Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 51

Full-Text Articles in Entire DC Network

"The Rising: Ireland: Easter 1916," Fearghal Mcgarry (New York: Oxford University Press, 2010) And "Guerrilla Warfare In The Irish War Of Independence, 1919-1921," Joseph Mckenna (Jefferson, Nc And London: Mcfarland & Company, Inc., Publishers, 2011), Edward J. Hagerty Sep 2011

"The Rising: Ireland: Easter 1916," Fearghal Mcgarry (New York: Oxford University Press, 2010) And "Guerrilla Warfare In The Irish War Of Independence, 1919-1921," Joseph Mckenna (Jefferson, Nc And London: Mcfarland & Company, Inc., Publishers, 2011), Edward J. Hagerty

Journal of Strategic Security

No abstract provided.


Extraordinary Rendition And U.S. Counterterrorism Policy, Mark J. Murray Sep 2011

Extraordinary Rendition And U.S. Counterterrorism Policy, Mark J. Murray

Journal of Strategic Security

This article examines the United States Government policy of extraordinary rendition as a response to terrorism. The paper provides a working definition of the term, outlines why it has become controversial, and uses case studies to examine success and failures of extraordinary rendition in practice. The paper concludes with lessons learned—more specifically, policy amendments—that are necessary to keep extraordinary rendition as a viable tool for the Obama Administration and mitigate political fallout against the United States from both its allies and enemies. This paper argues that extraordinary rendition provides flexibility to policymakers to detain terrorists in cases where an attack …


Hizbollah–Syrian Intelligence Affairs: A Marriage Of Convenience, Carl Anthony Wege Sep 2011

Hizbollah–Syrian Intelligence Affairs: A Marriage Of Convenience, Carl Anthony Wege

Journal of Strategic Security

Since the 1980s, Hizbollah has emerged as the guardian of Lebanon's Shi'a and a stalking horse for Iran. Syria, though allied with Tehran, seeks to manage Hizbollah's freedom of action in Lebanon and is eyed cautiously in Damascus. Hizbollah has managed to maintain independence from these Syrian efforts because of both Lebanese Shi'a religious élan and the protection given Hizbollah by its Shi'a allies in Iran.


Cover & Front Matter Sep 2011

Cover & Front Matter

Journal of Strategic Security

No abstract provided.


Mitigating The Exploitation Of U.S. Borders By Jihadists And Criminal Organizations, Todd Steinmetz Sep 2011

Mitigating The Exploitation Of U.S. Borders By Jihadists And Criminal Organizations, Todd Steinmetz

Journal of Strategic Security

Following the events of September 11, 2001, the U.S. Government began improving security in large population centers and near potential highvalue terrorist targets. Included in these efforts was the development of a more robust border security program, with an emphasis on reducing the threat of terrorist infiltration at America's borders. However, nearly a decade after 9/11, terrorism and organized crime continue to pose significant threats to the United States. As many of these threats emanate from other nations, improved border security helps mitigate these threats. This article summarizes known terrorist activity along the U.S. northern and southern borders, and highlights …


Buy Off And Buy In: Flipping The Farc, Joel K. Day Ii Sep 2011

Buy Off And Buy In: Flipping The Farc, Joel K. Day Ii

Journal of Strategic Security

The election of President Juan Manuel Santos in Columbia marks a new era in Columbian security policy. administration has failed to implementInstead of focusing on a solely military solution to conflict with Revolutionary Armed Forces of Colombia (FARC), as his predecessor did, Santos has committed to a multifaceted effort to resolve the dispute. In spite of this hope, the Santos many critical non-military policy proposals. Like Santos, the scholarly community has ignored important comparative studies of counterterrorism. This essay attempts to fill a gap in the literature by framing a discussion of FARC in light of new advances in counter-insurgency …


"Terrorism And Homeland Security: Perspectives, Thoughts, And Opinions," Edited By Dale L. June (Boca Raton, Fl: Crc Press, 2011), Mark J. Roberts Sep 2011

"Terrorism And Homeland Security: Perspectives, Thoughts, And Opinions," Edited By Dale L. June (Boca Raton, Fl: Crc Press, 2011), Mark J. Roberts

Journal of Strategic Security

No abstract provided.


"Area 51: An Uncensored History Of America's Top Secret Military Base," Annie Jacobsen (New York: Little, Brown And Company, 2011), Edward M. Roche Sep 2011

"Area 51: An Uncensored History Of America's Top Secret Military Base," Annie Jacobsen (New York: Little, Brown And Company, 2011), Edward M. Roche

Journal of Strategic Security

No abstract provided.


The Right Side Of The Coin: Focus On The Human Rights Of People, Not The Failure Of States, Brooke Ackerly Aug 2011

The Right Side Of The Coin: Focus On The Human Rights Of People, Not The Failure Of States, Brooke Ackerly

Human Rights & Human Welfare

US policy toward failed states should focus on strengthening civil society and social movements so that people are better able to hold their leaders accountable.

The language of “failed states” disassociates foreign policy from international dialogue about human rights. Instead, “failed states” is a contemporary sound bite that connotes a lack of sovereignty, suggesting that intervention would not violate national sovereignty because in a failed state, there is none. Of course, we could have a similar cynicism about the use of human rights concerns to justify invasion. Certainly, states have tried to choose when to reference international human rights norms …


More Questions, Few Answers On State Failure And Human Rights, Edzia Carvalho Aug 2011

More Questions, Few Answers On State Failure And Human Rights, Edzia Carvalho

Human Rights & Human Welfare

The Foreign Policy article under review brings us back to the issues addressed in April's Roundtable, which looked at humanitarian intervention in light of widespread political violence in the Ivory Coast. Much of that discussion centered on the factors that lead states to adopt policies aimed at stopping egregious human rights abuses from being committed in other jurisdictions, either by state agents or non-state actors. This month's Roundtable discussion highlights the myths attached to the concept of “state failure,” which increases the likelihood of such violations occurring. The author of this month's centerpiece, James Traub, comments on a number of …


Immobilizing Conceptual Debates, Jonas Claes Aug 2011

Immobilizing Conceptual Debates, Jonas Claes

Human Rights & Human Welfare

In “Think Again: Failed States,” James Traub argues that “state failure” is a failed concept. Prioritizing efforts to prevent or address state fragility, weakness, or failure may seem impractical given the conceptual breadth of this systemic challenge. Like globalization, human security, or climate change, state failure contains so many aspects that it becomes analytically useless. But the need to rethink this garbage-can concept—everything can be thrown in—does not keep us from addressing the litany of well-understood challenges subsumed within.


“Failed States Are Everyone’S Problem”, Devin Joshi Aug 2011

“Failed States Are Everyone’S Problem”, Devin Joshi

Human Rights & Human Welfare

This article raises interesting issues but cannot answer its own puzzles because it fails to define what constitutes a threat or danger to US national security. As an American citizen, the security of the Central African Republic is in my personal interest. The CAR is a country where it has been reported that one out of every sixteen mothers dies during childbirth. That is a serious problem! Who is to say it is not in Americans’ interest to prevent state failure there? If the US government is not interested in Central Africans' security, obviously, there is a disconnect between the …


Linking Mine Action And Development: Local-Level Benefits And Challenges, Russell Gasser Jul 2011

Linking Mine Action And Development: Local-Level Benefits And Challenges, Russell Gasser

The Journal of Conventional Weapons Destruction

In many post-conflict regions, landmines and explosive remnants of war remain, limiting recovery and development even after mine-clearance projects are completed. A number of mine-clearance organizations are starting to promote “linking mine action and development” as a better alternative to a separate and uncoordinated approach.


Modeling Human Behavior To Anticipate Insider Attacks, Frank L. Greitzer , Ph.D., Ryan E. Hohimer Jul 2011

Modeling Human Behavior To Anticipate Insider Attacks, Frank L. Greitzer , Ph.D., Ryan E. Hohimer

Journal of Strategic Security

The insider threat ranks among the most pressing cyber-security challenges
that threaten government and industry information infrastructures.
To date, no systematic methods have been developed that provide a
complete and effective approach to prevent data leakage, espionage, and
sabotage. Current practice is forensic in nature, relegating to the analyst
the bulk of the responsibility to monitor, analyze, and correlate an overwhelming
amount of data. We describe a predictive modeling framework
that integrates a diverse set of data sources from the cyber domain, as well
as inferred psychological/motivational factors that may underlie malicious
insider exploits. This comprehensive threat assessment approach
provides …


China's Use Of Cyber Warfare: Espionage Meets Strategic Deterrence, Magnus Hjortdal Jul 2011

China's Use Of Cyber Warfare: Espionage Meets Strategic Deterrence, Magnus Hjortdal

Journal of Strategic Security

This article presents three reasons for states to use cyber warfare and
shows that cyberspace is—and will continue to be—a decisive element in
China's strategy to ascend in the international system. The three reasons
are: deterrence through infiltration of critical infrastructure; militarytechnological
espionage to gain military knowledge; and industrial espionage
to gain economic advantage. China has a greater interest in using
cyberspace offensively than other actors, such as the United States, since
it has more to gain from spying on and deterring the United States than
the other way around. The article also documents China's progress in
cyber warfare and …


"Information Operations Matters: Best Practices," Leigh Armistead, (Washington, D.C.: Potomac Books, 2010), Robin L. Thompson Jul 2011

"Information Operations Matters: Best Practices," Leigh Armistead, (Washington, D.C.: Potomac Books, 2010), Robin L. Thompson

Journal of Strategic Security

No abstract provided.


"Obama's Wars," Bob Woodward, (New York, Ny: Simon And Schuster, 2010), Richard J. Kilroy Jr. Jul 2011

"Obama's Wars," Bob Woodward, (New York, Ny: Simon And Schuster, 2010), Richard J. Kilroy Jr.

Journal of Strategic Security

No abstract provided.


Cover & Front Matter Jul 2011

Cover & Front Matter

Journal of Strategic Security

No abstract provided.


"The Dynamics Of Terror And Creation Of Homegrown Terrorists," Richard J. Hughbank, Ed. Et Al., (Mustang, Ok: Tate Publishing And Enterprises, 2010), Jennifer Jefferis Jul 2011

"The Dynamics Of Terror And Creation Of Homegrown Terrorists," Richard J. Hughbank, Ed. Et Al., (Mustang, Ok: Tate Publishing And Enterprises, 2010), Jennifer Jefferis

Journal of Strategic Security

No abstract provided.


"The New Muslim Brotherhood In The West," Lorenzo Vidino, (New York: Columbia University Press, 2010), Sheldon Greaves , Ph.D. Jul 2011

"The New Muslim Brotherhood In The West," Lorenzo Vidino, (New York: Columbia University Press, 2010), Sheldon Greaves , Ph.D.

Journal of Strategic Security

No abstract provided.


"Small Boats, Weak States, Dirty Money: Piracy And Maritime Terrorism In The Modern World," Martin N. Murphy, (New York: Columbia University Press, 2009), Francis D. Bonadonna , Capt. Jul 2011

"Small Boats, Weak States, Dirty Money: Piracy And Maritime Terrorism In The Modern World," Martin N. Murphy, (New York: Columbia University Press, 2009), Francis D. Bonadonna , Capt.

Journal of Strategic Security

No abstract provided.


Psychological Assessment: What Will The Future Bring?, Ibpp Editor Jun 2011

Psychological Assessment: What Will The Future Bring?, Ibpp Editor

International Bulletin of Political Psychology

The author discusses the (de)valuation of psychological assessment from various perspectives.


Conflict Resolution Agenda: Approaching Its Expiration Date, Jonas Claes Jun 2011

Conflict Resolution Agenda: Approaching Its Expiration Date, Jonas Claes

Human Rights & Human Welfare

Conflict resolution scholars and policy-makers have traditionally prioritized research and policy measures dealing with political violence, treating criminal violence as a contextual factor in their analysis or as a subordinate policy concern. One may wonder why the value of a casualty differs depending on whether the fatal blow was caused by a tank, a gang knife, or even a typhoon. The prioritization of political violence over criminal violence seems morally unjustified considering that the killing rates in Guatemala and El Salvador are higher now than during the civil wars that ended in the 1990s. Despite similarities in the causes, manifestations, …


Deadly Silence: An Assessment Of Emergency Alert Systems For Lincoln County, Georgia, Gretchen B. Keneson, Mar 2011

Deadly Silence: An Assessment Of Emergency Alert Systems For Lincoln County, Georgia, Gretchen B. Keneson,

Georgia Journal of Public Policy

Rural counties have a predisposition to sustaining catastrophic losses during natural emergencies. These counties tend to have poorer economic conditions that exacerbate attempts at hazard mitigation. Emergency Alerts Systems (EAS) are the most efficient and effective ways to provide information of impending danger. This study will compare and contrast different EAS to determine which would accommodate the needs of a community. The most successful way for most counties to alert citizens is through the use of a combination of redundant systems. For pastoral Lincoln County, Georgia the optimal systems are an alert siren and auto call capabilities. Both of these …


Proper Crime Recording As An Effective Feedback Tool In Articulating A Crime Policy, Kevin A. Unter Mar 2011

Proper Crime Recording As An Effective Feedback Tool In Articulating A Crime Policy, Kevin A. Unter

Georgia Journal of Public Policy

Crime policy is subject to the policy process just like other governmental policies. An effective crime policy is one that reduces the amount of crime in a police department’s jurisdiction, e.g., the city. Accordingly, crime policy consists of the same policy components – agenda setting, formulation, implementation, and feedback. The implementation of any crime policy depends on the information collected by police departments, often through crimes reported to the department via 9-1-1 calls or brought to a police officer’s attention through proactive police work. The success of that police work relative to the reported crime first depends on whether the …


Resetting U.S.-Turkish Relations: Charting A New Way Forward, Aaron Stein Mar 2011

Resetting U.S.-Turkish Relations: Charting A New Way Forward, Aaron Stein

Journal of Strategic Security

After nearly nine decades of benign neglect, Turkey has set about reestablishing its influence in the Middle East. Although most observers agree that the United States and Turkey share a number of overlapping goals in the Middle East, Turkey's recent rapprochement with Iran has drawn the ire of the United States. In tandem, Turkey's relations with Israel, Washington's closest ally in the region, have deteriorated rapidly following Israel's war in Gaza and the events aboard the Mavi Marmara. These coinciding events have further complicated U.S.-Turkish relations and have led a number of pundits in Washington to openly question Turkey's ideological …


The Financial Arm Of The Farc: A Threat Finance Perspective, Thomas R. Cook Mar 2011

The Financial Arm Of The Farc: A Threat Finance Perspective, Thomas R. Cook

Journal of Strategic Security

The FARC (Fuerzas Armadas Revolucionarias de Colombia or Revolutionary Armed Forces of Colombia) transformed from a traditional guerrilla group into a full-fledged insurgency because of its ability to effectively convert the proceeds derived from illegal narcotic trafficking into operational funds. Those financial capabilities allowed the FARC to challenge government authority in large swathes of the Colombian state. The FARC moved into the drug trade, initially controlling production territory and subsequently engaging in trafficking, which allowed the organization to increase its war-fighting capabilities. This paper only scratches the surface of the mechanism by which the FARC utilized its coca revenue in …


Alternative Threat Methodology, Charles B. King Iii Mar 2011

Alternative Threat Methodology, Charles B. King Iii

Journal of Strategic Security

Of the many challenges facing risk analysis practitioners, perhaps the most difficult to overcome is in the field of terrorist threat analysis. When estimating the threat associated with naturally occurring events, historical data provides a great deal of insight into the frequency of those events. Threat associated with accidents applies many operations research tools to gauge future failure-rates (Failure Mode and Effects Analysis being perhaps the most widely known). However, estimating the probability of an individual's or group's attacking a specific (or even a generic) target is an element of risk analysis in which art and intuition are applied far …


New Start: The Contentious Road To Ratification, Elizabeth Zolotukhina Mar 2011

New Start: The Contentious Road To Ratification, Elizabeth Zolotukhina

Journal of Strategic Security

Senate ratification of the New START treaty re-established effective bilateral inspection and monitoring of American and Russian nuclear holdings and has the potential to further enhance U.S.-Russian cooperation on key issues, including containing the Iranian nuclear program, and further reductions in the two countries' arsenals. Although the accord was widely heralded as a foreign policy success of the Obama administration, the contentious Senate ratification may impede future progress on arms control.


Cover & Front Matter Mar 2011

Cover & Front Matter

Journal of Strategic Security

No abstract provided.