Hostname: page-component-5c6d5d7d68-wp2c8 Total loading time: 0 Render date: 2024-08-16T16:24:23.898Z Has data issue: false hasContentIssue false

Institutions as swords and shields: multilateral counter-terrorism since 9/11

Published online by Cambridge University Press:  08 July 2010

Abstract

International institutions are prominent in the ‘global War on Terror’. But there remains variation in the institutionalisation of counter-terrorism, across policy domains and over time. I argue that institutions pursue tasks of counter-terrorism when they are backed by power. Institutions function as ‘swords’ as strong states seek to influence others. Weak states, too, are sensitive to the distributional consequences of cooperation and use institutions as ‘shields’ to resist the powerful. These claims are reflected in patterns of cooperation within the UN, and in terrorist financing and maritime security. Looking forward, multilateral counter-terrorism may remain contingent upon state power.

Type
Research Article
Copyright
Copyright © British International Studies Association 2010

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

1 See Cortright, David and Lopez, George A. (eds), Uniting Against Terror: Cooperative Nonmilitary Responses to the Global Terrorist Threat (Cambridge, MA: MIT Press, 2007)Google Scholar ; Stiles, Kendall W., ‘The Power of Procedure and the Procedures of the Powerful: Anti-Terror Law in the UN’, Journal of Peace Research, 43 (2006), pp. 3754CrossRefGoogle Scholar ; Luck, Edward C., ‘The Uninvited Challenge : Terrorism targets the UN’, in Newman, Edward, Thakur, Ramesh and Tirman, John (eds), Multilateralism under Challenge? Power, International Order, and Structural Change (Tokyo: UN University Press, 2006), pp. 336355Google Scholar ; and Boulden, Jane and Weiss, Thomas G. (eds), Terrorism and the UN: Before and After September 11 (Bloomington: Indiana University Press, 2004)Google Scholar .

2 ‘Counter-terrorism’ comprises state actions that aim to suppress terrorist violence, utilising any or all tools of statecraft including military force, criminal law, intelligence operations, regulatory controls, and diplomacy: see Pillar, Paul R., Terrorism and US Foreign Policy (Washington, DC: Brookings Institution Press, 2001), pp. 2940Google Scholar , ch. 4.

3 {http://www.un.org/sc/ctc/best_prac.html} accessed 20 November 2007. A summary of these measures is contained in Center for Global Counter-terrorism Cooperation, Report on Standards and Best Practices for Improving States' Implementation of UN Security Council Counter-terrorism Mandates. Prepared for the Netherlands Ministry of Foreign Affairs (2006).

4 {http://www.un.org/terrorism/cttaskforce.shtml} accessed 20 January 2008.

5 Jonathan M. Winer, ‘The Growing Role of International Institutions on Counter-terrorism and Law Enforcement’, Council on Foreign Relations, Roundtable on Old Rules, New Threats (5 November 2003). Available at {http://www.cfr.org/publication.html?id=6585} accessed 5 July 2007.

6 Crenshaw, Martha, ‘Counter-terrorism Policy and the Political Process’, Studies in Conflict and Terrorism, 24 (2001), pp. 329337CrossRefGoogle Scholar .

7 Katzenstein, Peter J., ‘Same War – Different Views: Germany, Japan and Counter-terrorism’, International Organization, 57 (2003), p. 734CrossRefGoogle Scholar .

8 Crenshaw, Martha, Terrorism and International Cooperation, Occasional Paper No. 11, Institute for East-West Studies (New York: Westview Press, 1989)Google Scholar , ch. 3.

9 These are listed at {http://www.un.org/terrorism/instruments.html} accessed 16 November 2007.

10 See Ward, Curtis A., ‘Building Capacity to Combat International Terrorism: The Role of the UN Security Council’, Journal of Conflict and Security Law, 8 (2003), pp. 289305CrossRefGoogle Scholar ; and Cortright, David et al. , An Action Agenda for Enhancing the UN Program on Counter-Terrorism, (Goshen: Fourth Freedom Forum, 2004)Google Scholar .

11 Pillar, Terrorism and US Foreign Policy, p. 77.

12 A similar observation is made by Stiles, ‘The Power of Procedure’, p. 38.

13 In addition to the sources listed in fn. 1, above, see Crelinsten, Ronald D., ‘Counter-terrorism as Global Governance: A Research Inventory’, in Ranstrop, Magnus (ed.), Mapping Terrorism Research: State of the Art, Gaps and Future Directions (London: Routledge, 2007), pp. 210235Google Scholar . Note also the studies published by the Center for Global Counter-terrorism Cooperation, available at: {www.globalct.org}.

14 Biersteker, Thomas J., Eckert, Sue E. and Romaniuk, Peter, ‘International Initiatives to Suppress Terrorist Financing’, in Biersteker, Thomas J. and Eckert, Sue E. (eds), Countering the Financing of Terrorism (London: Routledge, 2007), pp. 234259Google Scholar .

15 Rey Koslowski, ‘Possible steps towards an international regime for mobility and security’, Global Migration Perspectives (Global Commission on International Migration), No. 8 (2004).

16 ‘Proposal for the Revitalisation of the Counter-Terrorism Committee’, UN Doc. S/2004/124 (19 February 2004).

17 ‘Global Counter-terrorism Strategy’, UN Doc. A/RES/60/288 (19 September 2006).

18 Hmoud, Mahmoud, ‘Negotiating the Draft Comprehensive Convention on International Terrorism’, Journal of International Criminal Justice, 4 (2006), pp. 10311043CrossRefGoogle Scholar .

19 Young distinguishes between ‘spontaneous’ (without conscious coordination among participants), ‘negotiated’ (conscious coordination among participants) and ‘imposed’ (fostered by dominant actors) orders: Young, Oran R., ‘Regime dynamics: The rise and fall of international regimes’, International Organization, 36 (1982), pp. 277297CrossRefGoogle Scholar .

20 Schweller, Randall L. and Priess, David, ‘A Tale of Two Realisms: Expanding the Institutions Debate’, Mershon International Studies Review, 41 (1997), pp. 89, 12CrossRefGoogle Scholar .

21 Gruber, Lloyd, Ruling the World: Power Politics and the Rise of Supranational Institutions (Princeton: Princeton University Press, 2000)CrossRefGoogle Scholar .

22 Schweller and Priess, ‘A Tale of Two Realisms’, p. 8.

23 Ibid., p. 9.

24 Gruber, Ruling the World; Drezner, Daniel W., All Politics is Global: Explaining International Regulatory Regimes (Princeton: Princeton University Press, 2007)Google Scholar .

25 Drezner, All Politics is Global, p. 5.

26 On procedures in particular, see Stiles, ‘The Power of Procedure’.

27 Drezner, All Politics is Global, p. 75.

28 Ibid.

29 Lloyd Gruber, ‘Power Politics and the Institutionalization of International Relations’, London: LSE Research Online (2005). Available at: {http://eprints.lse.ac.uk/238} accessed 19 January 2008.

30 Gruber, Ruling the World; Schweller and Priess, ‘A Tale of Two Realisms’.

31 Grieco, Joseph M., ‘Anarchy and the Limits of Cooperation: A Realist Critique of the Newest Liberal Institutionalism’, International Organization, 42 (1998), pp. 485507CrossRefGoogle Scholar .

32 Stiles, ‘The Power of Procedure’.

33 Mastanduno, Michael, ‘US foreign policy and the pragmatic use of international institutions’, Australian Journal of International Affairs, 59 (2005), p. 324CrossRefGoogle Scholar . On substitution and forum shopping, see Drezner, All Politics is Global.

34 This is the ‘ability to opt out of collective negotiations, proceed on one's own, and still derive positive gains with respect to the baseline (non-institutionalized) status quo’: Gruber, ‘Power politics’, p. 2.

35 Strange, Susan, ‘Cave! Hic Dragones: A Critique of Regime Analysis’, International Organization, 36 (1982), p. 496CrossRefGoogle Scholar (emphasis in original).

36 Young, ‘Regime dynamics’, p. 284.

37 See Luck, ‘The Uninvited Challenge’; Boulden and Weiss (eds), Terrorism and the UN; and Crenshaw, Terrorism and International Cooperation.

38 An exhaustive account of this dilemma, and GA debates generally, is offered by M. J. Peterson, ‘Using the General Assembly’, in Boulden and Weiss (eds), Terrorism and the UN, pp. 173–97.

39 Gioia, A., ‘The UN Conventions on the Prevention and Suppression of International Terrorism’, in International Cooperation in Counter-terrorism: The UN and Regional Organizations in the Fight Against Terrorism, edited by Nesi, G. (Aldershot: Ashgate, 2006), pp. 323Google Scholar .

40 These were Libya (1992), Sudan (1996) and the Taliban (1999): de Jonge Oudraat, Chantal, ‘The UN and the campaign against terrorism’, Disarmament Forum, 1 (2004), pp. 2937Google Scholar ; de Jonge Oudraat, Chantal, ‘The Role of the Security Council’, in Boulden, and Weiss, (eds), Terrorism and the UN, pp. 151172Google Scholar .

41 Crenshaw, Terrorism and International Cooperation, p. 27.

42 Ibid., pp. 25–30.

43 Andreas, Peter and Nadelmann, Ethan, Policing the Global: Criminalization and Crime Control in International Relations (New York: Oxford University Press, 2006)Google Scholar .

44 Stiles, ‘The Power of Procedure’.

45 Ward, ‘Building Capacity’, p. 289.

46 On this point, see Ward, ‘Building Capacity’, and Eric Rosand, ‘Resolution 1373 and the CTC: The Security Council's Capacity-building’, in G. Nesi (ed), International Cooperation in Counter-terrorism, pp. 81–8.

47 Ward, ‘Building Capacity’, provides an upbeat assessment of the early work of the CTC.

48 On the sanctions and the ‘Al-Qaida and Taliban Sanctions Committee’, see: {http://www.un.org/sc/committees/1267/index.shtml}.

49 ‘Counter-terrorism Committee work programme’, UN Doc. S/2001/986 (19 October 2001).

50 Resolution 1456 (2003), para. 4 (iii).

51 Resolution 1566 (2004), para. 7.

52 The best practices are listed at: {www.un.org/sc/ctc/bestpractices.shtml}. An analytical summary is provided by Center for Global Counter-terrorism Cooperation, Report on Standards and Best Practices. The technical assistance matrix is at: {www.un.org/sc/ctc/htdocs/}.

53 This activity is summarised at: {www.un.org/sc/ctc/intlcooperation.shtml}.

54 See ‘Index of international, regional and subregional organizations’, UN Doc. S/AC.40/2003/SM.1/2 (23 February 2003).

55 A. Marschik, ‘The Security Council's Role: Problems and Prospects in the Fight Against Terrorism’, in G. Nesi (ed.), International Cooperation in Counter-terrorism, pp. 69–80; Szasz, P., ‘The Security Council Starts Legislating’, American Journal of International Law, 96 (2002), pp. 901905CrossRefGoogle Scholar .

56 Rosand, Eric, ‘Security Council Resolution 1373, the Counter-terrorism Committee, and the Fight Against Terrorism’, American Journal of International Law, 97 (2003), pp. 338341CrossRefGoogle Scholar .

57 The Council endorsed the report, ‘Proposal for the Revitalisation of the Counter-Terrorism Committee’, UN Doc. S/2004/124 (19 February 2004).

58 See Rosand, Eric, ‘The UN-Led Multilateral Institutional Response to Jihadist Terrorism: Is a Global Counter-terrorism Body Needed?’, Journal of Conflict and Security Law, 11 (2007), pp. 399427CrossRefGoogle Scholar ; and Millar, Alistair and Rosand, Eric, Allied against Terrorism: What's Needed to Strengthen Worldwide Commitment (New York: The Century Foundation, 2006)Google Scholar .

59 ‘A More Secure World: Our Shared Responsibility – Report of the High Level Panel on Threats, Challenges and Change’, UN Doc. A/59/565 (2 December 2004).

60 ‘In Larger Freedom: Towards Development, Security and Human Rights for All – Report of the Secretary-General’, UN Doc. A/59/2005 (21 March 2005).

61 ‘Uniting Against Terrorism: Recommendations for a Global Strategy – Report of the Secretary General’, UN Doc. A/60/825 (27 April 2006).

62 The characterisation of the Strategy as ‘rather anodyne’ is from Rosand, ‘The UN-Led Multilateral Institutional Response to Jihadist Terrorism’, p. 416.

63 Alistair Millar and Eric Rosand, ‘Building Global Alliances in the Fight Against Terrorism’, (Washington, DC: Center for Global Counter-terrorism Cooperation, 2007).

64 Eric Rosand, Alistair Millar and Jason Ipe, ‘The UN Security Council's Counter-terrorism Program: What Lies Ahead?’ (New York: International Peace Academy, 2007).

65 Biersteker, Eckert and Romaniuk, ‘International Initiatives to Suppress Terrorist Financing’; Kathryn L. Gardner, ‘Terrorism Defanged: The Financial Action Taskforce and International Efforts to Capture Terrorist Finances’, in Cortright and Lopez (eds), Uniting Against Terror, pp. 157–86.

66 Drezner, All Politics is Global, ch. 3.

67 See fn. 39, above, and the discussions of the Libya, Sudan and Taliban sanctions in David Cortright and Lopez, George A., The Sanctions Decade: Assessing UN Strategies in the 1990s (Boulder: Lynne Rienner, 2000), p. 115Google Scholar , ch. 6.

68 FATF, Annual Report 2000–01 (Paris: FATF Secretariat, 22 June 2001)Google Scholar ; FATF, Report on Money Laundering Typologies 2000–01 (Paris: FATF Secretariat, 1 February 2001)Google Scholar ; FATF, Report on Money Laundering Typologies 1999–2000 (Paris: FATF Secretariat, 3 February 2000)Google Scholar .

69 National Commission on Terrorism, Countering the Changing Threat of International Terrorism: Report of the National Commission on Terrorism (2000); National Money Laundering Strategy for 2000, US Treasury and Department of Justice (March 2000).

70 Gilmore, William C., Dirty Money: The Evolution of Money Laundering Counter Measure, 3rd ed (Strasbourg: Council of Europe Press, 2004)Google Scholar .

71 Drezner, All Politics is Global, pp. 142–48.

72 These were mostly drawn from the developed world and included: Argentina, Australia, Austria, Belgium, Brazil, Canada, Denmark, Finland, France, Germany, Greece, Hong Kong SAR, Iceland, Ireland, Italy, Japan, Luxemburg, Mexico, Netherlands, New Zealand, Norway, Portugal, Singapore, Spain, Sweden, Switzerland, Turkey, the UK, the USA, the European Commission and the Gulf Cooperation Council: FATF, Annual Report 2000–01.

73 Eric Helleiner, ‘The Politics of Global Financial Reregulation: Lessons From the Fight Against Money Laundering’, Working Paper No. 15, CEPA Working Paper Series III (Center for Economic Policy Analysis, New School for Social Research, 2000); Helleiner, Eric, ‘State Power and the Regulation of Illicit Activity in Global Finance’, in Friman, H. R. and Andreas, P. (eds), The Illicit Global Economy and State Power (Lanham: Rowman and Littlefield, 1999), pp. 5390Google Scholar ; Simmons, Beth A., ‘The International Politics of Harmonization: The Case of Capital Market Regulation’, International Organization, 55 (2001), pp. 589620CrossRefGoogle Scholar .

74 On the external relations of the FATF, see Gilmore, Dirty Money, pp. 141–52.

75 FATF, Annual Report 2000–01.

76 Ibid.

77 Levi, Michael, ‘Money Laundering and Its Regulation’, Annals of the American Academy of Political and Social Sciences, 582 (2002), pp. 181194CrossRefGoogle Scholar ; Morris-Cotterill, Nigel, ‘Money Laundering’, Foreign Policy, 124 (2001), pp. 1622CrossRefGoogle Scholar .

78 Drezner, All Politics is Global, pp. 142–45; Simmons, ‘The International Politics of Harmonization’; Helleiner, ‘The Politics of Global Financial Reregulation’.

79 Clunan argues that the US has ‘succeeded in globalizing the anti-money laundering framework and recasting it as a regime to combat terrorist financing’: Clunan, Anne L., ‘US and International Responses to Terrorist Financing’, Strategic Insights, 4 (Center for Contemporary Conflict, Naval Postgraduate School, 2005)Google Scholar .

80 FATF, Annual Report 2001–02 (Paris: FATF Secretariat, 21 June 2002)Google Scholar .

81 The SRs are available at: {www.fatf-gafi.org}.

82 FATF, Annual Report 2004–05 (Paris: FATF Secretariat, 10 June 2005); Biersteker, Eckert and Romaniuk, ‘International Initiatives to Suppress Terrorist Financing’.

83 C. B. Realuyo, ‘G8 Counter-terrorism Action Group Efforts to Combat Terrorist Financing’ (11 March 2004). Available at: {http://www.osce.org/documents/sg/2004/03/3297_en.pdf} accessed 20 January 2008.

84 ‘G8 Statement on Counter-terrorism’, Gleneagles (July 2005).

85 UNODC, ‘Strengthening international cooperation and technical assistance in promoting the implementation of the universal conventions and protocols related to terrorism within the framework of the activities of the UN Office on Drugs and Crime’, UN Doc. E/CN.15/2005/13 (8 April 2005).

86 Joint Forum (of the Basel Committee on Banking Supervision, the International Organization of Securities Commissions and the International Association of Insurance Supervisors), ‘Initiatives by the BCBS, IAIS and IOSCO to combat money laundering and the financing of terrorism’, IOSCO Public Document No. 146 (June 2003).

87 Offshore Group of Banking Supervisors, ‘OGBS welcomes Eight Special Recommendations on terrorist financing’, Press release (14 November 2001); Offshore Group of Banking Supervisors, ‘OGBS welcomes revised FATF Recommendations’, Press release (July 2003).

88 Wolfsberg Group, ‘Wolfsberg Statement on the Suppression of the Financing of Terrorism’ (January 2002).

89 For an overview and criticism of US counter-terrorist financing assistance initiatives, see GAO, Terrorist Financing: Better Strategic Planning Needed to Coordinate US Efforts to Deliver Counter-terrorism Financing Training and Technical Assistance Abroad, GAO-06–19, Washington DC (October 2005).

90 ‘Blacklist of “dirty money” havens put on temporary hold’, Financial Times (26 September 2002).

91 A summary of section 311 activity is available at: {http://www.fincen.gov/reg_section311.html} accessed 20 January 2008.

92 Tom Ridge, ‘Remarks by Secretary Tom Ridge at Port of Los Angeles’, Long Beach (21 June 2004).

93 US Customs and Border Protection, ‘Fact Sheet: US Customs and Border Protection – Protecting Our Borders Against Terrorism’ (22 July 2004).

94 MTSA 2002 §70116(b) (1) and (4).

95 For an overview of IMO activity on maritime security prior to 9/11, see, Hesse, Hartmut G., ‘Maritime Security in a Multilateral Context: IMO Activities to Enhance Maritime Security’, International Journal of Marine and Coastal Law, 18 (2003), pp. 327340CrossRefGoogle Scholar ; Hartmut G. Hesse and Nicolaos L Charalambous, ‘New Security Measures for the International Shipping Community’, Information Paper, Maritime Safety Division, International Maritime Organization (2004); and IMO, ‘IMO 2004: Focus on Maritime Security’, Background Paper, World Maritime Day (2004).

96 The Assembly comprises all member states and also has power over the organization's work plan and budget.

97 ‘Review of measures and procedures to prevent acts of terrorism which threaten the security of passengers and crews and the safety of ships’, IMO Doc. A.224 (22) (November 2001).

98 ‘Prevention and Suppression of Acts of Terrorism Against Shipping’, IMO Doc. MSC 75/17, 14 (December 2001).

99 For example, ‘Prevention and Suppression of Acts of Terrorism Against Shipping’, IMO Doc. MSC 75/ISWG/3 (11 January 2002); ‘Prevention and Suppression of Acts of Terrorism Against Shipping’, IMO Doc. MSC 75/ISWG/5 (10 January 2002) (submitted by France).

100 ‘Prevention and Suppression of Acts of Terrorism Against Shipping’, IMO Doc. MSC 75/ISWG/5/7 (15 January 2002) (submitted by the USA).

101 Summarised in ‘Prevention and Suppression of Acts of Terrorism Against Shipping’, IMO Doc. MSC 75/17/1 (25 February 2002) (note by the Secretariat).

102 A new Seafarer's ID Convention was subsequently adopted in June 2003. The convention incorporates biometric technology into the identity document. Reaction to the Convention has been mixed. Concerned about the technical specifications of the ID, the US is unwilling to exempt seafarers from visa requirements – as is contemplated by the Convention – and is unlikely to sign: Rajesh Joshi, ‘“Hopeful sign” on seafarer shore leave in US’, Lloyd's List (2 February 2006).

103 ‘Prevention and Suppression of Acts of Terrorism Against Shipping’, IMO Doc. MSC 75/17/12, 12 (April 2002) (submitted by Belgium, Finland, France, Germany, Ireland, Italy, Portugal, Spain and Sweden).

104 For a summary of the specific substantive provisions of the Code see Hesse, ‘Maritime Security in a Multilateral Context’; Hesse and Charalambous, ‘New Security Measures for the International Shipping Community’; and IMO, ‘IMO 2004: Focus on Maritime Security’.

105 IMO, ‘IMO 2004: Focus on Maritime Security’, pp. 7–10.

106 ‘Helping hand for developing countries vital in compliance’, Lloyd's List (25 April 2005).

107 Adm. T. H. Collins, ‘Address to Houston Maritime Association’ (22 January 2004). Downloaded from: {www.uscg.mil/ha/g-m/mp/pdf/0122_Houston_Mtme.pdf} accessed 22 May 2004.

108 Regarding Europe, note the influence of the ‘Paris MOU’: B. Reyes, ‘Europe starts getting tough with ISPS reminders as deadline looms’, Lloyd's List (3 February 2004); The Paris Memorandum of Understanding on Port State Control, Port State Control: Steady She Goes (Annual Report) (2006), p. 24. In Asia, the ‘Tokyo MOU’ undertook a ‘concentrated inspection campaign’: Tokyo MOU, ‘Concentrated inspection campaign on the implementation of the ISPS Code’, Press release (15 December 2004). On the concept of ‘port state control’ generally, see Vorbach, Joseph E., ‘The Vital Role of Non-Flag State Actors in the Pursuit of Safer Shipping’, Ocean Development and International Law, 32 (2001), pp. 2742CrossRefGoogle Scholar .

109 At end 2003, the US led the world with 13 per cent of maritime trade measured by value: UNCTAD, Review of Maritime Transport 2004, Geneva (2004), p. 52.

110 J. Porter and J. Stares, ‘Ports at risk of missing ISPS Code deadline’, Lloyd's List (11 March 2004).

111 ‘Maritime security on agenda as USCG visits IMO’, IMO Briefing 12/2005 (17 February 2005); S. Speares, ‘ISPS starts well but survey shows port official problems remain’, Lloyd's List (2 November 2004); ‘Security compliance shows continued improvement’, IMO Press Briefing 28/2004 (6 August 2004).

112 Mastanduno, ‘US foreign policy’, p. 324.

114 US Customs and Border Protection, ‘Fact Sheet: Container Security Initiative’ (July 2005).

115 US Customs and Border Protection, ‘Fact Sheet’.

116 Customs Commissioner Bonner used this term frequently in his public statements, for example, R. C. Bonner, ‘Remarks to Royal Institute of International Affairs, Chatham House’, London (20 September 2004).

117 G8, ‘Cooperative G8 Action on Transport Security’, Kananaskis Summit (2002).

118 For example, R. C. Bonner, ‘Remarks to World Customs Organization’, Brussels (28 June 2002).

119 Edmonson, R. G., ‘Taking shape: WCO fleshes out plan to balance security and trade facilitation’, Journal of Commerce (28 February 2005)Google Scholar ; ‘WCO endorses framework annexes for security, facilitation’, Journal of Commerce Online (29 April 2005).

120 WCO, ‘Framework of Standards to Secure Global Trade’ (June 2005).

121 Speares, S., ‘IMO nations bury differences to pass update anti-terror treaties’, Lloyd's List (17 October 2005)Google Scholar .

122 ‘Safer Global Trade Boosted by Commitment to Build Capacity’, Press release, World Customs Organization (23 June 2005).

123 ‘Members who have expressed their intention to implement the WCO Framework of Standards to Secure and Facilitate Global Trade’, WCO (27 September 2007).

124 Drezner, All Politics is Global, pp. 63–4.

125 Gruber, Ruling the World.

126 If borne out in future research, this observation may qualify Drezner's claim that ‘A great power concert is a necessary and sufficient condition for effective global governance’. All Politics is Local, p. 5, emphasis added.

127 Schweller and Priess, ‘A Tale of Two Realisms’, p. 12.

128 Krasner, Stephen K., ‘Structural Causes and Regime Consequences: Regimes as Intervening Variables’, International Organization, 36 (1982), pp. 185205CrossRefGoogle Scholar .

129 Raustiala, Kal and Victor, David G., ‘The Regime Complex for Plant Genetic Resources’, International Organization, 58 (2004), p. 279CrossRefGoogle Scholar .

130 Raustiala and Victor, ‘The Regime Complex for Plant Genetic Resources’, p. 280.

131 For example, several studies of intelligence cooperation after 9/11 have noted the importance of trusted links among intelligence services as well as the ‘dynamics of comparative advantage’: Rudner, Martin, ‘Hunters and Gatherers: The Intelligence Coalition Against Islamic Terrorism’, International Journal of Intelligence and Counterintelligence, 17 (2004), pp. 193230CrossRefGoogle Scholar ; Lefebvre, Stephane, ‘The Difficulties and Dilemmas of International Intelligence Cooperation’, International Journal of Intelligence and Counterintelligence, 16 (2003), pp. 527542CrossRefGoogle Scholar .

132 Pillar, Paul R., ‘Counterterrorism after al Qaeda’, Washington Quarterly, 27 (2004), p. 107CrossRefGoogle Scholar .

133 A similar series of recommendations, specific to terrorist financing, are set out in Biersteker, Eckert and Romaniuk, ‘International Initiatives to Suppress Terrorist Financing’.

134 Millar and Rosand, ‘Building Global Alliances’; Boulden, Jane and Weiss, Thomas G., ‘Tactical Multilateralism: Coaxing America Back to the UN’, Survival, 46 (2004), pp. 103114CrossRefGoogle Scholar .