Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- Terrorism / counterterrorism (12)
- Radicalization (10)
- Violent extremism (9)
- Counterterrorism (8)
- Human rights (8)
-
- Islamic culture and politics (8)
- Ideology (7)
- Religious violence (7)
- Al-Qaida (6)
- Fundamentalism (6)
- Nonstate actors (6)
- Political violence (5)
- Asymmetric warfare (4)
- Failed states (4)
- Foreign policy (4)
- Homeland security (4)
- Middle East (4)
- National security (4)
- Security (4)
- Strategy (4)
- Cybersecurity (3)
- Gangs and criminal organizations (3)
- Governance and rule of law (3)
- Intelligence analysis (3)
- International law (3)
- Public diplomacy (3)
- Sociocultural dynamics in security (3)
- United States (3)
- Conflict studies (2)
- Counterintelligence (2)
Articles 1 - 30 of 51
Full-Text Articles in Entire DC Network
"The Rising: Ireland: Easter 1916," Fearghal Mcgarry (New York: Oxford University Press, 2010) And "Guerrilla Warfare In The Irish War Of Independence, 1919-1921," Joseph Mckenna (Jefferson, Nc And London: Mcfarland & Company, Inc., Publishers, 2011), Edward J. Hagerty
Journal of Strategic Security
No abstract provided.
Extraordinary Rendition And U.S. Counterterrorism Policy, Mark J. Murray
Extraordinary Rendition And U.S. Counterterrorism Policy, Mark J. Murray
Journal of Strategic Security
This article examines the United States Government policy of extraordinary rendition as a response to terrorism. The paper provides a working definition of the term, outlines why it has become controversial, and uses case studies to examine success and failures of extraordinary rendition in practice. The paper concludes with lessons learned—more specifically, policy amendments—that are necessary to keep extraordinary rendition as a viable tool for the Obama Administration and mitigate political fallout against the United States from both its allies and enemies. This paper argues that extraordinary rendition provides flexibility to policymakers to detain terrorists in cases where an attack …
Hizbollah–Syrian Intelligence Affairs: A Marriage Of Convenience, Carl Anthony Wege
Hizbollah–Syrian Intelligence Affairs: A Marriage Of Convenience, Carl Anthony Wege
Journal of Strategic Security
Since the 1980s, Hizbollah has emerged as the guardian of Lebanon's Shi'a and a stalking horse for Iran. Syria, though allied with Tehran, seeks to manage Hizbollah's freedom of action in Lebanon and is eyed cautiously in Damascus. Hizbollah has managed to maintain independence from these Syrian efforts because of both Lebanese Shi'a religious élan and the protection given Hizbollah by its Shi'a allies in Iran.
Mitigating The Exploitation Of U.S. Borders By Jihadists And Criminal Organizations, Todd Steinmetz
Mitigating The Exploitation Of U.S. Borders By Jihadists And Criminal Organizations, Todd Steinmetz
Journal of Strategic Security
Following the events of September 11, 2001, the U.S. Government began improving security in large population centers and near potential highvalue terrorist targets. Included in these efforts was the development of a more robust border security program, with an emphasis on reducing the threat of terrorist infiltration at America's borders. However, nearly a decade after 9/11, terrorism and organized crime continue to pose significant threats to the United States. As many of these threats emanate from other nations, improved border security helps mitigate these threats. This article summarizes known terrorist activity along the U.S. northern and southern borders, and highlights …
Buy Off And Buy In: Flipping The Farc, Joel K. Day Ii
Buy Off And Buy In: Flipping The Farc, Joel K. Day Ii
Journal of Strategic Security
The election of President Juan Manuel Santos in Columbia marks a new era in Columbian security policy. administration has failed to implementInstead of focusing on a solely military solution to conflict with Revolutionary Armed Forces of Colombia (FARC), as his predecessor did, Santos has committed to a multifaceted effort to resolve the dispute. In spite of this hope, the Santos many critical non-military policy proposals. Like Santos, the scholarly community has ignored important comparative studies of counterterrorism. This essay attempts to fill a gap in the literature by framing a discussion of FARC in light of new advances in counter-insurgency …
"Terrorism And Homeland Security: Perspectives, Thoughts, And Opinions," Edited By Dale L. June (Boca Raton, Fl: Crc Press, 2011), Mark J. Roberts
"Terrorism And Homeland Security: Perspectives, Thoughts, And Opinions," Edited By Dale L. June (Boca Raton, Fl: Crc Press, 2011), Mark J. Roberts
Journal of Strategic Security
No abstract provided.
"Area 51: An Uncensored History Of America's Top Secret Military Base," Annie Jacobsen (New York: Little, Brown And Company, 2011), Edward M. Roche
"Area 51: An Uncensored History Of America's Top Secret Military Base," Annie Jacobsen (New York: Little, Brown And Company, 2011), Edward M. Roche
Journal of Strategic Security
No abstract provided.
The Right Side Of The Coin: Focus On The Human Rights Of People, Not The Failure Of States, Brooke Ackerly
The Right Side Of The Coin: Focus On The Human Rights Of People, Not The Failure Of States, Brooke Ackerly
Human Rights & Human Welfare
US policy toward failed states should focus on strengthening civil society and social movements so that people are better able to hold their leaders accountable.
The language of “failed states” disassociates foreign policy from international dialogue about human rights. Instead, “failed states” is a contemporary sound bite that connotes a lack of sovereignty, suggesting that intervention would not violate national sovereignty because in a failed state, there is none. Of course, we could have a similar cynicism about the use of human rights concerns to justify invasion. Certainly, states have tried to choose when to reference international human rights norms …
More Questions, Few Answers On State Failure And Human Rights, Edzia Carvalho
More Questions, Few Answers On State Failure And Human Rights, Edzia Carvalho
Human Rights & Human Welfare
The Foreign Policy article under review brings us back to the issues addressed in April's Roundtable, which looked at humanitarian intervention in light of widespread political violence in the Ivory Coast. Much of that discussion centered on the factors that lead states to adopt policies aimed at stopping egregious human rights abuses from being committed in other jurisdictions, either by state agents or non-state actors. This month's Roundtable discussion highlights the myths attached to the concept of “state failure,” which increases the likelihood of such violations occurring. The author of this month's centerpiece, James Traub, comments on a number of …
Immobilizing Conceptual Debates, Jonas Claes
Immobilizing Conceptual Debates, Jonas Claes
Human Rights & Human Welfare
In “Think Again: Failed States,” James Traub argues that “state failure” is a failed concept. Prioritizing efforts to prevent or address state fragility, weakness, or failure may seem impractical given the conceptual breadth of this systemic challenge. Like globalization, human security, or climate change, state failure contains so many aspects that it becomes analytically useless. But the need to rethink this garbage-can concept—everything can be thrown in—does not keep us from addressing the litany of well-understood challenges subsumed within.
“Failed States Are Everyone’S Problem”, Devin Joshi
“Failed States Are Everyone’S Problem”, Devin Joshi
Human Rights & Human Welfare
This article raises interesting issues but cannot answer its own puzzles because it fails to define what constitutes a threat or danger to US national security. As an American citizen, the security of the Central African Republic is in my personal interest. The CAR is a country where it has been reported that one out of every sixteen mothers dies during childbirth. That is a serious problem! Who is to say it is not in Americans’ interest to prevent state failure there? If the US government is not interested in Central Africans' security, obviously, there is a disconnect between the …
Linking Mine Action And Development: Local-Level Benefits And Challenges, Russell Gasser
Linking Mine Action And Development: Local-Level Benefits And Challenges, Russell Gasser
The Journal of Conventional Weapons Destruction
In many post-conflict regions, landmines and explosive remnants of war remain, limiting recovery and development even after mine-clearance projects are completed. A number of mine-clearance organizations are starting to promote “linking mine action and development” as a better alternative to a separate and uncoordinated approach.
Modeling Human Behavior To Anticipate Insider Attacks, Frank L. Greitzer , Ph.D., Ryan E. Hohimer
Modeling Human Behavior To Anticipate Insider Attacks, Frank L. Greitzer , Ph.D., Ryan E. Hohimer
Journal of Strategic Security
The insider threat ranks among the most pressing cyber-security challenges
that threaten government and industry information infrastructures.
To date, no systematic methods have been developed that provide a
complete and effective approach to prevent data leakage, espionage, and
sabotage. Current practice is forensic in nature, relegating to the analyst
the bulk of the responsibility to monitor, analyze, and correlate an overwhelming
amount of data. We describe a predictive modeling framework
that integrates a diverse set of data sources from the cyber domain, as well
as inferred psychological/motivational factors that may underlie malicious
insider exploits. This comprehensive threat assessment approach
provides …
China's Use Of Cyber Warfare: Espionage Meets Strategic Deterrence, Magnus Hjortdal
China's Use Of Cyber Warfare: Espionage Meets Strategic Deterrence, Magnus Hjortdal
Journal of Strategic Security
This article presents three reasons for states to use cyber warfare and
shows that cyberspace is—and will continue to be—a decisive element in
China's strategy to ascend in the international system. The three reasons
are: deterrence through infiltration of critical infrastructure; militarytechnological
espionage to gain military knowledge; and industrial espionage
to gain economic advantage. China has a greater interest in using
cyberspace offensively than other actors, such as the United States, since
it has more to gain from spying on and deterring the United States than
the other way around. The article also documents China's progress in
cyber warfare and …
"Information Operations Matters: Best Practices," Leigh Armistead, (Washington, D.C.: Potomac Books, 2010), Robin L. Thompson
"Information Operations Matters: Best Practices," Leigh Armistead, (Washington, D.C.: Potomac Books, 2010), Robin L. Thompson
Journal of Strategic Security
No abstract provided.
"Obama's Wars," Bob Woodward, (New York, Ny: Simon And Schuster, 2010), Richard J. Kilroy Jr.
"Obama's Wars," Bob Woodward, (New York, Ny: Simon And Schuster, 2010), Richard J. Kilroy Jr.
Journal of Strategic Security
No abstract provided.
"The Dynamics Of Terror And Creation Of Homegrown Terrorists," Richard J. Hughbank, Ed. Et Al., (Mustang, Ok: Tate Publishing And Enterprises, 2010), Jennifer Jefferis
"The Dynamics Of Terror And Creation Of Homegrown Terrorists," Richard J. Hughbank, Ed. Et Al., (Mustang, Ok: Tate Publishing And Enterprises, 2010), Jennifer Jefferis
Journal of Strategic Security
No abstract provided.
"The New Muslim Brotherhood In The West," Lorenzo Vidino, (New York: Columbia University Press, 2010), Sheldon Greaves , Ph.D.
"The New Muslim Brotherhood In The West," Lorenzo Vidino, (New York: Columbia University Press, 2010), Sheldon Greaves , Ph.D.
Journal of Strategic Security
No abstract provided.
"Small Boats, Weak States, Dirty Money: Piracy And Maritime Terrorism In The Modern World," Martin N. Murphy, (New York: Columbia University Press, 2009), Francis D. Bonadonna , Capt.
"Small Boats, Weak States, Dirty Money: Piracy And Maritime Terrorism In The Modern World," Martin N. Murphy, (New York: Columbia University Press, 2009), Francis D. Bonadonna , Capt.
Journal of Strategic Security
No abstract provided.
Psychological Assessment: What Will The Future Bring?, Ibpp Editor
Psychological Assessment: What Will The Future Bring?, Ibpp Editor
International Bulletin of Political Psychology
The author discusses the (de)valuation of psychological assessment from various perspectives.
Conflict Resolution Agenda: Approaching Its Expiration Date, Jonas Claes
Conflict Resolution Agenda: Approaching Its Expiration Date, Jonas Claes
Human Rights & Human Welfare
Conflict resolution scholars and policy-makers have traditionally prioritized research and policy measures dealing with political violence, treating criminal violence as a contextual factor in their analysis or as a subordinate policy concern. One may wonder why the value of a casualty differs depending on whether the fatal blow was caused by a tank, a gang knife, or even a typhoon. The prioritization of political violence over criminal violence seems morally unjustified considering that the killing rates in Guatemala and El Salvador are higher now than during the civil wars that ended in the 1990s. Despite similarities in the causes, manifestations, …
Deadly Silence: An Assessment Of Emergency Alert Systems For Lincoln County, Georgia, Gretchen B. Keneson,
Deadly Silence: An Assessment Of Emergency Alert Systems For Lincoln County, Georgia, Gretchen B. Keneson,
Georgia Journal of Public Policy
Rural counties have a predisposition to sustaining catastrophic losses during natural emergencies. These counties tend to have poorer economic conditions that exacerbate attempts at hazard mitigation. Emergency Alerts Systems (EAS) are the most efficient and effective ways to provide information of impending danger. This study will compare and contrast different EAS to determine which would accommodate the needs of a community. The most successful way for most counties to alert citizens is through the use of a combination of redundant systems. For pastoral Lincoln County, Georgia the optimal systems are an alert siren and auto call capabilities. Both of these …
Proper Crime Recording As An Effective Feedback Tool In Articulating A Crime Policy, Kevin A. Unter
Proper Crime Recording As An Effective Feedback Tool In Articulating A Crime Policy, Kevin A. Unter
Georgia Journal of Public Policy
Crime policy is subject to the policy process just like other governmental policies. An effective crime policy is one that reduces the amount of crime in a police department’s jurisdiction, e.g., the city. Accordingly, crime policy consists of the same policy components – agenda setting, formulation, implementation, and feedback. The implementation of any crime policy depends on the information collected by police departments, often through crimes reported to the department via 9-1-1 calls or brought to a police officer’s attention through proactive police work. The success of that police work relative to the reported crime first depends on whether the …
Resetting U.S.-Turkish Relations: Charting A New Way Forward, Aaron Stein
Resetting U.S.-Turkish Relations: Charting A New Way Forward, Aaron Stein
Journal of Strategic Security
After nearly nine decades of benign neglect, Turkey has set about reestablishing its influence in the Middle East. Although most observers agree that the United States and Turkey share a number of overlapping goals in the Middle East, Turkey's recent rapprochement with Iran has drawn the ire of the United States. In tandem, Turkey's relations with Israel, Washington's closest ally in the region, have deteriorated rapidly following Israel's war in Gaza and the events aboard the Mavi Marmara. These coinciding events have further complicated U.S.-Turkish relations and have led a number of pundits in Washington to openly question Turkey's ideological …
The Financial Arm Of The Farc: A Threat Finance Perspective, Thomas R. Cook
The Financial Arm Of The Farc: A Threat Finance Perspective, Thomas R. Cook
Journal of Strategic Security
The FARC (Fuerzas Armadas Revolucionarias de Colombia or Revolutionary Armed Forces of Colombia) transformed from a traditional guerrilla group into a full-fledged insurgency because of its ability to effectively convert the proceeds derived from illegal narcotic trafficking into operational funds. Those financial capabilities allowed the FARC to challenge government authority in large swathes of the Colombian state. The FARC moved into the drug trade, initially controlling production territory and subsequently engaging in trafficking, which allowed the organization to increase its war-fighting capabilities. This paper only scratches the surface of the mechanism by which the FARC utilized its coca revenue in …
Alternative Threat Methodology, Charles B. King Iii
Alternative Threat Methodology, Charles B. King Iii
Journal of Strategic Security
Of the many challenges facing risk analysis practitioners, perhaps the most difficult to overcome is in the field of terrorist threat analysis. When estimating the threat associated with naturally occurring events, historical data provides a great deal of insight into the frequency of those events. Threat associated with accidents applies many operations research tools to gauge future failure-rates (Failure Mode and Effects Analysis being perhaps the most widely known). However, estimating the probability of an individual's or group's attacking a specific (or even a generic) target is an element of risk analysis in which art and intuition are applied far …
New Start: The Contentious Road To Ratification, Elizabeth Zolotukhina
New Start: The Contentious Road To Ratification, Elizabeth Zolotukhina
Journal of Strategic Security
Senate ratification of the New START treaty re-established effective bilateral inspection and monitoring of American and Russian nuclear holdings and has the potential to further enhance U.S.-Russian cooperation on key issues, including containing the Iranian nuclear program, and further reductions in the two countries' arsenals. Although the accord was widely heralded as a foreign policy success of the Obama administration, the contentious Senate ratification may impede future progress on arms control.