Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Public Affairs, Public Policy and Public Administration

PDF

Selected Works

Selected Works

National Security

Articles 1 - 15 of 15

Full-Text Articles in Entire DC Network

Acknowledging The Impact Of Climate Change On National Security: A Long And Winding Road, Linda A. Malone Sep 2019

Acknowledging The Impact Of Climate Change On National Security: A Long And Winding Road, Linda A. Malone

Linda A. Malone

No abstract provided.


Strategic Cyberwar Theory - A Foundation For Designing Decisive Strategic Cyber Operations, Jan Kallberg Apr 2016

Strategic Cyberwar Theory - A Foundation For Designing Decisive Strategic Cyber Operations, Jan Kallberg

Jan Kallberg

Traditional military theory applied in cyber struggles with four challenges – anonymity, object permanence, measurable results, and rapid digital execution. In a Clausewitzian world, these challenges were non-existent. The enemy was clearly marked, the battle field was fixed, the results of the battle was visible, and it occurred not at computational speed but instead in a pace that allowed human leadership to act. Traditional military thinking does not support decisive action in a future nation state cyber conflict. The utility of cyber attacks is dependent on the institutional design of the targeted society. Strategic cyberwar theory utilizes ‘Occam’s Razor’ to …


Integration Of And The Potential For Islamic Radicalization Among Ethnic Turks In Germany, Alev Dudek Apr 2015

Integration Of And The Potential For Islamic Radicalization Among Ethnic Turks In Germany, Alev Dudek

Alev Dudek

In spite of ongoing improvements, integration of ethnic Turks in Germany remains a challenge from the dominant culture perspective, whereas a deeply ingrained institutional and everyday racism and the lack of legal protection against discrimination pose a challenge to full participation of ethnic Turks from another perspective. In an increasingly xenophobic Europe, particularly Germany, an increase in potential for religious and nationalist radicalization in different groups including ethnic Turks is becoming more and more evident. This increase in radical attitudes is not necessarily caused by a lack of integration, as evidenced among well-integrated individuals.

In view of recent developments toward …


Cyber Resilience Is A National Problem, Jan Kallberg Oct 2014

Cyber Resilience Is A National Problem, Jan Kallberg

Jan Kallberg

The biggest challenge for American cyber resilience right now is to disseminate knowledge within the nation. The federal sector, the financial institutions, and the defense complex are on top of the game to a high degree. The asymmetric way cyber conflicts are and will be fought exposes the whole government structure of a country. The sheer numbers entities that form local government are staggering – just as examples I mention that in the US there are 6,000 counties, 15,000 police departments, and 50,000 public utilities. My take is that to be able to strengthen American cyber resiliency local government needs …


Why The Cyber Bill Matters, Jan Kallberg Jun 2014

Why The Cyber Bill Matters, Jan Kallberg

Jan Kallberg

The separation between private sphere and the federal government matters more than we might think. The bill will create a funnel for industries, enterprises, local government, and state agencies to share information with the federal government. The bill separates the federal government and these other entities – by a traditional but validated approach – by the surrender to federal government for protection by bargaining away the “right” to self-protection. It is important because the federal government will maintain its legitimacy and authority over defending the nation – and by doing so we avoid a chaotic cyber environment where everyone is …


Cyber Beyond Computers - The Environmental Aspect, Jan Kallberg Feb 2014

Cyber Beyond Computers - The Environmental Aspect, Jan Kallberg

Jan Kallberg

A forgotten aspect on cyber and cyber conflicts impact on our society is the fact that tampering with our control systems can lead to industrial processes running amok - and lead to environmental damages. Threats to our environment is taken very serious by the population and pollution and contamination of our living space trigger drastic reactions.


Societal Cyberwar Theory Applied The Disruptive Power Of State Actor Aggression For Public Sector Information Security, Jan Kallberg, Bhavani Thuraisingham, Erik Lakomaa Aug 2013

Societal Cyberwar Theory Applied The Disruptive Power Of State Actor Aggression For Public Sector Information Security, Jan Kallberg, Bhavani Thuraisingham, Erik Lakomaa

Jan Kallberg

Abstract – The modern welfare state faces significant challenges to be able to sustain a systematic cyber conflict that pursues the institutional destabilization of the targeted state.

Cyber defense in these advanced democracies are limited, unstructured, and focused on anecdotal cyber interchanges of marginal geopolitical value.

The factual reach of government activities once a conflict is initiated is likely to be miniscule. Therefore the information security activities, and assessments leading to cyberdefense efforts, have to be strategically pre-event coordinated within the state. This coordination should be following a framework that ensures institutional stability, public trust, and limit challenges to the …


Chapter 13: Operation Neptune Spear: Was Killing Bin Laden A Legitimate Military Objective?, Kevin H. Govern Feb 2013

Chapter 13: Operation Neptune Spear: Was Killing Bin Laden A Legitimate Military Objective?, Kevin H. Govern

Kevin H. Govern

In this chapter I take the killing of Osama bin Laden as a test case for considering the moral and legal status of intentionally killing individuals deemed a threat to national security, under conditions in which the object of the targeted attack is offered little or no opportunity to surrender to attacking forces. The target in such operations, in short, is treated as though he were a belligerent: a person placed on a kill list may be targeted in a way that would be legitimate if he were an enemy combatant. In such cases, we think of him as having …


Towards A Conceptual Model Of User Acceptance Of Location-Based Emergency Services, Anas Aloudat, Katina Michael Dec 2012

Towards A Conceptual Model Of User Acceptance Of Location-Based Emergency Services, Anas Aloudat, Katina Michael

Professor Katina Michael

This paper investigates the introduction of location-based services by government as part of an all-hazards approach to modern emergency management solutions. Its main contribution is in exploring the determinants of an individual’s acceptance or rejection of location services. The authors put forward a conceptual model to better predict why an individual would accept or reject such services, especially with respect to emergencies. While it may be posited by government agencies that individuals would unanimously wish to accept life-saving and life-sustaining location services for their well-being, this view remains untested. The theorised determinants include: visibility of the service solution, perceived service …


Book Review: Handbook On Securing Cyber-Physical Critical Infrastructure: Foundations And Challenges (Written By Sajal K. Das, Krishna Kant, Nan Zhang), Katina Michael Aug 2012

Book Review: Handbook On Securing Cyber-Physical Critical Infrastructure: Foundations And Challenges (Written By Sajal K. Das, Krishna Kant, Nan Zhang), Katina Michael

Professor Katina Michael

This 800+ page handbook is divided into eight parts and contains thirty chapters, ideal for either an advanced undergraduate or graduate course in security. At the heart of this handbook is how we might go about managing both physical and cyber infrastructures, as they continue to become embedded and enmeshed, through advanced control systems, and new computing and communications paradigms.


Employees' Peers Can Fill Gap When Vetting Clearances, Jan Kallberg Mar 2012

Employees' Peers Can Fill Gap When Vetting Clearances, Jan Kallberg

Jan Kallberg

Federal Times' Jan. 8 editorial ["Time to overhaul security clearance system"] proposed changes in the security clearance system. Many of these proposed changes are straightforward: one unified government body that handles clearances, reciprocity among agencies to honor the clearance, and increased automation. I would like to add another recommendation: peer reporting during the period the security clearance is held. The process of clearing personnel would be faster if we could rely on automated vetting with limited additional manual research, and then add active peer reporting. A structured clearance process at the entrance point can be trespassed, but peers watch and …


Human Rights, Regulation, And National Security, Katina Michael, Simon Bronitt Feb 2012

Human Rights, Regulation, And National Security, Katina Michael, Simon Bronitt

Professor Katina Michael

Law disciplines technology, though it does so in a partial and incomplete way as reflected in the old adage that technology outstrips the capacity of law to regulate it. The rise of new technologies poses a significant threat to human rights – the pervasive use of CCTV (and now mobile CCTV), telecommunications interception, and low-cost audio-visual recording and tracking devices (some of these discreetly wearable), extend the power of the state and corporations significantly to intrude into the lives of citizens.


Recommendations For Australia’S Implementation Of The National Emergency Warning System Using Location-Based Services, Anas Aloudat, Katina Michael, Roba Abbas Sep 2011

Recommendations For Australia’S Implementation Of The National Emergency Warning System Using Location-Based Services, Anas Aloudat, Katina Michael, Roba Abbas

Professor Katina Michael

Mobile alerts, notifications and location-based emergency warning systems are now an established part of mobile government strategies in an increasing number of countries worldwide. In Australia the national emergency warning system (NEWS) was instituted after the tragic Black Saturday Victorian Bushfires of February 2009. In the first phase, NEWS has enabled the provision of public information from the government to the citizen during emergencies anywhere and any time. Moving on from traditional short message service (SMS) notifications and cell broadcasting to more advanced location-based services, this paper provides executive-level recommendations about the viability of location-based mobile phone services in NEWS …


Military Commissions Act Of 2006, Arsalan M. Suleman Dec 2006

Military Commissions Act Of 2006, Arsalan M. Suleman

Arsalan Suleman

On October 17, 2006, President Bush signed into law the Military Commissions Act of 2006 (MCA). Congress passed the MCA to authorize the trial by military commissions of detained terrorism suspects after the Supreme Court's decision in Hamdan v. Rumsfeld invalidated the military commissions previously established pursuant to a 2001 military order from President Bush. The MCA adds chapter 47A to title 10 of the U.S. Code to give statutory authorization for the military commissions. This Recent Development explores some of the more controversial aspects of the MCA, especially those sections that respond to the Court's Hamdan decision. The note …


Soap Box: If Katina Michael Could Send A Message To Government, It Would Be This..., K. Michael Jun 2006

Soap Box: If Katina Michael Could Send A Message To Government, It Would Be This..., K. Michael

Professor Katina Michael

No abstract provided.