Open Access. Powered by Scholars. Published by Universities.®

National Security Law Commons

Open Access. Powered by Scholars. Published by Universities.®

1900 Full-Text Articles 1594 Authors 886959 Downloads 114 Institutions

All Articles in National Security Law

Faceted Search

1900 full-text articles. Page 57 of 63.

Not Reading Means Losing: The National Security Cost Of Ignoring Osama Bin Laden's Words, Michael Scheuer 2011 Mitchell Hamline School of Law

Not Reading Means Losing: The National Security Cost Of Ignoring Osama Bin Laden's Words, Michael Scheuer

William Mitchell Law Review

No abstract provided.


No Strict Scruting—The Court's Deferrential Position On Material Support To Terrorism In Holder V. Humanitarian Law Project, Katherine R. Zerwas 2011 Mitchell Hamline School of Law

No Strict Scruting—The Court's Deferrential Position On Material Support To Terrorism In Holder V. Humanitarian Law Project, Katherine R. Zerwas

William Mitchell Law Review

No abstract provided.


Rethinking Radicalization, Randy Borum 2011 University of South Florida

Rethinking Radicalization, Randy Borum

Journal of Strategic Security

No abstract provided.


Radicalization Into Violent Extremism Ii: A Review Of Conceptual Models And Empirical Research, Randy Borum 2011 University of South Florida

Radicalization Into Violent Extremism Ii: A Review Of Conceptual Models And Empirical Research, Randy Borum

Journal of Strategic Security

Over the past decade, analysts have proposed several frameworks to explain the process of radicalization into violent extremism (RVE). These frameworks are based primarily on rational, conceptual models which are neither guided by theory nor derived from systematic research. This article reviews recent (post-9/11) conceptual models of the radicalization process and recent (post-9/11) empirical studies of RVE. It emphasizes the importance of distinguishing between ideological radicalization and terrorism involvement, though both issues deserve further empirical inquiry.Finally, it summarizes some recent RVE-related research efforts, identifies seven things that social science researchers and operational personnel still need to know ...


Gangs, Terrorism, And Radicalization, Scott Decker, David Pyrooz 2011 Arizona State University

Gangs, Terrorism, And Radicalization, Scott Decker, David Pyrooz

Journal of Strategic Security

What can street gangs tell us about radicalization and extremist groups? At first glance, these two groups seem to push the boundaries of comparison. In this article, we examine the important similarities and differences across criminal, deviant, and extremist groups. Drawing from research on street gangs, this article explores issues such as levels of explanation,organizational structure, group process, and the increasingly important role of technology and the Internet in the context of radicalization. There are points of convergence across these groups, but it is important to understand the differences between these groups. This review finds little evidence to support ...


Radicalization And The Use Of Social Media, Robin L. Thompson 2011 Henley-Putnam

Radicalization And The Use Of Social Media, Robin L. Thompson

Journal of Strategic Security

The use of social media tools by individuals and organizations to radicalize individuals for political and social change has become increasingly popular as the Internet penetrates more of the world and mobile computing devices are more accessible. To establish a construct for radicalization,the power and reach of social media will be described so there is common understanding of what social media is and how it is utilized by various individuals and groups. The second section will answer the question of why social media applications are the perfect platform for the radical voice. Finally, the use of social media and ...


The Development Of British Defence Policy: Blair, Brown And Beyond. By David Brown, Ed. (Burlington, Vt: Ashgate Publishing Company, 2010), Edward M. Roche 2011 Henley-Putnam University

The Development Of British Defence Policy: Blair, Brown And Beyond. By David Brown, Ed. (Burlington, Vt: Ashgate Publishing Company, 2010), Edward M. Roche

Journal of Strategic Security

No abstract provided.


Friction: How Radicalization Happens To Them And Us. By Clark Mccauley And Sophia Moskalenko (New York: Oxford University Press, 2011), Robin L. Thompson 2011 NASA Counterintelligence Office

Friction: How Radicalization Happens To Them And Us. By Clark Mccauley And Sophia Moskalenko (New York: Oxford University Press, 2011), Robin L. Thompson

Journal of Strategic Security

No abstract provided.


Cover & Front Matter, 2011 University of South Florida

Cover & Front Matter

Journal of Strategic Security

No abstract provided.


Advising Terrorism: Material Support, Safe Harbors, And Freedom Of Speech, Peter Margulies 2011 Roger Williams University School of Law

Advising Terrorism: Material Support, Safe Harbors, And Freedom Of Speech, Peter Margulies

Law Faculty Scholarship

No abstract provided.


The Theoretical Constitutional Shape (And Shaping) Of American National Security Law, Robert F. Blomquist 2011 Valparaiso University School of Law

The Theoretical Constitutional Shape (And Shaping) Of American National Security Law, Robert F. Blomquist

Law Faculty Publications

No abstract provided.


The Self-Judging Wto Security Exception, Roger P. Alford 2011 Notre Dame Law School

The Self-Judging Wto Security Exception, Roger P. Alford

Journal Articles

This Article analyzes the WTO security exception, with a particular focus on State practice. In the absence of any GATT or WTO jurisprudence, State practice affords the best vehicle to understand the meaning of Article XXI. In the few instances when invocation of the security exception has been challenged, State practice suggests that the security exception is not judicially reviewable.

A critical question emerges from this analysis of State practice. If a Member State can avoid WTO obligations through a self-judging security exception, what is to prevent bad faith invocations? The WTO regime includes a number of devices to address ...


Radical Islamism And Migrant Integration In Denmark: An Empirical Inquiry, Marco Goli, Shahamak Rezaei 2011 Metropolitan University College, Copenhagen

Radical Islamism And Migrant Integration In Denmark: An Empirical Inquiry, Marco Goli, Shahamak Rezaei

Journal of Strategic Security

It has been suggested that alienation and failed integration may be causes of "Homegrown Radical Islamism" in Western societies. Western countries often expect that migrants and their descendants residing there as citizens will embrace or support common democratic ideals as a predicate for—or consequence of—their societal integration. Conventional wisdom suggests: "The more you associate yourself with the cherished and established goals and means, the more you will disassociate yourself from Radical Islamism," and vice versa. We believe that, quite surprisingly, an empirical test of this idea is lacking. Based on a nationally representative sample of 1,113 youth ...


Four Lessons From The Study Of Fundamentalism And Psychology Of Religion, Sara Savage 2011 University of Cambridge

Four Lessons From The Study Of Fundamentalism And Psychology Of Religion, Sara Savage

Journal of Strategic Security

What lessons can the study of fundamentalism and the psychology of religion teach the newer field of Radicalization and Involvement in Violent Extremism (RIVE)? Four lessons and an intervention are offered in this article: (1) Religion is a robust human experience and cultural product that adopts a defensive shape when its worldview is threatened. (2) This does not mean that all "fundamentalisms" or radical versions of religion are somehow linked or perform similar functions; rather, they reflect the limited human repertoire to threat, yet within different cultural and historical contexts. (3) Causal explanations on the level of the individual are ...


Murder And Martial Justice: Spying And Retribution In Wwii America. By Meredith Lentz Adams (Kent, Ohio: The Kent State University Press, 2011), Millard E. Moon Ed.D. 2011 Colonel (ret.), U.S. Air Force Office of Special Investigations

Murder And Martial Justice: Spying And Retribution In Wwii America. By Meredith Lentz Adams (Kent, Ohio: The Kent State University Press, 2011), Millard E. Moon Ed.D.

Journal of Strategic Security

No abstract provided.


Responses To The Ten Questions, John Cary Sims 2011 Pacific McGeorge School of Law

Responses To The Ten Questions, John Cary Sims

McGeorge School of Law Scholarly Articles

No abstract provided.


Radicalization Into Violent Extremism I: A Review Of Social Science Theories, Randy Borum 2011 University of South Florida

Radicalization Into Violent Extremism I: A Review Of Social Science Theories, Randy Borum

Journal of Strategic Security

In discourse about countering terrorism, the term "radicalization" is widely used, but remains poorly defined. To focus narrowly on ideological radicalization risks implying that radical beliefs are a proxy—or at least a necessary precursor—for terrorism, though we know this not to be true.Different pathways and mechanisms of terrorism involvement operate in different ways for different people at different points in time and perhaps in different contexts. This article explores the problems in defining radicalization and radicalism, and suggests that radicalization—and more specifically, involvement in terrorism—might best be viewed as a set of diverse processes. It ...


Radicalism Within The Context Of Social Movements: Processes And Types, Remy Cross, David A. Snow 2011 University of California, Irvine

Radicalism Within The Context Of Social Movements: Processes And Types, Remy Cross, David A. Snow

Journal of Strategic Security

Drawing on work within the study of social movements and on conversion processes that is relevant to understanding radicalization, as well as on our own relevant research experiences and findings, especially on radicalism in right-wing and left-wing movements, we focus attention on the elements and dynamics of social movements, both intra-movement and extra-movement, that facilitate the grassroots development and maintenance of radical identities and enhance or diminish the prospect of engagement in radical action. In particular, we note the importance of free spaces to associate apart from the reach of control agents and adversaries,the development of affinity groups and ...


Disarming Youth Combatants: Mitigating Youth Radicalization And Violent Extremism, Alpaslan Özerdem, Sukanya Podder 2011 Coventry University

Disarming Youth Combatants: Mitigating Youth Radicalization And Violent Extremism, Alpaslan Özerdem, Sukanya Podder

Journal of Strategic Security

In the complex of motivating variables that define the push and pull factors behind recruitment and participation in civil conflict, "radicalization"—or "violent extremism"—is not conceived as a very strong motive, as is the case with studies on terrorism. As part of disarming youth combatants,the linkages between reintegration outcomes and possible rerecruitment into radical and extremist violence must be better understood to mitigate such risks. In our analysis, the policies guiding reintegration of child soldiers and youth should be better attuned to the relationship between recruitment motivations and reintegration outcomes, and must be approached from a political lens ...


The Sec Staff's "Cybersecurity Disclosure" Guidance: Will It Help Investors Or Cyber-Thieves More?, Sarah Jane Hughes, Roland L. Trope 2011 Indiana University Maurer School of Law

The Sec Staff's "Cybersecurity Disclosure" Guidance: Will It Help Investors Or Cyber-Thieves More?, Sarah Jane Hughes, Roland L. Trope

Articles by Maurer Faculty

No abstract provided.


Digital Commons powered by bepress