Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

PDF

Selected Works

Public Affairs, Public Policy and Public Administration

National Security

SelectedWorks

Articles 1 - 12 of 12

Full-Text Articles in Entire DC Network

Ebola And Bioterrorism, Joshua P. Monroe Jan 2014

Ebola And Bioterrorism, Joshua P. Monroe

Joshua P Monroe

This paper will be a comparison of the United States government’s reaction to the recent outbreak of Ebola and will compare this response with the potential response by the United States government toward an act of biological or chemical warfare. The paper will analyze these responses from a cultural, political, legal, and policy standpoint


Mandatory Foreign Language Training For All Military Members, Samuel W. Bettwy Jan 2013

Mandatory Foreign Language Training For All Military Members, Samuel W. Bettwy

Samuel W Bettwy

For too long now, DOD and the military services have been paying lip service to the need for foreign language capability across all ranks. It’s about time that DOD made real progress by mandating foreign language instruction at all levels of military training and schooling and by obtaining the funding needed to expand DLI’s mission to include meaningful language instruction for all servicemembers, both linguists and non-linguists. And by the way, shouldn’t the service academies make foreign language proficiency a requirement for graduation?


Multinational Corporations Are Overlooked Players In Stability, Security, Transition And Reconstruction Operations, Samuel W. Bettwy Jan 2013

Multinational Corporations Are Overlooked Players In Stability, Security, Transition And Reconstruction Operations, Samuel W. Bettwy

Samuel W Bettwy

It has long been acknowledged that multinational corporations have acquired legal personality under international law. Unlike states, however, MNCs are not precluded by notions of sovereignty and territorial inviolability. In the narrative of rogue and failing states and the emerging international norm of humanitarian intervention, most observers characterize MNCs as villainous predators. In states that have a permissive regulatory environment, MNCs exploit cheap labor, enable authoritarian regimes, and pollute the environment. Some observers believe that MNCs are also positive forces that contribute to the economic and political stability of the state and its people. Either way, combatant commanders need to …


Smart Power For Hard Problems: The Role Of Special Operation Forces Strengthening The Rule Of Law And Human Rights In Africa, Kevin H. Govern Jan 2013

Smart Power For Hard Problems: The Role Of Special Operation Forces Strengthening The Rule Of Law And Human Rights In Africa, Kevin H. Govern

Kevin H. Govern

This article will assess the roles and responsibilities of Special Operations Forces (SOF) within the newly created U.S. Africa Command (AFRICOM) as an active proponent of a so-called “smart power” national security strategy. In particular, it will outline the economic, political, and military challenges faced in Africa; specifically, how and why SOCAFRICA is the U.S. force of choice for promoting human rights and rule of law in Africa. With the goals of the U.S. military in mind, questions will necessarily arise as to “what success looks like” for both the U.S. and African nations, and the roles of each in …


The Value Of Government Mandated Location-Based Services In Emergencies In Australia, Anas Aloudat, Katina Michael, Roba Abbas, Mutaz M. Al-Debei Dec 2011

The Value Of Government Mandated Location-Based Services In Emergencies In Australia, Anas Aloudat, Katina Michael, Roba Abbas, Mutaz M. Al-Debei

Dr. Mutaz M. Al-Debei

The adoption of mobile technologies for emergency management has the capacity to save lives. In Australia in February 2009, the Victorian Bushfires claimed 173 lives, the worst peace-time disaster in the nation’s history. The Australian government responded swiftly to the tragedy by going to tender for mobile applications that could be used during emergencies, such as mobile alerts and location services. These applications, which are becoming increasingly accurate with the evolution of positioning techniques, have the ability to deliver personalized information direct to the citizen during crises, complementing traditional broadcasting mediums like television and radio. Indeed governments have a responsibility …


Iran And The Myth Of Deterrence, William Wunderle, Gabriel Lajeunesse Feb 2010

Iran And The Myth Of Deterrence, William Wunderle, Gabriel Lajeunesse

William Wunderle

Thos who argue deterrence is the answer to a nuclear Iran miss the point -- the real issue is not whether Iran can be deterred from use or transfer of a nuclear weapon, but rather how a weapon would enable Iran to transition from its current status as a malignant spoiler to that of a true global power and threat. http://www.huffingtonpost.com/william-wunderle/iran-and-the-myth-of-dete_b_478576.html


Countering Iranian Malign Influence: The Need For A Regional Response, William D. Wunderle, Gabriel C. Lajeunesse Apr 2009

Countering Iranian Malign Influence: The Need For A Regional Response, William D. Wunderle, Gabriel C. Lajeunesse

William Wunderle

The behavior and the policies pursued by Iran’s current leadership pose profound and wide-ranging challenges to U.S. interests, the interests of its friends and allies, and the international community as a whole. Particularly concerning is Iran’s ability to foment instability through the use of terrorism. Recognizing this, the authors participated in a series of roundtables, discussions, and forums on Iranian Malign Influence. Participants included military and civilian experts from a number of Middle Eastern, European, and Central Asian countries, U.S. think tanks, and U.S. intelligence and interagency subject matter experts. This paper is a reflection of the insightful dialogue that …


Iran's Other Ticking Time Bomb, William Wunderle, Gabriel Lajeunesse Mar 2009

Iran's Other Ticking Time Bomb, William Wunderle, Gabriel Lajeunesse

William Wunderle

With all the focus on Iran's nuclear-development program, one can forget that the Islamic Republic is also involved in a variety of subversive activities that could also plunge the states of the region into war. Iran's support of terror is not limited to Hezbollah or Hamas, but also extends to Iraq and Afghanistan, Turkey and Sudan, among other states, write these two visiting associates from Georgetown University's Institute for the Study of Diplomacy.


Developing A Coherent National Security Architecture, William Wunderle, Gabriel Lajeunesse Jan 2009

Developing A Coherent National Security Architecture, William Wunderle, Gabriel Lajeunesse

William Wunderle

We face a number of significant challenges to U.S. security interests. One of the next administration's first acts should be to introduce rigor into our national security processes.


Bargaining In The Shadow Of Violence: The Npt, Iaea, And Nuclear Non-Proliferation Negotiations, Arsalan M. Suleman Jan 2008

Bargaining In The Shadow Of Violence: The Npt, Iaea, And Nuclear Non-Proliferation Negotiations, Arsalan M. Suleman

Arsalan Suleman

The NPT non-proliferation regime is both a multilateral treaty of international law and a dispute system designed to manage conflict over the use of nuclear technology. The system seeks to balance the competing desires of member-states to have access to peaceful nuclear technology and to provide national security. In the course of implementation, the system must handle disputes over alleged violations of the NPT and IAEA safeguards agreements. Negotiations, crucial to the functioning of the NPT dispute system, are undertaken in the shadow of the law and the shadow of violence. The NPT and any relevant agreement signed with the …


Strategic Planning For Combating Terrorism: A Critical Examination, Arsalan Suleman Apr 2007

Strategic Planning For Combating Terrorism: A Critical Examination, Arsalan Suleman

Arsalan Suleman

This article engages in a thorough assessment of the Bush Administration's main security strategy documents related to combating terrorism, namely the 2002 and 2006 National Security Strategy documents, the 2003 National Strategy for Combating Terrorism, and the 2006 National Military Strategic Plan for the War on Terrorism. First, the article assesses the value and importance of strategy documents and the utility in analyzing them. Second, the strategies are analyzed based on the process by which they were authored, the structural elements of the strategy, and the strategy's content. Third, the article discusses the overall content of counter-terrorism strategy and makes …


Detainee Treatment Act Of 2005, Arsalan M. Suleman Jan 2006

Detainee Treatment Act Of 2005, Arsalan M. Suleman

Arsalan Suleman

This Recent Development focuses on the legal standards that would govern the treatment and interrogation tactics applicable to detainees held by the United States abroad after the passage of the Detainee Treatment Act (DTA). The article first discusses the legal implications of the DTA as to U.S. law on the use of torture or CID treatment, which primarily concerns Sections 1002 and 1003 of the DTA. Then, it explores certain shortfalls in the scope of these sections on this issue, as the sections do not fully address all of the potential ways in which detainee abuse and torture might continue. …