Open Access. Powered by Scholars. Published by Universities.®

National Security Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Portfolio and Security Analysis

Counterterrorism

Publication Year

Articles 1 - 15 of 15

Full-Text Articles in National Security Law

Policy Intervention In Fata: Why Discourse Matters, Nazya Fiaz Dr. Apr 2012

Policy Intervention In Fata: Why Discourse Matters, Nazya Fiaz Dr.

Journal of Strategic Security

Despite years of wide-scale counterterrorism measures in Pakistan's FATA (Federally Administered Tribal Areas), the injection of substantial funds, and the "close" collaboration between the United States and Pakistan, the ugly truth is that the extremism and militancy in FATA continues to recruit members. Moreover, there is little indication that the killing of Usama bin Ladin will have any significant effect on reducing support for militancy. While taking stock of these realities, this article will not seek to rehash the many successes and failures of the counterterrorist operations in FATA. Instead, its purpose will be to argue that while the causes …


Deterring And Dissuading Nuclear Terrorism, John J. Klein Apr 2012

Deterring And Dissuading Nuclear Terrorism, John J. Klein

Journal of Strategic Security

While nuclear deterrence theory may be well-suited to dealing with nuclear-armed states, its suitability for deterring nuclear terrorism has frequently been questioned since 9/11. While terrorist organizations do not necessarily act uniformly or according to the same underlying beliefs, many of the most aggressive organizations are motivated by an ideology that embraces martyrdom and an apocalyptic vision.1 This ideology may be based on religion or a desire to overthrow a government. Consequently, terrorists motivated by ideology who intend to use a stolen or improvised nuclear device against the United States or its interests may not care about the resulting military …


A Systems-Based Approach To Intelligence Reform, Austen Givens Apr 2012

A Systems-Based Approach To Intelligence Reform, Austen Givens

Journal of Strategic Security

The terrorist attacks of September 11, 2001 prompted the most comprehensive changes to the U.S. Intelligence Community (IC) since its creation via the National Security Act of 1947. Recent structural and organizational reforms, such as efforts to enhance information sharing and recruit speakers of hard-target languages, have also triggered new challenges to successful transformation. In light of the systemic problems facing the IC, this paper argues that systems engineering, a discipline increasingly useful in organizational change, offers a more efficient, holistic approach to the intelligence reform process than the status quo. Systems engineering views the IC as an integrated and …


Extraordinary Rendition And U.S. Counterterrorism Policy, Mark J. Murray Sep 2011

Extraordinary Rendition And U.S. Counterterrorism Policy, Mark J. Murray

Journal of Strategic Security

This article examines the United States Government policy of extraordinary rendition as a response to terrorism. The paper provides a working definition of the term, outlines why it has become controversial, and uses case studies to examine success and failures of extraordinary rendition in practice. The paper concludes with lessons learned—more specifically, policy amendments—that are necessary to keep extraordinary rendition as a viable tool for the Obama Administration and mitigate political fallout against the United States from both its allies and enemies. This paper argues that extraordinary rendition provides flexibility to policymakers to detain terrorists in cases where an attack …


"The Dynamics Of Terror And Creation Of Homegrown Terrorists," Richard J. Hughbank, Ed. Et Al., (Mustang, Ok: Tate Publishing And Enterprises, 2010), Jennifer Jefferis Jul 2011

"The Dynamics Of Terror And Creation Of Homegrown Terrorists," Richard J. Hughbank, Ed. Et Al., (Mustang, Ok: Tate Publishing And Enterprises, 2010), Jennifer Jefferis

Journal of Strategic Security

No abstract provided.


Four Lessons From The Study Of Fundamentalism And Psychology Of Religion, Sara Savage Jan 2011

Four Lessons From The Study Of Fundamentalism And Psychology Of Religion, Sara Savage

Journal of Strategic Security

What lessons can the study of fundamentalism and the psychology of religion teach the newer field of Radicalization and Involvement in Violent Extremism (RIVE)? Four lessons and an intervention are offered in this article: (1) Religion is a robust human experience and cultural product that adopts a defensive shape when its worldview is threatened. (2) This does not mean that all "fundamentalisms" or radical versions of religion are somehow linked or perform similar functions; rather, they reflect the limited human repertoire to threat, yet within different cultural and historical contexts. (3) Causal explanations on the level of the individual are …


Radicalization Into Violent Extremism I: A Review Of Social Science Theories, Randy Borum Jan 2011

Radicalization Into Violent Extremism I: A Review Of Social Science Theories, Randy Borum

Journal of Strategic Security

In discourse about countering terrorism, the term "radicalization" is widely used, but remains poorly defined. To focus narrowly on ideological radicalization risks implying that radical beliefs are a proxy—or at least a necessary precursor—for terrorism, though we know this not to be true.Different pathways and mechanisms of terrorism involvement operate in different ways for different people at different points in time and perhaps in different contexts. This article explores the problems in defining radicalization and radicalism, and suggests that radicalization—and more specifically, involvement in terrorism—might best be viewed as a set of diverse processes. It goes on to review several …


Radical Islamism And Migrant Integration In Denmark: An Empirical Inquiry, Marco Goli, Shahamak Rezaei Jan 2011

Radical Islamism And Migrant Integration In Denmark: An Empirical Inquiry, Marco Goli, Shahamak Rezaei

Journal of Strategic Security

It has been suggested that alienation and failed integration may be causes of "Homegrown Radical Islamism" in Western societies. Western countries often expect that migrants and their descendants residing there as citizens will embrace or support common democratic ideals as a predicate for—or consequence of—their societal integration. Conventional wisdom suggests: "The more you associate yourself with the cherished and established goals and means, the more you will disassociate yourself from Radical Islamism," and vice versa. We believe that, quite surprisingly, an empirical test of this idea is lacking. Based on a nationally representative sample of 1,113 youth (ages 15–30) in …


Radicalization Into Violent Extremism Ii: A Review Of Conceptual Models And Empirical Research, Randy Borum Jan 2011

Radicalization Into Violent Extremism Ii: A Review Of Conceptual Models And Empirical Research, Randy Borum

Journal of Strategic Security

Over the past decade, analysts have proposed several frameworks to explain the process of radicalization into violent extremism (RVE). These frameworks are based primarily on rational, conceptual models which are neither guided by theory nor derived from systematic research. This article reviews recent (post-9/11) conceptual models of the radicalization process and recent (post-9/11) empirical studies of RVE. It emphasizes the importance of distinguishing between ideological radicalization and terrorism involvement, though both issues deserve further empirical inquiry.Finally, it summarizes some recent RVE-related research efforts, identifies seven things that social science researchers and operational personnel still need to know about violent radicalization, …


Disarming Youth Combatants: Mitigating Youth Radicalization And Violent Extremism, Alpaslan Özerdem, Sukanya Podder Jan 2011

Disarming Youth Combatants: Mitigating Youth Radicalization And Violent Extremism, Alpaslan Özerdem, Sukanya Podder

Journal of Strategic Security

In the complex of motivating variables that define the push and pull factors behind recruitment and participation in civil conflict, "radicalization"—or "violent extremism"—is not conceived as a very strong motive, as is the case with studies on terrorism. As part of disarming youth combatants,the linkages between reintegration outcomes and possible rerecruitment into radical and extremist violence must be better understood to mitigate such risks. In our analysis, the policies guiding reintegration of child soldiers and youth should be better attuned to the relationship between recruitment motivations and reintegration outcomes, and must be approached from a political lens rather than a …


Gangs, Terrorism, And Radicalization, Scott Decker, David Pyrooz Jan 2011

Gangs, Terrorism, And Radicalization, Scott Decker, David Pyrooz

Journal of Strategic Security

What can street gangs tell us about radicalization and extremist groups? At first glance, these two groups seem to push the boundaries of comparison. In this article, we examine the important similarities and differences across criminal, deviant, and extremist groups. Drawing from research on street gangs, this article explores issues such as levels of explanation,organizational structure, group process, and the increasingly important role of technology and the Internet in the context of radicalization. There are points of convergence across these groups, but it is important to understand the differences between these groups. This review finds little evidence to support the …


U.S. Response To Terrorism: A Strategic Analysis Of The Afghanistan Campaign, Valentina Taddeo May 2010

U.S. Response To Terrorism: A Strategic Analysis Of The Afghanistan Campaign, Valentina Taddeo

Journal of Strategic Security

This article examines the U.S. response to global terrorism and its campaign in Afghanistan from 2001 to today. The aim of this article is first to understand the fallacies, missteps, and misunderstandings of the U.S. approach in Afghanistan. Second, the analysis evaluates the lessons learnt and some possible strategies for achieving long-term stability and security in Afghanistan. In particular, the analysis focuses on the different strategies adopted by the United States and their achievements. Despite a first victory over the Taliban regime, the initial approach was focused on the enemy only and it lacked long-term planning, paving the way to …


Extinguishing The Torch Of Terror: The Threat Of Terrorism And The 2010 Olympics, Serge E. Vidalis Nov 2009

Extinguishing The Torch Of Terror: The Threat Of Terrorism And The 2010 Olympics, Serge E. Vidalis

Journal of Strategic Security

With the change in seasons comes the expected change of insurgency operations in Afghanistan as Taliban and al-Qaida fighters mount their spring and summer offensives against both NATO forces and Afghanis sympathetic to foreign troops. As insurgents curtail their seasonal operations with the arrival of fall and winter, is it likely that a threat may arise from Afghanistan to affect the 2010 Olympics in Vancouver, British Columbia? As will be illustrated herein, the threat to the games will not be borne directly from the insurgency in Afghanistan but rather by the universal jihadist ideology of al-Qaida rather than the nationalist …


What Price Security?, Donald C. Masters Sep 2009

What Price Security?, Donald C. Masters

Journal of Strategic Security

This article presents a critique of the Copenhagen Consensus Center's(CCC) exhaustive study on transnational terrorism, published in 2008.The implications of this study are controversial, yet highly relevant in today's economic environment. The Obama administration must come toterms with fiscal realities that will challenge budget priorities and invigorate what will undoubtedly prove to be tough negotiations on Capitol Hill for homeland security dollars. It is proposed here that standard economic tools such as benefit cost analysis, cost effectiveness criteria, and simulation models can help identify areas where security can be either extended or improved using fewer resources. Greater movement towards competitive …


Targeted Killing: Self-Defense, Preemption, And The War On Terrorism, Thomas Byron Hunter May 2009

Targeted Killing: Self-Defense, Preemption, And The War On Terrorism, Thomas Byron Hunter

Journal of Strategic Security

This paper assesses the parameters and utility of “targeted killing” in combating terrorism and its role within the norm of state self-defense in the international community. The author’s thesis is that, while targeted killing provides states with a method of combating terrorism, and while it is “effective” on a number of levels, it is inherently limited and not a panacea. The adoption and execution of such a program brings with it, among other potential pitfalls, political repercussions. Targeted killing is defined herein as the premeditated, preemptive, and intentional killing of an individual or individuals known or believed to represent a …