Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 12 of 12

Full-Text Articles in Entire DC Network

Counterterrorism Law And Policy In The United Kingdom, Canada, And Australia: A Comparative Perspective, Nadav Morag Jul 2023

Counterterrorism Law And Policy In The United Kingdom, Canada, And Australia: A Comparative Perspective, Nadav Morag

Journal of Strategic Security

This article looks at the similarities and differences in British, Canadian, and Australian counterterrorism laws and policies. Canada and Australia are contrasted with the United Kingdom because their respective approaches to counterterrorism are based on the British approach, and yet have evolved to take into account differences in the nature and scope of the threat and the differing styles of governance in place in Canada and Australia. The article looks at each country in the context of: counterterrorism laws; detention and disruption practices; investigatory approaches; intelligence and law enforcement institutions; and the treatment of foreign fighters. The article then draws …


Promoting Cognitive Complexity Among Yezidi Youth Impacted By Isis In Kurdistan, Iraq, Sara Savage, Jessica Francar, Kristin Perry Jan 2023

Promoting Cognitive Complexity Among Yezidi Youth Impacted By Isis In Kurdistan, Iraq, Sara Savage, Jessica Francar, Kristin Perry

Journal of Strategic Security

This article reports on the results of an intervention to promote the reintegration of Yezidi children and youth in the Kurdistan Region of Iraq, who had been in ISIS captivity or were displaced by ISIS, by increasing their cognitive complexity through experiential learning. The article explores the challenges faced by this demographic, including trauma and exclusion. It looks at the impact of a group-based curriculum designed to increase cognitive complexity (measured by integrative complexity), and discusses how the intervention addressed socio-cognitive needs in order to support reintegration. The intervention was piloted with young people associated with ISIS and those displaced …


Challenges In Mali, The Importance Of Legitimate Governance In Combatting Terrorism And Violent Extremism, Gerald Krieger Oct 2022

Challenges In Mali, The Importance Of Legitimate Governance In Combatting Terrorism And Violent Extremism, Gerald Krieger

Journal of Strategic Security

The Greater Sahel is one of the world’s most troubled regions. Within the region, Mali is the regional lynchpin and has been the focus of French efforts to eradicate terrorist groups. The essay seeks to answer the question, “Why has violence increased and terrorist cells continued to thrive in Mali despite international efforts?” Although the issue is more complicated and nuanced, corruption and poor governance are significant factors in increased violence. Local leaders focus on militarization and violent suppression to maintain control over larger cities while neglecting rural communities. These actions undermine the government’s legitimacy, exacerbated by rampant corruption. Secondary …


Networks Of Threats: Interconnection, Interaction, Intermediation, Julien Theron Oct 2021

Networks Of Threats: Interconnection, Interaction, Intermediation, Julien Theron

Journal of Strategic Security

The rapidly changing global security environment requires to constantly adapt our understanding of threats. The findings of this paper confirm that threats interact with each other on three levels. Security, conflict, war, and strategic studies converge to build a new qualitative theoretical framework for threat analysis. Shaping the global security environment, threats communicate on three levels. Firstly, the interconnection of agents with similar ideological and/or strategic motivations connects threats. Secondly, interaction exacerbates incidental threats through cooperation, competition, and convergence. Thirdly, intermediation occurs between antagonistic threats trying to achieve common intermediary objectives. These networks are driven by agents maximizing their impact …


Continuity And Change In The Operational Dynamics Of The Islamic State, James L. Regens, Nick Mould Apr 2017

Continuity And Change In The Operational Dynamics Of The Islamic State, James L. Regens, Nick Mould

Journal of Strategic Security

In this article we estimate the influence of leadership changes on the operational dynamics associated with terrorist attacks conducted by the Islamic State and its predecessors. Because the focus of our research is empirical, the study uses data for 2,131 successful attacks between October 2002 and December 2014 to examine differentials in operational tempo, attack severity, primary tactics employed, and principal targets. The data are aggregated on a monthly basis to estimate the probabilities associated with specific attack sequences in terms of the following primary tactics: (1) firearms, (2) explosives, (3) hostage-taking/kidnapping, and (4) attacks involving combinations of (1), (2), …


Drugs & Thugs: Funding Terrorism Through Narcotics Trafficking, Colin P. Clarke Oct 2016

Drugs & Thugs: Funding Terrorism Through Narcotics Trafficking, Colin P. Clarke

Journal of Strategic Security

To date, much of the literature on the financing of terrorism and insurgency has focused at the macro-level on groups involved in financing their organizations through involvement in the drug trade. This paper discusses some of those implications, but argues that to better understand the threat faced by the new generation of jihadists in the West, security forces and intelligence services must also look at the micro-level of how lower level trafficking, drug dealing and petty criminal activity, combined with prison radicalization and ties to the black market and illicit underworld, combine to present a new spin on a longstanding …


Britain’S Approach To Balancing Counter-Terrorism Laws With Human Rights, Christian A. Honeywood Oct 2016

Britain’S Approach To Balancing Counter-Terrorism Laws With Human Rights, Christian A. Honeywood

Journal of Strategic Security

This paper examines the UK's approach to balancing counter-terror laws with human rights and civil liberties after 9/11. Since then, a litany of legislation has been passed that some human rights commentators have labeled as overzealous and draconian. Because of the glut of counter-terror laws instituted, only a fraction of the provisions contained within them will be reviewed including, indefinite detentions, stop and search rights, passport seizures, and Temporary Exclusion Orders. The potential for government abuse of far-reaching legislation is also highlighted through a case study of Miranda v. the Secretary of State for the Home Department and others. …


Thieves Of State: Why Corruption Threatens Global Security. By Sarah Chayes. New York: W.W. Norton & Company, 2015., Benjamin Dille Jul 2016

Thieves Of State: Why Corruption Threatens Global Security. By Sarah Chayes. New York: W.W. Norton & Company, 2015., Benjamin Dille

Journal of Strategic Security

No abstract provided.


Intelligence Sesquicentennial: Testament Of Bleeding War, David M. Keithly Oct 2015

Intelligence Sesquicentennial: Testament Of Bleeding War, David M. Keithly

Journal of Strategic Security

No abstract provided.


Understanding Radicalization And Engagement In Terrorism Through Religious Conversion Motifs, Neil Ferguson, Eve Binks Jun 2015

Understanding Radicalization And Engagement In Terrorism Through Religious Conversion Motifs, Neil Ferguson, Eve Binks

Journal of Strategic Security

Although research into the processes and outcomes of radicalization has yielded significant discoveries regarding antecedent risk factors and the role played by societal circumstances and individual variables, research regarding the process of radical conversion remains in its infancy. We believe that the psychology of religion may hold the key to unlocking new insights into this conversion process. As a result of assessing both Lofland and Skonovd’s religious conversion motifs and Rambo’s integrative model of religious conversion, we suggest that issues of culture, society and the individual which are prevalent in first-hand accounts of conversion to terrorism provide crucial insight into …


Michael Collins And The Anglo-Irish War: Britain's Counterinsurgency Failure. By J.B.E. Hittle. Washington, Dc, Potomac Books, 2011., Edward J. Hagerty Jul 2012

Michael Collins And The Anglo-Irish War: Britain's Counterinsurgency Failure. By J.B.E. Hittle. Washington, Dc, Potomac Books, 2011., Edward J. Hagerty

Journal of Strategic Security

No abstract provided.


North Korea And Support To Terrorism: An Evolving History, Bruce E. Bechtol, Jr. May 2010

North Korea And Support To Terrorism: An Evolving History, Bruce E. Bechtol, Jr.

Journal of Strategic Security

The DPRK's (Democratic People's Republic of Korea or North Korea) support for terrorism began as an ideologically-based policy financed by the Soviet Union that eventually led to a policy designed to put money into the coffers of the elite in Pyongyang—in short, a "proliferation for hire" policy. This article articulates a brief history of the North Korean regime, the rise to power of Kim Il-sung and his son, Kim Jong-il, and North Korea's persistent support to terrorist groups around the globe.