dead, at least 36 injured. (2005, July 8). The Guardian. Retrieved from http://infoweb.newsbank.com.proxy.lib.muohio.edu/iw-search/we/InfoWeb?p_theme=aggregated5&d_articleFolderId=&p_action=doc&p_product=AWNB&p_docid=10B39AC2DF5CFDE0&f_lastaction=savedarticles.

77

Van de Linde, E., O'Brien, K., Lindstrom, G., de Spiegeleire, S., Vayrynen, M., & de Vries, H.

Netherlands Ministry of Justice, (2002). Quick scan of post 9/11 national counter-

terrorism policy making and implementation in selected European countries (MR -

1590). Arlington: RAND Europe.

Vitzthum, C., Johnson, K., & Champion, M. (2004, March 12). Terror in Madrid: Train bombs kill at least 190 in Spain. The Wall Street Journal, p. A1.

Vlogbrothers (2010a, November 5). God and grain: The French revolution, Part I. Retrieved

from http://youtu.be/BvSod16wfg

Vlogbrothers (2010b, November 11). Reign of terror: The French revolution, Part III. Retrieved from http://youtu.be/PyZsLYxaluM

Zegart, A. (2006). An empirical analysis of failed intelligence reforms before September 11. Political Science Quarterly, 121(1), 33-60.