Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 23 of 23

Full-Text Articles in Law

Reviving The United States' Commitment To Pakistan And Afghanistan, Steve A. Young, Imdad Hussain Sahito Nov 2009

Reviving The United States' Commitment To Pakistan And Afghanistan, Steve A. Young, Imdad Hussain Sahito

Journal of Strategic Security

As President Obama is in the midst of deciding whether additional U.S.combat forces are needed in Afghanistan in addition to the 21,000 troops recently committed, he must realize that additional armed forces are only a stopgap measure in Afghanistan's downward spiral into an 'undergoverned' failed state. Similarly, as Pakistan's fragile and fractured civilian government continues to appease the Tehrik-i-Taliban Pakistan (TTP), an umbrella organization of Pakistani Pashtun tribesmen with Taliban cultural values led by Baitullah Mehsud and others, it comes closer to the concept of a "misgoverned" failed state, possessing a small arsenal of nuclear arms. The problem for the …


The Tangled Web Of Taliban And Associated Movements, Greg Smith Nov 2009

The Tangled Web Of Taliban And Associated Movements, Greg Smith

Journal of Strategic Security

Following the devastating terrorist attacks of September 11, 2001,worldwide attention became focused on the Taliban and al-Qaida forcesin Afghanistan. Prior to the attacks, many people had never heard of the Taliban or their shar'ia-law style of government. Since 2001, manysplinter groups have formed in response to the continual United Statespresence in the region. Today, the term Taliban has been used to envelop several groups such as the Tehrik-i-Taliban Pakistan (TTP), the Haqqani Network (HQN) and the Tehrik-eNifaz-e-Shariat-e-Mohammadi(TNSM). These groups make up the majority of fighters along the Afghanistan-Pakistan border. Many of these groups have been historicrivals for control of the …


Cover & Front Matter Nov 2009

Cover & Front Matter

Journal of Strategic Security

No abstract provided.


Extinguishing The Torch Of Terror: The Threat Of Terrorism And The 2010 Olympics, Serge E. Vidalis Nov 2009

Extinguishing The Torch Of Terror: The Threat Of Terrorism And The 2010 Olympics, Serge E. Vidalis

Journal of Strategic Security

With the change in seasons comes the expected change of insurgency operations in Afghanistan as Taliban and al-Qaida fighters mount their spring and summer offensives against both NATO forces and Afghanis sympathetic to foreign troops. As insurgents curtail their seasonal operations with the arrival of fall and winter, is it likely that a threat may arise from Afghanistan to affect the 2010 Olympics in Vancouver, British Columbia? As will be illustrated herein, the threat to the games will not be borne directly from the insurgency in Afghanistan but rather by the universal jihadist ideology of al-Qaida rather than the nationalist …


Revisiting Downs' Issue-Attention Cycle: International Terrorism And U.S. Public Opinion, Karen K. Petersen Nov 2009

Revisiting Downs' Issue-Attention Cycle: International Terrorism And U.S. Public Opinion, Karen K. Petersen

Journal of Strategic Security

Lamenting the lack of public awareness of international events and U.S. foreign policy is not a particularly novel exercise; yet, explaining the process by which issues enter and exit the public realm remains a challenging endeavor. Despite contributions from researchers working in international relations and mass communication, explaining public inattentiveness continues to vex scholars. However, in his article, "Up and Down with Ecology: The 'Issue-Attention Cycle,'" Anthony Downs provides a parsimonious and tractable model of public opinion that can be applied to foreign policy issues.1 While Downs concerns himself exclusively with domestic issues, particularly environmental issues, his model has thepotential …


Book Reviews, Christine E. Williamson, Ed Urie, Michael Savasta, Robin L. Thompson, D.M., Edward M. Roche Nov 2009

Book Reviews, Christine E. Williamson, Ed Urie, Michael Savasta, Robin L. Thompson, D.M., Edward M. Roche

Journal of Strategic Security

Critical Thinking and Intelligence Analysis. By David T.Moore.

At The Center Of The Storm: The CIA During America's Time of Crisis. By George Tenet with Bill Harlow.

Female Suicide Bombers. By Rosemarie Skaine.

Information Operations: Doctrine and Practice. By Christopher Paul.

The Secret Sentry: The Untold History of the National Security Agency. By Matthew M. Aid.

The Blood of Lambs: A Former Terrorist's Memoir of Death and Redemption. By Kamal Saleem with Lynn Vincent.

Attaché Extraordinaire: Vernon A. Walters in Brazil. By Frank Márcio De Oliveira.


Guerilla Warfare & Law Enforcement: Combating The 21st Century Terrorist Cell Within The U.S., Richard J. Hughbank Nov 2009

Guerilla Warfare & Law Enforcement: Combating The 21st Century Terrorist Cell Within The U.S., Richard J. Hughbank

Journal of Strategic Security

Both domestic and international terrorist organizations employ guerrilla warfare tactics, techniques, and procedures. Thus, the ability to identify and defeat the members of these organizations, cripple their infrastructures, and disrupt their financial resources lies in the understanding of modern guerrilla warfare as it develops in the twenty-first century within the United States.3 The forms of asymmetric warfare4 adopted by domestic and international terrorist groups alike is no longer intended to gain simple media exposure or governmental manipulation; they want to make an overpowering impact by causing massive loss of life and severe damage to infrastructure and are often motivated by …


Islamist Distortions: Hizb Ut- Tahrir A Breeding Ground For Al- Qaida Recruitment, Krishna Mungur Nov 2009

Islamist Distortions: Hizb Ut- Tahrir A Breeding Ground For Al- Qaida Recruitment, Krishna Mungur

Journal of Strategic Security

In 1953, a radical splinter organization from the Muslim Brotherhood,Hizb ut-Tahrir (HuT), was founded by the Al-Azhar University (Cairo,Egypt) educated jurist Sheikh Taqiuddin an-Nabhani who criticized theMuslim Brotherhood for collaborating with Egyptian secularists, such as Gamal Abdel Nasser. A sizable portion of the more radical members of the Muslim Brotherhood broke away, to join Nabhani's budding movement. Today, HuT is known to operate in more than forty countries, calling for the restoration of the Islamic Caliphate, with a history of violence and links to violent terrorist organizations. Given increasing tensions in the region over the presence of coalition troops, Predator …


Countering The Somali Pirates: Harmonizing The International Response, Richard Weitz Sep 2009

Countering The Somali Pirates: Harmonizing The International Response, Richard Weitz

Journal of Strategic Security

The growing threat to international shipping in the Gulf of Aden and neighboring regions from pirates operating off the shores of lawless Somalia has engendered an unparalleled global response. Over the past year, numerous international security organizations as well as national governments have organized many separate multilateral and single-country maritime security operations in the Horn of Africa region. Despite the unprecedented extent of this effort, this mishmash of ad hoc multinational and national initiatives has had only a limited effect. These various contingents typically have conflicting mandates and rules of engagement. They have also become fixated on responding to immediate …


Start: Overcoming Remaining Challenges, Elizabeth Zolotukhina Sep 2009

Start: Overcoming Remaining Challenges, Elizabeth Zolotukhina

Journal of Strategic Security

During the administrations of Presidents George W. Bush and VladimirPutin, the governments of Russia and the United States could not agreeon how to codify their balance of strategic offensive nuclear forces after the existing Strategic Arms Reductions Treaty (START) expired onDecember 5, 2009.1 The United States and Russia are currently engagedin negotiations to replace START with a new treaty before the end of this year.


Keeping Our Campuses And Communities Safe, Ronald Goodman Sep 2009

Keeping Our Campuses And Communities Safe, Ronald Goodman

Journal of Strategic Security

Since the events of September 11, 2001, the U.S. population has a heightened awareness that tragedies can and do strike ordinary people without warning. The same can be said for the unfortunate abundance of campus shootings, where the next "9/11" occurred in 2007 on the campus of Virginia Tech. And yet, subsequent investigations into these horrific events often reveal that clues existed that might have pointed to the eventual violent outcome. It is unquestionable that to dramatically improve the safety and security of our cities we must rely upon the millions of eyes of our fellow citizens to unearth these …


Cover & Front Matter Sep 2009

Cover & Front Matter

Journal of Strategic Security

No abstract provided.


Book Reviews, J. Kelly Stewart, Mark J. Roberts, Jeffery Ahn, Lloyd H. Hoffman, Donald J. Goldstein Sep 2009

Book Reviews, J. Kelly Stewart, Mark J. Roberts, Jeffery Ahn, Lloyd H. Hoffman, Donald J. Goldstein

Journal of Strategic Security

The Accidental Guerilla: Fighting Small Wars in the Midst of a Big One. By David Kilcullen.

Aviation and Airport Security: Terrorism and Safety Concerns. By Kathleen M. Sweet.

Executive Measures, Terrorism and National Security: Have the Rules of the Game Changed? By David Bonner.

Spycraft: The Secret History of the CIA's Spy techs from Communism to Al-Qaeda. By Robert Wallace and H. Keith Melton, with Henry Robert Schlesinger.

Troublesome Young Men: The Rebels who brought Churchill to Power and Saved England. By Lynne Olson.


What Price Security?, Donald C. Masters Sep 2009

What Price Security?, Donald C. Masters

Journal of Strategic Security

This article presents a critique of the Copenhagen Consensus Center's(CCC) exhaustive study on transnational terrorism, published in 2008.The implications of this study are controversial, yet highly relevant in today's economic environment. The Obama administration must come toterms with fiscal realities that will challenge budget priorities and invigorate what will undoubtedly prove to be tough negotiations on Capitol Hill for homeland security dollars. It is proposed here that standard economic tools such as benefit cost analysis, cost effectiveness criteria, and simulation models can help identify areas where security can be either extended or improved using fewer resources. Greater movement towards competitive …


The Tipping Point: Biological Terrorism, Scott Cary Sep 2009

The Tipping Point: Biological Terrorism, Scott Cary

Journal of Strategic Security

This article presents a strategic, operational, and tactical analysis of information currently available on the state of bio-weapons development by non-state actors, primarily Islamist jihadists. It discusses the evidence supporting a practical assessment that non-state actors have begun to acquire, and in the near-term intend to employ, bio-weapons. A pathogen and method of attack specifically designed to achieve the strategic goals of jihadists are presented as functional examples of the problem of the emerging global bio-weapons threat.Is a terrorist attack utilizing biological weapons a real threat? If so, is there a way to predict the circumstances under which it might …


Decision Support For Countering Terrorist Threats Against Transportation Networks, Richard Adler, Jeff Fuller Sep 2009

Decision Support For Countering Terrorist Threats Against Transportation Networks, Richard Adler, Jeff Fuller

Journal of Strategic Security

This article presents a dynamic decision support methodology forcounter-terrorism decision support. The initial sections introduce basic objectives and challenges of terrorism risk analysis and risk management. The remainder of the paper describes TRANSEC, a decision support framework for defining, validating, and monitoring strategies focused on managing terrorism risks to international transportation networks. The methodology and software tools underlying TRANSEC are applicable to other homeland security problems, such as critical infrastructure and border protection.


Fragility: The Next Wave In Critical Infrastructure Protection, Allan Mcdougall May 2009

Fragility: The Next Wave In Critical Infrastructure Protection, Allan Mcdougall

Journal of Strategic Security

In North America today, we are about to embark on a significant effort to repair, or even upgrade, many aspects of our infrastructure. Many of these efforts are linked to economic recovery packages. Others are based on sheer need. The challenge for decision makers and planners involves ensuring that scarce economic resources are put to their best use. Understanding the concept of fragility plays a pivotal part in reaching that understanding.Fragility, like many other systems—particularly Information Technology (IT ) systems—works on the concept of subjects and objects. Subjects are those entities that seek to exploit the services (or capacity) offered …


The Importance Of Intelligence In Combating A Modern Insurgency, Kevin Reamer May 2009

The Importance Of Intelligence In Combating A Modern Insurgency, Kevin Reamer

Journal of Strategic Security

Throughout history the world has been plagued by insurgencies. While the underlying causes of each new insurgency have been different, they are all similar in certain areas. This similarity entails that the effective countering of an insurgency can be turned into a science with a set of guidelines to follow based on conditions on the ground. Guidelines are important because insurgencies are flexible and to defeat them the counterinsurgency must be equally flexible if not more flexible. Good intelligence is critical to the success of an insurgency. With their small, poorly equipped forces, the leaders of insurgencies need to know …


Book Reviews, Edward J. Hagerty, Ed Urie May 2009

Book Reviews, Edward J. Hagerty, Ed Urie

Journal of Strategic Security

Afghanistan: Transition Under Threat. By Geoffrey Hayes and Mark Sedra, editors.

Enemies of Intelligence: Knowledge & Power in American National Security. By Richard K. Betts.


Film Reviews, Bart Bechtel May 2009

Film Reviews, Bart Bechtel

Journal of Strategic Security

No abstract provided.


Al-Qaeda In The Lands Of The Islamic Maghreb, Gregory A. Smith May 2009

Al-Qaeda In The Lands Of The Islamic Maghreb, Gregory A. Smith

Journal of Strategic Security

This paper is organized into four chapters that focus on the terrorist group Al Qaeda in the Lands of the Islamic Maghreb (AQIM). The four chapters examine different facets of the collective environment that have allowed AQIM to succeed and even thrive at times. The first chapter begins with Algeria’s war of independence with the French. The second chapter focuses on the nomadic Tuareg people. It seeks to show how the Tuaregs were deprived by French occupiers and how European colonization cost the Tuaregs access to vital trade routes used for centuries. The third chapter will very briefly examine Algeria’s …


Cover & Front Matter May 2009

Cover & Front Matter

Journal of Strategic Security

No abstract provided.


Targeted Killing: Self-Defense, Preemption, And The War On Terrorism, Thomas Byron Hunter May 2009

Targeted Killing: Self-Defense, Preemption, And The War On Terrorism, Thomas Byron Hunter

Journal of Strategic Security

This paper assesses the parameters and utility of “targeted killing” in combating terrorism and its role within the norm of state self-defense in the international community. The author’s thesis is that, while targeted killing provides states with a method of combating terrorism, and while it is “effective” on a number of levels, it is inherently limited and not a panacea. The adoption and execution of such a program brings with it, among other potential pitfalls, political repercussions. Targeted killing is defined herein as the premeditated, preemptive, and intentional killing of an individual or individuals known or believed to represent a …