Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Law (20)
- National Security Law (19)
- Business (16)
- Portfolio and Security Analysis (15)
- Peace and Conflict Studies (7)
-
- Terrorism Studies (7)
- Arts and Humanities (6)
- Political Science (6)
- International Relations (5)
- Military, War, and Peace (5)
- History (4)
- Military History (4)
- Military and Veterans Studies (4)
- Psychology (4)
- Sociology (4)
- Communication (3)
- Criminology and Criminal Justice (3)
- Legal Studies (3)
- Public Affairs (3)
- Social Psychology (3)
- American Politics (2)
- Criminology (2)
- Ethics and Political Philosophy (2)
- International and Area Studies (2)
- Other Political Science (2)
- Philosophy (2)
- Policy Design, Analysis, and Evaluation (2)
- Institution
-
- University of South Florida (17)
- US Army War College (4)
- Embry-Riddle Aeronautical University (2)
- Liberty University (2)
- Missouri State University (2)
-
- City University of New York (CUNY) (1)
- Claremont Colleges (1)
- Columbus State University (1)
- Dominican University of California (1)
- Georgia Southern University (1)
- Nova Southeastern University (1)
- Sacred Heart University (1)
- San Jose State University (1)
- Selected Works (1)
- SelectedWorks (1)
- University of Central Florida (1)
- Publication Year
- Publication
-
- Journal of Strategic Security (17)
- The US Army War College Quarterly: Parameters (3)
- MSU Graduate Theses (2)
- Brian J. Gibbs (1)
- CMC Senior Theses (1)
-
- Criminal Justice Faculty Publications (1)
- Department of Conflict Resolution Studies Theses and Dissertations (1)
- Dissertations, Theses, and Capstone Projects (1)
- Electronic Theses and Dissertations (1)
- Faculty Publications and Presentations (1)
- George Dimitriu (1)
- Honors Undergraduate Theses (1)
- International Bulletin of Political Psychology (1)
- Parameters Bookshelf – Online Book Reviews (1)
- Political Science & International Studies | Senior Theses (1)
- Publications (1)
- Secrecy and Society (1)
- Senior Honors Theses (1)
- Servant Leadership: Theory & Practice (1)
- Publication Type
Articles 1 - 30 of 38
Full-Text Articles in Defense and Security Studies
Book Review: The Islamic State In Afghanistan And Pakistan: Strategic Alliances And Rivalries, Thomas F. Lynch Iii
Book Review: The Islamic State In Afghanistan And Pakistan: Strategic Alliances And Rivalries, Thomas F. Lynch Iii
Parameters Bookshelf – Online Book Reviews
Authors: Amira Jadoon with Andrew Mines
Reviewed by Thomas F. Lynch III, PhD, Distinguished Research Fellow, Institute of National Strategic Studies, National Defense University
Dr. Thomas F. Lynch III offers his expertise in a thoughtful review of this "essential primer" on the Islamic-State Khorasan Province (ISK). While finding the book's idea that the ISK is currently a "latent, global terrorist threat" to be "less persuasive," Lynch highlights the value of author Amira Jadoon's unique ability "to write with an appropriate level of depth about the complexity of tribal groups, subgroups, fragments, and splinters" and notes that "There is no other …
Servant Leadership And Violent Extremism: An Evaluative Framework, Eric J. Russell, Ardian Shajkovci
Servant Leadership And Violent Extremism: An Evaluative Framework, Eric J. Russell, Ardian Shajkovci
Servant Leadership: Theory & Practice
The following article presents a conceptual servant leadership framework for evaluating preventing violent extremism (PVE) policies and programs. The purpose of the work was to discover how servant leadership could strengthen existing PVE evaluative strategies. This article stems from work being done in servant leadership, counterterrorism, and countering violent extremism at Nichols College and Utah Valley University. The authors used a secondary analysis of empirical and literary servant leadership and PVE works to develop the framework. The analysis revealed a relationship between servant leadership’s commitment to the growth of people and building community and the need for PVE to be …
A Conceptual Frame For Us Counterterrorism Policy: Examining The Effectiveness Against Al Qaeda And Its Associates Prior To 9/11, "Tod" Thomas Patrick Brown
A Conceptual Frame For Us Counterterrorism Policy: Examining The Effectiveness Against Al Qaeda And Its Associates Prior To 9/11, "Tod" Thomas Patrick Brown
Publications
The United States (US) has been engaged in a “war on terrorism” to “defeat” al Qaeda since 2001. This study presented and tested an over-arching conceptual framework for US Counterterrorism (CT) policy. The conceptual frame was tested using qualitative thematic analysis of archival records from the Reagan through Clinton era. The research also used a case study of al Qaeda as the context to bound the selected records for the study. This new conceptual frame was used to evaluate the success, failure, and effects of US CT policy activities related to al Qaeda, using the records identified for the study. …
Asymmetric Threats: Analyzing The Future Of Nuclear Terrorism & Cyber Attacks; The Value Of Deterrence Theory For Addressing The Challenges Of Nuclear Terrorism In The Age Of 21st Century Cybersecurity, Oliver Demmert-Shelfo
Asymmetric Threats: Analyzing The Future Of Nuclear Terrorism & Cyber Attacks; The Value Of Deterrence Theory For Addressing The Challenges Of Nuclear Terrorism In The Age Of 21st Century Cybersecurity, Oliver Demmert-Shelfo
Political Science & International Studies | Senior Theses
Given the rapid development and ease of access to technology, the threat of extremist organizations utilizing cyberspace as a means to target critical American strategic infrastructure is of increasing concern. The risk posed by the acquisition of fissile material, sabotage, or use of a nuclear device by an extremist organization has been exasperated due to technological development outpacing strategy. Despite policy-makers’ attempts to protect the public from cyber-attacks and nuclear terrorism, the federal policies in place have failed to account for the continual evolution of technology and the gaps in security that this advancement brings. Through examining documents from congressional …
A Relentless War: America, Israel, And The Fight Against Terrorism, Elyse Keener
A Relentless War: America, Israel, And The Fight Against Terrorism, Elyse Keener
Senior Honors Theses
For Israel, terrorism has plagued the nation since its beginning. Terrorism rears its ugly head in a variety of ways and for a variety of reasons; however, in both the United States and Israel, Islamic extremism has presented itself as the largest threat. Since its birth as a nation, the United States has been involved in numerous conflicts, from the Revolutionary War to World War II and beyond. These wars were fought between nation-states and traditional powers, but since the attacks on 9/11, the United States finds itself in a new kind of conflict against a different kind of enemy. …
Terrorism In The 2020s: Examining The Global Threat Landscape, Landon W. Swearngin
Terrorism In The 2020s: Examining The Global Threat Landscape, Landon W. Swearngin
MSU Graduate Theses
This thesis uses quantitative and qualitative research methods to (1) explore the global trends and trajectories of terrorism, (2) identify emerging strategic challenges, and (3) outline an opportunity analysis for U.S. counterterrorism strategy. Collectively, this project provides a strategic forecast for terrorism in the 2020s, demonstrating that terrorism is becoming increasingly dangerous, dynamic, and difficult to defeat.
The Convergence Of The War On Terror And The War On Drugs: A Counter-Narcoterrorism Approach As A Policy Response, Lindsay Burton
The Convergence Of The War On Terror And The War On Drugs: A Counter-Narcoterrorism Approach As A Policy Response, Lindsay Burton
CMC Senior Theses
This thesis investigates how and why U.S. policies and agencies are ill-equipped to respond to narco-terrorism and offers some policy recommendations for remedying that. Narco-terrorism is the merging of terrorism and drug trafficking. Terrorist organizations and narcotics traffickers each have much to offer the other; there is potential for symbiosis in the form of cooperation and even hybridization. Examination of the dynamics between terrorist organizations and drug traffickers, combined with an evaluation of the US responses to narcoterrorism in Colombia and Afghanistan, makes it clear that current US policy responses fail to recognize narcoterrorism as a unique challenge, and instead …
Ethnographic Research In The U.S. Intelligence Community: Opportunities And Challenges, Bridget Nolan
Ethnographic Research In The U.S. Intelligence Community: Opportunities And Challenges, Bridget Nolan
Secrecy and Society
This article considers lessons learned from conducting research inside the intelligence community. Drawing on a year of ethnographic field work and interviews at the National Counterterrorism Center, I show that “boundary personnel”- people who navigate between the worlds of academia and national security - provide value added in the form of tacit knowledge that outside researchers would not be able to deliver. At the same time, these people face delays, challenges to freedom of information, and ethical considerations that are unique to their positions. Despite setbacks, social scientists must continue their engagement with national security organizations to further our understanding …
Deterrence & Security Assistance: The South China Sea, Tommy Ross
Deterrence & Security Assistance: The South China Sea, Tommy Ross
The US Army War College Quarterly: Parameters
This article identifies how the United States can apply security assistance to support regional security in the South China Sea in order to counter China’s assertive expansion strategy.
Selling National Security: Journalism, Political Actors, And The Marketing Of Counterterrorism Policy, Nicole M. Napolitano
Selling National Security: Journalism, Political Actors, And The Marketing Of Counterterrorism Policy, Nicole M. Napolitano
Dissertations, Theses, and Capstone Projects
The social construction of terrorism in the public sphere naturally limits and directs logical policy options. In the United States, media are a primary vehicle for the construction of social problems and accompanying policy solutions, as much of public discourse takes place in media narratives. News media play a major part in political communication, both between government and governed as well as among different segments of government.
Social construction in media is shaped by journalistic values and preferences, occurs within an active and influential policy process, and is shaped by powerful policy actors. Government-based policy actors, or governmental policy entrepreneurs, …
Disrupt, Deny, Dismantle: A Special Operations Forces (Sof) Model For Combatting New Terrorism, Will Gunzelman
Disrupt, Deny, Dismantle: A Special Operations Forces (Sof) Model For Combatting New Terrorism, Will Gunzelman
Faculty Publications and Presentations
Terrorism in the new millennium has morphed drastically since the 1970s. The terrorist organizations of today are a hybrid between the insurgent group models of the 1960s and modern terrorist organizations such as Al Qaeda. This hybrid model has created what has become a transnational insurgency recruited, trained, and led by major terrorist networks such as the Islamic State of Iraq and the Levant (ISIL). Even smaller regional groups such as Boko Haram have surpassed merely conducting terrorist attacks. These smaller groups are also focused on controlling territory. Tan (2008) refers to this change as “New Terrorism”. To combat New …
Case-Specific Counterterrorism Policies For Islamic Fundamentalist Groups, Jessica L. Shoemaker
Case-Specific Counterterrorism Policies For Islamic Fundamentalist Groups, Jessica L. Shoemaker
Honors Undergraduate Theses
Since 9/11, counterterrorism policies have been one of the crucial policy issues facing the United States. After the attacks on the United States, counterterrorism in this country transformed. Fifteen years later, counterterrorism is typically organized as a one-size fits all approach. This approach generalizes all terrorist threats, trying to target terrorism as a whole. This thesis explains how this is an improper approach to counterterrorism. Instead, policies should be case-specific and created in regards to the specific characteristics embodied by each terrorist organization. These characteristics include history and ideology, organizational and leadership structure, finances, and tactics and targets. These characteristics …
Law V. Safety: Balancing Domestic Surveillance's Legal Deficiencies Against The Necessity Of Counterterrorism, Jeremy Kommel-Bernstein
Law V. Safety: Balancing Domestic Surveillance's Legal Deficiencies Against The Necessity Of Counterterrorism, Jeremy Kommel-Bernstein
MSU Graduate Theses
This thesis discusses whether the collection of metadata by the NSA, as revealed in 2013 by Edward Snowden, from domestic sources is legal and/or effective, and how to balance safety and liberty. The topic is both timely and important due to the potential for abuse that comes with domestic intelligence programs, as well as the risk of suffering a terrorist attack on U.S. soil. Research for this thesis included personal interviews with former NSA and CIA Director Michael Hayden, and reviewing numerous court cases, legal documents, and articles and books on the subject. There is significant evidence that the NSA's …
Between Warrior And Helplessness In The Valley Of Azawa - The Struggle Of The Kel Tamashek In The War Of The Sahel, Patrick James Christian
Between Warrior And Helplessness In The Valley Of Azawa - The Struggle Of The Kel Tamashek In The War Of The Sahel, Patrick James Christian
Department of Conflict Resolution Studies Theses and Dissertations
This dissertation is an Investigation into the Tuareg involvement in violent conflict in the Sahara and the Sahel of North Africa from a sociological psychological perspective of unmet human needs. The research begins by establishing the structure and texture of the sociological, psychological, and emotional life patterns of their existence when not involved in violent conflict. This is followed by an examination of the pathology of Tuareg social structures that are engaged in intra and inter communal violence as perpetrators, victims, and bystanders. The first part of the research establishes normal conditions of the sociological life cycle and highlights natural …
Winning Counterterrorism's Version Of Pascal's Wager, But Struggling To Open The Purse, Brian J. Gibbs
Winning Counterterrorism's Version Of Pascal's Wager, But Struggling To Open The Purse, Brian J. Gibbs
Brian J. Gibbs
No abstract provided.
Strategic Landpower And The Arabian Gulf, W. Andrew Terrill
Strategic Landpower And The Arabian Gulf, W. Andrew Terrill
The US Army War College Quarterly: Parameters
No abstract provided.
The "War On Terror," Mortality Salience, And American Prejudice Before And After The 2013 Boston Marathon Bombings, Arthur Hatton
The "War On Terror," Mortality Salience, And American Prejudice Before And After The 2013 Boston Marathon Bombings, Arthur Hatton
Electronic Theses and Dissertations
The United States’ counterterrorism efforts have been framed in various ways in the media and politics, and each framing metaphor varies in its ability to accurately describe counterterrorism (Kruglanski, Crenshaw, Post, & Victoroff, 2007). Each frame also may have effects on the way the public perceives, responds to, and finds acceptable in counterterrorism. One common framing metaphor in American politics is counterterrorism as a “War on Terror.” Terror Management Theory (TMT) predicts that reminding people of mortality has predictable effects on their opinions and behavior. This study seeks to test empirically whether framing counterterrorism as a “War on Terror” acts …
A Systems-Based Approach To Intelligence Reform, Austen Givens
A Systems-Based Approach To Intelligence Reform, Austen Givens
Journal of Strategic Security
The terrorist attacks of September 11, 2001 prompted the most comprehensive changes to the U.S. Intelligence Community (IC) since its creation via the National Security Act of 1947. Recent structural and organizational reforms, such as efforts to enhance information sharing and recruit speakers of hard-target languages, have also triggered new challenges to successful transformation. In light of the systemic problems facing the IC, this paper argues that systems engineering, a discipline increasingly useful in organizational change, offers a more efficient, holistic approach to the intelligence reform process than the status quo. Systems engineering views the IC as an integrated and …
Deterring And Dissuading Nuclear Terrorism, John J. Klein
Deterring And Dissuading Nuclear Terrorism, John J. Klein
Journal of Strategic Security
While nuclear deterrence theory may be well-suited to dealing with nuclear-armed states, its suitability for deterring nuclear terrorism has frequently been questioned since 9/11. While terrorist organizations do not necessarily act uniformly or according to the same underlying beliefs, many of the most aggressive organizations are motivated by an ideology that embraces martyrdom and an apocalyptic vision.1 This ideology may be based on religion or a desire to overthrow a government. Consequently, terrorists motivated by ideology who intend to use a stolen or improvised nuclear device against the United States or its interests may not care about the resulting military …
Policy Intervention In Fata: Why Discourse Matters, Nazya Fiaz Dr.
Policy Intervention In Fata: Why Discourse Matters, Nazya Fiaz Dr.
Journal of Strategic Security
Despite years of wide-scale counterterrorism measures in Pakistan's FATA (Federally Administered Tribal Areas), the injection of substantial funds, and the "close" collaboration between the United States and Pakistan, the ugly truth is that the extremism and militancy in FATA continues to recruit members. Moreover, there is little indication that the killing of Usama bin Ladin will have any significant effect on reducing support for militancy. While taking stock of these realities, this article will not seek to rehash the many successes and failures of the counterterrorist operations in FATA. Instead, its purpose will be to argue that while the causes …
Ondervraging Van Irakese En Afghaanse Insurgents: De Nederlandse Ervaringen, George Dimitriu
Ondervraging Van Irakese En Afghaanse Insurgents: De Nederlandse Ervaringen, George Dimitriu
George Dimitriu
Gedurende de afgelopen jaren is de Nederlandse Krijgsmacht een aantal jaren actief geweest in Irak en Afghanistan waarbij honderden mensen gevangen zijn genomen en zijn ondervraagd. In tegenstelling tot veel andere landen die ook in Irak en Afghanistan actief zijn of waren, zoals de Verenigde Staten, Groot-Brittannië, Spanje en Canada, is Nederland tot op heden gevrijwaard gebleven van een groot martelschandaal of een binnenlandse discussie. Afgezien van een incident in 2006 toen krantenkoppen Nederlanders betichtten van marteling tijdens de missie in Irak, is er maar weinig voorgevallen. Bovendien luwde de ophef over het vermeende martelincident in Irak al snel. Hoe …
Extraordinary Rendition And U.S. Counterterrorism Policy, Mark J. Murray
Extraordinary Rendition And U.S. Counterterrorism Policy, Mark J. Murray
Journal of Strategic Security
This article examines the United States Government policy of extraordinary rendition as a response to terrorism. The paper provides a working definition of the term, outlines why it has become controversial, and uses case studies to examine success and failures of extraordinary rendition in practice. The paper concludes with lessons learned—more specifically, policy amendments—that are necessary to keep extraordinary rendition as a viable tool for the Obama Administration and mitigate political fallout against the United States from both its allies and enemies. This paper argues that extraordinary rendition provides flexibility to policymakers to detain terrorists in cases where an attack …
"The Dynamics Of Terror And Creation Of Homegrown Terrorists," Richard J. Hughbank, Ed. Et Al., (Mustang, Ok: Tate Publishing And Enterprises, 2010), Jennifer Jefferis
"The Dynamics Of Terror And Creation Of Homegrown Terrorists," Richard J. Hughbank, Ed. Et Al., (Mustang, Ok: Tate Publishing And Enterprises, 2010), Jennifer Jefferis
Journal of Strategic Security
No abstract provided.
Four Lessons From The Study Of Fundamentalism And Psychology Of Religion, Sara Savage
Four Lessons From The Study Of Fundamentalism And Psychology Of Religion, Sara Savage
Journal of Strategic Security
What lessons can the study of fundamentalism and the psychology of religion teach the newer field of Radicalization and Involvement in Violent Extremism (RIVE)? Four lessons and an intervention are offered in this article: (1) Religion is a robust human experience and cultural product that adopts a defensive shape when its worldview is threatened. (2) This does not mean that all "fundamentalisms" or radical versions of religion are somehow linked or perform similar functions; rather, they reflect the limited human repertoire to threat, yet within different cultural and historical contexts. (3) Causal explanations on the level of the individual are …
Radicalization Into Violent Extremism I: A Review Of Social Science Theories, Randy Borum
Radicalization Into Violent Extremism I: A Review Of Social Science Theories, Randy Borum
Journal of Strategic Security
In discourse about countering terrorism, the term "radicalization" is widely used, but remains poorly defined. To focus narrowly on ideological radicalization risks implying that radical beliefs are a proxy—or at least a necessary precursor—for terrorism, though we know this not to be true.Different pathways and mechanisms of terrorism involvement operate in different ways for different people at different points in time and perhaps in different contexts. This article explores the problems in defining radicalization and radicalism, and suggests that radicalization—and more specifically, involvement in terrorism—might best be viewed as a set of diverse processes. It goes on to review several …
Radical Islamism And Migrant Integration In Denmark: An Empirical Inquiry, Marco Goli, Shahamak Rezaei
Radical Islamism And Migrant Integration In Denmark: An Empirical Inquiry, Marco Goli, Shahamak Rezaei
Journal of Strategic Security
It has been suggested that alienation and failed integration may be causes of "Homegrown Radical Islamism" in Western societies. Western countries often expect that migrants and their descendants residing there as citizens will embrace or support common democratic ideals as a predicate for—or consequence of—their societal integration. Conventional wisdom suggests: "The more you associate yourself with the cherished and established goals and means, the more you will disassociate yourself from Radical Islamism," and vice versa. We believe that, quite surprisingly, an empirical test of this idea is lacking. Based on a nationally representative sample of 1,113 youth (ages 15–30) in …
Disarming Youth Combatants: Mitigating Youth Radicalization And Violent Extremism, Alpaslan Özerdem, Sukanya Podder
Disarming Youth Combatants: Mitigating Youth Radicalization And Violent Extremism, Alpaslan Özerdem, Sukanya Podder
Journal of Strategic Security
In the complex of motivating variables that define the push and pull factors behind recruitment and participation in civil conflict, "radicalization"—or "violent extremism"—is not conceived as a very strong motive, as is the case with studies on terrorism. As part of disarming youth combatants,the linkages between reintegration outcomes and possible rerecruitment into radical and extremist violence must be better understood to mitigate such risks. In our analysis, the policies guiding reintegration of child soldiers and youth should be better attuned to the relationship between recruitment motivations and reintegration outcomes, and must be approached from a political lens rather than a …
Gangs, Terrorism, And Radicalization, Scott Decker, David Pyrooz
Gangs, Terrorism, And Radicalization, Scott Decker, David Pyrooz
Journal of Strategic Security
What can street gangs tell us about radicalization and extremist groups? At first glance, these two groups seem to push the boundaries of comparison. In this article, we examine the important similarities and differences across criminal, deviant, and extremist groups. Drawing from research on street gangs, this article explores issues such as levels of explanation,organizational structure, group process, and the increasingly important role of technology and the Internet in the context of radicalization. There are points of convergence across these groups, but it is important to understand the differences between these groups. This review finds little evidence to support the …
Radicalization Into Violent Extremism Ii: A Review Of Conceptual Models And Empirical Research, Randy Borum
Radicalization Into Violent Extremism Ii: A Review Of Conceptual Models And Empirical Research, Randy Borum
Journal of Strategic Security
Over the past decade, analysts have proposed several frameworks to explain the process of radicalization into violent extremism (RVE). These frameworks are based primarily on rational, conceptual models which are neither guided by theory nor derived from systematic research. This article reviews recent (post-9/11) conceptual models of the radicalization process and recent (post-9/11) empirical studies of RVE. It emphasizes the importance of distinguishing between ideological radicalization and terrorism involvement, though both issues deserve further empirical inquiry.Finally, it summarizes some recent RVE-related research efforts, identifies seven things that social science researchers and operational personnel still need to know about violent radicalization, …
U.S. Response To Terrorism: A Strategic Analysis Of The Afghanistan Campaign, Valentina Taddeo
U.S. Response To Terrorism: A Strategic Analysis Of The Afghanistan Campaign, Valentina Taddeo
Journal of Strategic Security
This article examines the U.S. response to global terrorism and its campaign in Afghanistan from 2001 to today. The aim of this article is first to understand the fallacies, missteps, and misunderstandings of the U.S. approach in Afghanistan. Second, the analysis evaluates the lessons learnt and some possible strategies for achieving long-term stability and security in Afghanistan. In particular, the analysis focuses on the different strategies adopted by the United States and their achievements. Despite a first victory over the Taliban regime, the initial approach was focused on the enemy only and it lacked long-term planning, paving the way to …