Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- National security (2)
- Terrorism (2)
- Afghanistan (1)
- Agriculture (1)
- Agroterrorism (1)
-
- Asymmetric (1)
- Biodefense (1)
- Biological weapons (1)
- Bioterrorism (1)
- Control networks (1)
- Corporate networks (1)
- Countering violent extremism (1)
- Counterinsurgency (1)
- Counterterrorism (1)
- Critical infrastructure (1)
- Cyber attack (1)
- Cybersecurity (1)
- Cyberterrorism (1)
- Deterrence (1)
- El Salvador (1)
- Foreign policy (1)
- Foreign terrorist fighters (1)
- Gulf Cooperation Council (1)
- ICS (1)
- Insurgency (1)
- International alliances (1)
- Iraq (1)
- Middle East (1)
- NIST framework (1)
- Nation-building (1)
Articles 1 - 6 of 6
Full-Text Articles in Entire DC Network
Roots And Goals Of The State Of Qatar's Contradictory Foreign Policy: Implications For U.S. National Security Interests, Osarodion Odosamamwen Izevbigie
Roots And Goals Of The State Of Qatar's Contradictory Foreign Policy: Implications For U.S. National Security Interests, Osarodion Odosamamwen Izevbigie
MSU Graduate Theses
Qatar‟s foreign policies and the tools used in achieving them pose various risks and dangers to the interests of the United States, and its allies. These tools involve the use of the media, terrorist organizations, hedging, investments, hyperactive diplomacy, and strategic alliances. Through these tools, Qatar aims to achieve influence and objectives, which are normally beyond the political circumference of small states. For instance, as a tool of influence, Qatar maintains relationships with terrorist organizations, which has serious implications for the U.S. fight against terrorism. However, as an ally, Qatar has advantages for the U.S. through its purchase of U.S. …
Analysis Of Nation-Building During Insurgency In U.S. Defense Policy Strategy, Joseph Valles
Analysis Of Nation-Building During Insurgency In U.S. Defense Policy Strategy, Joseph Valles
MSU Graduate Theses
U.S. defense policy has often relied on a strategy of nation-building to reform the local government and address the root causes of the instability in a given nation or region. This strategy has, in recent years, been criticized for being ineffective and a wasteful drain on American resources. This paper will determine if such criticism is valid by analyzing the performance of four security environments where such a strategy was used: Vietnam, El Salvador, Afghanistan, and Iraq. The paper will determine if such a strategy was effective in these conflicts by analyzing the progress of reforms and, when possible, the …
Cybersecurity For Critical Infrastructure: Addressing Threats And Vulnerabilities In Canada, Samuel A. Cohen
Cybersecurity For Critical Infrastructure: Addressing Threats And Vulnerabilities In Canada, Samuel A. Cohen
MSU Graduate Theses
The aim of this thesis is to assess the unique technical and policy-based cybersecurity challenges facing Canada’s critical infrastructure environment and to analyze how current government and industry practices are not equipped to remediate or offset associated strategic risks to the country. Further, the thesis also provides cases and evidence demonstrating that Canada’s critical infrastructure has been specifically targeted by foreign and domestic cyber threat actors to pressure the country’s economic, safety and national security interests. Essential services that Canadians and Canadian businesses rely on daily are intricately linked to the availability and integrity of vital infrastructure sectors, such as …
An Examination Of The Potential Threat Of A State-Sponsored Biological Attack Against The United States: A Study Of Policy Implications, Courtney Anne Pfluke
An Examination Of The Potential Threat Of A State-Sponsored Biological Attack Against The United States: A Study Of Policy Implications, Courtney Anne Pfluke
MSU Graduate Theses
In 2002, US Navy Seals found a list of pathogens in an Afghanistan cave that Al Qaeda had planned to use in a series of biological attacks. Unique about the discovery was that the pathogens were not limited to human ones. Six pathogens targeted livestock and four targeted crops. Despite this discovery, limited attention has been given to the possibility of a state-sponsored terrorist attack utilizing biological agents against the US population, food source, or water supply. Throughout history, biological agents have been developed for use as an offensive weapon for both states and terrorist groups. The United States may …
Terrorism In The 2020s: Examining The Global Threat Landscape, Landon W. Swearngin
Terrorism In The 2020s: Examining The Global Threat Landscape, Landon W. Swearngin
MSU Graduate Theses
This thesis uses quantitative and qualitative research methods to (1) explore the global trends and trajectories of terrorism, (2) identify emerging strategic challenges, and (3) outline an opportunity analysis for U.S. counterterrorism strategy. Collectively, this project provides a strategic forecast for terrorism in the 2020s, demonstrating that terrorism is becoming increasingly dangerous, dynamic, and difficult to defeat.
Disaggregating The United States Military: An Analysis Of The Current Organizational And Management Structure Of U.S. National Security Policy As It Relates To Military Operations In Space, Joseph M. Zeman
MSU Graduate Theses
This thesis was written to provide the reader with a comprehensive assessment about the realities of the current organizational and management structure of United States national security policy as it relates to the conduct of military operations in space. To create an encompassing argument, this thesis considers the current organizational structure of United States space policy while acknowledging that space has, in fact, become a warfighting domain. A reorganization of this magnitude has the potential to generate a succinct chain of command for military space operations while condensing the space acquisitions process and ultimately providing military space operations with the …