Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 9 of 9

Full-Text Articles in Entire DC Network

Assessing Nuclear Security Risks In Pakistan, Sitara Noor Jun 2023

Assessing Nuclear Security Risks In Pakistan, Sitara Noor

International Journal of Nuclear Security

Pakistan’s nuclear program and perceived nuclear security concerns have attracted global attention. The varying concerns range from the potential theft of nuclear weapons or materials to the unauthorized use of a nuclear device to terrorist groups taking control of the Pakistani government. The enduring debate, however, has oscillated between these doomsday scenarios and some optimistic considerations, where various quarters have shared their satisfaction over Pakistan’s nuclear security regime and its ability to deal with the emerging challenges. To address the evolving nature of these threats, Pakistan is constantly improving its nuclear security infrastructure. It has established a comprehensive legislative and …


Countering Terrorism On Tomorrow’S Battlefield: Critical Infrastructure Security And Resiliency (Nato Coe-Dat Handbook 2), Sarah J. Lohmann, Lucas M. Cox, Denise Feldner, Trevor P. Helmy, Frank J. Kuzminski, Marcus Mohlin, Aleksander Olech, Wuraola Oyewusi, Gabriel T. Raicu, Silke Ruhl, Sabrina Schulz, Máté Tóth, Megan A. Ward Dec 2022

Countering Terrorism On Tomorrow’S Battlefield: Critical Infrastructure Security And Resiliency (Nato Coe-Dat Handbook 2), Sarah J. Lohmann, Lucas M. Cox, Denise Feldner, Trevor P. Helmy, Frank J. Kuzminski, Marcus Mohlin, Aleksander Olech, Wuraola Oyewusi, Gabriel T. Raicu, Silke Ruhl, Sabrina Schulz, Máté Tóth, Megan A. Ward

Monographs & Collaborative Studies

Every day, malicious actors target emerging technologies and medical resilience or seek to wreak havoc in the wake of disasters brought on by climate change, energy insecurity, and supply-chain disruptions. Countering Terrorism on Tomorrow’s Battlefield is a handbook on how to strengthen critical infrastructure resilience in an era of emerging threats. The counterterrorism research produced for this volume is in alignment with NATO’s Warfighting Capstone Concept, which details how NATO Allies can transform and maintain their advantage despite new threats for the next two decades. The topics are rooted in NATO’s Seven Baseline requirements, which set the standard for enhancing …


Terror Threat At Tokyo Olympics 2021, Daiju Wada Mar 2021

Terror Threat At Tokyo Olympics 2021, Daiju Wada

Japanese Society and Culture

While we witnessed collapse of Islamic State’s territorial control, Jihadists threat will continue for decades. But the real threat will not come from groups such as Al Qaeda and Islamic State but its Salafi Jihadism. Of course, the ideological threat is not visible and can never be eradicated by military actions. Cyberspace has facilitated the threat to be transnational pandemic phenomenon, as proved by inspired individuals. The backgrounds of those vary by person and this ideology performs as a detonator in driving individuals into violent terrorists.

Japan is located at the periphery of Jihadist’s interest. But Islamic State declared their …


The Evolution Of United States - Central Asian Security Policy Post-9/11: Military, Terrorism, And Cyber-Security, Shamsuddin Karimi Jan 2021

The Evolution Of United States - Central Asian Security Policy Post-9/11: Military, Terrorism, And Cyber-Security, Shamsuddin Karimi

FIU Electronic Theses and Dissertations

Rudyard Kipling once described and wrote about the Great Game as a way to outline 19th century great power politics in the struggle for empire in Central Asia. While Kipling’s tale of spy-craft and espionage is fiction, the political philosophy behind the story has never lost relevance. The struggle for political dominance in Central Asia continued through the twentieth century in the Cold War as well as into twenty-first century after the terrorist attacks on September 11, 2001. Although the great power players may have changed over the past 120 years, the importance of Central Asia has not.

This …


Study On The Implementation Of The Regulations Of Terrorism Activities In Social Media, Angga Dewanto Basari, Muhammad Syauqillah, Asep Usman Ismail Jul 2020

Study On The Implementation Of The Regulations Of Terrorism Activities In Social Media, Angga Dewanto Basari, Muhammad Syauqillah, Asep Usman Ismail

Journal of Strategic and Global Studies

The legal scope of the Terrorism Law and the Information and Electronic Transactions Law in Indonesia is considered as lacking to cover the problem of cybercrime in social media. Aside from literature review, this paper is also supported by data from direct interview with the Head of Counterterrorism Special Detachment 88 (Densus 88 AT) of Indonesian National Police. The data found out that the Terrorism Law is a repressive response towards terrorism crimes that have already occured, but less preventive to future crimes. The existence of laws in Indonesia is often one step behind its crime. The difference of perception …


Women As Nontraditional Terrorists, Giorgi Beruashvili Jan 2020

Women As Nontraditional Terrorists, Giorgi Beruashvili

Honors Undergraduate Theses

Terrorist organizations have always been predominantly dominated by male members in numbers of participants, supporters, and leaders. Despite men having the majority of the roles, oftentimes the world witnesses attack executed by female terrorists which deal a substantial amount of damage to the infrastructure and the peaceful civilians surrounding them. Furthermore, the sense of unpredictability and unpreparedness from the counterterrorist forces and the general public adds up to the overall advantage women possess in the field of terrorism over men. Considering these observations, one can argue that women have grown to be far more dangerous and successful in the field …


The Interplay Of Intelligence, Education, And The Media In Western Counterterrorism Strategies, Lincoln Gimnich May 2018

The Interplay Of Intelligence, Education, And The Media In Western Counterterrorism Strategies, Lincoln Gimnich

International and Global Studies Undergraduate Honors Theses

Terrorist activity has increased and evolved in Western societies in the twenty-first century as terrorist organizations have sought new methods to further their ideologies and goals. Counterterrorism thus requires a similar evolution that undoubtedly reverses the historic trend wherein counterterrorism has been merely reactive. Through interviews with experts, qualitative analysis of governmental publications and documents, and review of existing literature, this project explores the institutions of intelligence, education, and the media and their work within the larger counterterrorism and anti-radicalization framework of Western states. The project focuses specifically on domestic intelligence operations, intelligence sharing agreements, the United Kingdom’s Prevent strategy, …


Human Rights And The War On Terror: Complete 2005 - 2007 Topical Research Digest, Jack Donnelly, Simon Amajuru, Susannah Compton, Robin Davey, Syd Dillard, Amanda Donahoe, Charles Hess, Sydney Fisher, Kelley Laird, Victoria Lowdon, Chris Maggard, Alexandra Nichols, Travis Ning, Toni Panetta, Greg Sanders, James Smithwick, Angela Woolliams, Chris Saeger, Sarah Bania-Dobyns, Eric Dibbern, David Gillespie, Latife Bulur, Katie Friesen, Arika Long, Arianna Nowakowski, Joel R. Pruce Jan 2007

Human Rights And The War On Terror: Complete 2005 - 2007 Topical Research Digest, Jack Donnelly, Simon Amajuru, Susannah Compton, Robin Davey, Syd Dillard, Amanda Donahoe, Charles Hess, Sydney Fisher, Kelley Laird, Victoria Lowdon, Chris Maggard, Alexandra Nichols, Travis Ning, Toni Panetta, Greg Sanders, James Smithwick, Angela Woolliams, Chris Saeger, Sarah Bania-Dobyns, Eric Dibbern, David Gillespie, Latife Bulur, Katie Friesen, Arika Long, Arianna Nowakowski, Joel R. Pruce

Human Rights & Human Welfare

“9/11 changed everything.” Not really. In fact, there has been far more continuity than change over the past six years in both international and domestic politics. Nonetheless, human rights often have been harmed—although not by terrorism but by “the war on terror.”


Influence In An Age Of Terror: A Framework Of Response To Islamist Influence Operations, John Deniston Jan 2007

Influence In An Age Of Terror: A Framework Of Response To Islamist Influence Operations, John Deniston

Global Tides

Adversarial influence operations perpetrated by Islamist terrorist networks confront the most foundational of America’s national defense capabilities: the will of the American people to fight. This assertion is predicated on four key determinations. First, Islamist terrorist networks use influence operations as an integral tool of global jihad. Second, these adversarial influence operations should be perceived as attacks and, subsequently, should demand response. Third, a wide array of US Government tools and institutions currently exists to counter this challenge. Fourth, precision-strike doctrine and cyber-attack response frameworks provide instructional examples of methods to create a coordinated US Government response to such influence …