Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 34

Full-Text Articles in Law

Book Review: A Women’S Place: U.S. Counterterrorism Since 9/11, Tahmina Sobat Jun 2023

Book Review: A Women’S Place: U.S. Counterterrorism Since 9/11, Tahmina Sobat

Feminist Pedagogy

Cook, J. in her book named "A women’s place: U.S. Counterterrorism since 9/11" identifies shortcomings in the accessibility of gendered security studies and tries to bridge the gap between the academic world and government actions regarding security and its relation to women's position. Accordingly, Cook provides a framework to organize and assess how women can be brought into all security aspects, particularly countering terrorism (p. 2). This review will highlight different aspects of the above-mentioned agencies' work concerning women, and I will mostly reference examples of Afghanistan from the book.


Law Enforcement Policy And Personnel Responses To Terrorism: Do Prior Attacks Predict Current Preparedness?, Bryce Kirk May 2022

Law Enforcement Policy And Personnel Responses To Terrorism: Do Prior Attacks Predict Current Preparedness?, Bryce Kirk

Graduate Theses and Dissertations

Terrorism has been on the mind of the American people and politicians alike since the 9/11 attacks over two decades ago. In the years since, there has been a massive shift in law enforcement priorities from community-oriented policing (COP) to homeland security-oriented policing. This was especially evident in the establishment of the Department of Homeland Security (DHS) shortly after the attacks on the World Trade Center and Pentagon in 2001, which was established to aid law enforcement entities with terrorism preparedness. While prior literature has addressed a variety of factors that have contributed to terrorism preparedness, very little research has …


Congressional Oversight Of Modern Warfare: History, Pathologies, And Proposals For Reform, Oona A. Hathaway, Tobias Kuehne, Randi Michel, Nicole Ng Oct 2021

Congressional Oversight Of Modern Warfare: History, Pathologies, And Proposals For Reform, Oona A. Hathaway, Tobias Kuehne, Randi Michel, Nicole Ng

William & Mary Law Review

Despite significant developments in the nature of twenty-first century warfare, Congress continues to employ a twentieth century oversight structure. Modern warfare tactics, including cyber operations, drone strikes, and special operations, do not neatly fall into congressional committee jurisdictions. Counterterrorism and cyber operations, which are inherently multi-jurisdictional and highly classified, illustrate the problem. In both contexts, over the past several years Congress has addressed oversight shortcomings by strengthening its reporting requirements, developing relatively robust oversight regimes. But in solving one problem, Congress has created another: deeply entrenched information silos that inhibit the sharing of information about modern warfare across committees. This …


State Sponsored Radicalization, Sahar F. Aziz Sep 2021

State Sponsored Radicalization, Sahar F. Aziz

Michigan Journal of Race and Law

Where was the FBI in the months leading up to the violent siege on the U.S. Capitol in 2021? Among the many questions surrounding that historic day, this one reveals the extent to which double standards in law enforcement threaten our nation’s security. For weeks, Donald Trump’s far right-wing supporters had been publicly calling for and planning a protest in Washington, D.C. on January 6, the day Congress was to certify the 2021 presidential election results. Had they been following credible threats to domestic security, officials would have attempted to stop the Proud Boys and QAnon from breaching the Capitol …


Counterterrorism In The Philippines: Review Of Key Issues, Ronald U. Mendoza, Rommel Jude G. Ong, Dion Lorenz L. Romano, Bernadette Chloe P. Torno Feb 2021

Counterterrorism In The Philippines: Review Of Key Issues, Ronald U. Mendoza, Rommel Jude G. Ong, Dion Lorenz L. Romano, Bernadette Chloe P. Torno

Ateneo School of Government Publications

Terrorism has taken root in almost all corners of the world with terrorist organizations thriving in both rich and poor countries. In the Philippines, the Human Security Act of 2007 came into force to address the threat of terrorism to the national security of the country. However, the law has never been fully utilized. To provide law enforcers with a stronger legal measure to address acts of terrorism in the country, President Duterte certified a new Anti-Terrorism Bill as urgent, with Congress adopting the Senate version and approving it in the shortest time possible. Despite opposition from various sectors and …


Terrorism In The 2020s: Examining The Global Threat Landscape, Landon W. Swearngin May 2019

Terrorism In The 2020s: Examining The Global Threat Landscape, Landon W. Swearngin

MSU Graduate Theses

This thesis uses quantitative and qualitative research methods to (1) explore the global trends and trajectories of terrorism, (2) identify emerging strategic challenges, and (3) outline an opportunity analysis for U.S. counterterrorism strategy. Collectively, this project provides a strategic forecast for terrorism in the 2020s, demonstrating that terrorism is becoming increasingly dangerous, dynamic, and difficult to defeat.


The Role Of Women In Terrorism, Zeynep Bayar May 2019

The Role Of Women In Terrorism, Zeynep Bayar

Dissertations, Theses, and Capstone Projects

The main purpose of this paper is to understand what motivate women to join terrorist groups and why these organizations prefer to work with female terrorists. Although each woman has different reasons to involve in terrorist groups, this research demonstrates 'religious, political and personal' reasons as the major motivating factors. This study also focuses on the question of why women are the targets of terror recruiters. In order to answer these, the research analysis examines 'psychological, gender, and media' factors as major recruitment reasons of terrorist organizations. This study also analyzes the similarities and differences between female terrorists' profiles of …


The Convergence Of The War On Terror And The War On Drugs: A Counter-Narcoterrorism Approach As A Policy Response, Lindsay Burton Jan 2019

The Convergence Of The War On Terror And The War On Drugs: A Counter-Narcoterrorism Approach As A Policy Response, Lindsay Burton

CMC Senior Theses

This thesis investigates how and why U.S. policies and agencies are ill-equipped to respond to narco-terrorism and offers some policy recommendations for remedying that. Narco-terrorism is the merging of terrorism and drug trafficking. Terrorist organizations and narcotics traffickers each have much to offer the other; there is potential for symbiosis in the form of cooperation and even hybridization. Examination of the dynamics between terrorist organizations and drug traffickers, combined with an evaluation of the US responses to narcoterrorism in Colombia and Afghanistan, makes it clear that current US policy responses fail to recognize narcoterrorism as a unique challenge, and instead …


Unmanned Aerial Vehicles In Counterterrorism Efforts And Implications For International Humanitarian Law, Kunle Adebamiji Olulowo Jan 2018

Unmanned Aerial Vehicles In Counterterrorism Efforts And Implications For International Humanitarian Law, Kunle Adebamiji Olulowo

Walden Dissertations and Doctoral Studies

The United States increasingly has resorted to the use of Unmanned Aerial Vehicles (UAVs) for targeted killings of terrorists as a counterterrorism strategy. More states and terrorist organizations also are acquiring UAVs and this development can lead to indiscriminate and unregulated use of UAVs. Previous researchers have indicated the surveillance ability and precise weapon delivery capacity of UAVs make them a weapon of choice for U.S. counterterrorism efforts. Although the U.S. government estimated the collateral damage involved in the use of UAVs at 3-5%, nongovernmental sources put it at 25-40%. A gap exists in the current literature regarding public perception …


Deterrence & Security Assistance: The South China Sea, Tommy Ross Nov 2017

Deterrence & Security Assistance: The South China Sea, Tommy Ross

The US Army War College Quarterly: Parameters

This article identifies how the United States can apply security assistance to support regional security in the South China Sea in order to counter China’s assertive expansion strategy.


Security Council Resolution 2178 (2014): An Ineffective Response To The Foreign Terrorist Fighter Phenomenon, Cory Kopitzke Feb 2017

Security Council Resolution 2178 (2014): An Ineffective Response To The Foreign Terrorist Fighter Phenomenon, Cory Kopitzke

Indiana Journal of Global Legal Studies

Thousands of foreign terrorist fighters poured into the Middle East from almost every country across the globe. Radicalized by professionally edited videos and propaganda disseminated through the Internet, people from all walks of life were captivated by the Islamic State's rhetoric, and nations were struggling to figure out how to stop them. One solution came in the form of a United Nations Security Council Resolution- Resolution 2178 (2014). This resolution is directed specifically at foreign terrorist fighters and calls upon all Member States to act with haste to address this new phenomenon. Critics were quick to call into question the …


Strategic Landpower And The Arabian Gulf, W. Andrew Terrill Sep 2013

Strategic Landpower And The Arabian Gulf, W. Andrew Terrill

The US Army War College Quarterly: Parameters

No abstract provided.


Deterring And Dissuading Nuclear Terrorism, John J. Klein Apr 2012

Deterring And Dissuading Nuclear Terrorism, John J. Klein

Journal of Strategic Security

While nuclear deterrence theory may be well-suited to dealing with nuclear-armed states, its suitability for deterring nuclear terrorism has frequently been questioned since 9/11. While terrorist organizations do not necessarily act uniformly or according to the same underlying beliefs, many of the most aggressive organizations are motivated by an ideology that embraces martyrdom and an apocalyptic vision.1 This ideology may be based on religion or a desire to overthrow a government. Consequently, terrorists motivated by ideology who intend to use a stolen or improvised nuclear device against the United States or its interests may not care about the resulting military …


A Systems-Based Approach To Intelligence Reform, Austen Givens Apr 2012

A Systems-Based Approach To Intelligence Reform, Austen Givens

Journal of Strategic Security

The terrorist attacks of September 11, 2001 prompted the most comprehensive changes to the U.S. Intelligence Community (IC) since its creation via the National Security Act of 1947. Recent structural and organizational reforms, such as efforts to enhance information sharing and recruit speakers of hard-target languages, have also triggered new challenges to successful transformation. In light of the systemic problems facing the IC, this paper argues that systems engineering, a discipline increasingly useful in organizational change, offers a more efficient, holistic approach to the intelligence reform process than the status quo. Systems engineering views the IC as an integrated and …


Policy Intervention In Fata: Why Discourse Matters, Nazya Fiaz Dr. Apr 2012

Policy Intervention In Fata: Why Discourse Matters, Nazya Fiaz Dr.

Journal of Strategic Security

Despite years of wide-scale counterterrorism measures in Pakistan's FATA (Federally Administered Tribal Areas), the injection of substantial funds, and the "close" collaboration between the United States and Pakistan, the ugly truth is that the extremism and militancy in FATA continues to recruit members. Moreover, there is little indication that the killing of Usama bin Ladin will have any significant effect on reducing support for militancy. While taking stock of these realities, this article will not seek to rehash the many successes and failures of the counterterrorist operations in FATA. Instead, its purpose will be to argue that while the causes …


On The Language Of (Counter)Terrorism And The Legal Geography Of Terror, Nick J. Sciullo Dec 2011

On The Language Of (Counter)Terrorism And The Legal Geography Of Terror, Nick J. Sciullo

Nick J. Sciullo

In this paper, I will discuss the difficulties in defining a place for the global war on terror and the implications this lack of terrestrial bounds has for the law. I will then discuss the way language impacts not only the idea of terrorism, but also the politics of place. On our journey will be philosophers Martin Heidegger and Jacques Derrida, discussed extensively below, who help flesh out the important politics of language and place. Ultimately, I will urge for a deconstructive approach to the global war on terror, which I hope will encourage a more thoughtful consideration of the …


Extraordinary Rendition And U.S. Counterterrorism Policy, Mark J. Murray Sep 2011

Extraordinary Rendition And U.S. Counterterrorism Policy, Mark J. Murray

Journal of Strategic Security

This article examines the United States Government policy of extraordinary rendition as a response to terrorism. The paper provides a working definition of the term, outlines why it has become controversial, and uses case studies to examine success and failures of extraordinary rendition in practice. The paper concludes with lessons learned—more specifically, policy amendments—that are necessary to keep extraordinary rendition as a viable tool for the Obama Administration and mitigate political fallout against the United States from both its allies and enemies. This paper argues that extraordinary rendition provides flexibility to policymakers to detain terrorists in cases where an attack …


"The Dynamics Of Terror And Creation Of Homegrown Terrorists," Richard J. Hughbank, Ed. Et Al., (Mustang, Ok: Tate Publishing And Enterprises, 2010), Jennifer Jefferis Jul 2011

"The Dynamics Of Terror And Creation Of Homegrown Terrorists," Richard J. Hughbank, Ed. Et Al., (Mustang, Ok: Tate Publishing And Enterprises, 2010), Jennifer Jefferis

Journal of Strategic Security

No abstract provided.


Four Lessons From The Study Of Fundamentalism And Psychology Of Religion, Sara Savage Jan 2011

Four Lessons From The Study Of Fundamentalism And Psychology Of Religion, Sara Savage

Journal of Strategic Security

What lessons can the study of fundamentalism and the psychology of religion teach the newer field of Radicalization and Involvement in Violent Extremism (RIVE)? Four lessons and an intervention are offered in this article: (1) Religion is a robust human experience and cultural product that adopts a defensive shape when its worldview is threatened. (2) This does not mean that all "fundamentalisms" or radical versions of religion are somehow linked or perform similar functions; rather, they reflect the limited human repertoire to threat, yet within different cultural and historical contexts. (3) Causal explanations on the level of the individual are …


Disarming Youth Combatants: Mitigating Youth Radicalization And Violent Extremism, Alpaslan Özerdem, Sukanya Podder Jan 2011

Disarming Youth Combatants: Mitigating Youth Radicalization And Violent Extremism, Alpaslan Özerdem, Sukanya Podder

Journal of Strategic Security

In the complex of motivating variables that define the push and pull factors behind recruitment and participation in civil conflict, "radicalization"—or "violent extremism"—is not conceived as a very strong motive, as is the case with studies on terrorism. As part of disarming youth combatants,the linkages between reintegration outcomes and possible rerecruitment into radical and extremist violence must be better understood to mitigate such risks. In our analysis, the policies guiding reintegration of child soldiers and youth should be better attuned to the relationship between recruitment motivations and reintegration outcomes, and must be approached from a political lens rather than a …


Radicalization Into Violent Extremism Ii: A Review Of Conceptual Models And Empirical Research, Randy Borum Jan 2011

Radicalization Into Violent Extremism Ii: A Review Of Conceptual Models And Empirical Research, Randy Borum

Journal of Strategic Security

Over the past decade, analysts have proposed several frameworks to explain the process of radicalization into violent extremism (RVE). These frameworks are based primarily on rational, conceptual models which are neither guided by theory nor derived from systematic research. This article reviews recent (post-9/11) conceptual models of the radicalization process and recent (post-9/11) empirical studies of RVE. It emphasizes the importance of distinguishing between ideological radicalization and terrorism involvement, though both issues deserve further empirical inquiry.Finally, it summarizes some recent RVE-related research efforts, identifies seven things that social science researchers and operational personnel still need to know about violent radicalization, …


Radical Islamism And Migrant Integration In Denmark: An Empirical Inquiry, Marco Goli, Shahamak Rezaei Jan 2011

Radical Islamism And Migrant Integration In Denmark: An Empirical Inquiry, Marco Goli, Shahamak Rezaei

Journal of Strategic Security

It has been suggested that alienation and failed integration may be causes of "Homegrown Radical Islamism" in Western societies. Western countries often expect that migrants and their descendants residing there as citizens will embrace or support common democratic ideals as a predicate for—or consequence of—their societal integration. Conventional wisdom suggests: "The more you associate yourself with the cherished and established goals and means, the more you will disassociate yourself from Radical Islamism," and vice versa. We believe that, quite surprisingly, an empirical test of this idea is lacking. Based on a nationally representative sample of 1,113 youth (ages 15–30) in …


Gangs, Terrorism, And Radicalization, Scott Decker, David Pyrooz Jan 2011

Gangs, Terrorism, And Radicalization, Scott Decker, David Pyrooz

Journal of Strategic Security

What can street gangs tell us about radicalization and extremist groups? At first glance, these two groups seem to push the boundaries of comparison. In this article, we examine the important similarities and differences across criminal, deviant, and extremist groups. Drawing from research on street gangs, this article explores issues such as levels of explanation,organizational structure, group process, and the increasingly important role of technology and the Internet in the context of radicalization. There are points of convergence across these groups, but it is important to understand the differences between these groups. This review finds little evidence to support the …


Radicalization Into Violent Extremism I: A Review Of Social Science Theories, Randy Borum Jan 2011

Radicalization Into Violent Extremism I: A Review Of Social Science Theories, Randy Borum

Journal of Strategic Security

In discourse about countering terrorism, the term "radicalization" is widely used, but remains poorly defined. To focus narrowly on ideological radicalization risks implying that radical beliefs are a proxy—or at least a necessary precursor—for terrorism, though we know this not to be true.Different pathways and mechanisms of terrorism involvement operate in different ways for different people at different points in time and perhaps in different contexts. This article explores the problems in defining radicalization and radicalism, and suggests that radicalization—and more specifically, involvement in terrorism—might best be viewed as a set of diverse processes. It goes on to review several …


Radicalization Of Islamist Terrorists In The Western World, Daniel H. Heinke, Ryan Hunter Dec 2010

Radicalization Of Islamist Terrorists In The Western World, Daniel H. Heinke, Ryan Hunter

Dr. Daniel H. Heinke

Unified simplified model of the radicalization process of homegrown Islamist terrorists.


U.S. Response To Terrorism: A Strategic Analysis Of The Afghanistan Campaign, Valentina Taddeo May 2010

U.S. Response To Terrorism: A Strategic Analysis Of The Afghanistan Campaign, Valentina Taddeo

Journal of Strategic Security

This article examines the U.S. response to global terrorism and its campaign in Afghanistan from 2001 to today. The aim of this article is first to understand the fallacies, missteps, and misunderstandings of the U.S. approach in Afghanistan. Second, the analysis evaluates the lessons learnt and some possible strategies for achieving long-term stability and security in Afghanistan. In particular, the analysis focuses on the different strategies adopted by the United States and their achievements. Despite a first victory over the Taliban regime, the initial approach was focused on the enemy only and it lacked long-term planning, paving the way to …


Extinguishing The Torch Of Terror: The Threat Of Terrorism And The 2010 Olympics, Serge E. Vidalis Nov 2009

Extinguishing The Torch Of Terror: The Threat Of Terrorism And The 2010 Olympics, Serge E. Vidalis

Journal of Strategic Security

With the change in seasons comes the expected change of insurgency operations in Afghanistan as Taliban and al-Qaida fighters mount their spring and summer offensives against both NATO forces and Afghanis sympathetic to foreign troops. As insurgents curtail their seasonal operations with the arrival of fall and winter, is it likely that a threat may arise from Afghanistan to affect the 2010 Olympics in Vancouver, British Columbia? As will be illustrated herein, the threat to the games will not be borne directly from the insurgency in Afghanistan but rather by the universal jihadist ideology of al-Qaida rather than the nationalist …


What Price Security?, Donald C. Masters Sep 2009

What Price Security?, Donald C. Masters

Journal of Strategic Security

This article presents a critique of the Copenhagen Consensus Center's(CCC) exhaustive study on transnational terrorism, published in 2008.The implications of this study are controversial, yet highly relevant in today's economic environment. The Obama administration must come toterms with fiscal realities that will challenge budget priorities and invigorate what will undoubtedly prove to be tough negotiations on Capitol Hill for homeland security dollars. It is proposed here that standard economic tools such as benefit cost analysis, cost effectiveness criteria, and simulation models can help identify areas where security can be either extended or improved using fewer resources. Greater movement towards competitive …


Targeted Killing: Self-Defense, Preemption, And The War On Terrorism, Thomas Byron Hunter May 2009

Targeted Killing: Self-Defense, Preemption, And The War On Terrorism, Thomas Byron Hunter

Journal of Strategic Security

This paper assesses the parameters and utility of “targeted killing” in combating terrorism and its role within the norm of state self-defense in the international community. The author’s thesis is that, while targeted killing provides states with a method of combating terrorism, and while it is “effective” on a number of levels, it is inherently limited and not a panacea. The adoption and execution of such a program brings with it, among other potential pitfalls, political repercussions. Targeted killing is defined herein as the premeditated, preemptive, and intentional killing of an individual or individuals known or believed to represent a …


Let Privateers Marque Terrorism: A Proposal For A Reawakening, Robert P. Dewitte Jan 2007

Let Privateers Marque Terrorism: A Proposal For A Reawakening, Robert P. Dewitte

Indiana Law Journal

No abstract provided.