14. The provocative strategist Ralph Peters makes a similar distinction between the practical and
apocalyptic terrorist, but unfortunately limits his discussion of the latter to Muslim extremists,
such as Osama bin Laden, when in fact the group is larger and should rightly include many non-
Muslim and non-Arab groups, such as Aum Shinrikyo and potentially even Christian
fundamentalists or other ethnically Caucasian groups such as the Branch Davidians. See Peters,
Beyond Terror: Strategy in a Changing World (Mechanicsburg, PA: Stackpole Books 2002),
especially Part I, “When Devils Walk the Earth”; and Sebestyén L. v. Gorka, “2000 AD: Boom
Time in the Doom Market,” Jane’s Intelligence Review, January 2000.
15. An excellent collection of al Qaeda statements was compiled by the former Federal
Broadcast Information Service (FBIS) and can be accessed by US government employees and
contractors through the Open Source Center (which absorbed the FBIS) at
https://www.opensource.gov/
16. For examples of information supporting this vision, see the various works by al Qaeda
specialist Rohan Gunaratna, such as Inside Al Qaeda: Global Network of Terror (New York:
Columbia University Press, 2002).
17. It is again important to note that the categorization of rational or nonrational refers to “our”
point of view. There exists, undoubtedly, in the mindset of the Aum Shinrikyo or al Qaeda
operator, a distinct logic all his or her own. The difference is whether or not the desired endstate
is posited in reference to a transcendental reality. As a result one could also use, as I have, the
labels “political” and “transcendental” terrorist.
18. In fact, it was the sacrosanct nature of sovereignty that lay behind the creation of the balance
of power system so important to Europe in following centuries.
19. For a much lengthier and most influential discussion of the evolution of the nation-state,
security, and international law, see the recent writings of Philip Bobbitt, especially his book The
Shield of Achilles: War, Peace and the Course of History (New York: Alfred A. Knopf, 2002).
20. There are, of course, rare exceptions to the rule, such as Andorra or Costa Rica, but these all
have in common either that they are too small to have their own armies or security services, or
that they rely upon external and comprehensive guarantees of safety (as in the case of Costa Rica
and its treaty relationship with the United States).
21. One such example is when the CIA was accused during the Vietnam War of collecting
information on American nationals in the United States—an activity that was mandated to the
FBI.
22. For a discussion of the nature of the European Union and how its identity has fundamentally
changed with the last round of enlargement this year, see the author’s paper entitled “European
Union Enlargement: Common Challenge or Internal Divide?” as presented to the German-
American Fulbright Commission’s Berlin Seminar: “Where Continents Meet,” 20 March 2004.
23. “Purple” operations and structures are those that involve all the arms of military service,
army, navy, air force, and marines. The US Department of Defense has been emphasizing the
“Joint,” or “Purple,” mode for some years now, breaking down the technical as well as mental
barriers to interoperability among the services. My proposal would take this approach and apply
it across the whole national security structure, not just the armed forces. I am indebted to my
good friend Keith Mines of the US State Department for christening my concept so aptly,
“Purple” referring to the slang for joint operations (arrived at when the service colors are mixed),
and “Super-Purple” referring to interdepartmental and international jointness.
24. Lest the reader think I am making an argument here for states to follow the US model by
creating their own Department of Homeland Security (DHS), I am not. The gargantuan DHS,