Journal of Strategic Security
[7 followers] Follow
Open Access journal
ISSN (Print) 1944-0464 - ISSN (Online) 1944-0472
Published by Henley-Putnam University [1 journal]
- Superforecasting: The Art and Science of Prediction. By Philip Eyrikson
Tetlock and Dan Gardner. New York, N.Y.: Crown Publishers, 2015
Authors: Edward M. Roche, Ph.D; J.D.
PubDate: Mon, 14 Mar 2016 13:32:21 PDT
- Relentless Strike: The Secret History of Joint Special Operations Command.
By Sean Naylor. New York: St. Martin’s Press, 2015
Authors: Martin S. Catino Ph.D
PubDate: Mon, 14 Mar 2016 13:32:14 PDT
- The Great War of Our Time: The CIA’s Fight Against Terrorism from Al
Qa’ida to ISIS. By Michael Morell with Bill Harolow, New York, NY:
Hachette Book Group, 2015
PubDate: Mon, 14 Mar 2016 13:32:08 PDT
- Disciplining Terror: How Experts Invented “Terrorism”. By Lisa
Stampnitzky. Cambridge, UK: Cambridge University Press, 2014.
Authors: Mark Roberts
PubDate: Mon, 14 Mar 2016 13:32:02 PDT
- Comparative Analysis of VNSA Complex Engineering Efforts
Authors: Gary A. Ackerman
Abstract: The case studies undertaken in this special issue demonstrate unequivocally that, despite being forced to operate clandestinely and facing the pressures of security forces seeking to hunt them down and neutralize them, at least a subset of violent non-state actors (VNSAs) are capable of some genuinely impressive feats of engineering. At the same time, success in such endeavours is not guaranteed and VNSAs will undoubtedly face a number of obstacles along the way. A comparative analysis of the cases also reveals new insights about the factors influencing the decision to pursue complex engineering efforts, the implementation of such decisions and the determinants of the ultimate outcome. These result in a set of hypotheses and indicators that, if confirmed by future research, can contribute to both operational and strategic intelligence assessments. Overall, the current study enriches our understanding of how and why VNSAs might engage in complex engineering efforts.
PubDate: Mon, 14 Mar 2016 13:31:55 PDT
- A.Q. Khan Nuclear Smuggling Network
Authors: Molly MacCalman
Abstract: Abdul Qadeer Khan, widely viewed as the father of Pakistan’s nuclear weapons program, was arrested on January 31, 2004 for his key role in the black market sale of nuclear technology and equipment to Iran, North Korea, Libya, and possibly others. A.Q. Khan’s nuclear smuggling network prospered throughout the 1980s and 1990s and was linked to middlemen and businesses in over 20 countries. The network offered buyers a menu of both technical expertise and materials with prices ranging from millions to hundreds of millions of dollars. The Khan network was ultimately exposed largely due to years of intelligence gathering by the United States and the United Kingdom. However, very few of the network’s members have been successfully prosecuted and the demand for nuclear material by both state and non-state actors continues. The exposure of Khan’s network confirmed that a non-state actor could procure and sell a turnkey nuclear weapons program to willing buyers.
PubDate: Mon, 14 Mar 2016 13:31:47 PDT
- Digging Into Israel: The Sophisticated Tunneling Network of Hamas
Authors: Nicole J. Watkins et al.
Abstract: By the end of Operation Protective Edge in August 2014, the Israel Defense Force (IDF) claimed to have discovered and destroyed more than 30 tunnels spanning from beneath Gaza into Israeli territory. Hamas officials have praised these tunnels as an innovative approach to fighting an asymmetric war with a far more conventionally powerful Israel. The purpose of this case study is to examine the complexity of Hamas’ vast tunneling network by assessing the motivations behind the group’s decision to construct the network, to identify the factors that enabled Hamas to engage in such a complex engineering task, and to assess the level of effectiveness of the tunnel network both strategically and tactically against the IDF.
PubDate: Mon, 14 Mar 2016 13:31:38 PDT
- Los Zetas and Proprietary Radio Network Development
Authors: James Halverson
Abstract: The years from 2006 through 2011 were very active years for a number of Mexican drug trafficking organizations. However, the group that probably saw the most meteoric rise in this period, Los Zetas, had a unique and innovative tool at their disposal. It was during these years that the group constructed and utilized a proprietary encrypted radio network that grew to span from Texas to Guatemala through the Gulf States of Mexico and across much of the rest of the country. This network gave the group an operational edge. It also stood as a symbol of the latitude the group enjoyed across vast areas, as this extensive illicit infrastructure stood, in the face of the government and rival cartels, for six years. This investigation explicates the process by which Los Zetas constructed, concealed and utilized this network and attempts to draw conclusions about the motivations and organizational dynamics that brought the network to be, with attention paid to what this case says about the complex engineering capabilities of non-state entities in general.
PubDate: Mon, 14 Mar 2016 13:31:31 PDT
- The Revolutionary Armed Forces of Colombia (FARC) and the Development of
Authors: Michelle Jacome Jaramillo
Abstract: The Revolutionary Armed Forces of Colombia (FARC) have been one of the world's most consistently formidable violent non-state actors over the last forty years. Unsurprisingly, the group has provided one of the most compelling and concerning examples of the level of technical sophistication attainable by sub-state organizations. Over the last two decades the group has carried out an iterative and innovative process that, in reaction to improved detection capabilities, has brought them from depending on disposable go-fast boats to transport drugs to possessing fully submersible and reusable covert vessels for transportation. The following case study will discuss the development of narco-submarines and the underlying motivations behind the pursuit of this complex engineering task. The case study will outline the different phases of the narco-submarine development and highlight FARC’s determination to overcome the challenges present in each design. This discussion will show how FARC’s systematized acquiring of information and expertise has resulted in the accomplishment of fully submersible vessels, capable of transporting more than 10 tons of illicit product.
PubDate: Mon, 14 Mar 2016 13:31:23 PDT
- Aum Shinrikyo’s Nuclear and Chemical Weapons Development Efforts
Authors: Andrea A. Nehorayoff et al.
Abstract: This article details the terrorist activities of the Japanese cult, Aum Shinrikyo, from the perspective of its complex engineering efforts aimed at producing nuclear and chemical weapons. The experience of this millenarian organization illustrates that even violent non-state actors with considerable wealth and resources at their disposal face numerous obstacles to realizing their destructive aspirations. Specifically, Aum’s attempts at complex engineering were stymied by a combination of unchecked fantastical thinking, self-imposed ideological constraints, and a capricious leadership. The chapter highlights each of these mechanisms, as well as the specific ways in which they constrained the decision-making process and the implementation of the complex engineering tasks associated with their unconventional weapons development.
PubDate: Mon, 14 Mar 2016 13:31:12 PDT
- The Provisional Irish Republican Army and the Development of Mortars
Authors: Gary A. Ackerman
Abstract: The Provisional Irish Republican Army (PIRA) repeatedly showed itself to be one of the most inventive and adaptive of all the violent non-state actors who operated in the latter part of the twentieth century. Among its most innovative exploits was the PIRA’s successful development and fielding – spanning almost its entire operational lifetime – of improvised mortar systems. This chapter will trace the sustained development of mortars, including the underlying motivations for pursuing mortars as a complex engineering effort, the process by which the development took place and the underpinnings of its success. The discussion will show that the PIRA’s mortar development program was born out of tactical necessity but enabled by good organizational practices and the organization’s access to materials, expertise and places in which to leverage these.
PubDate: Mon, 14 Mar 2016 13:31:05 PDT
- “Designing Danger”: Complex Engineering by Violent Non-State
Actors: Introduction to the Special Issue
Authors: Gary A. Ackerman
Abstract: This Special Issue of the Journal of Strategic Security (JSS) presents the results of a series of case studies of prior efforts by VNSAs to engage in complex engineering tasks, in the hope of informing strategic assessments of the threat of VNSA exploitation of emerging technologies. One particular concern in international security lies at the nexus of violent non-state actors (VNSAs) and sophisticated technologies. When it comes to the assessment of such threats, much of the analysis hinges upon being able to accurately judge the desire and capability of adversaries to successfully carry out complex engineering operations. Yet, the actual process of how and why VNSAs engage in these efforts and the determinants of their success or failure are understudied aspects, at least in terms of systematic comparison across actors, technologies and time periods. This special issue presents the results of a series of case studies of prior efforts by VNSAs to engage in complex engineering tasks, in the hope of informing strategic assessments of the threat of VNSA exploitation of emerging technologies. The introductory article defines a complex engineering effort, summarizes the existing literature on the topic and sets out the methodology and framing questions used in the case studies.
PubDate: Mon, 14 Mar 2016 13:30:57 PDT
- Foreword to the Special Issue on Complex Engineering by Violent Non-State
Authors: Jez Littlewood
PubDate: Mon, 14 Mar 2016 13:30:50 PDT
- Table of Contents
PubDate: Mon, 14 Mar 2016 13:30:45 PDT
- Table of Contents
PubDate: Mon, 07 Dec 2015 09:44:24 PST
- Intelligence Communication in the Digital Era: Transforming Security,
Defence and Business. Edited by Rubén Arcos and Randolph H. Pherson.
Basingstoke, England: Palgrave Macmillan, 2015
Authors: Nicole J. Drumhiller
PubDate: Mon, 07 Dec 2015 09:44:23 PST
- The Red Web: The Struggle Between Russia's Digital Dictators and the
New Online Revolutionaries. By Andrei Soldatov and Irina Borogan. New
York, N.Y.: PublicAffairs, 2015
Authors: Edward M. Roche
PubDate: Mon, 07 Dec 2015 09:44:22 PST
- The Routledge History of Terrorism. Edited by Randall D. Law. New York,
N.Y.: Routledge, 2015
Authors: Mark J. Roberts
PubDate: Mon, 07 Dec 2015 09:44:21 PST
- A Spy Among Friends: Kim Philby and the Great Betrayal. By Ben Macintyre,
NY: Crown, 2014
Authors: Robert Smith
PubDate: Mon, 07 Dec 2015 09:44:20 PST
- Understanding the Intelligence Cycle. Edited by Mark Phythian. New York:
Authors: Cynthia Nolan
PubDate: Mon, 07 Dec 2015 09:44:19 PST