Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 5 of 5

Full-Text Articles in Entire DC Network

Where The Border Ends: How Reactive Policies To Terrorism Became Conduits For Drone Technology And The Enclosure Of Wealthy Nations, Arron Mitchell Mar 2023

Where The Border Ends: How Reactive Policies To Terrorism Became Conduits For Drone Technology And The Enclosure Of Wealthy Nations, Arron Mitchell

PPPA Paper Prize

The Antiterrorism and Effective Death Penalty Act (1996) and the USA PATRIOT Act (2001) are two key examples of reactive policies enacted in response to terrorist attacks on American soil. Expedited passage of both pieces of legislation were reliant on the public’s support for government action in wake of recent atrocities. These acts gave particular attention to securing the nation’s borders, directing an increase in funding for Border Patrol in order to prevent future terrorist attacks. This essay will connect the increased funding for border security directed by Congress with the defense industry’s pursuit of funding and outlets for drone …


Is The Transit Industry Prepared For The Cyber Revolution? Policy Recommendations To Enhance Surface Transit Cyber Preparedness, Scott Belcher, Terri Belcher, Eric Greenwald, Brandon Thomas Sep 2020

Is The Transit Industry Prepared For The Cyber Revolution? Policy Recommendations To Enhance Surface Transit Cyber Preparedness, Scott Belcher, Terri Belcher, Eric Greenwald, Brandon Thomas

Mineta Transportation Institute

The intent of this study is to assess the readiness, resourcing, and structure of public transit agencies to identify, protect from, detect, respond to, and recover from cybersecurity vulnerabilities and threats. Given the multitude of connected devices already in use by the transit industry and the vast amount of data generated (with more coming online soon), the transit industry is vulnerable to malicious cyber-attack and other cybersecurity-related threats. This study reviews the state of best cybersecurity practices in public surface transit; outlines U.S. public surface transit operators’ cybersecurity operations; assesses U.S. policy on cybersecurity in public surface transportation; and provides …


Strategic Rocket Forces, Soviet, Bert Chapman Dec 2014

Strategic Rocket Forces, Soviet, Bert Chapman

Libraries Faculty and Staff Scholarship and Research

Describes and analyzes the historic development and evolution of the Soviet Union's Strategic Rocket Forces which were a key part of this country's nuclear weapons arsenal. Covers the technical, political, economic, and military reasons for this force's development. U.S. efforts to monitor and assess the quantity and quality of these weapons are also covered.


Dwight Eisenhower, The Warrior, & John Kennedy, The Cold Warrior: Foreign Policy Under Two Presidents, Andrew C. Nosti Oct 2014

Dwight Eisenhower, The Warrior, & John Kennedy, The Cold Warrior: Foreign Policy Under Two Presidents, Andrew C. Nosti

Student Publications

This paper presents a comparison between President Eisenhower and President Kennedy's foreign affairs policies, specifically regarding the Cold War, by examining the presidents' interactions with four distinct Cold War regions.


Global Assessment Of Ec Mine Action Policy And Actions 2002-2004, Russell Gasser, Robert Keeley Mar 2005

Global Assessment Of Ec Mine Action Policy And Actions 2002-2004, Russell Gasser, Robert Keeley

Global CWD Repository

The Anti-Personnel Landmine Regulation mandates an overall assessment of all EC mine action every three years. This report contains the first such assessment for the period 2002-2004. The total funding by all EC budget lines for 2002-2004 for mine action was about 116M, of which the horizontal mine action budget line was nearly 40% at 45M. The total for the same period for all EU mine action, including contributions by Member States, was about 410M, of which the dedicated budget line is just 11%. The overall assessment reviewed four areas: 1) how the APL Regulation was used to generate mine …