Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 30

Full-Text Articles in Entire DC Network

Acknowledging The Impact Of Climate Change On National Security: A Long And Winding Road, Linda A. Malone Sep 2019

Acknowledging The Impact Of Climate Change On National Security: A Long And Winding Road, Linda A. Malone

Linda A. Malone

No abstract provided.


Strategic Cyberwar Theory - A Foundation For Designing Decisive Strategic Cyber Operations, Jan Kallberg Apr 2016

Strategic Cyberwar Theory - A Foundation For Designing Decisive Strategic Cyber Operations, Jan Kallberg

Jan Kallberg

Traditional military theory applied in cyber struggles with four challenges – anonymity, object permanence, measurable results, and rapid digital execution. In a Clausewitzian world, these challenges were non-existent. The enemy was clearly marked, the battle field was fixed, the results of the battle was visible, and it occurred not at computational speed but instead in a pace that allowed human leadership to act. Traditional military thinking does not support decisive action in a future nation state cyber conflict. The utility of cyber attacks is dependent on the institutional design of the targeted society. Strategic cyberwar theory utilizes ‘Occam’s Razor’ to …


Integration Of And The Potential For Islamic Radicalization Among Ethnic Turks In Germany, Alev Dudek Apr 2015

Integration Of And The Potential For Islamic Radicalization Among Ethnic Turks In Germany, Alev Dudek

Alev Dudek

In spite of ongoing improvements, integration of ethnic Turks in Germany remains a challenge from the dominant culture perspective, whereas a deeply ingrained institutional and everyday racism and the lack of legal protection against discrimination pose a challenge to full participation of ethnic Turks from another perspective. In an increasingly xenophobic Europe, particularly Germany, an increase in potential for religious and nationalist radicalization in different groups including ethnic Turks is becoming more and more evident. This increase in radical attitudes is not necessarily caused by a lack of integration, as evidenced among well-integrated individuals.

In view of recent developments toward …


Cyber Resilience Is A National Problem, Jan Kallberg Oct 2014

Cyber Resilience Is A National Problem, Jan Kallberg

Jan Kallberg

The biggest challenge for American cyber resilience right now is to disseminate knowledge within the nation. The federal sector, the financial institutions, and the defense complex are on top of the game to a high degree. The asymmetric way cyber conflicts are and will be fought exposes the whole government structure of a country. The sheer numbers entities that form local government are staggering – just as examples I mention that in the US there are 6,000 counties, 15,000 police departments, and 50,000 public utilities. My take is that to be able to strengthen American cyber resiliency local government needs …


Why The Cyber Bill Matters, Jan Kallberg Jun 2014

Why The Cyber Bill Matters, Jan Kallberg

Jan Kallberg

The separation between private sphere and the federal government matters more than we might think. The bill will create a funnel for industries, enterprises, local government, and state agencies to share information with the federal government. The bill separates the federal government and these other entities – by a traditional but validated approach – by the surrender to federal government for protection by bargaining away the “right” to self-protection. It is important because the federal government will maintain its legitimacy and authority over defending the nation – and by doing so we avoid a chaotic cyber environment where everyone is …


Cyber Beyond Computers - The Environmental Aspect, Jan Kallberg Feb 2014

Cyber Beyond Computers - The Environmental Aspect, Jan Kallberg

Jan Kallberg

A forgotten aspect on cyber and cyber conflicts impact on our society is the fact that tampering with our control systems can lead to industrial processes running amok - and lead to environmental damages. Threats to our environment is taken very serious by the population and pollution and contamination of our living space trigger drastic reactions.


Ebola And Bioterrorism, Joshua P. Monroe Jan 2014

Ebola And Bioterrorism, Joshua P. Monroe

Joshua P Monroe

This paper will be a comparison of the United States government’s reaction to the recent outbreak of Ebola and will compare this response with the potential response by the United States government toward an act of biological or chemical warfare. The paper will analyze these responses from a cultural, political, legal, and policy standpoint


Societal Cyberwar Theory Applied The Disruptive Power Of State Actor Aggression For Public Sector Information Security, Jan Kallberg, Bhavani Thuraisingham, Erik Lakomaa Aug 2013

Societal Cyberwar Theory Applied The Disruptive Power Of State Actor Aggression For Public Sector Information Security, Jan Kallberg, Bhavani Thuraisingham, Erik Lakomaa

Jan Kallberg

Abstract – The modern welfare state faces significant challenges to be able to sustain a systematic cyber conflict that pursues the institutional destabilization of the targeted state.

Cyber defense in these advanced democracies are limited, unstructured, and focused on anecdotal cyber interchanges of marginal geopolitical value.

The factual reach of government activities once a conflict is initiated is likely to be miniscule. Therefore the information security activities, and assessments leading to cyberdefense efforts, have to be strategically pre-event coordinated within the state. This coordination should be following a framework that ensures institutional stability, public trust, and limit challenges to the …


Chapter 13: Operation Neptune Spear: Was Killing Bin Laden A Legitimate Military Objective?, Kevin H. Govern Feb 2013

Chapter 13: Operation Neptune Spear: Was Killing Bin Laden A Legitimate Military Objective?, Kevin H. Govern

Kevin H. Govern

In this chapter I take the killing of Osama bin Laden as a test case for considering the moral and legal status of intentionally killing individuals deemed a threat to national security, under conditions in which the object of the targeted attack is offered little or no opportunity to surrender to attacking forces. The target in such operations, in short, is treated as though he were a belligerent: a person placed on a kill list may be targeted in a way that would be legitimate if he were an enemy combatant. In such cases, we think of him as having …


Mandatory Foreign Language Training For All Military Members, Samuel W. Bettwy Jan 2013

Mandatory Foreign Language Training For All Military Members, Samuel W. Bettwy

Samuel W Bettwy

For too long now, DOD and the military services have been paying lip service to the need for foreign language capability across all ranks. It’s about time that DOD made real progress by mandating foreign language instruction at all levels of military training and schooling and by obtaining the funding needed to expand DLI’s mission to include meaningful language instruction for all servicemembers, both linguists and non-linguists. And by the way, shouldn’t the service academies make foreign language proficiency a requirement for graduation?


Multinational Corporations Are Overlooked Players In Stability, Security, Transition And Reconstruction Operations, Samuel W. Bettwy Jan 2013

Multinational Corporations Are Overlooked Players In Stability, Security, Transition And Reconstruction Operations, Samuel W. Bettwy

Samuel W Bettwy

It has long been acknowledged that multinational corporations have acquired legal personality under international law. Unlike states, however, MNCs are not precluded by notions of sovereignty and territorial inviolability. In the narrative of rogue and failing states and the emerging international norm of humanitarian intervention, most observers characterize MNCs as villainous predators. In states that have a permissive regulatory environment, MNCs exploit cheap labor, enable authoritarian regimes, and pollute the environment. Some observers believe that MNCs are also positive forces that contribute to the economic and political stability of the state and its people. Either way, combatant commanders need to …


Smart Power For Hard Problems: The Role Of Special Operation Forces Strengthening The Rule Of Law And Human Rights In Africa, Kevin H. Govern Jan 2013

Smart Power For Hard Problems: The Role Of Special Operation Forces Strengthening The Rule Of Law And Human Rights In Africa, Kevin H. Govern

Kevin H. Govern

This article will assess the roles and responsibilities of Special Operations Forces (SOF) within the newly created U.S. Africa Command (AFRICOM) as an active proponent of a so-called “smart power” national security strategy. In particular, it will outline the economic, political, and military challenges faced in Africa; specifically, how and why SOCAFRICA is the U.S. force of choice for promoting human rights and rule of law in Africa. With the goals of the U.S. military in mind, questions will necessarily arise as to “what success looks like” for both the U.S. and African nations, and the roles of each in …


Towards A Conceptual Model Of User Acceptance Of Location-Based Emergency Services, Anas Aloudat, Katina Michael Dec 2012

Towards A Conceptual Model Of User Acceptance Of Location-Based Emergency Services, Anas Aloudat, Katina Michael

Professor Katina Michael

This paper investigates the introduction of location-based services by government as part of an all-hazards approach to modern emergency management solutions. Its main contribution is in exploring the determinants of an individual’s acceptance or rejection of location services. The authors put forward a conceptual model to better predict why an individual would accept or reject such services, especially with respect to emergencies. While it may be posited by government agencies that individuals would unanimously wish to accept life-saving and life-sustaining location services for their well-being, this view remains untested. The theorised determinants include: visibility of the service solution, perceived service …


Book Review: Handbook On Securing Cyber-Physical Critical Infrastructure: Foundations And Challenges (Written By Sajal K. Das, Krishna Kant, Nan Zhang), Katina Michael Aug 2012

Book Review: Handbook On Securing Cyber-Physical Critical Infrastructure: Foundations And Challenges (Written By Sajal K. Das, Krishna Kant, Nan Zhang), Katina Michael

Professor Katina Michael

This 800+ page handbook is divided into eight parts and contains thirty chapters, ideal for either an advanced undergraduate or graduate course in security. At the heart of this handbook is how we might go about managing both physical and cyber infrastructures, as they continue to become embedded and enmeshed, through advanced control systems, and new computing and communications paradigms.


The Value Of Government Mandated Location-Based Services In Emergencies In Australia, Anas Aloudat, Katina Michael, Roba Abbas, Mutaz Al-Debei Jul 2012

The Value Of Government Mandated Location-Based Services In Emergencies In Australia, Anas Aloudat, Katina Michael, Roba Abbas, Mutaz Al-Debei

Associate Professor Katina Michael

The adoption of mobile technologies for emergency management has the capacity to save lives. In Australia in February 2009, the Victorian Bushfires claimed 173 lives, the worst peace-time disaster in the nation’s history. The Australian government responded swiftly to the tragedy by going to tender for mobile applications that could be used during emergencies, such as mobile alerts and location services. These applications, which are becoming increasingly accurate with the evolution of positioning techniques, have the ability to deliver personalized information direct to the citizen during crises, complementing traditional broadcasting mediums like television and radio. Indeed governments have a responsibility …


Employees' Peers Can Fill Gap When Vetting Clearances, Jan Kallberg Mar 2012

Employees' Peers Can Fill Gap When Vetting Clearances, Jan Kallberg

Jan Kallberg

Federal Times' Jan. 8 editorial ["Time to overhaul security clearance system"] proposed changes in the security clearance system. Many of these proposed changes are straightforward: one unified government body that handles clearances, reciprocity among agencies to honor the clearance, and increased automation. I would like to add another recommendation: peer reporting during the period the security clearance is held. The process of clearing personnel would be faster if we could rely on automated vetting with limited additional manual research, and then add active peer reporting. A structured clearance process at the entrance point can be trespassed, but peers watch and …


Human Rights, Regulation, And National Security, Katina Michael, Simon Bronitt Feb 2012

Human Rights, Regulation, And National Security, Katina Michael, Simon Bronitt

Professor Katina Michael

Law disciplines technology, though it does so in a partial and incomplete way as reflected in the old adage that technology outstrips the capacity of law to regulate it. The rise of new technologies poses a significant threat to human rights – the pervasive use of CCTV (and now mobile CCTV), telecommunications interception, and low-cost audio-visual recording and tracking devices (some of these discreetly wearable), extend the power of the state and corporations significantly to intrude into the lives of citizens.


Sousveillance And The Social Implications Of Point Of View Technologies In The Law Enforcement Sector, Katina Michael, M.G. Michael Feb 2012

Sousveillance And The Social Implications Of Point Of View Technologies In The Law Enforcement Sector, Katina Michael, M.G. Michael

Associate Professor Katina Michael

Policing today has become a high-tech affair; especially in the provision of incident event tracking and reporting systems increasingly being used to provide evidence in a court of law. These in-car video (ICV) and body worn recording systems are said to increase convictions and eliminate false claims made by defendants, providing documentary support to police officers and their associated actions in an incident. But today, new technologies such as smart phones equipped with cameras and global positioning system chipsets can also be found in the hands of the everyday citizen, used to capture everyday happenings and distributed to social networks …


Location Privacy Under Dire Threat As Uberveillance Stalks The Streets, Katina Michael, Roger Clarke Jan 2012

Location Privacy Under Dire Threat As Uberveillance Stalks The Streets, Katina Michael, Roger Clarke

Associate Professor Katina Michael

Location tracking and monitoring applications have proliferated with the arrival of smart phones that are equipped with onboard global positioning system (GPS) chipsets. It is now possible to locate a smart phone user down to 10 metres of accuracy on average. Innovators have been quick to capitalise on this emerging market by introducing novel pedestrian tracking technologies which can denote the geographic path of a mobile user. At the same time there is contention by law enforcement personnel over the need for a warrant process to track an individual in a public space. This paper considers the future of location …


The Value Of Government Mandated Location-Based Services In Emergencies In Australia, Anas Aloudat, Katina Michael, Roba Abbas, Mutaz M. Al-Debei Dec 2011

The Value Of Government Mandated Location-Based Services In Emergencies In Australia, Anas Aloudat, Katina Michael, Roba Abbas, Mutaz M. Al-Debei

Dr. Mutaz M. Al-Debei

The adoption of mobile technologies for emergency management has the capacity to save lives. In Australia in February 2009, the Victorian Bushfires claimed 173 lives, the worst peace-time disaster in the nation’s history. The Australian government responded swiftly to the tragedy by going to tender for mobile applications that could be used during emergencies, such as mobile alerts and location services. These applications, which are becoming increasingly accurate with the evolution of positioning techniques, have the ability to deliver personalized information direct to the citizen during crises, complementing traditional broadcasting mediums like television and radio. Indeed governments have a responsibility …


Recommendations For Australia’S Implementation Of The National Emergency Warning System Using Location-Based Services, Anas Aloudat, Katina Michael, Roba Abbas Sep 2011

Recommendations For Australia’S Implementation Of The National Emergency Warning System Using Location-Based Services, Anas Aloudat, Katina Michael, Roba Abbas

Professor Katina Michael

Mobile alerts, notifications and location-based emergency warning systems are now an established part of mobile government strategies in an increasing number of countries worldwide. In Australia the national emergency warning system (NEWS) was instituted after the tragic Black Saturday Victorian Bushfires of February 2009. In the first phase, NEWS has enabled the provision of public information from the government to the citizen during emergencies anywhere and any time. Moving on from traditional short message service (SMS) notifications and cell broadcasting to more advanced location-based services, this paper provides executive-level recommendations about the viability of location-based mobile phone services in NEWS …


Iran And The Myth Of Deterrence, William Wunderle, Gabriel Lajeunesse Feb 2010

Iran And The Myth Of Deterrence, William Wunderle, Gabriel Lajeunesse

William Wunderle

Thos who argue deterrence is the answer to a nuclear Iran miss the point -- the real issue is not whether Iran can be deterred from use or transfer of a nuclear weapon, but rather how a weapon would enable Iran to transition from its current status as a malignant spoiler to that of a true global power and threat. http://www.huffingtonpost.com/william-wunderle/iran-and-the-myth-of-dete_b_478576.html


Countering Iranian Malign Influence: The Need For A Regional Response, William D. Wunderle, Gabriel C. Lajeunesse Apr 2009

Countering Iranian Malign Influence: The Need For A Regional Response, William D. Wunderle, Gabriel C. Lajeunesse

William Wunderle

The behavior and the policies pursued by Iran’s current leadership pose profound and wide-ranging challenges to U.S. interests, the interests of its friends and allies, and the international community as a whole. Particularly concerning is Iran’s ability to foment instability through the use of terrorism. Recognizing this, the authors participated in a series of roundtables, discussions, and forums on Iranian Malign Influence. Participants included military and civilian experts from a number of Middle Eastern, European, and Central Asian countries, U.S. think tanks, and U.S. intelligence and interagency subject matter experts. This paper is a reflection of the insightful dialogue that …


Iran's Other Ticking Time Bomb, William Wunderle, Gabriel Lajeunesse Mar 2009

Iran's Other Ticking Time Bomb, William Wunderle, Gabriel Lajeunesse

William Wunderle

With all the focus on Iran's nuclear-development program, one can forget that the Islamic Republic is also involved in a variety of subversive activities that could also plunge the states of the region into war. Iran's support of terror is not limited to Hezbollah or Hamas, but also extends to Iraq and Afghanistan, Turkey and Sudan, among other states, write these two visiting associates from Georgetown University's Institute for the Study of Diplomacy.


Developing A Coherent National Security Architecture, William Wunderle, Gabriel Lajeunesse Jan 2009

Developing A Coherent National Security Architecture, William Wunderle, Gabriel Lajeunesse

William Wunderle

We face a number of significant challenges to U.S. security interests. One of the next administration's first acts should be to introduce rigor into our national security processes.


Bargaining In The Shadow Of Violence: The Npt, Iaea, And Nuclear Non-Proliferation Negotiations, Arsalan M. Suleman Jan 2008

Bargaining In The Shadow Of Violence: The Npt, Iaea, And Nuclear Non-Proliferation Negotiations, Arsalan M. Suleman

Arsalan Suleman

The NPT non-proliferation regime is both a multilateral treaty of international law and a dispute system designed to manage conflict over the use of nuclear technology. The system seeks to balance the competing desires of member-states to have access to peaceful nuclear technology and to provide national security. In the course of implementation, the system must handle disputes over alleged violations of the NPT and IAEA safeguards agreements. Negotiations, crucial to the functioning of the NPT dispute system, are undertaken in the shadow of the law and the shadow of violence. The NPT and any relevant agreement signed with the …


Strategic Planning For Combating Terrorism: A Critical Examination, Arsalan Suleman Apr 2007

Strategic Planning For Combating Terrorism: A Critical Examination, Arsalan Suleman

Arsalan Suleman

This article engages in a thorough assessment of the Bush Administration's main security strategy documents related to combating terrorism, namely the 2002 and 2006 National Security Strategy documents, the 2003 National Strategy for Combating Terrorism, and the 2006 National Military Strategic Plan for the War on Terrorism. First, the article assesses the value and importance of strategy documents and the utility in analyzing them. Second, the strategies are analyzed based on the process by which they were authored, the structural elements of the strategy, and the strategy's content. Third, the article discusses the overall content of counter-terrorism strategy and makes …


Military Commissions Act Of 2006, Arsalan M. Suleman Dec 2006

Military Commissions Act Of 2006, Arsalan M. Suleman

Arsalan Suleman

On October 17, 2006, President Bush signed into law the Military Commissions Act of 2006 (MCA). Congress passed the MCA to authorize the trial by military commissions of detained terrorism suspects after the Supreme Court's decision in Hamdan v. Rumsfeld invalidated the military commissions previously established pursuant to a 2001 military order from President Bush. The MCA adds chapter 47A to title 10 of the U.S. Code to give statutory authorization for the military commissions. This Recent Development explores some of the more controversial aspects of the MCA, especially those sections that respond to the Court's Hamdan decision. The note …


Soap Box: If Katina Michael Could Send A Message To Government, It Would Be This..., K. Michael Jun 2006

Soap Box: If Katina Michael Could Send A Message To Government, It Would Be This..., K. Michael

Professor Katina Michael

No abstract provided.


Detainee Treatment Act Of 2005, Arsalan M. Suleman Jan 2006

Detainee Treatment Act Of 2005, Arsalan M. Suleman

Arsalan Suleman

This Recent Development focuses on the legal standards that would govern the treatment and interrogation tactics applicable to detainees held by the United States abroad after the passage of the Detainee Treatment Act (DTA). The article first discusses the legal implications of the DTA as to U.S. law on the use of torture or CID treatment, which primarily concerns Sections 1002 and 1003 of the DTA. Then, it explores certain shortfalls in the scope of these sections on this issue, as the sections do not fully address all of the potential ways in which detainee abuse and torture might continue. …