Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 6 of 6
Full-Text Articles in Entire DC Network
Extraordinary Rendition And U.S. Counterterrorism Policy, Mark J. Murray
Extraordinary Rendition And U.S. Counterterrorism Policy, Mark J. Murray
Journal of Strategic Security
This article examines the United States Government policy of extraordinary rendition as a response to terrorism. The paper provides a working definition of the term, outlines why it has become controversial, and uses case studies to examine success and failures of extraordinary rendition in practice. The paper concludes with lessons learned—more specifically, policy amendments—that are necessary to keep extraordinary rendition as a viable tool for the Obama Administration and mitigate political fallout against the United States from both its allies and enemies. This paper argues that extraordinary rendition provides flexibility to policymakers to detain terrorists in cases where an attack …
Buy Off And Buy In: Flipping The Farc, Joel K. Day Ii
Buy Off And Buy In: Flipping The Farc, Joel K. Day Ii
Journal of Strategic Security
The election of President Juan Manuel Santos in Columbia marks a new era in Columbian security policy. administration has failed to implementInstead of focusing on a solely military solution to conflict with Revolutionary Armed Forces of Colombia (FARC), as his predecessor did, Santos has committed to a multifaceted effort to resolve the dispute. In spite of this hope, the Santos many critical non-military policy proposals. Like Santos, the scholarly community has ignored important comparative studies of counterterrorism. This essay attempts to fill a gap in the literature by framing a discussion of FARC in light of new advances in counter-insurgency …
Radicalization And The Use Of Social Media, Robin L. Thompson
Radicalization And The Use Of Social Media, Robin L. Thompson
Journal of Strategic Security
The use of social media tools by individuals and organizations to radicalize individuals for political and social change has become increasingly popular as the Internet penetrates more of the world and mobile computing devices are more accessible. To establish a construct for radicalization,the power and reach of social media will be described so there is common understanding of what social media is and how it is utilized by various individuals and groups. The second section will answer the question of why social media applications are the perfect platform for the radical voice. Finally, the use of social media and its …
Radicalization Into Violent Extremism Ii: A Review Of Conceptual Models And Empirical Research, Randy Borum
Radicalization Into Violent Extremism Ii: A Review Of Conceptual Models And Empirical Research, Randy Borum
Journal of Strategic Security
Over the past decade, analysts have proposed several frameworks to explain the process of radicalization into violent extremism (RVE). These frameworks are based primarily on rational, conceptual models which are neither guided by theory nor derived from systematic research. This article reviews recent (post-9/11) conceptual models of the radicalization process and recent (post-9/11) empirical studies of RVE. It emphasizes the importance of distinguishing between ideological radicalization and terrorism involvement, though both issues deserve further empirical inquiry.Finally, it summarizes some recent RVE-related research efforts, identifies seven things that social science researchers and operational personnel still need to know about violent radicalization, …
Friction: How Radicalization Happens To Them And Us. By Clark Mccauley And Sophia Moskalenko (New York: Oxford University Press, 2011), Robin L. Thompson
Friction: How Radicalization Happens To Them And Us. By Clark Mccauley And Sophia Moskalenko (New York: Oxford University Press, 2011), Robin L. Thompson
Journal of Strategic Security
No abstract provided.
Radicalization Into Violent Extremism I: A Review Of Social Science Theories, Randy Borum
Radicalization Into Violent Extremism I: A Review Of Social Science Theories, Randy Borum
Journal of Strategic Security
In discourse about countering terrorism, the term "radicalization" is widely used, but remains poorly defined. To focus narrowly on ideological radicalization risks implying that radical beliefs are a proxy—or at least a necessary precursor—for terrorism, though we know this not to be true.Different pathways and mechanisms of terrorism involvement operate in different ways for different people at different points in time and perhaps in different contexts. This article explores the problems in defining radicalization and radicalism, and suggests that radicalization—and more specifically, involvement in terrorism—might best be viewed as a set of diverse processes. It goes on to review several …