Articles

192 Items

teaser image

Journal Article

Lines, Flows and Transnational Crime: Toward a Revised Approach to Countering the Underworld of Globalization

| Dec. 16, 2019

In this article, we develop a new framework for combating transnational criminal activity. We argue that global illicit flows, perpetrated by organized crime, in the interstices of lawful trade and travel, embody a critical and debilitating non-state security threat in today’s world, one that the Westphalian international system of sovereign states remains ill-equipped to confront. Accordingly, we seek to generate a wider discussion in the field regarding a revised approach to this threat that is situated within a global framework of collaborative law enforcement which incorporates, in appropriate fashion, certain military and counter-terrorist strategies.

The propositions we advance in support of a revised approach to countering transnational crime and its globalized web-enabled criminals include: (a) terrorism is one species of transnational crime; (b) the criminal justice model of arrest, prosecution, conviction and incarceration is a partial and insufficient response to transnational crime; (c) national security and law enforcement functions should be viewed analytically as a “public security” continuum rather than disciplines separated by bright lines; (d) countering transnational criminal organizations effectively may require development of a hybrid law enforcement/military capacity and new strategic and tactical doctrines, including safeguards against abuse, to govern its deployment; (e) joint border management within nations and between them, coordinated with the private sector, is required and inter-agency cooperation and multilateral institutions must be strengthened in accordance with new international norms and (f) North America, a region construed as extending from Colombia to the Arctic and from Bermuda to Hawaii, could develop in the future, together with the European Union, as an initial site for a model pilot of the new approach.

a new barrier is built along the Texas-Mexico border near downtown El Paso

AP/Eric Gay

Newspaper Article - The Huffington Post

Border Security Expert Tells 'Mansplaining' Rep. Dan Crenshaw Why A Wall Won't Work

    Author:
  • David Moye
| Feb. 05, 2019

Juliette Kayyem suggested that freshman Texas GOP Representative Dan Crenshaw support his argument on border security with facts — "not with mocking a woman."  This article covers the Twitter exchange.

teaser image

Journal Article - Foreign Affairs

Preventing the Next Attack: A Strategy for the War on Terrorism

| Oct. 16, 2017

Today, the terrorist threat looks much different than it did right before 9/11. The U.S. counterterrorism community has dramatically ramped up its intelligence capabilities. Determined to “connect the dots” in the future, the U.S. government created new agencies and instituted a new paradigm for intelligence—share by rule, withhold by exception—and set up a slew of “fusion centers” and joint task forces to foster interagency cooperation. Borders were hardened, cockpit doors reinforced, and watch lists created. In Afghanistan, the United States overthrew the Taliban regime, which was hosting al Qaeda. Today, despite recent Taliban gains, al Qaeda still does not enjoy free rein in the country. In Iraq and Syria, al Qaeda’s offshoot, the Islamic State (or ISIS), is on the run, thanks to the work of a global coalition assembled in 2014 and U.S.-led air strikes and special operations raids. The group’s Iraqi capital of Mosul fell in July, and its Syrian stronghold in Raqqa is almost certain to follow. Owing to the relentless pressure that the United States and its allies have placed on terrorists’ safe havens, the threat of a complex and catastrophic attack emanating from abroad—although not gone—has diminished. At the same time, however, the threat from homegrown and so called lone-wolf terrorism has increased.

teaser image

Magazine Article - Forbes

U.S. Ambassador To India Richard Verma Leaves A Lasting Legacy To Follow

| Feb. 03, 2017

Richard Verma’s two-year tenure as U.S. Ambassador to India concluded last month with the new incoming presidential administration. During his time in New Delhi, Verma established himself as one of the most consequential envoys to ever occupy the prestigious post once held by such foreign policy legends as John Kenneth Galbraith and Frank Wisner. The first Indian American to serve in the role, Verma leaves behind a far-reaching legacy. He raised the U.S-India strategic partnership to unparalleled heights in virtually every arena of bilateral cooperation while serving as a skilled and talented public diplomat.

teaser image

Magazine Article - The American Prospect

Long Lines and Disasters: The TSA in a Time of Troubles

| May 20, 2016

"The way TSA and certainly security experts like me think about security is that we talk about layered security: That is, what you want is enough layers. None of them are perfect; everyone is willing to admit that. You might secure some doors and not others. But you put enough layers in those access points for violence to become a little bit more difficult."

U.S. Secretary of Energy Ernest Moniz (left) and Secretary of State John Kerry (center) meeting in Vienna to discuss the Iran nuclear agreement.

Carlos Barria/Agence France-Presse

Newspaper Article - The New York Times

Crucial Questions Remain as Iran Nuclear Talks Approach Deadline

| June 28, 2015

Iran’s top nuclear negotiator was heading back to Tehran on Sunday to consult with his nation’s leadership, as negotiators remained divided over how to limit and monitor Tehran’s nuclear program and even on how to interpret the preliminary agreement they reached two months ago.

Journal Article - IEEE Security & Privacy

Regulating Cybersecurity: Institutional Learning or a Lesson in Futility?

| November-December 2014

On 22 November 2013, the Federal Energy Regulatory Commission approved the latest version of mandatory cybersecurity regulations for the bulk electric system—known as Critical Infrastructure Protection (CIP) Reliability Standards. The CIP standards are relatively unique: they are developed through an unusual model of industry-led regulation that places industry, and not federal regulators, at the center of regulatory design and enforcement. The CIP regulations have received a significant amount of criticism. Critics argue that the regulations are incomplete at best and irreparably flawed at worst. The author examines the lessons we can learn from the CIP standards and poses a provocative question: Are the regulations actually a secret success?

Gas centrifuges for uranium enrichment recovered en route to Libya in 2003.

U.S. Department of Energy

Journal Article - Quarterly Journal: International Security

The Nonproliferation Emperor Has No Clothes: The Gas Centrifuge, Supply-Side Controls, and the Future of Nuclear Proliferation

| Spring 2014

Policymakers have long focused on preventing nuclear weapons proliferation by controlling technology. Even developing countries, however, may now possess the technical ability to create nuclear weapons. The history of gas centrifuge development in twenty countries supports this perspective. To reduce the demand for nuclear weapons, policymakers will have look toward the cultural, normative, and political organization of the world.

In a move that disappointed environmental groups and cheered the oil industry, the Obama administration on Jan. 31, 2014, said it had no major environmental objections to the proposed Keystone XL oil pipeline from Canada.

AP Images

Journal Article - Energy Research & Social Science

Rethinking the Governance of Energy Infrastructure

| March 2014

Providing societies with reliable energy services, fighting energy poverty and mitigating climate change entail a crucial infrastructure component. Both the energy access and the low carbon challenge require more decentralized energy solutions and a change in the energy infrastructure paradigm. Yet, physical energy infrastructure co-evolves with socio-economic institutions, actors and social norms. This may produce inertia against change. The energy challenge also requires solutions at multiple scales and may entail elements of common pool resource problems. Therefore, the governance of energy infrastructure needs to be polycentric. This allows for contextualization, experimentation and innovation. The article concludes by sketching routes of further research into the energy infrastructure governance nexus in social science research.