•  
  •  
 

Author Biography

The writer holds a Master's Degree in Political Science from the University of Connecticut. He is presently studying for his doctorate at the University of Nottingham. His research interests include American foreign policy, transnational revolutionary organizations, and covert action.

DOI

https://doi.org/10.5038/1944-0472.13.2.1795

Subject Area Keywords

Security policy

Abstract

When terrorist attacks became more frequent and destructive in the early portion of the twenty-first century, American officials asserted that Islamist networks needed to be crippled. After a campaign against these groups was launched, Washington began to rely on some new security measures. For the past two decades, several studies have been produced about innovations such as drone strikes. What has not been seen, though, are analyses of measures that the U.S. unveiled in the Cold War and has continued to use in the effort against Islamist organizations. Within this article, America;s continued reliance on transferal operations will be taken into consideration. While a military intervention is in progress, policymakers declare that U.S. troops will be withdrawn from a country once indigenous elements are capable of inheriting their responsibilities. However, a security transfer usually takes place when the intervention becomes unpopular on the American home front.

Share

COinS