Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 36

Full-Text Articles in Law

Extraordinary Rendition And U.S. Counterterrorism Policy, Mark J. Murray Sep 2011

Extraordinary Rendition And U.S. Counterterrorism Policy, Mark J. Murray

Journal of Strategic Security

This article examines the United States Government policy of extraordinary rendition as a response to terrorism. The paper provides a working definition of the term, outlines why it has become controversial, and uses case studies to examine success and failures of extraordinary rendition in practice. The paper concludes with lessons learned—more specifically, policy amendments—that are necessary to keep extraordinary rendition as a viable tool for the Obama Administration and mitigate political fallout against the United States from both its allies and enemies. This paper argues that extraordinary rendition provides flexibility to policymakers to detain terrorists in cases where an attack …


Buy Off And Buy In: Flipping The Farc, Joel K. Day Ii Sep 2011

Buy Off And Buy In: Flipping The Farc, Joel K. Day Ii

Journal of Strategic Security

The election of President Juan Manuel Santos in Columbia marks a new era in Columbian security policy. administration has failed to implementInstead of focusing on a solely military solution to conflict with Revolutionary Armed Forces of Colombia (FARC), as his predecessor did, Santos has committed to a multifaceted effort to resolve the dispute. In spite of this hope, the Santos many critical non-military policy proposals. Like Santos, the scholarly community has ignored important comparative studies of counterterrorism. This essay attempts to fill a gap in the literature by framing a discussion of FARC in light of new advances in counter-insurgency …


Mitigating The Exploitation Of U.S. Borders By Jihadists And Criminal Organizations, Todd Steinmetz Sep 2011

Mitigating The Exploitation Of U.S. Borders By Jihadists And Criminal Organizations, Todd Steinmetz

Journal of Strategic Security

Following the events of September 11, 2001, the U.S. Government began improving security in large population centers and near potential highvalue terrorist targets. Included in these efforts was the development of a more robust border security program, with an emphasis on reducing the threat of terrorist infiltration at America's borders. However, nearly a decade after 9/11, terrorism and organized crime continue to pose significant threats to the United States. As many of these threats emanate from other nations, improved border security helps mitigate these threats. This article summarizes known terrorist activity along the U.S. northern and southern borders, and highlights …


Cover & Front Matter Sep 2011

Cover & Front Matter

Journal of Strategic Security

No abstract provided.


Hizbollah–Syrian Intelligence Affairs: A Marriage Of Convenience, Carl Anthony Wege Sep 2011

Hizbollah–Syrian Intelligence Affairs: A Marriage Of Convenience, Carl Anthony Wege

Journal of Strategic Security

Since the 1980s, Hizbollah has emerged as the guardian of Lebanon's Shi'a and a stalking horse for Iran. Syria, though allied with Tehran, seeks to manage Hizbollah's freedom of action in Lebanon and is eyed cautiously in Damascus. Hizbollah has managed to maintain independence from these Syrian efforts because of both Lebanese Shi'a religious élan and the protection given Hizbollah by its Shi'a allies in Iran.


"The Rising: Ireland: Easter 1916," Fearghal Mcgarry (New York: Oxford University Press, 2010) And "Guerrilla Warfare In The Irish War Of Independence, 1919-1921," Joseph Mckenna (Jefferson, Nc And London: Mcfarland & Company, Inc., Publishers, 2011), Edward J. Hagerty Sep 2011

"The Rising: Ireland: Easter 1916," Fearghal Mcgarry (New York: Oxford University Press, 2010) And "Guerrilla Warfare In The Irish War Of Independence, 1919-1921," Joseph Mckenna (Jefferson, Nc And London: Mcfarland & Company, Inc., Publishers, 2011), Edward J. Hagerty

Journal of Strategic Security

No abstract provided.


"Terrorism And Homeland Security: Perspectives, Thoughts, And Opinions," Edited By Dale L. June (Boca Raton, Fl: Crc Press, 2011), Mark J. Roberts Sep 2011

"Terrorism And Homeland Security: Perspectives, Thoughts, And Opinions," Edited By Dale L. June (Boca Raton, Fl: Crc Press, 2011), Mark J. Roberts

Journal of Strategic Security

No abstract provided.


"Area 51: An Uncensored History Of America's Top Secret Military Base," Annie Jacobsen (New York: Little, Brown And Company, 2011), Edward M. Roche Sep 2011

"Area 51: An Uncensored History Of America's Top Secret Military Base," Annie Jacobsen (New York: Little, Brown And Company, 2011), Edward M. Roche

Journal of Strategic Security

No abstract provided.


Cover & Front Matter Jul 2011

Cover & Front Matter

Journal of Strategic Security

No abstract provided.


"Information Operations Matters: Best Practices," Leigh Armistead, (Washington, D.C.: Potomac Books, 2010), Robin L. Thompson Jul 2011

"Information Operations Matters: Best Practices," Leigh Armistead, (Washington, D.C.: Potomac Books, 2010), Robin L. Thompson

Journal of Strategic Security

No abstract provided.


"Small Boats, Weak States, Dirty Money: Piracy And Maritime Terrorism In The Modern World," Martin N. Murphy, (New York: Columbia University Press, 2009), Francis D. Bonadonna , Capt. Jul 2011

"Small Boats, Weak States, Dirty Money: Piracy And Maritime Terrorism In The Modern World," Martin N. Murphy, (New York: Columbia University Press, 2009), Francis D. Bonadonna , Capt.

Journal of Strategic Security

No abstract provided.


"Obama's Wars," Bob Woodward, (New York, Ny: Simon And Schuster, 2010), Richard J. Kilroy Jr. Jul 2011

"Obama's Wars," Bob Woodward, (New York, Ny: Simon And Schuster, 2010), Richard J. Kilroy Jr.

Journal of Strategic Security

No abstract provided.


"The New Muslim Brotherhood In The West," Lorenzo Vidino, (New York: Columbia University Press, 2010), Sheldon Greaves , Ph.D. Jul 2011

"The New Muslim Brotherhood In The West," Lorenzo Vidino, (New York: Columbia University Press, 2010), Sheldon Greaves , Ph.D.

Journal of Strategic Security

No abstract provided.


China's Use Of Cyber Warfare: Espionage Meets Strategic Deterrence, Magnus Hjortdal Jul 2011

China's Use Of Cyber Warfare: Espionage Meets Strategic Deterrence, Magnus Hjortdal

Journal of Strategic Security

This article presents three reasons for states to use cyber warfare and
shows that cyberspace is—and will continue to be—a decisive element in
China's strategy to ascend in the international system. The three reasons
are: deterrence through infiltration of critical infrastructure; militarytechnological
espionage to gain military knowledge; and industrial espionage
to gain economic advantage. China has a greater interest in using
cyberspace offensively than other actors, such as the United States, since
it has more to gain from spying on and deterring the United States than
the other way around. The article also documents China's progress in
cyber warfare and …


Modeling Human Behavior To Anticipate Insider Attacks, Frank L. Greitzer , Ph.D., Ryan E. Hohimer Jul 2011

Modeling Human Behavior To Anticipate Insider Attacks, Frank L. Greitzer , Ph.D., Ryan E. Hohimer

Journal of Strategic Security

The insider threat ranks among the most pressing cyber-security challenges
that threaten government and industry information infrastructures.
To date, no systematic methods have been developed that provide a
complete and effective approach to prevent data leakage, espionage, and
sabotage. Current practice is forensic in nature, relegating to the analyst
the bulk of the responsibility to monitor, analyze, and correlate an overwhelming
amount of data. We describe a predictive modeling framework
that integrates a diverse set of data sources from the cyber domain, as well
as inferred psychological/motivational factors that may underlie malicious
insider exploits. This comprehensive threat assessment approach
provides …


"The Dynamics Of Terror And Creation Of Homegrown Terrorists," Richard J. Hughbank, Ed. Et Al., (Mustang, Ok: Tate Publishing And Enterprises, 2010), Jennifer Jefferis Jul 2011

"The Dynamics Of Terror And Creation Of Homegrown Terrorists," Richard J. Hughbank, Ed. Et Al., (Mustang, Ok: Tate Publishing And Enterprises, 2010), Jennifer Jefferis

Journal of Strategic Security

No abstract provided.


New Start: The Contentious Road To Ratification, Elizabeth Zolotukhina Mar 2011

New Start: The Contentious Road To Ratification, Elizabeth Zolotukhina

Journal of Strategic Security

Senate ratification of the New START treaty re-established effective bilateral inspection and monitoring of American and Russian nuclear holdings and has the potential to further enhance U.S.-Russian cooperation on key issues, including containing the Iranian nuclear program, and further reductions in the two countries' arsenals. Although the accord was widely heralded as a foreign policy success of the Obama administration, the contentious Senate ratification may impede future progress on arms control.


Cover & Front Matter Mar 2011

Cover & Front Matter

Journal of Strategic Security

No abstract provided.


Alternative Threat Methodology, Charles B. King Iii Mar 2011

Alternative Threat Methodology, Charles B. King Iii

Journal of Strategic Security

Of the many challenges facing risk analysis practitioners, perhaps the most difficult to overcome is in the field of terrorist threat analysis. When estimating the threat associated with naturally occurring events, historical data provides a great deal of insight into the frequency of those events. Threat associated with accidents applies many operations research tools to gauge future failure-rates (Failure Mode and Effects Analysis being perhaps the most widely known). However, estimating the probability of an individual's or group's attacking a specific (or even a generic) target is an element of risk analysis in which art and intuition are applied far …


Book Reviews Mar 2011

Book Reviews

Journal of Strategic Security

No abstract provided.


Resetting U.S.-Turkish Relations: Charting A New Way Forward, Aaron Stein Mar 2011

Resetting U.S.-Turkish Relations: Charting A New Way Forward, Aaron Stein

Journal of Strategic Security

After nearly nine decades of benign neglect, Turkey has set about reestablishing its influence in the Middle East. Although most observers agree that the United States and Turkey share a number of overlapping goals in the Middle East, Turkey's recent rapprochement with Iran has drawn the ire of the United States. In tandem, Turkey's relations with Israel, Washington's closest ally in the region, have deteriorated rapidly following Israel's war in Gaza and the events aboard the Mavi Marmara. These coinciding events have further complicated U.S.-Turkish relations and have led a number of pundits in Washington to openly question Turkey's ideological …


The Nuclear (And The) Holocaust: Israel, Iran, And The Shadows Of Auschwitz, Shmuel Nili Mar 2011

The Nuclear (And The) Holocaust: Israel, Iran, And The Shadows Of Auschwitz, Shmuel Nili

Journal of Strategic Security

The main thesis of this article is that the Holocaust is indispensable for understanding Israel’s treatment of what it perceives as the greatest current threat to its security - the Iranian nuclear program. The Holocaust’s impact deviates in crucial ways from established teaching regarding balance of power in general and nuclear deterrence in particular. Mutually Assured Destruction, the distinction between capabilities and intentions, and even linkage politics - all of those basic concepts are profoundly altered in the Israeli case by the (often conscious) presence of the Holocaust. The Holocaust’s influence is evident in the Israeli belief that deterring Iran …


The Financial Arm Of The Farc: A Threat Finance Perspective, Thomas R. Cook Mar 2011

The Financial Arm Of The Farc: A Threat Finance Perspective, Thomas R. Cook

Journal of Strategic Security

The FARC (Fuerzas Armadas Revolucionarias de Colombia or Revolutionary Armed Forces of Colombia) transformed from a traditional guerrilla group into a full-fledged insurgency because of its ability to effectively convert the proceeds derived from illegal narcotic trafficking into operational funds. Those financial capabilities allowed the FARC to challenge government authority in large swathes of the Colombian state. The FARC moved into the drug trade, initially controlling production territory and subsequently engaging in trafficking, which allowed the organization to increase its war-fighting capabilities. This paper only scratches the surface of the mechanism by which the FARC utilized its coca revenue in …


Four Lessons From The Study Of Fundamentalism And Psychology Of Religion, Sara Savage Jan 2011

Four Lessons From The Study Of Fundamentalism And Psychology Of Religion, Sara Savage

Journal of Strategic Security

What lessons can the study of fundamentalism and the psychology of religion teach the newer field of Radicalization and Involvement in Violent Extremism (RIVE)? Four lessons and an intervention are offered in this article: (1) Religion is a robust human experience and cultural product that adopts a defensive shape when its worldview is threatened. (2) This does not mean that all "fundamentalisms" or radical versions of religion are somehow linked or perform similar functions; rather, they reflect the limited human repertoire to threat, yet within different cultural and historical contexts. (3) Causal explanations on the level of the individual are …


Radicalization And The Use Of Social Media, Robin L. Thompson Jan 2011

Radicalization And The Use Of Social Media, Robin L. Thompson

Journal of Strategic Security

The use of social media tools by individuals and organizations to radicalize individuals for political and social change has become increasingly popular as the Internet penetrates more of the world and mobile computing devices are more accessible. To establish a construct for radicalization,the power and reach of social media will be described so there is common understanding of what social media is and how it is utilized by various individuals and groups. The second section will answer the question of why social media applications are the perfect platform for the radical voice. Finally, the use of social media and its …


Radicalization Into Violent Extremism I: A Review Of Social Science Theories, Randy Borum Jan 2011

Radicalization Into Violent Extremism I: A Review Of Social Science Theories, Randy Borum

Journal of Strategic Security

In discourse about countering terrorism, the term "radicalization" is widely used, but remains poorly defined. To focus narrowly on ideological radicalization risks implying that radical beliefs are a proxy—or at least a necessary precursor—for terrorism, though we know this not to be true.Different pathways and mechanisms of terrorism involvement operate in different ways for different people at different points in time and perhaps in different contexts. This article explores the problems in defining radicalization and radicalism, and suggests that radicalization—and more specifically, involvement in terrorism—might best be viewed as a set of diverse processes. It goes on to review several …


Radical Islamism And Migrant Integration In Denmark: An Empirical Inquiry, Marco Goli, Shahamak Rezaei Jan 2011

Radical Islamism And Migrant Integration In Denmark: An Empirical Inquiry, Marco Goli, Shahamak Rezaei

Journal of Strategic Security

It has been suggested that alienation and failed integration may be causes of "Homegrown Radical Islamism" in Western societies. Western countries often expect that migrants and their descendants residing there as citizens will embrace or support common democratic ideals as a predicate for—or consequence of—their societal integration. Conventional wisdom suggests: "The more you associate yourself with the cherished and established goals and means, the more you will disassociate yourself from Radical Islamism," and vice versa. We believe that, quite surprisingly, an empirical test of this idea is lacking. Based on a nationally representative sample of 1,113 youth (ages 15–30) in …


The Development Of British Defence Policy: Blair, Brown And Beyond. By David Brown, Ed. (Burlington, Vt: Ashgate Publishing Company, 2010), Edward M. Roche Jan 2011

The Development Of British Defence Policy: Blair, Brown And Beyond. By David Brown, Ed. (Burlington, Vt: Ashgate Publishing Company, 2010), Edward M. Roche

Journal of Strategic Security

No abstract provided.


Cover & Front Matter Jan 2011

Cover & Front Matter

Journal of Strategic Security

No abstract provided.


Rethinking Radicalization, Randy Borum Jan 2011

Rethinking Radicalization, Randy Borum

Journal of Strategic Security

No abstract provided.