Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Public Affairs, Public Policy and Public Administration

Journal of Strategic Security

Asymmetric warfare

Publication Year

Articles 1 - 10 of 10

Full-Text Articles in Law

Deterring And Dissuading Nuclear Terrorism, John J. Klein Apr 2012

Deterring And Dissuading Nuclear Terrorism, John J. Klein

Journal of Strategic Security

While nuclear deterrence theory may be well-suited to dealing with nuclear-armed states, its suitability for deterring nuclear terrorism has frequently been questioned since 9/11. While terrorist organizations do not necessarily act uniformly or according to the same underlying beliefs, many of the most aggressive organizations are motivated by an ideology that embraces martyrdom and an apocalyptic vision.1 This ideology may be based on religion or a desire to overthrow a government. Consequently, terrorists motivated by ideology who intend to use a stolen or improvised nuclear device against the United States or its interests may not care about the resulting military …


Buy Off And Buy In: Flipping The Farc, Joel K. Day Ii Sep 2011

Buy Off And Buy In: Flipping The Farc, Joel K. Day Ii

Journal of Strategic Security

The election of President Juan Manuel Santos in Columbia marks a new era in Columbian security policy. administration has failed to implementInstead of focusing on a solely military solution to conflict with Revolutionary Armed Forces of Colombia (FARC), as his predecessor did, Santos has committed to a multifaceted effort to resolve the dispute. In spite of this hope, the Santos many critical non-military policy proposals. Like Santos, the scholarly community has ignored important comparative studies of counterterrorism. This essay attempts to fill a gap in the literature by framing a discussion of FARC in light of new advances in counter-insurgency …


"The Dynamics Of Terror And Creation Of Homegrown Terrorists," Richard J. Hughbank, Ed. Et Al., (Mustang, Ok: Tate Publishing And Enterprises, 2010), Jennifer Jefferis Jul 2011

"The Dynamics Of Terror And Creation Of Homegrown Terrorists," Richard J. Hughbank, Ed. Et Al., (Mustang, Ok: Tate Publishing And Enterprises, 2010), Jennifer Jefferis

Journal of Strategic Security

No abstract provided.


Radicalization And The Use Of Social Media, Robin L. Thompson Jan 2011

Radicalization And The Use Of Social Media, Robin L. Thompson

Journal of Strategic Security

The use of social media tools by individuals and organizations to radicalize individuals for political and social change has become increasingly popular as the Internet penetrates more of the world and mobile computing devices are more accessible. To establish a construct for radicalization,the power and reach of social media will be described so there is common understanding of what social media is and how it is utilized by various individuals and groups. The second section will answer the question of why social media applications are the perfect platform for the radical voice. Finally, the use of social media and its …


Radicalization Into Violent Extremism Ii: A Review Of Conceptual Models And Empirical Research, Randy Borum Jan 2011

Radicalization Into Violent Extremism Ii: A Review Of Conceptual Models And Empirical Research, Randy Borum

Journal of Strategic Security

Over the past decade, analysts have proposed several frameworks to explain the process of radicalization into violent extremism (RVE). These frameworks are based primarily on rational, conceptual models which are neither guided by theory nor derived from systematic research. This article reviews recent (post-9/11) conceptual models of the radicalization process and recent (post-9/11) empirical studies of RVE. It emphasizes the importance of distinguishing between ideological radicalization and terrorism involvement, though both issues deserve further empirical inquiry.Finally, it summarizes some recent RVE-related research efforts, identifies seven things that social science researchers and operational personnel still need to know about violent radicalization, …


Strategic Asymmetric Deception And Its Role In The Current Threat Environment, Seth A. Gulsby Mar 2010

Strategic Asymmetric Deception And Its Role In The Current Threat Environment, Seth A. Gulsby

Journal of Strategic Security

President Bill Clinton's Secretary of Defense, William Cohen, once stated that the post-Cold War world of the 1990s was a "paradox [where] American military superiority actually increase[d] the threat of... attack against [the U.S.] by creating incentives for adversaries to challenge us asymmetrically." He was alluding to the fact that the Cold War's closure was supposed to bring about a situation that encouraged peace, nation-building, and unilateral comfort for the United States. The reality that America has come to know is quite different, and some might even argue that, given the option, many people would return to a security situation …


Guerilla Warfare & Law Enforcement: Combating The 21st Century Terrorist Cell Within The U.S., Richard J. Hughbank Nov 2009

Guerilla Warfare & Law Enforcement: Combating The 21st Century Terrorist Cell Within The U.S., Richard J. Hughbank

Journal of Strategic Security

Both domestic and international terrorist organizations employ guerrilla warfare tactics, techniques, and procedures. Thus, the ability to identify and defeat the members of these organizations, cripple their infrastructures, and disrupt their financial resources lies in the understanding of modern guerrilla warfare as it develops in the twenty-first century within the United States.3 The forms of asymmetric warfare4 adopted by domestic and international terrorist groups alike is no longer intended to gain simple media exposure or governmental manipulation; they want to make an overpowering impact by causing massive loss of life and severe damage to infrastructure and are often motivated by …


The Tipping Point: Biological Terrorism, Scott Cary Sep 2009

The Tipping Point: Biological Terrorism, Scott Cary

Journal of Strategic Security

This article presents a strategic, operational, and tactical analysis of information currently available on the state of bio-weapons development by non-state actors, primarily Islamist jihadists. It discusses the evidence supporting a practical assessment that non-state actors have begun to acquire, and in the near-term intend to employ, bio-weapons. A pathogen and method of attack specifically designed to achieve the strategic goals of jihadists are presented as functional examples of the problem of the emerging global bio-weapons threat.Is a terrorist attack utilizing biological weapons a real threat? If so, is there a way to predict the circumstances under which it might …


The Importance Of Intelligence In Combating A Modern Insurgency, Kevin Reamer May 2009

The Importance Of Intelligence In Combating A Modern Insurgency, Kevin Reamer

Journal of Strategic Security

Throughout history the world has been plagued by insurgencies. While the underlying causes of each new insurgency have been different, they are all similar in certain areas. This similarity entails that the effective countering of an insurgency can be turned into a science with a set of guidelines to follow based on conditions on the ground. Guidelines are important because insurgencies are flexible and to defeat them the counterinsurgency must be equally flexible if not more flexible. Good intelligence is critical to the success of an insurgency. With their small, poorly equipped forces, the leaders of insurgencies need to know …


Targeted Killing: Self-Defense, Preemption, And The War On Terrorism, Thomas Byron Hunter May 2009

Targeted Killing: Self-Defense, Preemption, And The War On Terrorism, Thomas Byron Hunter

Journal of Strategic Security

This paper assesses the parameters and utility of “targeted killing” in combating terrorism and its role within the norm of state self-defense in the international community. The author’s thesis is that, while targeted killing provides states with a method of combating terrorism, and while it is “effective” on a number of levels, it is inherently limited and not a panacea. The adoption and execution of such a program brings with it, among other potential pitfalls, political repercussions. Targeted killing is defined herein as the premeditated, preemptive, and intentional killing of an individual or individuals known or believed to represent a …