Articles

64 Items

teaser image

Journal Article

Lines, Flows and Transnational Crime: Toward a Revised Approach to Countering the Underworld of Globalization

| Dec. 16, 2019

In this article, we develop a new framework for combating transnational criminal activity. We argue that global illicit flows, perpetrated by organized crime, in the interstices of lawful trade and travel, embody a critical and debilitating non-state security threat in today’s world, one that the Westphalian international system of sovereign states remains ill-equipped to confront. Accordingly, we seek to generate a wider discussion in the field regarding a revised approach to this threat that is situated within a global framework of collaborative law enforcement which incorporates, in appropriate fashion, certain military and counter-terrorist strategies.

The propositions we advance in support of a revised approach to countering transnational crime and its globalized web-enabled criminals include: (a) terrorism is one species of transnational crime; (b) the criminal justice model of arrest, prosecution, conviction and incarceration is a partial and insufficient response to transnational crime; (c) national security and law enforcement functions should be viewed analytically as a “public security” continuum rather than disciplines separated by bright lines; (d) countering transnational criminal organizations effectively may require development of a hybrid law enforcement/military capacity and new strategic and tactical doctrines, including safeguards against abuse, to govern its deployment; (e) joint border management within nations and between them, coordinated with the private sector, is required and inter-agency cooperation and multilateral institutions must be strengthened in accordance with new international norms and (f) North America, a region construed as extending from Colombia to the Arctic and from Bermuda to Hawaii, could develop in the future, together with the European Union, as an initial site for a model pilot of the new approach.

a new barrier is built along the Texas-Mexico border near downtown El Paso

AP/Eric Gay

Newspaper Article - The Huffington Post

Border Security Expert Tells 'Mansplaining' Rep. Dan Crenshaw Why A Wall Won't Work

    Author:
  • David Moye
| Feb. 05, 2019

Juliette Kayyem suggested that freshman Texas GOP Representative Dan Crenshaw support his argument on border security with facts — "not with mocking a woman."  This article covers the Twitter exchange.

teaser image

Journal Article - Foreign Affairs

Preventing the Next Attack: A Strategy for the War on Terrorism

| Oct. 16, 2017

Today, the terrorist threat looks much different than it did right before 9/11. The U.S. counterterrorism community has dramatically ramped up its intelligence capabilities. Determined to “connect the dots” in the future, the U.S. government created new agencies and instituted a new paradigm for intelligence—share by rule, withhold by exception—and set up a slew of “fusion centers” and joint task forces to foster interagency cooperation. Borders were hardened, cockpit doors reinforced, and watch lists created. In Afghanistan, the United States overthrew the Taliban regime, which was hosting al Qaeda. Today, despite recent Taliban gains, al Qaeda still does not enjoy free rein in the country. In Iraq and Syria, al Qaeda’s offshoot, the Islamic State (or ISIS), is on the run, thanks to the work of a global coalition assembled in 2014 and U.S.-led air strikes and special operations raids. The group’s Iraqi capital of Mosul fell in July, and its Syrian stronghold in Raqqa is almost certain to follow. Owing to the relentless pressure that the United States and its allies have placed on terrorists’ safe havens, the threat of a complex and catastrophic attack emanating from abroad—although not gone—has diminished. At the same time, however, the threat from homegrown and so called lone-wolf terrorism has increased.

teaser image

Magazine Article - The American Prospect

Long Lines and Disasters: The TSA in a Time of Troubles

| May 20, 2016

"The way TSA and certainly security experts like me think about security is that we talk about layered security: That is, what you want is enough layers. None of them are perfect; everyone is willing to admit that. You might secure some doors and not others. But you put enough layers in those access points for violence to become a little bit more difficult."

teaser image

Magazine Article - GlobalPost

Iran nuclear deal: 3 Questions with Ambassador Nick Burns

| November 24, 2013

Iran and six world powers clinched a deal on Sunday curbing the Iranian nuclear program in exchange for initial sanctions relief. Sounds pretty good, but of course nothing is that simple and already Israel has called it a "historic mistake." Which is it? And what's going to happen next? Harvard Kennedy School professor and GlobalPost senior foreign affairs columnist, Nicholas Burns, weighs in.

U.S. Sailors assigned to Navy Cyber Defense Operations Command (NCDOC) man their stations at Joint Expeditionary Base Little Creek-Fort Story, Va., Aug. 4, 2010.

U.S. Navy Photo

Journal Article - Quarterly Journal: International Security

The Myth of Cyberwar: Bringing War in Cyberspace Back Down to Earth

    Author:
  • Erik Gartzke
| Fall 2013

Cyberwar has been described as a revolution in military affairs capable of overturning the prevailing world order. By itself, however, cyberwar can achieve neither conquest nor, in most cases, coercion. Conflict over the internet is much more likely to serve as an adjunct to, rather than a substitute for, existing modes of terrestrial force, and to augment the advantages of status quo powers rather than threatening existing political hierarchies.

March 8, 2012: Norwich University student Adam Marenna, of Belair, Md.  Deep in the bowels of a building on the campus of the nation's oldest private military academy, students from across the globe are being taught to fight the war of the future.

AP Photo/Toby Talbot

Journal Article - Quarterly Journal: International Security

The Meaning of the Cyber Revolution: Perils to Theory and Statecraft

| Fall 2013

While decisionmakers warn about the cyber threat constantly, there is little systematic analysis of the issue from an international security studies perspective. Cyberweapons are expanding the range of possible harm between the concepts of war and peace, and give rise to enormous defense complications and dangers to strategic stability. It is detrimental to the intellectual progress and policy relevance of the security studies field to continue to avoid the cyber revolution's central questions.