Articles

63 Items

teaser image

Journal Article

Lines, Flows and Transnational Crime: Toward a Revised Approach to Countering the Underworld of Globalization

| Dec. 16, 2019

In this article, we develop a new framework for combating transnational criminal activity. We argue that global illicit flows, perpetrated by organized crime, in the interstices of lawful trade and travel, embody a critical and debilitating non-state security threat in today’s world, one that the Westphalian international system of sovereign states remains ill-equipped to confront. Accordingly, we seek to generate a wider discussion in the field regarding a revised approach to this threat that is situated within a global framework of collaborative law enforcement which incorporates, in appropriate fashion, certain military and counter-terrorist strategies.

The propositions we advance in support of a revised approach to countering transnational crime and its globalized web-enabled criminals include: (a) terrorism is one species of transnational crime; (b) the criminal justice model of arrest, prosecution, conviction and incarceration is a partial and insufficient response to transnational crime; (c) national security and law enforcement functions should be viewed analytically as a “public security” continuum rather than disciplines separated by bright lines; (d) countering transnational criminal organizations effectively may require development of a hybrid law enforcement/military capacity and new strategic and tactical doctrines, including safeguards against abuse, to govern its deployment; (e) joint border management within nations and between them, coordinated with the private sector, is required and inter-agency cooperation and multilateral institutions must be strengthened in accordance with new international norms and (f) North America, a region construed as extending from Colombia to the Arctic and from Bermuda to Hawaii, could develop in the future, together with the European Union, as an initial site for a model pilot of the new approach.

a new barrier is built along the Texas-Mexico border near downtown El Paso

AP/Eric Gay

Newspaper Article - The Huffington Post

Border Security Expert Tells 'Mansplaining' Rep. Dan Crenshaw Why A Wall Won't Work

    Author:
  • David Moye
| Feb. 05, 2019

Juliette Kayyem suggested that freshman Texas GOP Representative Dan Crenshaw support his argument on border security with facts — "not with mocking a woman."  This article covers the Twitter exchange.

Chinese stealth fighter in the air

(China Military Online)

Journal Article - Quarterly Journal: International Security

Why China Has Not Caught Up Yet: Military-Technological Superiority, Systems Integration, and the Challenges of Imitation, Reverse Engineering, and Cyber-Espionage

| Winter 2018/19

The extraordinary complexity of today’s advanced weapons systems has significantly reduced the ability of states to imitate other states’ military technology. Consequently, U.S. rivals such as China will continue to struggle to develop indigenous capabilities that can match those of the United States.

teaser image

Journal Article - Global Policy

The Case for Economic Development Through Sovereign Investment: A Paradox of Scarcity?

| Apr. 14, 2018

Sovereign wealth funds (SWFs) have traditionally been created to recycle excess reserves from natural resource or non‐commodity revenues. However, in recent years funds are being established under conditions of capital scarcity with objectives to contribute domestic economic development, often through the buildout of national infrastructure programs. Such trends in new fund creation represent a fundamental shift in the sovereign wealth fund paradigm and raise serious questions about how these entities are to be capitalized and also the implications of capitalization models on their sustainability. This study examines the recent evolution of SWF models focused on economic development. Its analytic focus is drawn, in particular, to countries that are neither endowed with oil wealth, nor otherwise enjoy export surpluses to be used to capitalize a development‐oriented SWF. While this study is relevant to and expands the scope of the broad literature on SWFs, its specific contribution is as a focused analysis of how SWF funding sources impact achieving long‐term financial and socio‐economic development objectives.

teaser image

Journal Article - Foreign Affairs

Preventing the Next Attack: A Strategy for the War on Terrorism

| Oct. 16, 2017

Today, the terrorist threat looks much different than it did right before 9/11. The U.S. counterterrorism community has dramatically ramped up its intelligence capabilities. Determined to “connect the dots” in the future, the U.S. government created new agencies and instituted a new paradigm for intelligence—share by rule, withhold by exception—and set up a slew of “fusion centers” and joint task forces to foster interagency cooperation. Borders were hardened, cockpit doors reinforced, and watch lists created. In Afghanistan, the United States overthrew the Taliban regime, which was hosting al Qaeda. Today, despite recent Taliban gains, al Qaeda still does not enjoy free rein in the country. In Iraq and Syria, al Qaeda’s offshoot, the Islamic State (or ISIS), is on the run, thanks to the work of a global coalition assembled in 2014 and U.S.-led air strikes and special operations raids. The group’s Iraqi capital of Mosul fell in July, and its Syrian stronghold in Raqqa is almost certain to follow. Owing to the relentless pressure that the United States and its allies have placed on terrorists’ safe havens, the threat of a complex and catastrophic attack emanating from abroad—although not gone—has diminished. At the same time, however, the threat from homegrown and so called lone-wolf terrorism has increased.

teaser image

Magazine Article - The American Prospect

Long Lines and Disasters: The TSA in a Time of Troubles

| May 20, 2016

"The way TSA and certainly security experts like me think about security is that we talk about layered security: That is, what you want is enough layers. None of them are perfect; everyone is willing to admit that. You might secure some doors and not others. But you put enough layers in those access points for violence to become a little bit more difficult."

teaser image

Magazine Article - GlobalPost

Iran nuclear deal: 3 Questions with Ambassador Nick Burns

| November 24, 2013

Iran and six world powers clinched a deal on Sunday curbing the Iranian nuclear program in exchange for initial sanctions relief. Sounds pretty good, but of course nothing is that simple and already Israel has called it a "historic mistake." Which is it? And what's going to happen next? Harvard Kennedy School professor and GlobalPost senior foreign affairs columnist, Nicholas Burns, weighs in.

Security detail overseeing the secure transportation of highly enriched uranium to Russia in Poland, October 2010

USA.gov

Journal Article - Journal of Nuclear Materials Management

Preventing Insider Theft: Lessons from the Casino and Pharmaceutical Industries

| June 17, 2013

Through structured interviews and a literature review, we assess which approaches to protection against insider thefts in the casino and pharmaceutical industries could be usefully applied to strengthen protections against insider theft in the nuclear industry, where insider thefts could have very high consequences.

Police gather near Capitol Hill after reports of gunfire. Since Sept. 11, innocuous events like people getting sick on a plane can trigger outsize responses, and government officials and citizens are still trying to figure out how much fear is healthy.

AP Photo

Journal Article - Quarterly Journal: International Security

The Terrorism Delusion: America’s Overwrought Response to September 11

    Authors:
  • John Mueller
  • Mark G. Stewart
| Summer 2012

The reaction of the United States to the terrorist attacks of September 11, 2001, has been massively disproportionate to the actual threat posed by al-Qaida. This exaggerated response has inspired an expensive quest to ferret out, and even to create, a nearly nonexistent threat. The evidence suggests that the attacks of September 11, however tragic and dramatic in the first instance, have spurred more than a decade of needlessly high-cost anxiety and alarm despite exceedingly limited evidence that such a high level of fear is warranted.