Civil Wars
-

Christopher Blattman is currently completing a PhD in economics at UC Berkeley and holds a master's degree from Harvard's Kennedy School of Government. His research focuses on the causes and consequences of conflict and violence, the organization of guerrilla groups, as well as what post-conflict development policies work, for whom, and why. He recently completed a survey of war-affected men and boys in northern Uganda, and is presently conducting a similar survey of women and girls. Two randomized evaluations of post-conflict programs are planned in the same region for 2007, one studying the role of a group-based economic intervention in promoting community reintegration of ex-combatants, and another studying the introduction of a government and an independent press into communities not currently served by newspapers.

James Fearon is the Theodore and Frances Geballe Professor in the School of Humanities and Sciences, a professor of political science and CISAC affiliated faculty member at Stanford University. His research has focused on democracy and international disputes, explanations for interstate wars, and, most recently, the causes of civil and especially ethnic violence. He is presently working on a book manuscript (with David Laitin) on civil war since 1945. Representative publications include "Neotrusteeship and the Problem of Weak States" (International Security, Spring 2004), "Ethnicity, Insurgency, and Civil War" (APSR, February 2003), and "Rationalist Explanations for War" (International Organization, Summer 1995). Fearon won the 1999 Karl Deutsch Award, which is "presented annually to a scholar under the age of forty, or within ten years of the acquisition of his or her doctoral degree, who is judged to have made, through a body publications, the most significant contribution to the study of international relations and peace research." He was elected as a fellow of the American Academy of the Arts and Sciences in 2002.

Reuben W. Hills Conference Room

Christopher Blattman PhD Candidate Speaker Department of Economics, University of California, Berkeley

CISAC
Stanford University
Encina Hall
Stanford, CA 94305-6165

(650) 725-1314
0
Senior Fellow at the Freeman Spogli Institute for International Studies
Theodore and Frances Geballe Professor in the School of Humanities and Sciences
Professor of Political Science
james_fearon_2024.jpg PhD

James Fearon is the Theodore and Frances Geballe Professor in the School of Humanities and Sciences and a professor of political science. He is a Senior Fellow at FSI, affiliated with CISAC and CDDRL. His research interests include civil and interstate war, ethnic conflict, the international spread of democracy and the evaluation of foreign aid projects promoting improved governance. Fearon was elected to the National Academy of Sciences in 2012 and the American Academy of Arts and Sciences in 2002. Some of his current research projects include work on the costs of collective and interpersonal violence, democratization and conflict in Myanmar, nuclear weapons and U.S. foreign policy, and the long-run persistence of armed conflict.

Affiliated faculty at the Center for International Security and Cooperation
Affiliated faculty at the Center on Democracy, Development, and the Rule of Law
CV
Date Label
James Fearon Commentator
Seminars
-

Dara Kay Cohen is a PhD candidate in political science at Stanford University and was a fellow and research assistant at CISAC in 2004-2005 and 2005-2006. Her research at CISAC involved studying the politics of national security; she examined the creation of the Department of Homeland Security, how security issues have affected congressional elections and co-wrote a paper with Jacob N. Shapiro on the failure of the homeland security alert system. Her current dissertation research focuses on the use of sexual violence during civil wars, and she spend last summer in Sierra Leone conducting initial field work. She previously worked at the Department of Justice as a paralegal in the Outstanding Scholars Program in the Counterterrorism Section and at the u.S. Embassy in London on terrorist financing issues. She received her a.B. in political science and philosophy with honors from Brown University in 2001.

Mariano-Florentino Cuéllar, with a PhD in political science from Stanford as well as a law degree from Yale, focuses his scholarship on how organizations cope with the legal responsibility for managing complex criminal justice, regulatory, and international security problems. He has published the leading academic paper on the operation of federal money laundering laws, and one of the most exhaustive empirical case studies of public participation in regulatory rulemaking proceedings. Recent projects address the role of criminal enforcement in managing transnational threats, the physical safety of refugee communities in the developing world, legislative and budgetary dynamics affecting the federal Department of Homeland Security, and the impact of bureaucratic structure on how institutions implement legal mandates. Professor Cuéllar is an affiliated faculty member at the Stanford Center for International Security and Cooperation, and a member of the Executive committee for the Stanford International Initiative. Before joining the Stanford Law School faculty in 2001, he served as senior advisor to the u.S. Treasury Department's Undersecretary for Enforcement and clerked for Chief Judge Mary M. Schroeder of the U.S. Court of Appeals for the Ninth Circuit.

Bary R. Weingast is a senior fellow at the Hoover Institution as well as the Ward C. Krebs Family Professor in the Department of Political Science at Stanford University; he served as chair of that department from 1996 to 2001. He is also a professor of economics, by courtesy, at the university. He was a fellow at the Center for Advanced Study in the Behavioral Sciences from 1993 to 1994. Weingast is an expert in political economy and public policy, the political foundation of markets and economic reform, U.S. politics, and regulation. His current research focuses on the political determinants of public policymaking and the political foundations of markets and democracy. Weingast is a fellow of the American Academy of Arts and Sciences. He is the 2006 recipient of the William H. Riker Prize in Political Science. He received the Heinz Eulau Award for Best paper from the American Political Science Review in 1987. With Charles Stewart, he received the Award for Best Paper n Political History b the American Political Science Association in 1994 and again in 1998. He is also the recipient, along with Kenneth Schultz, of the Franklin L. Burdette Award for Best paper Presented at the 1994 Political Science Association Meeting.

Paul Stockton is a senior research scholar at CISAC. He was formerly the associate provost at the Naval Postgraduate School in Monterey, California, and was the former director of its Center for Homeland Defense and Security. His teaching and research focus son how U.S. security institutions respond to changes in the threat (including the rise of terrorism), and the interaction of Congress and the Executive branch in restructuring national security budgets, policies and institutional arrangement.s Stockton joined the faculty of the Naval Postgraduate School in August 1990. From 1995 until 2000, he served as director of NPS's Center for Civil-Military Relations. From 2000-2001, he founded and served as the acting dean of NPS's School of International Graduate Studies. He was appointed associate provost in 2001.

Reuben W. Hills Conference Room

Dara K. Cohen PhD Candidate Speaker Department of Political Science, Stanford University
Mariano-Florentino Cuéllar Speaker
Barry R. Weingast Senior Fellow, Hoover Institution and Ward C. Krebs Family Professor Speaker Department of Political Science, Stanford University
Paul Stockton Commentator
Seminars
-

Matthew Kroenig is a doctoral candidate in the Charles and Louise Travers Department of Political Science at the University of California, Berkeley, the Herbert York Fellow at the Institute on Global Conflict and Cooperation at the University of California, and a predoctoral fellow at CISAC. His dissertation explains the strategic incentives that drive states to provide nuclear weapons technology to nonnuclear-weapon states. His other research focuses on international security, nuclear weapons proliferation, homeland security, terrorism, and civil war. His writings have appeared in such publications as Democratization, Foreign Affairs, Foreign Policy, Newsday, and Security Studies.

Kroenig has also served as a strategist in the Office of the Secretary of Defense, where he was a principal author of key national security strategy and defense review documents and where he led the development of a U.S. government-wide strategy for deterring terrorist networks. For his work, Kroenig received the Department of Defense's Award for Outstanding Achievement.

Reuben W. Hills Conference Room

Matthew Kroenig Predoctoral Fellow Speaker CISAC
Seminars
Paragraphs

James D. Fearon testified on 15 September 2006 before the U.S. House of Representatives, Committee on Government Reform, Subcommittee on National Security, Emerging Threats, and International Relations, on the topic, "Iraq: Democracy or Civil War?"

 

Congressman Christopher Shays (R-CT), Chairman of the Subcommittee on National Security, Emerging Threats, and International Relations, convened a three-day oversight hearing entitled "Iraq: Democracy or Civil War?"

Fearon testified in the third of the following sessions that comprised the hearing:

  • Monday September 11
    Part I: When Can Iraqis Assume Full Internal Security?
  • Wednesday, September 13
    Part II: What will it Take to Achieve National Reconciliation?
  • Friday, September 15
    Part III: What Are the Consequences of Leaving Iraq?
All Publications button
1
Publication Type
Testimonies
Publication Date
Journal Publisher
U.S. House of Representatives, Committee on Government Reform, Subcommittee on National Security, Emerging Threats, and International Relations
Authors
James D. Fearon
Authors
News Type
Commentary
Date
Paragraphs
In the war on terror, the United States has become a military theater of operations. At stake, writes CISAC fellow Laura K. Donohue, is the long-held "principle, embedded in the 1878 Posse Comitatus Act, that the U.S. military not be used for domestic law enforcement."

Today, the Senate Intelligence Committee will begin questioning Air Force Gen. Michael Hayden, nominated to be director of the Central Intelligence Agency, about the National Security Agency's collection of U.S. citizens' telephone records.

The scrutiny of the NSA is deserved, but the Senate and the American public may be missing a broader and more disturbing development. For the first time since the Civil War, the United States has been designated a military theater of operations. The Department of Defense -- which includes the NSA -- is focusing its vast resources on the homeland. And it is taking an unprecedented role in domestic spying.

It may be legal. But it circumvents three decades of efforts by Congress to restrict government surveillance of Americans under the guise of national security. And it represents a profound shift in the role of the military operating inside the United States. What's at stake here is the erosion of the principle, embedded in the 1878 Posse Comitatus Act, that the U.S. military not be used for domestic law enforcement.

When the administration declared the United States to be a theater of military operations in 2002, it created a U.S. Northern Command, which set up intelligence centers in Colorado and Texas to analyze the domestic threat. But these are not the military's only domestic intelligence efforts. According to the Congressional Research Service, the Pentagon controls "a substantial portion" of U.S. national intelligence assets, the traditional turf of the FBI and CIA.

In 2003, Congress created the job of undersecretary of Defense for intelligence to oversee the department's many intelligence bodies -- including a new entity called Counterintelligence Field Activity, or CIFA.

CIFA was ordered to maintain a "domestic law-enforcement database" on "potential terrorist threats" to U.S. military installations, and it began collecting information on U.S. citizens.

In 2005, a presidential commission suggested that CIFA, set up as a clearinghouse for information, be empowered to conduct domestic investigations into crimes such as treason, espionage and terrorism. Astoundingly, the commission declared that such an expansion of military powers would not require congressional approval; a presidential order and Pentagon directive would suffice. One Defense Department program feeding information to CIFA is TALON (Threat and Local Observation Notice), which is supposed to obtain data from "concerned citizens and military members regarding suspicious incidents" that could herald terrorist attacks. But the military appears to have interpreted its mandate broadly. A TALON report was filed on a protest against "war profiteering" by Halliburton, Newsweek reported. The protesters alleged the defense contractor overcharged for food for U.S. troops in Iraq.

Counterintelligence reports were also filed on New York University's OUTlaw, a decades-old organization of openly gay law students. "The term 'outlaw' is a backhanded way of saying it's all right to commit possible violence," concluded one misguided military investigator in a document obtained last month under the Freedom of Information Act." NBC reported that about four dozen TALON database entries on "suspicious incidents" were not about terrorism but about opposition to the Iraq war and military recruiting.

These misguided military forays into domestic surveillance harken back to Vietnam War-era abuses. This time, they are the result of a much broader intelligence-gathering effort by the military on U.S. soil. President Bush said last week, "We're not mining or trolling through the personal lives of millions of innocent Americans." But a 2004 survey by the General Accounting Office found 199 data-mining operations that collect information ranging from credit-card statements to medical records. The Defense Department had five programs on intelligence and counterterrorism.

The Defense Intelligence Agency, created in 1961 to provide foreign military intelligence, now uses "Verity K2" software to scan U.S. intelligence files and the Internet "to identify foreign terrorists or Americans connected to foreign terrorism activity," and "Inxight Smart Discovery" software to help identify patterns in databases. CIFA has reportedly contracted with Computer Sciences Corp. to buy identity-masking software, which could allow it to create fake websites and monitor legitimate U.S. sites without leaving clues that it had been there. The National Geospatial-Intelligence Agency is collecting data from 133 U.S. cities; intelligence sources told the Los Angeles Times that, when collection is completed, the agency would be able to identify occupants in each house, their nationality and even their political affiliation.

In 2002, the Defense Department launched the granddaddy of all data-mining efforts, Total Information Awareness, to trawl through all government and commercial databases available worldwide. In 2003, concerned about privacy implications, Congress cut its funding. But many of the projects simply transferred to other Defense Department agencies. Two of the most important, the Information Awareness Prototype System and Genoa II, moved to NSA headquarters.

The Pentagon argues that its monitoring of U.S. citizens is legal. "Contrary to popular belief, there is no absolute ban on intelligence" agencies collecting information on Americans or disseminating it, says a memo by Robert Noonan, deputy chief of staff for intelligence. Military intelligence agents can receive any information "from anyone, any time," Noonan wrote.

Throughout U.S. history, we have struggled to balance security concerns with the protection of individual rights, and a thick body of law regulates domestic law enforcement agencies' behavior. Congress should think twice before it lets the behemoth Defense Department into domestic law enforcement.

All News button
1
Paragraphs

Today, the Senate Intelligence Committee will begin questioning Air Force Gen. Michael Hayden, nominated to be director of the Central Intelligence Agency, about the National Security Agency's collection of U.S. citizens' telephone records.

The scrutiny of the NSA is deserved, but the Senate and the American public may be missing a broader and more disturbing development. For the first time since the Civil War, the United States has been designated a military theater of operations. The Department of Defense -- which includes the NSA -- is focusing its vast resources on the homeland. And it is taking an unprecedented role in domestic spying.

It may be legal. But it circumvents three decades of efforts by Congress to restrict government surveillance of Americans under the guise of national security. And it represents a profound shift in the role of the military operating inside the United States. What's at stake here is the erosion of the principle, embedded in the 1878 Posse Comitatus Act, that the U.S. military not be used for domestic law enforcement.

When the administration declared the United States to be a theater of military operations in 2002, it created a U.S. Northern Command, which set up intelligence centers in Colorado and Texas to analyze the domestic threat. But these are not the military's only domestic intelligence efforts. According to the Congressional Research Service, the Pentagon controls "a substantial portion" of U.S. national intelligence assets, the traditional turf of the FBI and CIA.

In 2003, Congress created the job of undersecretary of Defense for intelligence to oversee the department's many intelligence bodies -- including a new entity called Counterintelligence Field Activity, or CIFA.

CIFA was ordered to maintain a "domestic law-enforcement database" on "potential terrorist threats" to U.S. military installations, and it began collecting information on U.S. citizens.

In 2005, a presidential commission suggested that CIFA, set up as a clearinghouse for information, be empowered to conduct domestic investigations into crimes such as treason, espionage and terrorism. Astoundingly, the commission declared that such an expansion of military powers would not require congressional approval; a presidential order and Pentagon directive would suffice. One Defense Department program feeding information to CIFA is TALON (Threat and Local Observation Notice), which is supposed to obtain data from "concerned citizens and military members regarding suspicious incidents" that could herald terrorist attacks. But the military appears to have interpreted its mandate broadly. A TALON report was filed on a protest against "war profiteering" by Halliburton, Newsweek reported. The protesters alleged the defense contractor overcharged for food for U.S. troops in Iraq.

Counterintelligence reports were also filed on New York University's OUTlaw, a decades-old organization of openly gay law students. "The term 'outlaw' is a backhanded way of saying it's all right to commit possible violence," concluded one misguided military investigator in a document obtained last month under the Freedom of Information Act." NBC reported that about four dozen TALON database entries on "suspicious incidents" were not about terrorism but about opposition to the Iraq war and military recruiting.

These misguided military forays into domestic surveillance harken back to Vietnam War-era abuses. This time, they are the result of a much broader intelligence-gathering effort by the military on U.S. soil. President Bush said last week, "We're not mining or trolling through the personal lives of millions of innocent Americans." But a 2004 survey by the General Accounting Office found 199 data-mining operations that collect information ranging from credit-card statements to medical records. The Defense Department had five programs on intelligence and counterterrorism.

The Defense Intelligence Agency, created in 1961 to provide foreign military intelligence, now uses "Verity K2" software to scan U.S. intelligence files and the Internet "to identify foreign terrorists or Americans connected to foreign terrorism activity," and "Inxight Smart Discovery" software to help identify patterns in databases. CIFA has reportedly contracted with Computer Sciences Corp. to buy identity-masking software, which could allow it to create fake websites and monitor legitimate U.S. sites without leaving clues that it had been there. The National Geospatial-Intelligence Agency is collecting data from 133 U.S. cities; intelligence sources told the Los Angeles Times that, when collection is completed, the agency would be able to identify occupants in each house, their nationality and even their political affiliation.

In 2002, the Defense Department launched the granddaddy of all data-mining efforts, Total Information Awareness, to trawl through all government and commercial databases available worldwide. In 2003, concerned about privacy implications, Congress cut its funding. But many of the projects simply transferred to other Defense Department agencies. Two of the most important, the Information Awareness Prototype System and Genoa II, moved to NSA headquarters.

The Pentagon argues that its monitoring of U.S. citizens is legal. "Contrary to popular belief, there is no absolute ban on intelligence" agencies collecting information on Americans or disseminating it, says a memo by Robert Noonan, deputy chief of staff for intelligence. Military intelligence agents can receive any information "from anyone, any time," Noonan wrote.

Throughout U.S. history, we have struggled to balance security concerns with the protection of individual rights, and a thick body of law regulates domestic law enforcement agencies' behavior. Congress should think twice before it lets the behemoth Defense Department into domestic law enforcement.

All Publications button
1
Publication Type
Commentary
Publication Date
Journal Publisher
Los Angeles Times
Authors
Authors
News Type
Commentary
Date
Paragraphs
One century after America's Civil War, the descendants of slaves daily faced the twin terrors of homicide and arson. Yet only 15 years after the rise of the Rev. Martin Luther King Jr., the back of segregation and neo-Confederate violence had been broken. Can Palestinians likewise mount a successful, nonviolent movement toward peaceful co-existence with their former adversaries? CISAC science fellow Jonathan Farley, writing in the San Francisco Chronicle, suggests they can.

Imagine a land where bombs explode almost daily and children are killed by terrorists without conscience. On one side we find a people who suffered through the horror of slave-labor death camps; on the other side a people who suffered through a terrible war -- which they began when what they felt was their property was seized from them -- a terrible defeat and (for them) a terrible occupation. Now imagine those same peoples 15 years later, living side by side, peacefully.

This sounds like a pipe dream: The Middle East could never be this way, we think. But we do not need to imagine this land.

We are living in it.

One century after America's Civil War, the descendants of slaves daily faced the twin terrors of homicide and arson. Yet only 15 years after the rise of the Rev. Martin Luther King Jr., the back of segregation and neo-Confederate violence had been broken.

Can Palestinians likewise mount a successful, nonviolent movement toward peaceful co-existence with their former adversaries? In short, can history repeat itself?

How expensive would it be for us if it did not? America spends an estimated $3 billion a year in support of Israel. This support is justified because Israel is a democracy and our main ally in the region. Yet we also spend $2 billion supporting Israel's nondemocratic neighbor, Egypt. Billions more have been spent maintaining bases in Saudi Arabia, Kuwait and now Iraq. We justify these expenditures by surrendering to the serpentine excuses of realpolitik: We need the support of key figures and families in the region, we say, and so we have to work with them. Just as we once said of the Dixiecrats and other segregationist politicians in the American South.

We can transform this paradigm, as we did then, and at little cost to ourselves. We can utilize the experience of the civil rights movement -- which Secretary of State Condoleezza Rice knows all too well (her childhood friend was killed by an improvised explosive device in segregated Birmingham) -- to assist Palestinians in their stride toward peace. What we need is a Muslim Martin Luther King.

Many believe that leaders are born, not made, but programs to cultivate leadership and promote good will among men have been used successfully for generations. Oxford's Rhodes Scholarship is one such example. Its idea is to bring the best and brightest from the British Commonwealth (and beyond) to build strong ties among English-speaking peoples, and stronger ties to England. Founder Cecil Rhodes, pirate though he was, wished for there to be "an understanding between the three great powers" -- America, Britain and Germany -- that "will render war impossible."

What we recommend is a sister program for the Middle East. One could hold a competition for the 30 best young orators in the Palestinian diaspora. (King first gained prominence at age 26, and the Rhodes Scholarship is only for men and women under that age.) Send them to an American institution such as Stanford University, where they could study for the doctorate under Professor Clayborne Carson, director of the Martin Luther King Jr. Papers Project and historian of the civil rights movement and the Student Non-Violent Coordinating Committee. Then, after they have spent several years studying the African American experience with special courses and lecturers, focusing especially on the efficacy of nonviolent direct action, send them back to their native lands.

This is no program of indoctrination. Indeed, it would be detrimental if American spy organizations were to infiltrate or interfere with the King scholars in any way: the scholars would lose all credibility at home. Just as King spoke out against Southern injustice (and American injustice in Vietnam), the King scholars must be free to criticize America and, it is to be expected, the occupation. They would not be able to lead the Arab street otherwise.

By bringing young leaders from the region, we would avoid disasters like the U.S. Army's flirtation with mathematician Ahmed Chalabi, a man who had no real roots in Iraq, but whom America still wished to enthrone as a new shah. The Chalabi experiment blew up in America's face like a roadside bomb.

The King scholarship program might cost only $2 million per year -- an endowment of perhaps $20 million could put it on its feet indefinitely. And, coupled with the application of "soft power," the export of American culture -- notably, hip-hop music, which serves both as a mechanism for promoting intercultural understanding and as a nonviolent channel for youthful aggression -- one could reasonably expect to see the flower of peace bloom in the desert of despair.

Two specific aspects of the civil rights movement would be most effective in resolving the Israeli-Palestinian conflict: first, the proper utilization of legal instruments as a way to wage a nonviolent campaign; second, the utilization of mosques to mobilize a nonviolent grassroots struggle. Mosques in the West Bank and Gaza can be used to promote peace over violence and terrorism, and the African American experience can teach Palestinians how to do this.

In "The Trial" by Franz Kafka, at one point two men stand outside a gate. One seeks to enter; the other seeks to prevent him from entering. Both men wait there for their entire lives. Though one is guard and the other the one guarded, both men are prisoners.

In game theory, the branch of mathematics made famous by "A Beautiful Mind," there is a paradox called the Prisoners' Dilemma. Each of two prisoners may believe it is in his best interests to harm the other, but one can mathematically prove that both men would be better off if they cooperated. A King scholars program might help us resolve the prisoners' dilemma that is the Middle East.

This is a utopian dream, perhaps. But another man dreamed, once, and we all know what became of that man's dream.

We are living it.

All News button
1
Authors
James D. Fearon
News Type
Commentary
Date
Paragraphs
Is the conflict in Iraq a civil war or not? Debate over this question is largely political. James D. Fearon sets aside politics to explain the meaning of civil war and how it applies to Iraq.

Does the conflict in Iraq amount to a civil war? In many ways, the public debate over this question is largely political. Calling Iraq a "civil war" implies yet another failure for the Bush administration and adds force to the question of whether U.S. troops still have a constructive role to play.

Politics aside, however, the definition of civil war is not arbitrary. For some -- and perhaps especially Americans -- the term brings to mind all-out historical conflicts along the lines of the U.S. or Spanish civil wars. According to this notion, there will not be civil war in Iraq until we see mass mobilization of sectarian communities behind more or less conventional armies.

But a more standard definition is common today:

1) Civil war refers to a violent conflict between organized groups within a country that are fighting over control of the government, one side's separatist goals, or some divisive government policy.

By this measure, the war in Iraq has been a civil war not simply since the escalation of internecine killings following the bombing of a Shiite shrine in Samarra in February, but at least since the United States handed over formal control to an interim Iraqi government in June 2004.

Here's why: Although the insurgents target the U.S. military, they are also fighting the Shiite-dominated Iraqi government and killing large numbers of Iraqis. There is little reason to believe that if the United States were suddenly to withdraw its forces, they would not continue their battle to control or shape the government.

Political scientists who study civil war have proposed various refinements to this rough definition to deal with borderline cases. One issue concerns how much killing has to occur -- and at what rate.

2) For a conflict to qualify as a civil war, most academics use the threshold of 1,000 dead, which leads to the inclusion of a good number of low-intensity rural insurgencies.

Current estimates suggest that more than 25,000 Iraqis have been killed in fighting since the U.S.-led invasion in March 2003 -- a level and rate of killing that is comparable to numerous other conflicts that are commonly described as civil wars, such as those in Lebanon (1975-1990) and Sri Lanka (beginning in 1983).

The organization -- or rather, disorganization -- of the warring communities in Iraq means that a large-scale conventional conflict along the lines of the U.S. Civil War is unlikely to develop. More probable is a gradual escalation of the current "dirty war" between neighborhood militias that have loose ties to national political factions and are fighting almost as much within sectarian lines as across them.

This is roughly what happened in Lebanon and at a lower level in Turkish cities in the late 1970s. Ethnic cleansing will occur not as a systematic, centrally directed campaign (as in Bosnia), but as a result of people moving to escape danger.

And there's another twist to the terminology:

3) If the conflict in Iraq becomes purely a matter of violence between Sunni and Shiite communities driven by revenge and hatred rather than by political goals, many political scientists would say that it is something other than civil war.

Almost no one, for example, calls the Hindu-Muslim violence in India a civil war.

A civil war has to involve attempts to grab power at the center of government or in a given region, or to use violence to change some major government policy.

In Iraq's case, however, the vacuum of power at the center means that communal violence will inevitably be tied to struggles for political power and control.

A final complication concerns the nature of international involvement. Some argue, for example, that the war in Bosnia should be seen as an interstate war rather than a civil war, since the Bosnian Serb forces were armed and directed largely by Belgrade. Post-Mobutu violence in Congo is often termed a civil war, even though fighters have been closely tied to armies from neighboring states.

4) A conflict may be both a civil and an interstate war at the same time.

The Vietnam War, for instance, clearly comprised both a civil war in the South and an interstate war involving the North, the South and the United States.

Iraq may be moving in this direction. The United States and Britain are already openly involved, and such neighboring countries as Iran and Syria are more covertly involved. Not that it matters to the people dying there, but the next debate here may turn on whether what is already a civil war in Iraq should be viewed as an interstate war as well.

All News button
1
Paragraphs

In this article, we critique the Eurocentric character of security studies as it has developed since World War II. The taken-for-granted historical geographies that underpin security studies systematically misrepresent the role of the global South in security relations and lead to a distorted view of Europe and the West in world politics. Understanding security relations, past and present, requires acknowledging the mutual constitution of European and non-European worlds and their joint role in making history. The politics of Eurocentric security studies, those of the powerful, prevent adequate understanding of the nature or legitimacy of the armed resistance of the weak. Through analysis of the explanatory and political problems Eurocentrism generates, this article lays the groundwork for the development of a non-Eurocentric security studies.

All Publications button
1
Publication Type
Journal Articles
Publication Date
Journal Publisher
Review of International Studies
Authors
Subscribe to Civil Wars