An Analysis of Diplomacy in the War on Terror By Patrick Blannin

An Analysis of Diplomacy in the War on Terror
By Patrick Blannin and Stuart Murray
Introduction
The War on Terror (WoT) has been the dominant global security issue of the
twenty-first century.1 Since the attacks on the Twin Towers and Pentagon on September
9, 2001, the world has witnessed two major wars in Afghanistan and Iraq and numerous
Intel., covert or ‘black’ operations. The WoT have proved costly. A 2014 Congressional
Research Service report chronicled the WoT as the most expensive in war in U.S. history
– totalling somewhere between $4 and $6 trillion” (Belasco, 2014; McInnis, 2016).2 A
terror industry has been spawned to fight the war. In the United States (U.S.) 267 new
departments, such as Homeland Security, the National Counterterrorism Centre and the
Office of the Director of National Intelligence have been created. Many government’s
counter-terrorism (CT) budgets have doubled and doubled again. In the UK, for example,
annual funding on the security services has increased from £1 bn in 2001 to
approximately £11.7 bn in 2015, with global national security expenditure exceeding
US$ 117 bn.3 In terms of human life the cost has also been exorbitant. The death toll for
Coalitional Forces personnel involved in WoT operations to date (April 2015) is
1
The term Global War on Terror was coined by President Ronald Reagan in 1984 and was adopted by
st
President Bush on the 21 September 2001. The Obama administration sought to distance itself from the
phrase, labelling the fight as the ‘War on Terror (WoT) and more recently the ‘war’ or the fight against (insert
name of group here) or overseas contingency operations. The phrase WoT continues to be widely used by
academia and the media. Therefore, this paper will refer to the fight against international terrorism as the
WoT.
2
From the 9/11 attacks through FY2014, between US$ 3.7 trillion and US$4.4 trillion has been provided for
war operations, diplomatic operations and foreign aid and for medical care for Iraq and Afghan war veterans.
3
The Home Office's Response to Terrorist Attacks - Home Affairs Committee. Section 4, Funding and CounterTerrorism Focus http://www.publications.parliament.uk/pa/cm200910/cmselect/cmhaff/117/11707.htm; UK
Government Sending Review and Autumn Statement 2015.
https://www.gov.uk/government/publications/spending-review-and-autumn-statement-2015-documents;
2015 Global Terrorism Index. Institute for Economics and Peace.
approximately 15,249, while over 41,862 Iraqi and Afghan police and security force
members have been killed since 2003.4 The civilian casualties number between 184,500
- 212,500 people and the Watson Institute estimates the Afghan, Iraq, and Pakistan
theatres alone account for the deaths of over 100,000 opposition fighters. Despite the
deaths of so many combatants from the battlefield, the enemy has proliferated. During
the past fifteen years Al Qa’ida has gone from a relative unknown group of hard-line
fundamentalists into a global terror brand, demonstrating a level of criminal
sophistication and strategic nuance previously unknown. Al Qa’ida franchises now take
advantage of political instability in an arc that stretches from the west coast of Africa to
South-East Asia, co-existing in a dark political space with groups including Boko Haram,
ISIL, Lashkar e-Taiba and Abu Sayyaf Group.
The WoT is now firmly embedded in the post-modern international relations
system. Images screened around the world of attacks in Madrid, London, Sousse BeachTunisia, Paris & Brussels are seared into the collective memory of a generation. And
worryingly, the War between ‘us’ and ‘them’ shows no sign of abating. Research from
the Institute Economics & Peace and START at the University of Maryland indicates a
recent surge in attacks. Conservative estimates suggest a ninefold increase since the
year 2000 with 32,658 people killed in 2014 alone; the highest annual total in recorded
history (GTI, 2015: 2; START, 2015). In 2001, when George W. Bush declared that the
War “will not end until every terrorist group of global reach has been found, stopped
and defeated,” few realised the Global War would turn into the Long War. Former CIA
4
Costs of War. Watson Institute of International and Public Affairs, Brown University.
http://watson.brown.edu/costsofwar/files/cow/imce/papers/2015/War%20Related%20Casualties%20Afghani
stan%20and%20Pakistan%202001-2014%20FIN%20%288%29.pdf; International Physicians for the Prevention
of Nuclear War. (2015). Body Count: Casualty Figures after 10 Years of the War on Terror, Iraq, Afghanistan,
and Pakistan. First international edition (March 2015).
http://www.ippnw.de/commonFiles/pdfs/Frieden/Body_Count_first_international_edition_2015_final.pdf; 2
iCasualties: http://icasualties.org/OEF/index.aspx; Department of Defense Casualty Report:
http://www.defense.gov/news/casualty.pdf
Deputy Director Michael Morrel agrees, stating that although “there has been a
reduction of the threat from the original al Qa’ida…it is safe to say Islamic extremism is
likely to be with us for generations” (2015: 1). Former Pentagon chief Leon Panetta
(2014) and former CIA/NSA Director General Michael Hayden (2015) confirm this dire
trend: each predicts a thirty-year battle against the current generation of jihadi
terrorists.
Despite wars, expanding budgets, and a general global condemnation of
terrorism, the U.S. and its Western allies appear to have reached an “indefinite
stalemate” in their battle against international terrorism (Deos & Pigman, 2010: 151;
Bunker, 2016).5 If the “goodies”, to use former Australian Prime Minister Tony Abott’s
phrase, are to stand any chance of winning a war “against an abstract entity,” (Hoffman,
2009: 20; Schmid & Singh, 2009: 40) then more intellectual resources need to be
devoted to understanding, engaging and, ultimately, defeating the growing threat of
terrorism. So far, however, the analysis of CT strategies and tactics have been examined
somewhat parochially, via International Relations (IR) mainstays of Strategic Studies,
Political Science, Foreign Policy Analysis, Social Movement Theory (a.k.a. the
deradicalization model), and Social Network Analysis. One perspective, which has
operated at the front and centre of the WoT, has been conspicuous in its absence:
diplomacy. This paper seeks to address this deficiency.
Whether thinking of summit, defence, or intelligence diplomacy, or newer
iterations such as public, digital or cultural diplomacy, the “business of peace” has been
of vital importance in the fight against terrorism (Murray, 2009: 119). Traditional state
actors and “unconventional diplomatic actors” (Berridge, 1994; Murray, 2009: 117;
5
Bunker prefers to label the stalemate as a “strategic pause,” but one which shows no sign of turning to the
Western coalitions favour. p. 1.
Torrosy, 2014) such as the United Nations, prominent civil society organisations (CSOs),
large, western hotel chains (so often the targets), multi-national corporations (MNC’s)
and private security providers, all form part of a global network whose goal remains
unchanged – to defeat the terrorists, deny them sanctuary, diminish their capacity to
recruit and defend the homeland from further terrorist attacks (National Strategy for
Counter Terrorism, 2003: 15). And putting aside the unhelpful over-simplification of
terrorist organisations (TOs) as medieval “barbarians”, a label produced and reproduced by governments and media organisations the world over, we argue somewhat
controversially that groups such as Al Qa’ida or ISIL also practice crude forms of
diplomacy. Like or loathe such opinion, they too communicate, negotiate and represent
a ‘moral’ struggle to disenfranchised individuals and groups the world over.
As yet, no diplomatic analysis of the most pressing security issue of our time has
been forthcoming. This paper seeks to fill this proverbial ‘gap’ in the canon of diplomatic
studies, in other words. Primarily, it argues that any analysis of the WoT - whether
seeking to understand or counter ‘new’ terrorism - is incomplete without mapping and
reviewing the role of diplomacy in the War. Related, and second, we argue that if
theorists and practitioners are to entertain any hope of winning the war then diplomacy,
not the military, must be the vanguard “default responder” to terrorism (Quadrennial
Defence Review, 2006: 86). Should the military remain as the key responder the war
will continue in perpetuity. To entertain any hope of winning the war more theoretical
and practical consideration of diplomacy is vital.
In terms of structure, the paper is divided into three main sections: traditional
diplomacy, networked diplomacy (with an emphasis on peaceful non-state actors
PNSAs), and the diplomacy of terror, that is, the diplomacy of violent non-state actors
(VNSAs). The paper concludes by suggesting a number of recommendations for
theorists and policy makers interested in better understanding the role diplomacy has
played, and can play, in making strategic gains in the WoT.
This paper has three, broad aims. Its initial purpose is to provide the first
diplomatic perspective on the biggest War of the 21st century. To do so, and second, the
paper maps and reviews diplomacy in the WOT from three perspectives: traditional,
non-traditional and radical. The result of this survey, third, and it is hoped, will instigate
greater discussion between diplomatic and terrorism studies theorists and practitioners
on how to better understand and, ergo, utilise diplomacy as the vanguard institution in
the WOT.
Finally, this paper also has three main parameters. Due to the scope, extent and
complexity of the War it would be impossible to examine and theorise on every actor,
incident, policy and case. Therefore this paper provides a grand, abstract or meta
review of diplomacy’s role in the WoT. Second, the paper focusses on U.S. diplomacy,
counter-terrorism and policy. It does so because the U.S. has been the prime victim and
aggressor in the WoT. Where it leads, others have followed, meaning the lessons that
can be learned of U.S. diplomacy are applicable to other Western liberal democracies
participating in the War. We do not, third, seek to provide a final analysis of diplomacy’s
role in the War. To do so would be to deny the purpose of theory, which Hayek (1967:
32) notes is to “merely describe a range of possibilities.” Rather than offer a set of
terminal theoretical assumptions this paper seeks to stimulate, generate and direct the
further development of knowledge on diplomacy’s scope and utility in the WoT.
1. Traditional Diplomacy and the WoT
This section begins by contextualising the WoT and defining traditional
diplomacy. It then describes four sub-categories of traditional diplomacy most
prevalent in the WOT from a theoretical perspective and briefly validates each one in
practice. As noted in the introduction, the paper employs the U.S. as its chief case study.
It does so because the ‘indispensable nation’ is a victim, primary aggressor, and leader
of the fight in the WoT. The U.S. also leads the world in many aspects of CT. U.S. WoT
strategy and tactics are often replicated to some extent by its allied partners such as the
U.K, Canada and Australia.
The September 11 attacks “triggered the most rapid and dramatic change in the
history of U.S. foreign policy” (Walt, 2001; Boyle, 2008). After nine days of concerted
national introspection as well as drafting Public Law 107–49-Authorisation for Use of
Military Force Act, President George W. Bush (20th Sept 2001) introduced the American
people and the world to the ‘war on terror’ when he declared,
“Our war on terror begins with al Qaeda, but it does not end there…We will
direct every resource at our command…every means of diplomacy, every
tool of intelligence, every instrument of law enforcement, every financial
influence, and every necessary weapon of war…to the destruction and to
the defeat of the global terror network…We will make no distinction
between the terrorists who committed these acts and those who harbor
them...Every nation has a choice to make...In this conflict, there is no neutral
ground...You're either with us or you are with the terrorists.”
Practically, the U.S. aimed at “denying sponsorship, support, and sanctuary to
terrorists” and “diminishing the underlying conditions that terrorists seek to exploit”
(Bush, 2001, 2006). To achieve these goals, the U.S developed an offensive, Whole-of Government strategy (JCS 3-26 Counterterrorism, 2014: viii) which was to be led by the
military and law enforcement agencies (Posen, 2003; Adams, et al, 2011). 6 Since the
official U.S military response to 9/11 began on October 7, 2001, with Operation
Enduring Freedom (OEF) in Afghanistan, the U.S. has led an international coalition in
numerous CT/counter-insurgency (CI) operations around the world in various efforts to
oust the Taliban regime, find Usama bin Laden and destroy the al Qa’ida terrorist
network. The mission resulted in the invasion of Iraq in 2003, multi-national Special
Forces operations in Yemen, North Africa, and the Afghanistan/Pakistan border region,
as well as extraordinary rendition programs operated by coalition intelligence agencies
in various clandestine locations throughout the world (Council of Europe, 2007; UNODC,
2009).
Theoretically, U.S. CT strategies and tactics have been developed and
subsequently analysed using International Relations mainstays such as Strategic Studies,
Political Science and Foreign Policy Analysis, as well as behavioural-based analyses such
as electronic/human profiling case studies and Social Network Analysis that are enemycentric evaluations (Krebs, 2008; Blum, 2010; Jaeger & Siddique, 2011; Byman, 2013;
Walsh & Schulzke, 2015). A body of population-centric analysis, which focuses on aid,
development initiatives (Moss, et al, 2005; Callaway & Harrelson-Stephens, 2006;
Bergin & Hately, 2010; Bandyopadhyay, et al, 2011; Choi, 2015) has emerged, as well
the radicalization process using concepts such as Social Movement Theory (DalgaardNeilsen, 2008; Schurman-Kauflin, 2013). To date however, one crucial analytical
perspective has been missing: diplomacy, which informs every aspect of CT in the WoT.
To understand diplomacy’s omnipotence it is important to first describe its
‘essence’, to borrow from the title of Jönsson and Hall’s 2005 book. Since the
6
The military priority is the protection of the state whereas law enforcement prioritizes protection of the
population.
Renaissance, states have been the custodians of diplomacy which is why diplomatic
scholars affix familiar labels to state-qua-state relations: “statist”, “state-centric”,
“rationalist” or “traditional” (Murray, 2009; 118). 7 This article prefers the label
traditional diplomacy; the tradition being that each generation of theorists and
practitioners relies on, develops and expresses admiration for the work of their
predecessors. Echoing Wicquefort, Callieres and Satow, for example, the great
practitioner-theorist Sir Harold Nicolson (1950: 15) defines diplomacy as “the
management of international relations by negotiation; the method by which these
relations are adjusted by ambassadors and envoys; the business or art of the
diplomatist.” Bull expresses the purpose of diplomacy through five key functions –
communication, negotiation, information gathering and dissemination, the minimisation
of friction and symbolism (1977: 163-166). Symbolism is better understood as the more
common term of representation which Sharp identifies as “a slippery concept but one
which we cannot entirely do without … with its emphasis on symbols of power, wealth,
and the grandeur of the state” (1998: 105).8 In short, diplomacy is not only means to a
state end (most commonly a foreign policy end) it is also a civil and civilising institution.
The “engine room of international affairs” (Cohen, 1998: 1), diplomacy is vitally
important to a world divided into hundreds of states and “agents with official standing”
(Mattingly, 1955: 71) in international affairs.
In a general sense, U.S. diplomacy during the WoT has been extremely active. For
example, the Department of State (hereafter referred to as State), regularly organises
bilateral, minilateral and multilateral summit meetings - at institutionalised, networked
7
Lacher, H. (2003). Putting the State in Its Place: The Critique of State-Centrism and Its Limits. Review of
International Studies, 29(4), 521–541. Lacher deconstructs the ‘state-centrism’ in a critique of IR and IPE which
prioritizes the concept of globalism. The term ‘traditional’ relates to the ‘accepted’ concept of modern
diplomacy with the sovereign state as the referent actor.
8
After offering a definition, Sharp states, while academics may wish to take the idea of representation further
than diplomats; they seem to be no clearer about what that involves. p. 105
and ad hoc levels - with domestic partners and international interlocutors. State has
also reinforced and restructured its relationship with Defence and the intelligence
community, supporting military to military relations as well as maintaining the vital
functions of intelligence management, covert operations, and secret diplomacy. Public
and digital diplomacy initiatives have been developed and remain central to U.S. CT
policy. To support these programs, State has incorporated many new front-line services,
establishing the Bureau of Counterterrorism to forge partnerships with non-state actors,
multilateral organizations, and foreign governments in the struggle against the threat of
terrorism at home and abroad. State has also created the Centre for Strategic
Counterterrorism Communications (CSCC) under the direction of the Under Secretary of
Public Diplomacy, a potent mechanism by which State aims to counter anti-American
messages across the digital spectrum. Finally State continues to invest in technologies
which enable it to influence and potentially control both physical and virtual territory.
To allude to the omnipotence, scope and complexity of traditional diplomacy in the WoT
State’s general diplomatic practices can be further distilled into four specific subcategories: summit diplomacy, defence diplomacy, secret diplomacy and public
diplomacy. Each of these is briefly elaborated on below.
Summit Diplomacy
The summit has been one of the main venues for traditional diplomacy during
the WoT. A brief summary of summitry since 2001 demonstrates the pervasive nature
of contemporary diplomacy. Melissen (2003: 3) defines summit diplomacy as “meetings
between incumbent heads of government and/or state, or political leaders.” Summit
diplomacy has often taken centre stage during the WoT when political leaders to centre
stage in a variety of ad hoc and institutionalised forum’s to address this dominant global
security concern (Cohen, 1987; Constantinou, 1996; Langhorne, 1997; Melissen, 2003).
A brief summary of summitry since 2001 is instructive as it demonstrates the pervasive
nature of contemporary diplomacy.
Since its inception in 1947 and more so since 9/11, the United Nations has led
international response to terrorism. To consolidate and enhance its CT efforts, in 2006
the General Assembly entered a new phase of institutionalised CT by agreeing on a
global strategy to counter terrorism. The UN Global Counter-Terrorism Strategy seeks
to reduce “conditions conducive to the spread of terrorism; to prevent and combat
terrorism; to take measures to build state capacity; to strengthen the role of the United
Nations in combating terrorism; and to ensure the respect of human rights while
countering terrorism” (A/RES/60/288). Moving from global to regional CT summitry,
the Eighth ASEAN Summit in November 2002 in Phnom Penh issued a Declaration on
Terrorism, a timely statement given the terrorist attacks in Bali, Indonesia and in the
cities of Zamboanga and Quezon in the Philippines earlier in 2002. There were several
‘spinoff’ summits generated from the Phnom Penh leaders meeting such as the InterSessional Meeting on Counter Terrorism and Transnational Crime (ISM CT–TC) in early
2003 as well as the establishment of the Regional Counter-Terrorism Centre in Malaysia,
which is a key piece a counter-terrorism infrastructure (ASEAN security Outlook, 2015).
Focusing on the U.S., in February 2015 President Obama assembled sixty world
leaders in Washington D.C., for the ‘Summit on Countering Violent Extremism’ attended
by members of the coalition against ISIL. This was the first of number of CVE
conferences held around the world in 2015 (Australia-June, Spain-July, New York-Sept).
At the conclusion of the summit, President Obama announced a three-phase strategy to
combat violent extremism (CVE), two of which are under the auspices of State and are
diplomacy orientated. Obama declared “we all recognize the need for more dialogues
across countries and cultures. But what’s most needed today, perhaps, are more
dialogues within countries -- not just across faiths, but also within faiths…we need to
build and bolster bridges of communication and trust.”9 The brief examples presented
above demonstrate the ubiquitous nature of the summit as a mechanism for generating
trust and cooperation between the actors and trust in the process itself, further
legitimizing diplomacy’s role in the WoT.
Defence Diplomacy
A second subcategory of diplomacy undertaken by State is defence diplomacy.
Tan & Singh (2012: 221) define defence diplomacy as “the collective application of
pacific and/or cooperative initiatives by national defense establishments and military
practitioners for confidence building, trust creation, conflict prevention, and/or conflict
resolution.” The UK MoD define it as “[T]he peaceful application by a state of resources
from across the spectrum of defence, for the purpose of achieving positive outcomes in
the development of bilateral and multilateral relationships … using defence assets to
support diplomatic objectives and further defence interests” (UK Defence Doctrine,
2014: 12). The objective of defence diplomacy is to deploy a state’s military apparatus
as a nonviolent tool of statecraft to shape the regional environment, establishing trust
as well as influencing the conditions effecting the achievement of foreign policy goals.
U.S. foreign policy has ‘always’ been pursued through a closely aligned
military/diplomatic apparatus from the Munroe doctrine beginning in the nineteenth
century. Since then, its goal has been to counter the spread of communism in the
9
Office of the Press Secretary. ‘Remarks by the President at the Summit on Countering Violent Extremism’, The
White House, February 19, 2015. https://www.whitehouse.gov/the-press-office/2015/02/19/remarkspresident-summit-countering-violent-extremism-february-19-2015 . The summits 3 phase recommendations
for CVE are: firstly, a continuation of the program to train allies to fight terrorists, secondly to create a counternarrative using technology and people-to-people dialogue to cross cultures and thirdly, initiate development
programs that focus on individual economic empowerment and improving education.
twentieth century, and fight the War on Terror in the twenty-first century. The strategic
engagement of defence diplomacy affords the U.S. the ability to leverage its global
leadership in military strategy, intra-allied cohesion and trust, burden-sharing and
credibility to form ad-hoc, threat specific groupings (Hallams & Schreer, 2012: 324-5).
U.S. scholars’ and policy makers have re-emphasized defence diplomacy, during the
WoT specifically and as a tool of conflict prevention more generally, as it proves to be an
effective mechanism to mitigate a range of national security issues (Cottey & Forster,
2004: 28; SECDEF Carter, 2016).10
Secret Diplomacy
A third, opaque sub-category is the curious business of secret diplomacy.
Corneliu Bjola (2013: 85) defines secret diplomacy as “the method of conducting
international negotiations without public scrutiny,” while Eytan Gilboa characterised it
as “the total isolation and exclusion of the media and the public from negotiations and
related policy making” (1998: 213). The most recognisable element of secrecy is
intelligence which is used to improve a state’s knowledge of the capabilities and
intentions of its competitors. Intelligence gathering is an “ethically neutral” tactic
however the air of neutrality is eroded when intelligence is absorbed under the label of
secrecy (Sims, 2013: 247; State, 2011). Thus, secrecy and diplomacy are inextricably
linked, with the art of intelligence, deception, and covert action being employed by
representatives of the state to “gain competitive advantages over adversaries in both
peacetime and in war” (Sims, 2013: 244).
10
Cottey & Forster claim tensions between China, Japan and South Korea as well as the issue of newly integrated
NATO states from the former Soviet Union could be mitigated by defence diplomacy initiatives. In April 2016,
SECDEF Carter listed five “evolving major immediate challenges involving Russia, China, the DPRK, Iran and ISIL, all of
which would be tackled through multilateral engagement.”
M. E. Bowman (1998) notes that clandestine, coercive and persuasive executive
action, as mechanisms for influencing behaviours have a long history in U.S. foreign
policy from the Secret Intelligence Bureau (SIB) created by Secretary of State Lansing in
1916 to the various levels of integration of U.S. Military Intelligence Divisions, the
Diplomatic Security Service and the Central Intelligence Agency (CIA) with State.11
Unsurprisingly then, U.S. military intelligence as well as its foreign and domestic
intelligence community have played a central role in the WoT. Secret diplomacy has
been active through covert programs of extraordinary renditions and global ‘black sites,’
suspicionless surveillance and warrantless arrest and detention as well as the vital
interstate capacity building, consensus generating and operational unity required to
conduct global counter-terror operations. In an era of openness and free information
the clandestine nature of secret diplomacy could be viewed as archaic and
unrepresentative of contemporary liberal society. Intelligence, covert operations and
back-channel negotiation are essential strategic assets in the WoT (Sims, 2013: 249).
Public Diplomacy
As a compliment to the ‘hard’ instruments of diplomacy, State has also invested
heavily in new, soft and innovative forms of diplomacy. Two of the more prominent
11
U.S. Secretary of State Lansing established the Secret Intelligence Bureau (Bureau of Diplomatic Security) in
1916. The Bureau provided the Secretary with daily intelligence updates obtained from the “war and Navy
intelligence offices, the Secret Service, and other U.S.G agencies as well as allied intelligence agents” and the
clandestine surveillance, including the interception of telegraph and telephone communications of foreign
embassies in Washington D.C.” p. 7
The National Security Act of 1947 created the CIA, the Director of Central Intelligence and the National
Security Council but the most significant aspect of the act, according to Bowman, was that it “officially and
publically recognised intelligence gathering as a legitimate foreign policy process.” The SID conducted
surveillance of German diplomatic missions whilst also deploying domestic agents to monitor so called
‘radicals’ from a variety of ideological and religious groups. The collaboration between State and the Army
intelligence Division also led to the creation of the Black Chamber project which was established to collect all
incoming and outgoing cable traffic in the CONUS. President Hoover's new Secretary of State Henry L. Stimson
refused to continue its funding with the now-famous comment, "Gentlemen do not read other people's mail."
American Big Brother: A Century of Political Surveillance and Repression. Cato Institute.
http://www.cato.org/american-big-brother; Yardley, H. (1981). The American Black Chamber. Indianapolis, The
Bobbs-Merrill Company.
categories are public and digital diplomacy. Hans Tuch defined public diplomacy (PD) as
“a government’s process of communicating with foreign publics in an attempt to bring
about understanding for its nation’s ideas and ideals, its institutions and culture, as well
as its national goals and policies” (1990: 3). Actors engaged in PD are essentially
promoting “positive images of their own countries and the values in which they believe”
(Sharp, 2009; Berridge, 2012). For van Ham (2003: 426) the key word is values, the
element of PD that “sets it apart from classical diplomacy” which is overwhelmingly
concerned with issues and interests. PD uses a variety of credible mediums to advocate
States policies to foreign audiences, building durable relationships based on a sound
understanding of its people, institutions, culture and ideals.12 This process has been
described as “retail politics on a global scale” (Smith, 1998: 91).
Advances in ICT have enabled governments to connect with foreign publics in an
unprecedented battle for ‘hearts and minds’ in the WoT. From print to radio, to
television and the internet-of-things, states and non-state actors alike have used PD to
inform and respond to demands of a target audience. As a result, PD is no longer an
exercise in state promotion and has moved towards an essential form of “diplomatic
engagement” (Melissen, 2011: 21; Murray, 2015: 134-38). While U.S. PD efforts in the
WoT are significant and highlight the potential of the mechanism, its limits are clear
when the message conveyed is inconsistent with U.S. foreign policy or military actions.
Melissen (2005: 7) suggested that “U.S. policies towards the Middle East or its military
presence in Iraq, for instance, undermine the credibility of public diplomacy.” More
recently, the 2015 U.S. Advisory Commission on Public Diplomacy urged the Obama
administration to continue to integrate PD with policy-making in Washington,
12
Sir John Kerr, former Brinish Ambassador to Washington, insisted that it “is probably the modern
ambassador’s principle function, to be on television, to be on radio, to accept all platforms” Berridge, 2010:
186.
reinforcing the premise that PD “adds a more sophisticated approach to the military
method of ‘winning’ the war on terrorism” (van Ham, 2003: 442).
Digital/Cyber Diplomacy
PD is a broad term and there are many different means to it, such as culture,
sports, education, alumni and/or music, however this paper will isolate and examine the
new facilitator of PD: digital diplomacy. It has been suggested, “the growth in public
diplomacy coupled with the digital ICT revolution has created ideal conditions for the
emergence of digital diplomacy” (Murray, 2015: 130). Digital diplomacy has been
defined as “the use of the internet and information communications technology in order
to carry out diplomatic objectives, or solve foreign policy problems” (Hanson, 2015: 35;
Digital Strategy, FCO, 2012). Hocking & Melissen (2015: 12) suggest the term ‘”cyber
diplomacy’ has become a synonym for digital diplomacy’ e-diplomacy, 21st century
statecraft as well as referring to the development of a cyberspace regime which ensures
Internet freedom, ‘net neutrality’ and Internet governance.” Holmes definition is more
succinct, referring to digital diplomacy “as a strategy of managing change through
digital tools and virtual collaboration” (2013: 4). Regardless of the terminology the ICT
revolution has enhanced traditional ‘analogue’ diplomacy in a number of ways. Westcott
(2008: 2) claims it multiplies and amplifies the number of voices and interests involved
in international policy-making, it accelerates and frees the dissemination of information,
and it enables traditional diplomatic services to be delivered faster and more costeffectively.
From the outset of the WoT, information dissemination has been prioritized by
the U.S. and the Office of e-Diplomacy established by U.S. Secretary of State Colin Powell
in 2002, to improve State’s use of information, has “been responsible for some terrific
innovations” which relate directly to the WoT (Murray, 2015: 132-33). The U.S.
attempted to get ahead of the Internet curve when Hilary Clinton introduced State to
21st Century Statecraft in 2009 as a strategy for engaging multiple audiences in a
decentralized struggle for power and relevance (U.S. Dept. State 2009; Ross, 2012; Faris,
2013; Hayden, 2013).13 The strategy lead to the creation of proactive programs ‘Engage
America’ and ‘Hometown Diplomat’ which encourage communication between
professional and ‘civilian’ diplomats.14 In 2015, State created a “mutli-disciplinary hub”
to improve resource management, increase knowledge sharing, and provide greater
accountability for development initiatives.15 The coalition partners of the U.S. have
created their own online presence with varying degrees of success and social media
platforms have been incorporated into many MFA’s and IGO’s.16
A 2015 United States Advisory Commission on Public Diplomacy report
identified “digital-first public diplomacy” for a number of departments including the
Center for Strategic Counter-Terrorism Communications (CSCC). The adaptability and
dynamic capacity of cyber which makes it so appealing equips policy makers, academics
and practitioners with powerful tools to enhance the levers of national power (Nolan,
2009: xi; Riordan, 2016). State’s embrace of digital as well as its online presence is
increasing its effectiveness and the Foreign Service has access to the latest technology
13
The idea of 21st Century Statecraft is based on an expansive, polylateral view of diplomacy, where a
multitude of non-state actors are enabled by network technologies. p. 26; Senior advisor to former Secretary
of State Hillary Clinton, Alec Ross, describes 21st Century Statecraft as an “agenda” that “complements
traditional foreign policy tools with newly innovated and adapted instruments that fully leverage the networks,
technologies, and demographics of our networked world.”
14
U.S. Department of State and U.S. AID. ‘Executive Summary.’ op. cit. State will increase funding for
diplomatic staff recruitment and training to “modernize” and “diversify” the Foreign Service. pp. 13-14
Governments in the post-modern age wield few economising axes more deeply than in respect of the
management of their overseas representation where the process of modernising has tended to also mean
minimising. All of these initiatives are examples of State attempting overcome a problem that is inherent with
the concept of State. It is the ‘Department of State’, it’s designed, oriented and obligated to deal with states
and its primary function is to deal with sovereign entities.
15
U.S. Department of State and U.S. AID. ‘Executive Summary.’ op. cit. The hub will incorporate “analytics,
data science, strategy and knowledge management.” p. 10
16
The G7 released its ICT Communique in May 2016 which emphasized the important multistakeholder
capacity of cyber to enhance the lives of a global population. G7 Leaders Communique. (2016). Charter for the
nd
Digitally Connected World. 2 May 2016, Japan. pp. 1-5.
http://www.soumu.go.jp/main_content/000416957.pdf
to compete for the ‘hearts and minds’ as it pursues its WoT policy objectives. Although
the medium may have changed, and the access to affordable technology has increased
competition for a target audience, the political philosophy behind state outreach
remains the same.17
This section has demonstrated that diplomacy matters in the battle against
international terrorism. It is the common denominator to the more visible high-profile
kinetic military and/or law enforcement aspects of the WoT. Without it, none of these
strategies would be possible. The theory and practice of traditional diplomacy has been
given a boost by the WoT. As Kleiner (2008:337) argues “the fight against terrorism has
strengthened state authority” as populations turn to their governments in times of crisis.
Melissen also recognises that “the state is more resilient than is sometimes suggested
and one should not underestimate the innovative capacity of state-based diplomacy”
(2011: 3; Lawson, 2012).18 Foreign ministries, the custodians of state-centric traditional
diplomacy, have incorporated many new front-line services to combat the global
terrorism threat. Old and new diplomatic instruments of State have been used to
understand cultures, attitudes, and behaviour, to build and strengthen existing
relationships, and to influence and mobilize actions to advance their interests and
values. Diplomacy, in this respect, has been an invaluable tool of CT. Diplomacy has also
been invigorated by PD as well as digital diplomacy, both of which complement the
more traditional bilateral and multilateral instruments of diplomacy such as summit,
defence and secret diplomacy. Clearly traditional diplomacy has been vital, active and
seminal in the WoT.
17
There are approximately 25 billion devices connected to the Internet of Things and some project that
number may grow to an incredible 50 trillion by the year 2045. EMC2. (2014). ‘The Digital Universe of
Opportunities: Rich Data and the Increasing Value of the Internet of Things.’
18
Lawson states the current interconnected transnational system is actually “transforming rather than
superseding the state.” p. 14
2. Networked diplomacy, PNSAs and the WoT
Further analysis of diplomacy in the WoT reveals that states aren’t the only
actors involved. Non-state actors are every bit as prominent. Old and new media
organisations disseminate imagery, information and government briefings on a regular
basis. Doctors and nurses from Médecins Sans Frontières risk their lives in front-line
theatres from Mogadishu to Aleppo.19 Individuals such as Julian Assange and Ed
Snowden have surrendered certain freedoms in their quest for government
transparency, and businesses such as BAE, Rapiscan and L-3 Systems have made a
fortune from providing the latest CT technology at airports the world over.20 All of these
actors loom large in the WoT yet little is known about their diplomatic character or the
relations they share with each other and, above, the state. Once more, diplomacy is the
glue that holds this plural network of horizontal and vertical relationships together.
This section changes its key referent object from the state to the non-state actor.
Only one, broad sub-category is required to understand this type of twenty-first century
19
Human Rights Watch. (2015). Attacks on Health: Global Report. Safeguarding Health in Conflict, Human
Rights Watch: 1-24; U.S. Central Command. (2016). Summary of the Airstrike on the MSF Trauma Center in
Kunduz, Afghanistan on October 3, 2015. pp. 726 https://info.publicintelligence.net/CENTCOMKunduzHospitalAttack.pdf ; Investigation and Follow-on Actions In May 2016 the U.N. Security Council issued a
resolution condemning attacks on hospitals. The International Committee of the Red Cross documented 2,400
cases of attacks in 11 conflict zones on medical personnel, facilities and patients in the past three years.
According to the president of Médecins Sans Frontières, “four out of five permanent members of the Security
Council have to varying degrees been associated with coalitions associated [with] attacks on medical facilities.”
th
U.N. Security Council Condemns Attacks on Health Workers in War Zones. New York Times, 4 May, 2016.
http://www.nytimes.com/2016/05/04/world/un-security-council-hospitalattacks.html?ct=t(Today_s_Headlines_and_Commentary11_3_2015)&_r=0 . Some claim “the resolution also
raised an awkward question: Can the world’s most powerful countries be expected to enforce the rules when
they and their allies are accused of flouting them?”
20
In November 2001, President Bush signed the Aviation and Transportation Security Act into law requiring
screening conducted by federal officials, 100 percent checked baggage screening, expansion of the Federal Air
Marshal Service and reinforced cockpit doors. The Transportation Security Authority is created to oversee
security in all modes of transportation with the CONUS; Mowery, K, et al. (2014). Security Analysis of a FullBody Scanner. Proceedings of the 23rd USENIX Security Symposium, August 2014.
https://radsec.org/secure1000-sec14.pdf ; Aaron Sarkin. (2014).New study proves just how worthless TSA
airport body scanners really are. http://www.dailydot.com/politics/tsa-rapiscan-body-scanner-study/; Marcus
Baram. ( 2010). Fear Pays: Chertoff, Ex-Security Officials Slammed For Cashing In On Government Experience
http://www.huffingtonpost.com/2010/11/23/fear_pays_chertoff_n_787711.html
diplomacy: that of networked diplomacy. Once this term has been introduced, defined
and situated in both theory and practice, the paper concentrates on the most crucial
actor in the network: peaceful non-state actors (PNSAs). It argues, simply, that
recognition of the valuable diplomatic role PNSAs play in combatting terrorism is vital
to developing a widened view of diplomacy, more effective CT strategies and, therefore,
any hope of ‘winning’ the WoT.
Such unconventional diplomatic analysis is not as implausible as may first
appear. For centuries, conventional diplomatic studies were dominated by state-centric
theories of diplomacy that focussed on the ministry of foreign affairs, its overseas
missions, embassies and consulates, and the professional diplomatic staff within. The
canon of diplomatic studies was dominated by positivist theoretical works, manuals for
novices entering the profession and memoirs by former diplomats. Since the end of the
Cold War, however, post-positivist theories of diplomacy have flooded the field of
studies. These theories “begin by relaxing the assumption that our understanding of
diplomacy must be grounded in the relations of sovereign, territorial states” (Sharp,
2013: 63). The result is a widened understanding of the ‘business of peace’, which
reminds the observer that the state does not have a monopoly on diplomacy.
Paradiplomatic actors such as the Scottish Parliament, large multinational corporations
such as Google, and prominent celebrity diplomats such as Angelina Jolie or Leo Messi,
all practice basic diplomatic functions once reserved for the state.
For Paul Sharp and James Der Derian (1987), it is therefore more meaningful to
construct definitions based on what diplomacy does rather than what it is. Sharp’s
(2009: 13) definition of diplomacy as “first and last, a set of assumptions, institutions
and practices for handling certain kinds of relations between human beings” is popular
when trying to conceive of diplomacy, twenty-first century style. As is Der Derian’s
seminal work On Diplomacy (1988) where he argued that diplomacy is the mediation of
estrangement between representatives of distinct groups. Such understandings of
diplomacy as a plural affair are much better suited for the post-modern, digital era than
traditional theories with their singular focus on the state. Post-positivist theories
describe and account for inter-connectivity associated with globalization as well as the
emergence of new, civil society players who have progressively increased their
influence, power, legitimacy, and credibility. Quite rightly, Grant and Melissen label this
deepening of international relations as “the democratization of diplomacy” (2005: 1-40;
2011: 2).
The term ‘networked diplomacy’ brings together the old and new theoretical
approaches described above.21 Networked diplomacy can be defined simply as a
combination of “two fundamental diplomatic strategies: bilateral and multilateral
modes of action and influence” (Hocking, 2008: 65). For Metzl (2001: 77-78) it is best
conceived of as “sets of interconnected individuals who occupy analogous positions in
institutional or social structures and create new community relationships that build
upon, democratize, and magnify existing social frameworks.” Network diplomacy not
only reflects the deeper range of modern diplomatic actors but also “draws attention to
the different interests, cultures and identities represented by states and non-state
actors” (Hocking & Lee 2005: 67). In nature, these networks are dynamic, adaptable,
informal and collaborative (Gregory, 2015), and support a “range of public and private
actors (sans) agreed rules and norms of (traditional) diplomatic engagement” (Hocking
& Lee, 2005: 7).
21
Network diplomacy goes by a number of different names: National Diplomatic System (Hocking & Spence,
2005; Hocking & Smith, 2010), Multistakeholder Diplomacy (Hocking, 1998), Paradiplomacy (Aguirre, 1999;
Criekemans, 2008) and Polylateralism (Wiseman, 1999, 2004) however all of these approaches bring together
otherwise estranged entities into a transformative process.
Networked diplomacy best describes the theory and practice of modern
diplomacy, as well as the challenges it faces. The WoT is a complex, plural and diverse
conflict involving many different entities with many different influences and goals.
Social, cultural and ideological differences manifest as intense power, brutal and often
bloody power struggles between violent and benign state and non-state actors.
Traditional diplomatic theory and/or practice will not help win or end the war. As
Langhorne notes, the WoT – an irregular conflict involving state and non-state
belligerents, private enterprises, insurgents, militias, and terrorists - cannot be won “by
the existing machinery” (2009: 99). The WoT is a networked war between military and
security forces as well as non-state actors such as NGO’s, IGO’s and regional institutions,
the private sector, the media, traditional and religious leaders as well as the armed
actors actively participating in the violence. Numerous academics contend that a
growing number of non-state actors involved in both intra-state and supra-state
struggles deem it necessary to increase the level of non-state actor involvement in the
management and resolution of those conflicts (Begoyan, 2006; Lamb, 2006; Specker,
2009; Pesto, 2010). A networked, diplomatic solution is vital to any chance of success in
the WoT, in other words.
In the context and purpose of this paper – to topographically and theoretically
map the role of diplomacy in the WoT – the most active, useful and visible non-state
actor in modern, CT diplomatic networks are peaceful non-state actors (PNSAs).
PNSAs22 are now part of the lexicon of international relations and can be easily defined
as “an organized political actor not directly connected to the state but pursing aims that
affect vital state interests” (Pearlman and Cunningham, 2012: 3). During the WoT,
PSNAs have established a role for themselves in a process of de-radicalisation, conflict
22
Or NGOs, or CSOs, on NSAs
resolution, and peacebuilding by prioritising inclusiveness and partnership. For
Hocking, PSNAs are no longer mere “consumers of diplomacy” but proactive “producers
of diplomatic outcomes” (2006: 17).
Most of the larger PNSAs have a rudimentary political structure and have
“adopted basic diplomatic functions such as negotiation skills, visible representation,
effective communication, filtered information and political reporting and symbolism”
(Murray, 2009: 125). International PNSA’s such as World Vision, the Aga Khan
Foundation, CARE and InterAction also have flags, policy goals, constitutions, charters
and political representatives (Bashan, 2004: Ohanyan, 2008; Donini, 2009; Baxter, 2011;
Black, 2013). And some also exhibit varying levels of political legitimacy, limited forms
of moral sovereignty, and institutionalized and ad hoc consultative status with large
IGO’s such as the UN.
PNSAs have been extremely active in the WoT. Consider the continuous
diplomatic representation, communication and negotiation undertaken by PNSA’s in the
WoT from aid, to medical support or to the reporting of information from war zones
such as the Syrian Observatory on Human Rights (Murray & Pigman: 2; Human Rights
Watch, 2016). The International Committee of the Red Cross (ICRC), for example, also
has the benefit of years of involvement in conflict situations to have one of the most
effective, yet almost invisible, roles in contemporary conflict resolution (1997: 9-10).
Since the U.S. led coalition began operations in Afghanistan in October 2001 the ICRC,
which played a vital neutral intermediary role between the Soviets and the Afghan
resistance movements, provides protection and assistance to refugees, returnees,
internally displaced persons, as well as co-opting members of the Taliban into demining activities in Kandahar. Following the 2003 Invasion of Iraq, the PNSA “gold rush”
(Stoddard, 2003: 7) supported the humanitarian aspect of the international coalition’s
political objectives in Operation Iraqi Freedom/Operation New Dawn. Oxfam,
Norwegian People’s Aid, QANDIL and Christian Aid are among those involved in
bridging the gap between the military and the Iraqi people, serving as a conduit for the
delivery of assistance whilst transmitting the messages of peace from the George W.
Bush administration by establishing confidence and clarity (Nicholls & Bjøreng, 2003,
Smillie & Minear, 2003; Kent, 2008).
In the broader War, the Permanent Peace Movement (PPM) and Geneva Call have
been extremely active in direct and indirect negotiation with opening direct channels of
cooperation and dialogue with the Palestinian Authority in the West Bank and Hamas in
Gaza, VNSA’s on both sides of the conflict in Yemen, non-Shabab militants in Somalia
(2012 Conference Joint Report). Since its foundation in 1989, the Lebanese based NGO
PPM has undertaken peaceful/nonviolent means for conflict resolution in local, national
and international communities, striving to empower individuals and institutions in the
peacebuilding process. Geneva Call engages directly with VNSAs in armed conflicts and
other situations of violence, seeking to increase awareness of international
humanitarian norms. Geneva Call’s objective is to reduce the impact of direct violence
against civilian populations, generate apolitical access to humanitarian assistance whilst
also exposing VNSA’s to the rights, obligations and mechanisms of legitimate political
actors. This type of engagement has augmented the participation of NGO’s and civil
society actors in both Hamas governed Gaza and AQAP and Houthis controlled areas of
Yemen.
PNSAs continue to fulfil important diplomatic functions. The flexible conflict
resolution services and outreach of organisations like the ICRC, Red Crescent Society,
PPM and Geneva Call, create parallel diplomatic networks where peaceful norms are
replicated and potentially accepted by the aggressor, facilitating the transition from
violent to non-violent actor (Sharp, 2009; Papa, et al, 2010; Powell, 2014). Gordenker
and Weiss add that PSNAs also “establish new and essential lines of communication to
introduce ideas, train individuals and help create alternate institutions” (1997: 452-3).
Nor are PNSA’s constrained by international treaties, or other political considerations
such as rigid formalized diplomatic practices (Hofmann & Schneckner, 2011; Pearlman
& Cunningham, 2012).
For states, this additional help is often a vital and most welcome addition to
sustainable CT because it creates opportunities for VNSAs to turn away from violence
(Schmid & Singh, 2009; Altier, et al, 2014). In the U.S. context, former Secretary of State
Powell (2001) labelled PSNAs a “force multiplier” in the War on Terror. They can be
found on the frontline not only dispensing aid and medical assistance serving as a vital
conduit for information flows both in and out of the combat zone imparting region
specific information and social concerns, both foreign and domestic, into CT policy
debate.
3. The Diplomacy of Terror
This third section continues with the non-state theme by posing a controversial
but intriguing question: can VNSAs such as ISIL be considered diplomatic? Theorizing
on the relationship between diplomacy and terror is not new. A diplomatic lens has
previously been applied to VNSA’s such as Paul Sharp’s (2003) assessment of Taliban
diplomacy form 1996-2001, Deos and Pigman’s (2010) analysis of the Good Friday
process in Northern Ireland and more recently Schneider (2015), Yarchi (2016) and
Gartenstein-Ross et al (2016) have examined the PD of Hamas, Hizballah, al Qa’ida and
ISIL.
Thinking about VNSAs in diplomatic terms is important. A diplomatic lens
immediately deepens the general and incorrect understanding that terrorist
organisations (TO) as little more than medieval, uncouth and violent ‘barbarians.’
Thinking diplomatically is also very important in terms of effective CT. In terms of
communication, for example, post-modern TO’s are masters of online propaganda (for
recruitment purposes, disseminating of core messages, mission statements and
successful attacks). If the West hopes to win the ‘battle for hearts and minds’ then
recognising, accepting and countering TOs advanced communication abilities is vital to
understanding and countering their anti-diplomatic message(s). Furthermore, while
states may insist that they do not negotiate with terrorists, more often than not, they do.
History illustrates that ‘wars on terror’ have concluded with a negotiated settlement
between the state and the T.O. While it is true that many TOs are brutal, in terms of
diplomacy, representation and communication, they’re also sophisticated, advanced and
smart.
For centuries, individuals or groups have used terrorism, violence, fear and
intimidation as means to political ends and goals. From the Sicarii Zealots in first
century Palestine, to the Shia Nizari assassins in Middle Age’s Persia through to the
anarchist movements of the nineteenth and early twentieth century which inspired
attacks in Europe, Russia and the U.S. The examples are commonly referred to as ‘old’
terrorism which was characterized by clearly identifiable organisations, specific issues
or causes, and the careful selection of targets using conventional weaponry (Crenshaw,
1985, 2007; Moghadam, et al, 2014). The targets were often combatants and, in order to
maximise public support, innocent civilians were not intentionally targeted. As Jenkins
(2006: 118) comments, old terrorist organisations “wanted a lot of people watching, not
a lot of people dead.” Old terrorism was also often framed by the notion of ‘liberation’ or
of a moral struggle where violence was a civic duty, all of which helped establish and
this was used to establish broad support networks by groups claiming to representing
the politically, economically or socially repressed (Duyvesteyn, 2004; Coolsaet, 2005;
Cronin, 2006; Crenshaw, 2014).
’Old’ terrorism died with the terrorist attacks in the U.S. on the 11th of
September 2001. Nineteen individuals from the Al Qa’ida group carried out an
audacious strike on the most powerful nation on earth by targeting symbols of U.S.
wealth and power: the Twin towers of the World Trade Centre in New York City and the
Pentagon in Washington D.C. The attack by al Qa’ida spawned a number of new TOs
(Rapaport, 2002) whose violent acts would transform the international security
environment in subsequent years (Barkawi & Laffey, 2006; Matusitz, 2013). 9/11
introduced a global audience to ‘new terrorism’ performed by international ‘jihadist’
movements, such as al Qa’ida and ISIL, their franchises, and the lone wolves who claim
to act on their behalf, often citing and drawing inspiration from a violent Islam based
doctrine (Aslan, 2009; Feldman, 2012; Stern & Berger, 2015). ‘New’ terrorism’s violence
is strategically brutal and their use of new media technology allows them to spread
their core message, of removing the infidel from Muslim lands and re-establishing the
caliphate, to a global audience (De Derian, 2005; Hoffman; 2009; Crenshaw, 2014; Stern
& Berger, 2015).
At first glance TOs seem anything but diplomatic. They intentionally target both
combatant and non-combatants, they practice illegitimate violence (that is-violence not
sanctioned by the state), they’re not sovereign, their actions are criminal and outlawed
by many judiciaries and demonstrate an abject indifference to international norms,
treaties, conventions and laws). As Schneckner (2009: 8) notes, VNSA’s are “willing and
capable to use violence for pursuing their objectives,” directly or indirectly challenging
the state by using or threatening illegitimate violence. Of course we accept that TOs are
brutal and must be defeated however parochially labelling then as crude, medieval and
barbaric is unhelpful in terms of sustainable and effective CT. To defeat them, however,
is to examine one means beyond terror that they employ on a daily basis to achieve
their ends: their diplomacy. While pursuing a political agenda, all TO’s represent a
constituency, negotiate to secure and maintain power, communicate to an internal and
external audience and establish diplomatic networks to mobilize popular support.
TO’s select and train certain individuals to represent their interests and, just like
a state, these individuals participate in legitimate if somewhat nefarious international
forums. The Taliban, for example, have several representatives based in its office in
Doha, Qatar and send representatives to regionally brokered, and internationally
supported, multilateral meetings. The Al Qa’ida linked Al Nusra Front, which is a central
protagonist in Syrian Civil War, is currently represented in the Turkish based Syrian
Islamic Council, the Syrian Revolution General Commission, the Supreme Military
Council Command and the High Negotiation Committee, which is the primary
representative body for the Syrian opposition involved in the Geneva Peace Talks.
Another core function of diplomacy is negotiation, which some TOs are effective
at. Some are adept at extracting concessions, ceding concessions with great drama on
non-core issues in direct, and/or indirect backchannel discussions with states as well as
negotiating strategic and operational terms with local tribal leaders and other militants.
There are multiple examples whereby negotiation has been central to the de-escalation
of violent conflicts involving VNSA’s throughout the twentieth century. The various
Declarations of Peace in Northern Ireland during the 1990’s and the cease-fire
Agreement with the Basque separatists ETA in 2011 followed decades of negotiations
between states and TOs. The formal discussions and conditional cease-fire agreements
between the FARC and the Colombian government may lead to the end of a sixty year
cycle of violence.
In the context of the WoT, the Taliban provide an example of the capacity of
VNSA’s to actively pursue their vital policy interests through negotiation. In 1994, for
instance, the Taliban negotiated a mutually beneficial arrangement with bin Laden’s al
Qa’ida core (Sharp, 2003, 2005; Curtis, 2010; Lister, 2015). 23 The Taliban engaged in
regular communications with the United Nations, the Organisation of Islamic Countries
(OIC) and senior officials from the United States, Great Britain, France, Germany and
China as well as with Pakistan, the Saudi’s and the UAE until just days before 9/11
(Sharp, 2003: 484-85).24 In the aftermath of the 9/11attacks, Mullah Zaeef, the Taliban’s
Ambassador to the world, and Abdul Hakim Mujahid, the Taliban Envoy to the UN,
sought ways to keep the diplomatic process functioning, “staging open air press
conferences” as the global media focused on the only credible link between the
terrorists and their victims (Sharp, 2003: 493). 25 However the negotiations were
unsuccessful, due in part to the Taliban’s unwillingness to deliver bin Laden in breach of
UN Security Council Resolutions 1267 and 1333 (Sharp, 2003; Kleiner, 2008; Comras,
2014). Regardless, the Taliban and other examples described above confirms that TOs
are active negotiators.
Communication has been central to the operations of TO’s since the Sicarii.
Terrorism is by definition the communication of a political message through violence
and the growth of global televisual media and the ICT revolution has presented TO’s
with an economical, reliable and oblique vehicle to carry its messages of terror. The last
fifty years is replete with examples of this; from the live broadcast of the PLFP blowing
23
Whilst in Afghanistan al Qa’ida also worked to forge alliances with other radical groups. In February 1998,
bin Laden announced an alliance of terrorist organizations—the "International Islamic Front for Jihad Against
the Jews and Crusaders"—that included the Egyptian al-Gama'at al-Islamiyya, the Egyptian Islamic Jihad, the
Harakat ul-Ansar, and other groups.
24
Sharp claims that the United States offered the Taliban government 1.5 million US dollars to compensate
farmers following the Taliban’s crack down of poppy cultivation.
25
Sharp insists that the Taliban diplomats were effective in controlling the media to suit their purposes.
up three El Al jetliners on Dawson’s Field, Jordan in 1970 and the Munich Olympic
Games operation in 1972 through to the strikes on the Twin Towers in Manhattan in
2001 and the more recent videos of ISIL brutality disseminated across multiple
platforms. These messages are directed at different audiences and the same piece of TO
propaganda can simultaneously terrify, revile, placate and inspire information
consumers across a spectrum spanning the state, the potential victim to the prospective
perpetrator of the next attack itself. Although the potency of ‘social media’ in terms of
enhanced recruitment for al Qa’ida and ISIL has been oversimplified and over-rated, Twitter,
YouTube, Telegram and even the benign Sony PS4 are capability extenders, providing TO’s
with an unobstructed means to expand its recruitment base to create a virtual global
battlefield (Schbley, 2004; Der Derian, 2001; Piazza, 2006; Aly, Macdonald, et al, 2016;
Schneider, 2016). Der Derian articulates what many researchers have discovered, that
international terrorism has become carefully stage-managed “as a televisual strategic
simulation choreographed by violence and staged for fearful captive global audience”
(1992: 68).
In terms of political organization many ‘new’ VNSA’s have adopted a ‘networked’
structure over a traditional, hierarchical, or ‘hub and spoke’ structure (Arquilla &
Ronfeldt, 2001; Brams, et al, 2006; Kilberg, 2012; Perliger, 2014). The private sector
were the pioneers of the network structure as business management specialists
recognized the benefits of sharing responsibility, decision making and more importantly
information across a more horizontal plane rather than the typical hierarchical
structure of top down direction. The military adopted this network approach and
developed Network-Centric Warfare (NCW) during the 1990’s assisted by the advances
in ICT. The result was a fully integrated modern fighting force capable of combating
traditional and asymmetric combatants. The key unifier in the business, military and
VNSA networks is connectivity and access to information. The network structure
directly effects the TO‘s diplomatic capabilities as the broad, inclusiveness of a
networked TO allow it to engage in diplomacy on multiple levels. Through the various
nodes of their network, TO’s can access specialists to represent, communicate and
negotiate with tribal leaders, local governments as well as formal representatives of the
state.
While the network structure presents challenges for CT practitioners it also
provides opportunities for diplomacy to disrupt ‘nodes’ and fragment TO’s. Multiple
studies have examined escalatory ‘‘outbidding’’ among and within groups supporting
the same overarching struggle (Bloom 2004; Gergez, 2006; Rivinius, 2015) or the ways
in which states can conjure and manipulate conflicts between ‘‘moderates’’ and
‘’radicals’(Kydd and Walter 2002; Bueno de Mesquita 2005; Glassman, 2008; Inbar &
Shamir, 2014; Atteridge, 2016). Such research sheds light on organisational behaviour
of TO’s identifying areas of exploitation either through direct or indirect diplomacy or
through the dissemination of effective counter-narratives (Pearlman & Cunningham,
2012).
Der Derian infers that generally in order “to gain official entry into the terrorist
debate one must check their critical weapons at the door, and join in a chorus of
condemnation-or risk suspicion for having sympathy with the terrorist devil” (1992:
84). To counter this generality, this section took on the role of an ‘agent provocateur,’
and demonstrating that TO’s consciously use diplomacy in to achieve their objectives
and secure their interests. TO’s represent themselves and others in various
international meetings and negotiate with actors ranging from the state to local mayor
or tribal leader. TO’s are also masters of verbal and non-verbal communication to
stimulate responses and capture the attention of politician’s and the public. Similarly,
effective communication of core messages is central to the TO’s raison d’etre.
4. Recommendations for Theorists and Policy Makers
Having established diplomacy as important, active and multifaceted in the WoT
this paper concludes by presenting a number of recommendations. These are made for
theorists and practitioners interested in boosting a diplomatic perspective of the WoT,
conducive to enhancing the “goodies” chances of success.
First, we contend that far more theoretical attention on diplomacy’s role in the
WoT would be positive, particularly in terms of effective CT. So far diplomatic
scholarship has been overshadowed by the growth in Security Studies funding, degree
programs and publications, while Strategic Studies and Foreign Policy Analysis
dominates Diplomatic Studies in U.S. International Relations disciplines (Barkawi &
Laffey, 2006; Adams, et al, 2011; Sheehan, 2012; Silke, 2015). Institutionalised research
programs and think-tanks, which had occasionally debated terrorism prior to 9/11,
have had unprecedented access to the policymakers developing the U.S. whole-ofgovernment strategy. This situation influences academia, the subsequent research
filling a plethora of terrorism related journals (Silke, 2008; Buzan & Hansen, 2009;
Sheehan, 2012).
The same cannot be said for diplomatic scholarship on terrorism related issues,
an attitude that is difficult to fathom. There has been several noteworthy application of
a diplomatic perspective to CT which serves as a starting point for this type of research
(Der Derian, 1987, 1992, 2005; Armstrong, 1999; Sharp, 2003, 2009; Pigman, 2010;
Kleiner, 2010; Deos & Pigman, 2010; Hocking, et al, 2012, Hoffman, et al, 2015). These
respected scholars have introduced concepts which provide researches with the tools to
formulate in depth analyses of global challenges across the security spectrum.
Diplomacy is after all, the business of peace’ and seeks to minimise not maximise
friction in relations between disparate groups. An enhanced diplomatic perspective on
the WoT would therefore generate solutions and not further division. Given the chance
(and the funding), there is no problem in the world that willing and able diplomats
cannot solve through compromise and negotiation.
Arguably, hard power has its limitations, particularly when fighting a ‘shadow.’
Diplomacy is therefore cheaper and more effective at combatting terrorism than hard,
military solutions. Time and time again, diplomacy has been central to the de-escalation
of violent conflicts involving VNSA’s, from the Maoists’ in Nepal, to the Umkhonto we
Sizwe (Spear of the Nation), the militant wing of the African National Congress (ANC) in
South Africa, and the PLO in Palestine/Israel. The paper builds a case which supports
the argument that diplomacy should replace the military as “the default responder” in
the WoT. Research has demonstrated that the best weapon against terrorism is either
politicization-choosing a political path, and/or effective and sustainable CT (Weinberg,
1991, 2012; Jones & Libicki, 2008; Cronin, 2009; Adams, et al, 2011; Gaibulloev &
Sandler, 2014; Martin, 2015). This paper asserts that diplomacy is central to both
processes and therefore, its vital role must be recognised and studied to maximise its
potential for good.
This paper emphasises the need to establish sustainable networks in CT as
networks synchronize the skills, resources and expertise to create an enhanced level of
situational awareness and response (proactive and reactive). As Hocking notes, “the
challenge for national governments (and PSNAs) is knowing how to connect to them,
build alliances and utilize these networks to exercise advocacy in support of policy
objectives” (2008: 73-74). A diplomacy centred network would facilitate participation,
and therefore information, from states, NGO’s, IGO’s and regional institutions, the
private sector, the media, traditional and religious leaders as well as other key
stakeholders. Multi-actor diplomacy networks are an ideal structure to manage the
collaborations within a state’s whole-of-government CT strategy.
As discussed, the military is currently perceived as the 'default responder' in the
battle against international terrorism but as we attempt to address this problem we
must be careful not to over-compensate and undervalue the military's contribution. The
military must be part of a whole-of-government strategy to combat terrorism. The
military's role in defence diplomacy programs aimed at capacity building, influencing
worldviews and institutionalizing norms of behaviour is critical to a networked
counter-terrorism approach. Military responses remain a key component CT as an
instrument of rapid response to an imminent threat based on sound intelligence.
Military operations prioritize certainty, designing strategic planning doctrine such as
Effects-Based Operations (EBO) to ensure that A leads to B leads to C. However CT and
irregular warfare is an unquantifiable, dynamic and complex environment. A multiactor diplomacy centred network overcomes uncertainty by increasing access to
information.
The ‘victory’ mentality associated with a military oriented doctrine distracts
academics and policy makers. Unilateral counter-narratives simply create 'white noise'
and are counter-productive. Through unity of effort, clearly articulated intent and
carefully crafted parameters, diplomacy oriented CT networks focus the various
elements of state and non-state power to deliver tactical and operational flexibility.
Chairman of the Joint Chiefs of Staff, Gen. Dunford stated in late April 2016 “at the very
minimum, I want to enhance our collaboration and cooperation from a common
understanding and then move towards a better integration of our efforts, because I
believe, given the breadth and scope of the challenge, integrating our capabilities is the
best way to succeed.”26 A diplomacy centred network achieves the General’s goal by
synchronizing the various elements of state power in a focused, united and effective
manner.
In practice, a comprehensive unified network which strategically combines
connectivity and access to information to facilitate cooperation and integration could
simultaneously target the tactic and the concept of terrorism by coordinating proactive
and reactive responses to terrorist groups whilst delegitimizing the choice of terrorism
by current and future opponents. General Mark A. Welsh, Chief of Staff of the U.S. AF,
emphasized recently that ‘numbers matter in our business (safeguarding the U.S.), the
coolest ship in the world can’t be in the Gulf and the South China Sea at the same time’
(CoFR Panel, 3rd May 2016). One way network diplomacy would address the quality
versus quantity balance is through its inherent capacity building effect which reduces
terrorism transference by unifying or at least ‘moving in the same direction’ in terms of
CT (Sandler & Lapan, 1988; Sandler & Siqueira, 2006; Bueno de Mesquita, 2007; Jensen,
2016). A diplomacy centred network increase both the quality and quantity of the
outcomes produced.
Kerr and Wiseman assert that “more and more global actors are demanding that
diplomacy, rather than military force, be used to settle differences” (2013: 7). This
paper is an attempt to formulate an objective and defensible response to that demand.
An analysis of diplomacy in the WoT achieves this by looking at state-centred traditional
diplomacy, the non-traditional diplomacy of PNSA’s as well as the diplomacy of terror
(how VNSAs use diplomacy). Finally the paper recommends further research in the field,
26
th
U.S. Department of Defense, Defense Media Activity, 26 April, 2016.http://www.defense.gov/News-ArticleView/Article/743160/dunford-explores-ways-to-better-integrate-counter-extremism-efforts
as well as presenting a network oriented diplomacy model which binds the ‘good’ guys
together in innovative ways to beat the ‘bad’ guys. Of course there will always be
terrorism but with the benefit of sound diplomacy, it is possible to effectively
discourage and diminish its impact, transforming international terrorism “from a grave
strategic threat to a dangerous nuisance” that is isolated and manageable (Byman, 2007:
127). The WoT is in its fifteenth year, and despite all the money and scholarship, it
shows no sign of ending soon. While we don’t argue that diplomacy is a panacea/silver
bullet, it does play a vitally important role in the WoT; to neglect it in theory and
practice is anathema to any hope of understanding the conflict and the means and
motivations of all concerned.
References
2012. Engaging with Armed non-State Actors in the Broader Middle East on the Protection of
Civilians. Permanent Peace Movement & Geneva Call. 30-31 March 2012, Broumana,
Lebanon. pp. 1-20.
A/RES/60/288. The United Nations Global Counter-Terrorism Strategy.
Adams, N., Nordaus, T, Shellenberger, M. (2011). Counterterrorism Since 9/11: Evaluating The
Efficacy Of Controversial Tactics. The Science Of Security Oakland, CA, The Breakthrough
Institute: 64.ASEAN Security Outlook (2015).
Altier, M. B, Thoroughgood, C. N. & Horgan, J. G. (2014). "Turning away from terrorism: Lessons
from psychology, sociology, and criminology." Journal of Peace Research 51(5): 647661.Armstrong, D. (1999). The Diplomacy of Revolutionary States. Innovation in
Diplomatic Practice. J. Melissen. New York, Palgrave: 43-59.
Aly, A., Macdonald, S. Jarvis, L & Chen, T. M. (2016). "Introduction to the Special Issue: Terrorist
Online Propaganda and Radicalization." Studies in Conflict & Terrorism
Atteridge, A. (2016). Foreign Fighters Post Conflict: Assessing the Impact of Arab Afghans and
Syrian-Iraqi Foreign Fighters on Global Security. International Institute of Counter
Terrorism, IDC Herzliya: 1-36.
Bandyopadhyay, S, Sandler, T & Younas, J. (2011). "Foreign aid as counterterrorism policy."
Oxford Economic Papers 63(3): 423-447.
Barak, M. (2016). The Telegram Chat Software as an Arena of Activity to Encourage the “Lone
Wolf” Phenomenon. The “Mujahideen Secrets” Channel. The International Institute for
Counter-Terrorism.
Barkawi, T. & Laffey, M. (2006). "The postcolonial moment in security studies." Review of
International Studies 32(02): 329-352.
Bashan, L. May 2004. “InterAction Member Activity Report, Afghanistan: A Guide to
Humanitarian and Development Efforts of InterAction Member Agencies in Afghanistan.”
InterAction.
Baxter, D. September 8, 2011. “U.S. Embassy Kabul Celebrates International Literacy Day.”
DipNote Blog. U.S. Department of State.
Beals, E. (2016). Masterminds of Terror. racontuer.net, 28th April, 2016
Beam, L. (1992). "Leaderless Resistance." The Seditionist 12.
Belasco, A. (2014). The Cost of Iraq, Afghanistan, and Other Global War on Terror Operations
Since 9/11. Congressional Research Service. Washington D.C: CRS
Berridge, G. R. (1994). Talking to the Enemy: How States without Diplomatic Relations
Communicate. Basingstoke, U.K., Palgrave MacMillan.
Berridge, G. R. (2010). Diplomacy theory and practice. Basingstoke, Basingstoke: Palgrave
Macmillan.
Berry, Chris. 2010. “Working Effectively with Non-State Actors to Deliver Education in Fragile
States.” Development in Practice 20(4): 586-593.
Bjola, C. (2013). The ethics of secret diplomacy: a contextual approach. Journal of Global Ethics
10(1). p. 85;
Bjola, C. (2015a). "Diplomatic Leadership in Times of International Crisis: The Maverick, the
Congregator and the Pragmatist." The Hague Journal of Diplomacy 10(1): 4-9
Bjola, C. (2015b). "Diplomacy as World Disclosure: A Fractal Theory of Crisis Management." The
British Journal of Politics & International Relations: 1-18.
Bjola, C. & M. Holmes (2015). Digital diplomacy: theory and practice. Milton Park, Abingdon,
Oxon, Routledge
Blum, G. (2010). Laws, outlaws, and terrorists lessons from the War on Terrorism. Cambridge,
Mass., Cambridge, Mass.: MIT Press.
Boyle, M. J. (2008). "The war on terror in American grand strategy." International Affairs 84(2):
191-209.
Boyle, M. J. (2010). "Do counterterrorism and counterinsurgency go together?" International
Affairs 86(2): 21.
Brams, S. J, Mutlu, H, & Ramirez, S. (2006). "Influence in Terrorist Networks: From Undirected
to Directed Graphs." Studies in Conflict & Terrorism 29(7): 703-718.
Bueno de Mesquita, E. (2007). "Politics and the Suboptimal Provision of Counterterror."
International Organization 61(01): 9-36.
Bull, H. (1977). The anarchical society: a study of order in world politics. New York, Columbia
University Press.
Bunker, J. (2016). Old and New Insurgency. Strategic Study Institute. U.S. Army War College
Press.
Bush, George W. 2010. Decision Points. New York: Random House, Inc.
Buzan, B. & L. Hansen (2009). The Evolution of International Security Studies. Cambridge,
Cambridge University Press.
Byman, D. (2003). "Measuring the war on terrorism: A first appraisal." Current History
102(668): 411-416.
Byman, D. (2003). Scoring the War on Terrorism. The National Interest (72), 75-84. doi:
10.2307/42897485
Byman, D. (2007). "US Counter–terrorism Options: A Taxonomy." Survival 49(3): 121-150.
Callaway, R., & Harrelson-Stephens, J. (2006). Toward a Theory of Terrorism: Human Security
as a Determinant of Terrorism. Studies in Conflict & Terrorism, 29(7), 679-702. doi:
10.1080/10576100600701974
Carter, SECDEF. A. (2016). A conversation with Ash Carter. Council on Foreign Relations. 8th
April, 2016.
Choi, S.-W. (2015). Economic growth and terrorism: domestic, international, and suicide.
Oxford Economic Papers, 67(1), 157-181. doi: 10.1093/oep/gpu036
Clinton, D. (2011). The Distinction between Diplomacy and Foreign Policy in American
International Though and Practice. American Diplomacy. G. Wiseman.
Comras, V. (2010). Flawed Diplomacy: the United Nations and the War on Terrorism. Dulles,
Virginia, Potomac Books
Coolsaet, R. (1998). The transformation of diplomacy at the threshold of the new millennium.
Leicester, Centre for the Study of Diplomacy.
Cottey, A. & Forster, A& International Institute for Strategic Studies. (2004). Reshaping defence
diplomacy: new roles for military cooperation and assistance. Oxford: Oxford University
Press for the International Institute for Strategic Studies
Criekemans, D. (2010). "Regional Sub-State Diplomacy from a Comparative Perspective: Quebec,
Scotland, Bavaria, Catalonia, Wallonia and Flanders." The Hague Journal of Diplomacy
5(1-2): 37-64.
Cronin, A. K. (2012). "U.S. Grand Strategy and Counterterrorism." Orbis 56(2): 192-214.
Cronin, A. K. (2013). "The ‘War on Terrorism’: What Does it Mean to Win?" Journal of Strategic
Studies 37(2): 174-197
Dalgaard-Nielsen, A. (2008). The Potential Contribution of Social Movement Theory. Paper
presented at the Studying Violent Radicalization in Europe.
Deos, A. & G. A. Pigman (2010). Sustainable Public Diplomacy: Communicating about Identity,
Interests and Terrorism. Sustainable Diplomacies. C. Constantinou and J. Der Derian.
Basingstoke, Palgrave Macmillan: 151-172
Derian, J. D. (1987). "Mediating estrangement: a theory for diplomacy." Review of International
Studies 13(02): 91-110.
Der Derian, J. (2001). Virtuous war: mapping the military-industrial-media-entertainment
network. Boulder, CO, Boulder, CO: Westview Press.
Der Derian, J. (2005). "Imaging terror: logos, pathos and ethos." Third World Quarterly 26(1):
23-37.
Digital Strategy.’ British Foreign and Commonwealth Office. (2012) at
Donini, Antonio. 2009. “NGOs and Humanitarian Reform: Mapping Study, Afghanistan Report.”
Commissioned by NGOs and Humanitarian Reforms Project.
Duyvesteyn, I. (2004). "How New Is the New Terrorism?" Studies in Conflict & Terrorism 27(5):
439-454.
Faris, D. (2013). From the Age of Secrecy to the Age of Sharing: Social Media, Diplomacy, and
Statecraft in the 21st Century. In Kalathil, S. Diplomacy, Development and Security in the
Information Age.
Franke, V. C. & Dorff, R. H. (2012). Conflict Management and “Whole of Government”: Useful
Tools for U.S. National Security Strategy? Carlisle PA: U.S. Army War College.
Gaibulloev, K. and T. Sandler (2014). "An empirical analysis of alternative ways that terrorist
groups end." Public Choice 160(1-2): 25-44.
Gartenstein-Ross, D., Barr, N & Moreng, B. (2016). The Islamic State's Global Propaganda
Strategy. ICCT Research Paper. The Hague, International Center for Counter Terrorism: 84.
Gerges, F. A. (2006). Journey of the Jihadist: Inside Muslim Militancy. Orlando, FL, Houghton
Mifflin Harcourt Publishing Company.
Gilboa, E. (1998). "Secret Diplomacy in the Television Age." International Communication. p.
213.
Gilboa, E. (2008). "Searching for a Theory of Public Diplomacy." The ANNALS of the American
Academy of Political and Social Science 616(1): 55-77.
Glassman, J. K. (2008). Briefing on U.S. Public Diplomacy and the War of Ideas. D. o. State.
Washington D.C., U.S. Government.
Gordenker, L. & Weiss, T. G. (1996). NGOs, the UN, and Global Governance. Boulder, CO: Lynne
Rienner.
Grant, R. (2005). The Democratization of Diplomacy: Negotiating with the Internet. Discussion
Papers in Diplomacy. Ed. D. Kelly. The Hague: The Netherland Institute of International
Relations 'Clingendael'. pp. 1-40
Handel, M. I. (2005). Masters of War: Classical Strategic Thought. London: Frank Cass
Publishers.
Hanson, F. (2012). Revolution@ State: the spread of ediplomacy. Canberra: Lowy Institute for
International Policy.
Hayden, C. (2013). Social Diplomacy, Public Diplomacy and Network Power Diplomacy,
Development and Security in the Information Age. S. Kalathil. Washington D.C.
Hayden, Gen. M. (2015). Three DECADES of terror: War with ISIS will last thirty years, claims
former CIA spy boss. UK Express, 22nd November, 2015.
Hayek, F. A. (1967). The Theory of Complex Phenomena: A Precocious Play on the Epistemology
of Complexity. Studies in Philosophy, Politics and Economics, London: UK: Routledge &
Kegan Paul, pp. 22-42.
Hill, Matthew Alan. 2010. “International Actors and Democratization: Can USAID Deliver a
Democratic Culture to Afghanistan?” International Relations 24(2): 155-174.
Hocking, B. & Spence, D. (2005). Towards a European Diplomatic System? Discussion Papers in
Diplomacy, Netherlands Institute of International Relations 'Clingendael'
Hocking, B. (2008). Engagement Public Diplomacy in a Globalised World. F. a. C. Office. London,
Foreign and Commonwealth Office.
Hocking, B. & Smith, M. (2010). An Emerging Diplomatic System For The EU? Frameworks and
Issues The ECPR Standing Group on the European Union Conference, Porto, Portugal.
Hocking, B, Melissen, J Riordan, S & Sharp, P (2012). Futures of Diplomacy: Integrative
Diplomacy in the 21st Century, Netherland Institute for International Relations
'Clingendael': 1-85.
Hocking, B. & Melissen. J. (2015). Diplomacy in the Digital Age. Clingendael Report. The Hague,
Netherlands Institute of International Relations Clingendael: 58.
Hoffman, B. (2009). "A Counterterrorism Strategy for the Obama Administration." Terrorism
and Political Violence 21(3): 359-377
Hofmann, C. & Schneckener, U. (2011). "Engaging non-state armed actors in state- and peacebuilding: options and strategies." International Review of the Red Cross 93(883): 603-621.
Hoffman, A. M., Agnew, C. R. VanderDrift, L. E. & Kulzick, R. (2015). "Norms, Diplomatic
Alternatives, and the Social Psychology of War Support." Journal of Conflict Resolution
59(1): 3-28.
Holmes, M. (2013). What is e-Diplomacy? 7th European Consortium for Political Research
General
Conference Bordeaux, France. p. 4
Inbar, E. & E. Shamir. (2014). ‘Mowing the Grass’: Israel’s Strategy for Protracted Intractable
Conflict." Journal of Strategic Studies 37(1): 65-90.
Israel Ministry of Foreign Affairs, Winograd Report, Information and Internet Department, 30
January 2008;
Jaeger, D. & Saddique, Z. (2011). Are Drone Strikes Effective in Afghanistan and Pakistan? On
the Dynamics of Violence between the United States and the Taliban. Discussion Paper
Series, Institute for the Study of Labor: 38.
Jenkins, B (2006). The New Age of Terrorism. The McGraw-Hill Homeland Security Handbook, pp.
117-130. Santa Monica, CA: RAND Corporation
Jervis, R. (1998). "U.S. grand strategy: Mission impossible." Naval War College Review 51(3):
22-36.
Jones, S. & M. Libicki (2008). How Terrorism Ends: Lessons for Countering al Qa'ida. Santa
Monica, Ran Publications: 250.
Kerr, P. & G. Wiseman (2012). Diplomacy in a globalizing world: theories and practices. New
York, New York: Oxford University Press, USA.
Kilberg, J. (2012). "A Basic Model Explaining Terrorist Group Organizational Structure." Studies
in Conflict & Terrorism 35(11): 810-830.
Kleiner, J. (2010). Diplomatic practice between tradition and innovation. Hackensack, NJ, World
Scientific.
Kleiner, J. (2014). "How Many Lives Do the Taliban Have?" Diplomacy & Statecraft 25(4): 708731.
Kydd, A. & Walter, B. (2002). "Sabotaging Peace: The Politics of Extremist Violence."
International Organization 56(2, Spring): 263-296.
Lawson, S. (2012). International Relations, 2nd Ed. Cambridge, UK: Polity Press
Lister, C. (2016). The Tangled Web of the Syrian Jihad. New York, Oxford University Press.
Macrae, J. & Harmer, A. (2003). Humanitarian Action in the 'Global War on Terror': a review of
trends and issues. Humanitarian Policy Group. Overseas Development Institute. London.
Martin, S. & A. Perliger (2012). Turning to and from Terror: Deciphering the Conditions under
which Political Groups Choose Violent and Nonviolent Tactics.
Mattis, J. N. Gen. (2008). USJFCOM Commander’s Guidance for Effects-based Operations.
Parameters, Autumn 2008.
McInnis, K. (2016). Coalition Contributions To Countering The Islamic State. C. R. Service.
Washington D.C., Congressional Research Service: 1-14.
Melissen, J. (2005). The new public diplomacy: soft power in international relations.
Basingstoke, Palgrave Macmillan.
Moghadam, A., Berger, R & Beliakova, P. (2014). Say Terrorist, Think Insurgent: Labelling and
Analysing Contemporary Terrorist Actors.
Morrel, M. (2015). "Fourteen Years and Counting: The Evolving Terrorist Threat." CTC Sentinel
8(9): 1-4.
Moss, T, Roodman, D & Standley, D. (2005). The Global War on Terror and U.S. Development
Assistance: USAID allocation by country, 1998-2005. Centre for Global Development,
Working paper no. 62, p.p. 1-19.
Murray, S. (2009). Towards and Enhanced Understanding of Diplomacy as the Business of
Peace. War Fronts: Interdisciplinary Perspectives on War, Virtual War and Human
Security. N. Gertz. Oxford, UK: Inter-Disciplinary Press. pp. 117-139.
Nolan, J. (2009). Diplomacy and Security in the Twenty-first Century Institute for the Study of
Diplomacy. Washington D.C., Edmund A. Walsh School of Foreign Service, Georgetown
University
Ohanyan, Anna. 2008. NGOs, IGOs, and the Network Mechanisms of Post-Conflict Global
Governance in Microfinance. New York: Palgrave Macmillan.
Panetta, L. (2014). Ex-Pentagon chief predicts 30-year ISIS war. Al Arabiya English, 25th April
2014.
Pearlman, W. & Cunningham, K. G. (2012). "Nonstate Actors, Fragmentation, and Conflict
Processes." Journal of Conflict Resolution 56(1): 3-15
Perliger, A. (2014). Terrorist Networks’ Productivity and Durability: A Comparative Multi-level
Analysis.
Pesto, H. (2010). "The Role of Diplomacy in the Fight Against Terrorism." Connections: The
Quarterly Journal 10(1): 64-81.
Piazza, J. A. (2009). Is Islamist Terrorism More Dangerous? An Empirical Study of Group
Ideology, Organization, and Goal Structure. Terrorism and Political Violence, 21(1), 62-88.
doi: 10.1080/09546550802544698
Pierce, Todd. August 11, 2008. “What I Saw in Afghanistan and Pakistan.” DipNote Blog. U.S.
Department of State.
Pigman, G. A. (2010). Contemporary diplomacy: representation and communication in a
globalized world. Cambridge, UK, Polity.
Posen, B. R. (2001). The Struggle against Terrorism: Grand Strategy, Strategy, and Tactics.
International Security, 26(3), 39-55. doi: 10.2307/3092088
Pouliot, V. (2016). "Hierarchy in practice: Multilateral diplomacy and the governance of
international security." European Journal of International Security 1(01): 5-26
Rapoport, D. (2002). The Four Waves of Rebel Terror and September 11. Anthropoetics - The
Journal of Generative Anthropology. Volume 8, no. 1, (Spring/Summer 2002).
Ross, A. (2012). “Digital Diplomacy and 21st Century Statecraft.” (The American University,
Washington, DC, March 27, 2012).
Ross, A. (2012). “Remarks at Digital Diplomacy: A New Era of Advancing Policy.” (Presented at
the Carnegie Endowment for International Peace, Washington, DC, 17th May, 2012).
Rothstein, H. 2012. “America’s Longest War.” In Afghan Endgames: Strategy and Policy Choices
for America’s Longest War. Eds. Hy Rothstein and John Arquilla. Washington, D.C.:
Georgetown University Press, 59-81.
Sandler, T. & Lapan, H. (1988). "The calculus of dissent: An analysis of terrorists' choice of
targets." Synthese 76(2): 245-261.
Schnurer, E. ‘Estonia and the future of the cyberstate’, Foreign Affairs, 28 January 2015Smith, P.
H. (1998). Public Diplomacy. In J. Kurbalija. Modern Diplomacy. Malta: Diplo.
Schmid, A. P. & Singh, R. (2009). Measuring Success and Failure in Terrorism and CounterTerrorism: U.S Government Metrics of the Global War on Terror. A. P. Schmid & G. F.
Hindle. After the War on Terror: Regional and Multilateral Perspectives on CounterTerrorism Strategy. London: RUSI Books
Schurman-Kauflin. (2008). Disturbed: Terrorist Behaviour Profiles. Sun City: Violent Crimes
Institute, LLC
Sims, E. (2013). Diplomacy and Intelligence. Diplomacy in a Globalizing World. P. Kerr and G.
Wiseman. New York, Oxford University Press: 244-261.
Sharp, P. (2003). "Mullah Zaeef and Taliban diplomacy: an English School approach." Review of
International Studies 29(04).
Sharp, P. (2009). Diplomatic Theory of International Relations. New York, Cambridge
University Press.
Sheehan, I. S. (2012). Mapping Contemporary Terrorism Courses at Top-Ranked National
Universities and Liberal Arts Colleges in the United States.
Silke, A. (2008). Research on Terrorism: A Review of the Impact of 9/11 and the Global War on
Terrorism. H. Chen, E. Ried, J. Sanai, A. Silke and B. Ganor. Terrorism Infomatics:
Knowledge Management and Data Mining for Homeland Security. Springer Publishing
Company, Inc. pp. 17-50.
Silke, A. (2016). "Ferocious Times: The IRA, the RIC, and Britain's Failure in 1919–1921."
Terrorism and Political Violence 28(3): 417-434.
Smith, P. H. (1998). Public Diplomacy. Modern Diplomacy. J. Kurbalija. Malta: Diplo
Schneider, N. (2015). ISIS and Social Media: The Combatant Commander’s Guide to Countering
ISIS’s Social Media Campaign, The Center for Counterterrorism Studies.
Stern, J & Berger, J. M. (2015) ISIS: The State of Terror. London: Williams Collins
Tan, S. S. & B. Singh (2012). "Introduction." Asian Security 8(3): 221-231.
Tarrosy, I. (2014). "Unconventional Diplomacy’ in a New Era of Summit Diplomacy." Tradecraft
Review: Periodical of the Military National Security Service (2014/2 Special Issue): 72-88.
Tuch, H. (1990). Communicating With the World: US Public Diplomacy Overseas. An Institute
for the Study of Diplomacy Book. New York: St Martin’s Press, p. 3.
UNAMA (2016). Afghanistan. Annual report 2015. Protection of civilians in armed conflict.
Kabul, UNAMA and UNHCR: 1-99.
U.S. State Department. (2011). History of the Bureau of Diplomatic Security of the United States.
Department of State. Washington D.C.
U.S Department of State &USAID. (2016). Department of State & USAID Joint Strategy on
Countering Violent Extremism. Washington D.C.: U.S. Government. pp. 1-12.
U.S. Advisory Commission on Public Diplomacy. (2015). ‘Executive Summary’ (pp. 1-26).
Comprehensive Annual Report on Public Diplomacy and International Broadcasting
Activities, 11 December, 2014.
Vallee, C. (2015). Digital Jihad: Al-Qaeda and the Islamic State: Dabiq vs. Inspire. International
Institute for Counter-Terrorism.
Walsh, J. I & Schulzke, M. The ethics of drone strikes: does reducing the cost of conflict
encourage war? Carlisle Barracks, PA: Strategic Studies Institute and U.S. Army War
College Press
Walt, S. M. (2001). "Beyond bin Laden: Reshaping U.S. Foreign Policy." International Security
26(3): 56-78.
Weinberg, L. (1991). "Turning to Terror: The Conditions under Which Political Parties Turn to
Terrorist Activities." Comparative Politics 23(4): 423-438.
Weinberg, L, Pedahzur, A. M. I. & Hirsch-Hoefler, S. (2004). "The Challenges of Conceptualizing
Terrorism." Terrorism and Political Violence 16(4): 777-794.
Westcott, N. (2008). Digital Diplomacy: The Impact of the Internet on International Relations
Research Report, Oxford Internet Institute: 1-20.
Yarchi, M. (2015). "Does using ‘imagefare’ as a state’s strategy in asymmetric conflicts improve
its foreign media coverage? The case of Israel." Media, War & Conflict.