Articles

166 Items

teaser image

Journal Article

Lines, Flows and Transnational Crime: Toward a Revised Approach to Countering the Underworld of Globalization

| Dec. 16, 2019

In this article, we develop a new framework for combating transnational criminal activity. We argue that global illicit flows, perpetrated by organized crime, in the interstices of lawful trade and travel, embody a critical and debilitating non-state security threat in today’s world, one that the Westphalian international system of sovereign states remains ill-equipped to confront. Accordingly, we seek to generate a wider discussion in the field regarding a revised approach to this threat that is situated within a global framework of collaborative law enforcement which incorporates, in appropriate fashion, certain military and counter-terrorist strategies.

The propositions we advance in support of a revised approach to countering transnational crime and its globalized web-enabled criminals include: (a) terrorism is one species of transnational crime; (b) the criminal justice model of arrest, prosecution, conviction and incarceration is a partial and insufficient response to transnational crime; (c) national security and law enforcement functions should be viewed analytically as a “public security” continuum rather than disciplines separated by bright lines; (d) countering transnational criminal organizations effectively may require development of a hybrid law enforcement/military capacity and new strategic and tactical doctrines, including safeguards against abuse, to govern its deployment; (e) joint border management within nations and between them, coordinated with the private sector, is required and inter-agency cooperation and multilateral institutions must be strengthened in accordance with new international norms and (f) North America, a region construed as extending from Colombia to the Arctic and from Bermuda to Hawaii, could develop in the future, together with the European Union, as an initial site for a model pilot of the new approach.

people look at a destroyed houses near the village of Barisha, in Idlib province, Syria, after an operation by the U.S. military which targeted Abu Bakr al-Baghdadi, the shadowy leader of the Islamic State group.

Ghaith Alsayed

Newspaper Article - The New York Times

Intelligence From al-Baghdadi Raid, Including 2 Prisoners, Could Reveal Trove of ISIS Clues

| Oct. 28, 2019

Delta Force commandos took two Islamic State fighters as prisoners and a trove of intelligence from the now-destroyed compound where AbuBakral-Baghdadi, the world’s most wanted terrorist, had been hiding, officials said Monday.

Nigerian schoolgirls sitting in presidential palace

(AP Photo/Azeez Akunleyan)

Journal Article - Quarterly Journal: International Security

“We Have Captured Your Women”: Explaining Jihadist Norm Change

| Summer 2019

In Pakistan and Nigeria, jihadist entrepreneurs have capitalized on external trigger events not only to successfully challenge established religious doctrine and norms, but to adopt radically new norms, including the use of gendered violence.

A funeral ceremony in Kobani, Syria

Wikicommons

Journal Article - E-International Relations (E-IR)

Societal (In)Security in the Middle East: Radicalism as a Reaction?

| Apr. 24, 2019

Societal insecurity, stemming from historical and functional realities has emboldened the identity-based gap of states vs. societies in the Arab region. The division of the Ottoman Empire into new states without much attention to identity lines, created a historical identity challenge in those states. On the other hand, Arab ruling elites’ efforts to enforce state-centred identities failed to prevent the challenge of conflicting identities. Later on, their functional inefficiencies emboldened the identity dichotomy.

As a result of threats perceived by Arab societies against their collective identity as well as separate challenges facing each state, the state-society gap continues to challenge state identities. Collectively perceived threats create and strengthen collective frameworks intended to address those threats. And among other frameworks come radical and terrorist organisations.

a new barrier is built along the Texas-Mexico border near downtown El Paso

AP/Eric Gay

Newspaper Article - The Huffington Post

Border Security Expert Tells 'Mansplaining' Rep. Dan Crenshaw Why A Wall Won't Work

    Author:
  • David Moye
| Feb. 05, 2019

Juliette Kayyem suggested that freshman Texas GOP Representative Dan Crenshaw support his argument on border security with facts — "not with mocking a woman."  This article covers the Twitter exchange.

Chinese stealth fighter in the air

(China Military Online)

Journal Article - Quarterly Journal: International Security

Why China Has Not Caught Up Yet: Military-Technological Superiority, Systems Integration, and the Challenges of Imitation, Reverse Engineering, and Cyber-Espionage

| Winter 2018/19

The extraordinary complexity of today’s advanced weapons systems has significantly reduced the ability of states to imitate other states’ military technology. Consequently, U.S. rivals such as China will continue to struggle to develop indigenous capabilities that can match those of the United States.

teaser image

Journal Article - Global Policy

The Case for Economic Development Through Sovereign Investment: A Paradox of Scarcity?

| Apr. 14, 2018

Sovereign wealth funds (SWFs) have traditionally been created to recycle excess reserves from natural resource or non‐commodity revenues. However, in recent years funds are being established under conditions of capital scarcity with objectives to contribute domestic economic development, often through the buildout of national infrastructure programs. Such trends in new fund creation represent a fundamental shift in the sovereign wealth fund paradigm and raise serious questions about how these entities are to be capitalized and also the implications of capitalization models on their sustainability. This study examines the recent evolution of SWF models focused on economic development. Its analytic focus is drawn, in particular, to countries that are neither endowed with oil wealth, nor otherwise enjoy export surpluses to be used to capitalize a development‐oriented SWF. While this study is relevant to and expands the scope of the broad literature on SWFs, its specific contribution is as a focused analysis of how SWF funding sources impact achieving long‐term financial and socio‐economic development objectives.

Floating desalination unit "Hydriada" powered by wind and solar energy

Creative Commons

Journal Article - Renewable and Sustainable Energy Reviews

Towards Sustainability in Water-energy Nexus: Ocean Energy for Seawater Desalination

In this article, the authors review the state of the art of ocean energy in desalination. It explores different sources of energy from the ocean that include electricity generation, as well as mechanical force and thermal energy and salinity gradients that can also be directly harnessed for powering the desalination processes. They also examine recent advances in scaling up for commercial deployment and discuss relevant cost, environmental, and social concerns.