Articles

80 Items

U.S. Army Soldiers share tactics and training with Nigerian Army Soldiers, Nigeria, February 8, 2018.

Capt. James Sheehan, U.S. Army

Journal Article - Quarterly Journal: International Security

The Cult of the Persuasive: Why U.S. Security Assistance Fails

    Author:
  • Rachel Tecott Metz
| Winter 2022/23

Why does the U.S. Army rely on persuasion to influence military partners to improve their forces despite repeated failures that undermine U.S. foreign policy goals? The army prioritizes its role as a fighting force, not an advisory group. U.S. leaders have developed an ideology—the cult of the persuasive—to advance army bureaucratic interests.

Ugandan police and other security forces chase people off the streets to avoid unrest after all public transport was banned for two weeks to halt the spread of the new coronavirus.

AP Photo/Ronald Kabuubi

Journal Article - Quarterly Journal: International Security

Opportunistic Repression: Civilian Targeting by the State in Response to COVID-19

    Authors:
  • Donald Grasse
  • Melissa Pavlik
  • Hilary Matfess
  • Travis B. Curtice
| Fall 2021

Opportunistic repression arises when states use crises to suppress the political opposition. An examination of the relationship between COVID-19 shutdown policies and state violence against civilians in Africa, including and a subnational case study of Uganda, tests this theory.

teaser image

Journal Article

Lines, Flows and Transnational Crime: Toward a Revised Approach to Countering the Underworld of Globalization

| Dec. 16, 2019

In this article, we develop a new framework for combating transnational criminal activity. We argue that global illicit flows, perpetrated by organized crime, in the interstices of lawful trade and travel, embody a critical and debilitating non-state security threat in today’s world, one that the Westphalian international system of sovereign states remains ill-equipped to confront. Accordingly, we seek to generate a wider discussion in the field regarding a revised approach to this threat that is situated within a global framework of collaborative law enforcement which incorporates, in appropriate fashion, certain military and counter-terrorist strategies.

The propositions we advance in support of a revised approach to countering transnational crime and its globalized web-enabled criminals include: (a) terrorism is one species of transnational crime; (b) the criminal justice model of arrest, prosecution, conviction and incarceration is a partial and insufficient response to transnational crime; (c) national security and law enforcement functions should be viewed analytically as a “public security” continuum rather than disciplines separated by bright lines; (d) countering transnational criminal organizations effectively may require development of a hybrid law enforcement/military capacity and new strategic and tactical doctrines, including safeguards against abuse, to govern its deployment; (e) joint border management within nations and between them, coordinated with the private sector, is required and inter-agency cooperation and multilateral institutions must be strengthened in accordance with new international norms and (f) North America, a region construed as extending from Colombia to the Arctic and from Bermuda to Hawaii, could develop in the future, together with the European Union, as an initial site for a model pilot of the new approach.

U.S. President Dwight D. Eisenhower and Secretary of State John Foster Dulles (from left) greet South Vietnamese President Ngo Dinh Diem at Washington National Airport

DoD/Department of the Air Force

Journal Article - Small Wars Journal

Bernard Fall as an Andrew Marshall Avant la Lettre (Part II)

| Dec. 09, 2019

SWJ interview with Nathaniel L. Moir, Ph.D., an Ernest May Postdoctoral Fellow in History and Policy at the Belfer Center for Science and International Affairs, Harvard Kennedy School. Dr. Moir is completing a book manuscript on Bernard Fall for publication.

a new barrier is built along the Texas-Mexico border near downtown El Paso

AP/Eric Gay

Newspaper Article - The Huffington Post

Border Security Expert Tells 'Mansplaining' Rep. Dan Crenshaw Why A Wall Won't Work

    Author:
  • David Moye
| Feb. 05, 2019

Juliette Kayyem suggested that freshman Texas GOP Representative Dan Crenshaw support his argument on border security with facts — "not with mocking a woman."  This article covers the Twitter exchange.

teaser image

Journal Article - Foreign Affairs

Preventing the Next Attack: A Strategy for the War on Terrorism

| Oct. 16, 2017

Today, the terrorist threat looks much different than it did right before 9/11. The U.S. counterterrorism community has dramatically ramped up its intelligence capabilities. Determined to “connect the dots” in the future, the U.S. government created new agencies and instituted a new paradigm for intelligence—share by rule, withhold by exception—and set up a slew of “fusion centers” and joint task forces to foster interagency cooperation. Borders were hardened, cockpit doors reinforced, and watch lists created. In Afghanistan, the United States overthrew the Taliban regime, which was hosting al Qaeda. Today, despite recent Taliban gains, al Qaeda still does not enjoy free rein in the country. In Iraq and Syria, al Qaeda’s offshoot, the Islamic State (or ISIS), is on the run, thanks to the work of a global coalition assembled in 2014 and U.S.-led air strikes and special operations raids. The group’s Iraqi capital of Mosul fell in July, and its Syrian stronghold in Raqqa is almost certain to follow. Owing to the relentless pressure that the United States and its allies have placed on terrorists’ safe havens, the threat of a complex and catastrophic attack emanating from abroad—although not gone—has diminished. At the same time, however, the threat from homegrown and so called lone-wolf terrorism has increased.

teaser image

Magazine Article - The American Prospect

Long Lines and Disasters: The TSA in a Time of Troubles

| May 20, 2016

"The way TSA and certainly security experts like me think about security is that we talk about layered security: That is, what you want is enough layers. None of them are perfect; everyone is willing to admit that. You might secure some doors and not others. But you put enough layers in those access points for violence to become a little bit more difficult."

The women in this image are Minova, DRC, rape survivors who are veiled so they cannot be seen or recognized in court during their testimony.

Globalpost image

Journal Article - Journal of Peace Research

Sexual Violence in Armed Conflict: Introducing the SVAC Dataset, 1989–2009

| May 2014

Which armed groups have perpetrated sexual violence in recent conflicts? This article presents patterns from the new Sexual Violence in Armed Conflict (SVAC) dataset. The dataset, coded from the three most widely used sources in the quantitative human rights literature, covers 129 active conflicts, and the 625 armed actors involved in these conflicts, during the period 1989–2009.

Anti-EULEX (European Union Rule of Law Initiative) Graffiti - Mitrovica (Serb Side) - Kosovo, October 26, 2013

Adam Jones, Ph.D. Photo

Journal Article - Nationalities Papers

Towards the Rule of Law in Kosovo: EULEX Should Go

| 2014

Following Kosovo's declaration of independence in February 2008, the European Union deployed a rule of law mission in Kosovo (EULEX). While EULEX and its supporters have argued that the mission has the potential to succeed, critics claim that the mission has failed to significantly improve Kosovo's rule of law institutions, to address the rule of law vacuum in the north of Kosovo, and to prosecute high-level organized crime and corruption.