Articles

25 Items

A protester holds up a placard outside the U.S. Consulate in Hong Kong, Wednesday, June 26, 2019.

AP Photo/Kin Cheung

Journal Article - Quarterly Journal: International Security

Nowhere to Hide? Global Policing and the Politics of Extradition

    Author:
  • Daniel Krcmaric
| Fall 2022

U.S. power extends beyond the military and economic spheres to include policing. The United States has used its global policing power to capture terrorists, warlords, and drug kingpins. But extradition is not simply a bureaucratic tool. States’ geopolitical interests shape their willingness to cooperate with others in extraditing fugitives. 

A set of NanoRacks CubeSats is photographed by an Expedition 38 crew member after the deployment by the Small Satellite Orbital Deployer (SSOD).

NASA

Journal Article - Quarterly Journal: International Security

Small Satellites, Big Data: Uncovering the Invisible in Maritime Security

    Authors:
  • Saadia Pekkanen
  • Setsuko Aoki
  • John Mittleman
| Fall 2022

The world’s oceans have always provided ships with room to hide. New technology is changing that. Small satellites now collect terabytes of global data daily. Computational analytics can mine that data as humans cannot. Increasingly, this information expands the ability to identify and track ships and their activities, including those affecting national and international security. 

Soldiers conducting a Mobile Training Team deployment in Liberia.

U.S. Army

Journal Article - Quarterly Journal: International Security

Soldiers' Dilemma: Foreign Military Training and Liberal Norm Conflict

| Spring 2022

When the U.S. military trains other states’ forces, it tries to impart liberal norms such as respect for human rights. But when liberal norms clash, these soldiers prioritize loyalty to their unit, the military, and shared goals.

Signing of the SALT treaty between the U.S. and the U.S.S.R. is observed by officials as U.S. President Richard Nixon, left and Soviet leader Leonid Brezhnev, right, sign document in Moscow, May 26, 1972. (AP Photo)

AP Photo

Journal Article - Quarterly Journal: International Security

Arms Control as Wedge Strategy: How Arms Limitation Deals Divide Alliances

| Fall 2021

Wedge strategy theory explains how states use strategic arms control to divide adversaries by affecting their trust, threat perceptions, and beliefs about a commitment’s trade-offs. Examining three landmark arms control negotiations shows how the wedge motive was a key component to these negotiations.

Ugandan police and other security forces chase people off the streets to avoid unrest after all public transport was banned for two weeks to halt the spread of the new coronavirus.

AP Photo/Ronald Kabuubi

Journal Article - Quarterly Journal: International Security

Opportunistic Repression: Civilian Targeting by the State in Response to COVID-19

    Authors:
  • Donald Grasse
  • Melissa Pavlik
  • Hilary Matfess
  • Travis B. Curtice
| Fall 2021

Opportunistic repression arises when states use crises to suppress the political opposition. An examination of the relationship between COVID-19 shutdown policies and state violence against civilians in Africa, including and a subnational case study of Uganda, tests this theory.

Black Americans register to vote in the July 4 Georgia Democratic Primary in Atlanta, Ga., on May 3, 1944. Registrations are increasing in Atlanta as black schools are giving instructions to students in ballot casting procedure.

AP Photo

Journal Article - Quarterly Journal: International Security

White Supremacy, Terrorism, and the Failure of Reconstruction in the United States

| Summer 2021

White Southerners opposed to Reconstruction used violence to undermine Black political power and force uncommitted white Southerners to their side. Although structural factors made it harder for the U.S. government to suppress this violence, a series of policy failures prompted Reconstruction’s failure and generations of injustice.

Anti-EULEX (European Union Rule of Law Initiative) Graffiti - Mitrovica (Serb Side) - Kosovo, October 26, 2013

Adam Jones, Ph.D. Photo

Journal Article - Nationalities Papers

Towards the Rule of Law in Kosovo: EULEX Should Go

| 2014

Following Kosovo's declaration of independence in February 2008, the European Union deployed a rule of law mission in Kosovo (EULEX). While EULEX and its supporters have argued that the mission has the potential to succeed, critics claim that the mission has failed to significantly improve Kosovo's rule of law institutions, to address the rule of law vacuum in the north of Kosovo, and to prosecute high-level organized crime and corruption.

Secretary of Defense Robert M. Gates and U.S. Ambassador to Mexico Carlos Pascual attend the Merida Initiative Plenary, which focuses on helping the Mexican government fight drug-trafficking cartels and other security threats, 23 March 2010.

DoD Photo

Magazine Article - Foreign Policy

Think Again: Mexican Drug Cartels

| November-December 2013

"The cartels, along with the violence and corruption they perpetrate, are threats to both Mexico and the United States. The problem is a complicated one and taps areas of profound policy disagreement. The way to make progress in combating the DTOs is to ignore issues like gun control and illegal immigration and follow the money. Stanching the cartels' profits will do more to end the bloodshed than any new fence or law."

Journal Article - University of Pennsylvania Journal of Constitutional Law Heightened Scrutiny

Decrypting the Fifth Amendment: The Limits of Self-Incrimination

| October 2012

In "Decrypting the Fifth Amendment: The Limits of Self-Incrimination in the Digital Era," Vivek Mohan and John Villasenor examine the scope of information protected from compelled self-incriminating disclosure by exploring the boundaries of the contents of the mind. They propose a framework for bringing the foregone conclusion doctrine, which was articulated in 1976, into the digital era, and conclude that the question of what constitutes a "testimonial act" must be revisited to proactively ensure that emerging technologies do not eviscerate the Fifth Amendment privilege against self-incrimination.