International Terrorism and the Middle East: An Expository Approach

Jide Ibietan, Felix Chidozie, Ese Ujara


This paper interrogates the role of the Middle East in international terrorism and the spillovers of this on global security. The narrative traces the roots of terrorism to the Middle East, noting the volatility of the issue and susceptibility of some countries within that region to terrorism, zeroing-in on Iran as misconstruing this vice for foreign policy instrument. Essentially, the paper relied on secondary data, statistical tools backed by the analytical approach, leading to the inference that the terrorist network and activities have wider international ramifications and reverberating effects on developing countries, including Nigeria. The adoption of more proactive measures and pragmatic security-building strategies by the United Nations towards a deceleration in international terrorism were canvassed.

Key Words: International Terrorism, Global Security, Middle East 


Full Text:



Alexander, Y. (2014). Terrorism in North Africa and in the Sahel in 2013, being a Fifth Annual Report published at the International Center for Terrorism Studies at the Potomac Institute for Policy Studies, January, USA.

Al-Thagafi, A. (2008). Causes and Possible Solutions to the Middle East Terrorism. Strategy Research Project, US Army War College, Carlisle Barracks.

Baldwin, D. (1997). The Concept of Security. Review of International Studies, 23, pp. 5-26

Barzegar, K. (2005). The Middle East and the New Terrorism. Journal on Science and World Affairs, 1 (2), pp. 113- 121

Best, S. and A. Nocella (2004). Defining Terrorism. Animal Liberation and Philosophy Journal, 2 (1), pp.1-18

Cooper, H. (2001). Terrorism: The Problem of Definition Revisited. American Behavioural Scientist, 44(6), February, pp.881-893

Fahmy, N. (2002). Implications of September 11 for Middle East Security, in Barletta M. (ed.) After 9,11: Preventing Mass-Destruction Terrorism and Weapons Proliferation, Occasional Paper, No. 8, Centre for Non-proliferation Studies, Monterey Institute of International Studies.

Federal Bureau of Investigation (1999). Terrorism in the United States: 30 Years of Terrorism A Special Retrospective Edition. Counterterrorism Assessment and Warning Unit, US Department of State

George, E. and Hilal, N (2013). Africa in Search of (In)Security: Beyond the Bondage of Boundaries, in Sabelo J. Ndlovu-Gatsheni & Brilliant Mhlanga (eds.) Bondage of Boundaries and Identity Politics in Postcolonial Africa: The ‘Northern Problem’ and Ethno-Futures. South Africa: Africa Institute of South Africa. Pp. 45-60

Good Reads “Noam Chomsky”. Retrieved from; Data accessed on 6th October, 2013.

Hubert, O (2001). Small Arms Demand, Reduction and Human Security. Ploughshares Briefing

Kimunguyi, P. (2011). Terrorism and Counterterrorism in East Africa, Global Terrorism Research Centre, Monash University, Australia

Levitt, M (2013). Iranian Support for Terrorism and Violations of Human Rights, Being a Testimony before the Standing Committee on Foreign Affairs and International Development, International Human Rights Subcommittee, House of Commons, Parliament of Canada, May 30th. Published by The Washington Institute for Near East Policy, pp.1-9

Manni, N. (2012). Boko Haram: A Threat to African and Global Security. Global Security Studies, Fall, Volume 3, Issue 4, pp.44-54

Maskaliunaite, A. (2002). Defining Terrorism in the Political and Academic Discourse. Public Defence Review, 2 (8), pp. 36 – 50

Nwolise, O.B.C (2012). Spiritual Dimension of Human and National Security. A Faculty Lecture by the Department of Political Science, Faculty of the Social Sciences, University of Ibadan, Ibadan, Nigeria. Held on Thursday, April 26

Office of the Coordinator for Counterterrorism (2014). Country Report on Terrorism 2013, July, US Department of State Publication. Retrieved from, Data accessed on 29th September, 2013.

Pillar, P. (2001). Terrorism and U.S. Foreign Policy. Brookings Institution Press, U.S.A

Shuhghart, W. (2005). An Analytical History of Terrorism, 1945 – 2000., pp. 1-65.

Stone, M. (2009). Security According to Buzan: A Comprehensive Security Analysis. Security Discussion Papers Series 1, Spring, pp. 1-11


  • There are currently no refbacks.