Open Access. Powered by Scholars. Published by Universities.®
- Discipline
- Keyword
-
- Terrorism / counterterrorism (5)
- Radicalization (4)
- Violent extremism (4)
- Armed groups (3)
- Governance and rule of law (3)
-
- Civil war and internal conflict (2)
- Conflict studies (2)
- Counterintelligence (2)
- Counterterrorism (2)
- Foreign policy (2)
- Gangs and criminal organizations (2)
- History (2)
- Identity (2)
- Intelligence analysis (2)
- Iraq (2)
- Irregular warfare (2)
- Middle East (2)
- Psychology (2)
- Russia (2)
- Security studies (2)
- Stability operations (2)
- Transnational crime (2)
- Afghanistan (1)
- Africa (1)
- Al-Qaida (1)
- Asymmetric warfare (1)
- Civil affairs (1)
- Complex emergencies (1)
- Complex operations (1)
- Corruption (1)
Articles 1 - 12 of 12
Full-Text Articles in Entire DC Network
Counterterrorism Law And Policy In The United Kingdom, Canada, And Australia: A Comparative Perspective, Nadav Morag
Counterterrorism Law And Policy In The United Kingdom, Canada, And Australia: A Comparative Perspective, Nadav Morag
Journal of Strategic Security
This article looks at the similarities and differences in British, Canadian, and Australian counterterrorism laws and policies. Canada and Australia are contrasted with the United Kingdom because their respective approaches to counterterrorism are based on the British approach, and yet have evolved to take into account differences in the nature and scope of the threat and the differing styles of governance in place in Canada and Australia. The article looks at each country in the context of: counterterrorism laws; detention and disruption practices; investigatory approaches; intelligence and law enforcement institutions; and the treatment of foreign fighters. The article then draws …
Promoting Cognitive Complexity Among Yezidi Youth Impacted By Isis In Kurdistan, Iraq, Sara Savage, Jessica Francar, Kristin Perry
Promoting Cognitive Complexity Among Yezidi Youth Impacted By Isis In Kurdistan, Iraq, Sara Savage, Jessica Francar, Kristin Perry
Journal of Strategic Security
This article reports on the results of an intervention to promote the reintegration of Yezidi children and youth in the Kurdistan Region of Iraq, who had been in ISIS captivity or were displaced by ISIS, by increasing their cognitive complexity through experiential learning. The article explores the challenges faced by this demographic, including trauma and exclusion. It looks at the impact of a group-based curriculum designed to increase cognitive complexity (measured by integrative complexity), and discusses how the intervention addressed socio-cognitive needs in order to support reintegration. The intervention was piloted with young people associated with ISIS and those displaced …
Challenges In Mali, The Importance Of Legitimate Governance In Combatting Terrorism And Violent Extremism, Gerald Krieger
Challenges In Mali, The Importance Of Legitimate Governance In Combatting Terrorism And Violent Extremism, Gerald Krieger
Journal of Strategic Security
The Greater Sahel is one of the world’s most troubled regions. Within the region, Mali is the regional lynchpin and has been the focus of French efforts to eradicate terrorist groups. The essay seeks to answer the question, “Why has violence increased and terrorist cells continued to thrive in Mali despite international efforts?” Although the issue is more complicated and nuanced, corruption and poor governance are significant factors in increased violence. Local leaders focus on militarization and violent suppression to maintain control over larger cities while neglecting rural communities. These actions undermine the government’s legitimacy, exacerbated by rampant corruption. Secondary …
Networks Of Threats: Interconnection, Interaction, Intermediation, Julien Theron
Networks Of Threats: Interconnection, Interaction, Intermediation, Julien Theron
Journal of Strategic Security
The rapidly changing global security environment requires to constantly adapt our understanding of threats. The findings of this paper confirm that threats interact with each other on three levels. Security, conflict, war, and strategic studies converge to build a new qualitative theoretical framework for threat analysis. Shaping the global security environment, threats communicate on three levels. Firstly, the interconnection of agents with similar ideological and/or strategic motivations connects threats. Secondly, interaction exacerbates incidental threats through cooperation, competition, and convergence. Thirdly, intermediation occurs between antagonistic threats trying to achieve common intermediary objectives. These networks are driven by agents maximizing their impact …
Continuity And Change In The Operational Dynamics Of The Islamic State, James L. Regens, Nick Mould
Continuity And Change In The Operational Dynamics Of The Islamic State, James L. Regens, Nick Mould
Journal of Strategic Security
In this article we estimate the influence of leadership changes on the operational dynamics associated with terrorist attacks conducted by the Islamic State and its predecessors. Because the focus of our research is empirical, the study uses data for 2,131 successful attacks between October 2002 and December 2014 to examine differentials in operational tempo, attack severity, primary tactics employed, and principal targets. The data are aggregated on a monthly basis to estimate the probabilities associated with specific attack sequences in terms of the following primary tactics: (1) firearms, (2) explosives, (3) hostage-taking/kidnapping, and (4) attacks involving combinations of (1), (2), …
Drugs & Thugs: Funding Terrorism Through Narcotics Trafficking, Colin P. Clarke
Drugs & Thugs: Funding Terrorism Through Narcotics Trafficking, Colin P. Clarke
Journal of Strategic Security
To date, much of the literature on the financing of terrorism and insurgency has focused at the macro-level on groups involved in financing their organizations through involvement in the drug trade. This paper discusses some of those implications, but argues that to better understand the threat faced by the new generation of jihadists in the West, security forces and intelligence services must also look at the micro-level of how lower level trafficking, drug dealing and petty criminal activity, combined with prison radicalization and ties to the black market and illicit underworld, combine to present a new spin on a longstanding …
Britain’S Approach To Balancing Counter-Terrorism Laws With Human Rights, Christian A. Honeywood
Britain’S Approach To Balancing Counter-Terrorism Laws With Human Rights, Christian A. Honeywood
Journal of Strategic Security
This paper examines the UK's approach to balancing counter-terror laws with human rights and civil liberties after 9/11. Since then, a litany of legislation has been passed that some human rights commentators have labeled as overzealous and draconian. Because of the glut of counter-terror laws instituted, only a fraction of the provisions contained within them will be reviewed including, indefinite detentions, stop and search rights, passport seizures, and Temporary Exclusion Orders. The potential for government abuse of far-reaching legislation is also highlighted through a case study of Miranda v. the Secretary of State for the Home Department and others. …
Thieves Of State: Why Corruption Threatens Global Security. By Sarah Chayes. New York: W.W. Norton & Company, 2015., Benjamin Dille
Thieves Of State: Why Corruption Threatens Global Security. By Sarah Chayes. New York: W.W. Norton & Company, 2015., Benjamin Dille
Journal of Strategic Security
No abstract provided.
Intelligence Sesquicentennial: Testament Of Bleeding War, David M. Keithly
Intelligence Sesquicentennial: Testament Of Bleeding War, David M. Keithly
Journal of Strategic Security
No abstract provided.
Understanding Radicalization And Engagement In Terrorism Through Religious Conversion Motifs, Neil Ferguson, Eve Binks
Understanding Radicalization And Engagement In Terrorism Through Religious Conversion Motifs, Neil Ferguson, Eve Binks
Journal of Strategic Security
Although research into the processes and outcomes of radicalization has yielded significant discoveries regarding antecedent risk factors and the role played by societal circumstances and individual variables, research regarding the process of radical conversion remains in its infancy. We believe that the psychology of religion may hold the key to unlocking new insights into this conversion process. As a result of assessing both Lofland and Skonovd’s religious conversion motifs and Rambo’s integrative model of religious conversion, we suggest that issues of culture, society and the individual which are prevalent in first-hand accounts of conversion to terrorism provide crucial insight into …
Michael Collins And The Anglo-Irish War: Britain's Counterinsurgency Failure. By J.B.E. Hittle. Washington, Dc, Potomac Books, 2011., Edward J. Hagerty
Michael Collins And The Anglo-Irish War: Britain's Counterinsurgency Failure. By J.B.E. Hittle. Washington, Dc, Potomac Books, 2011., Edward J. Hagerty
Journal of Strategic Security
No abstract provided.
North Korea And Support To Terrorism: An Evolving History, Bruce E. Bechtol, Jr.
North Korea And Support To Terrorism: An Evolving History, Bruce E. Bechtol, Jr.
Journal of Strategic Security
The DPRK's (Democratic People's Republic of Korea or North Korea) support for terrorism began as an ideologically-based policy financed by the Soviet Union that eventually led to a policy designed to put money into the coffers of the elite in Pyongyang—in short, a "proliferation for hire" policy. This article articulates a brief history of the North Korean regime, the rise to power of Kim Il-sung and his son, Kim Jong-il, and North Korea's persistent support to terrorist groups around the globe.