Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

PDF

2019

University of South Florida

National security

Articles 1 - 11 of 11

Full-Text Articles in Entire DC Network

Risk Representations And Confrontational Actions In The Arctic, Sybille Reinke De Buitrago Oct 2019

Risk Representations And Confrontational Actions In The Arctic, Sybille Reinke De Buitrago

Journal of Strategic Security

The Arctic is undergoing rapid changes and gaining geopolitical attention. The effects of climate change in the region lead to both potential and hopes for new resources, new or shorter transit routes, and other opportunities. Most Arctic coastal states have come forward with interest articulations. Some coastal states also see their national security and sovereignty at risk. While the region has seen a significant level of cooperation in some areas in the past, current developments seem to motivate both stronger risk representations and confrontational actions. Among the coastal states, particularly Canada, the United States, and Russia express increasing points of …


The First Conspiracy The Secret Plot To Kill George Washington. By Brad Meltzer And Josh Mensch, New York, N.Y.: Flatiron Books, 2019., Millard E. Moon Ed.D., Colonel (Ret.) Oct 2019

The First Conspiracy The Secret Plot To Kill George Washington. By Brad Meltzer And Josh Mensch, New York, N.Y.: Flatiron Books, 2019., Millard E. Moon Ed.D., Colonel (Ret.)

Journal of Strategic Security

No abstract provided.


Dawn Of The Code War: America’S Battle Against Russia, China, And The Rising Global Cyber Threat. By John P. Carlin, With Garrett M. Graff. New York: Hatchett Book Group, 2018., Edwin E. Urie Oct 2019

Dawn Of The Code War: America’S Battle Against Russia, China, And The Rising Global Cyber Threat. By John P. Carlin, With Garrett M. Graff. New York: Hatchett Book Group, 2018., Edwin E. Urie

Journal of Strategic Security

No abstract provided.


Two Armies: Balancing America’S Landpower For Competition And National Security, Mike Anderson Oct 2019

Two Armies: Balancing America’S Landpower For Competition And National Security, Mike Anderson

Journal of Strategic Security

Abstract:

The United States ground forces face divergent array of threats from a return of great power competitors and from a continuance of irregular non-state opponents and stability operations, leading the Army and Marine Corps to struggle with capability focuses. American ground forces historically swing from preparing their forces for one spectrum of conflict to the other based on immediate and perceived threats. The pendulum swing creates uncertainty and capability gaps, requiring sharp shifts when unanticipated, immediate threat emerge. A hybrid force model creates two distinct army groups within the larger Army force – allowing one to focus on conventional …


Landing On The Edge Of Eternity: Twenty-Four Hours At Omaha Beach. By Robert Kershaw. New York And London: Pegasus Books Ltd., 2018., Edward J. Hagerty Jul 2019

Landing On The Edge Of Eternity: Twenty-Four Hours At Omaha Beach. By Robert Kershaw. New York And London: Pegasus Books Ltd., 2018., Edward J. Hagerty

Journal of Strategic Security

No abstract provided.


The Global Positioning System And Military Jamming: The Geographies Of Electronic Warfare, Tegg Westbrook Jul 2019

The Global Positioning System And Military Jamming: The Geographies Of Electronic Warfare, Tegg Westbrook

Journal of Strategic Security

GPS supports infrastructure assets that are essential to the functioning of national and international banking operations, power grid, transportation, and communication systems, therefore its reliability and accuracy is critical. GPS boosts productivity around the world and has radically changed military operations. Despite the importance of GPS, the relative weakness of GPS signals are vulnerable to interference. This weakness provides a range of opportunities for criminals, terrorists and state actors using GPS jamming devices. Different types of jammers can cause varying degrees of interference, but the use of powerful military jammers are becoming more prevalent. This article provides an overview of …


India’S Maritime Diplomacy In South West Indian Ocean: Evaluating Strategic Partnerships, Chinmoyee Das Jul 2019

India’S Maritime Diplomacy In South West Indian Ocean: Evaluating Strategic Partnerships, Chinmoyee Das

Journal of Strategic Security

Being a maritime nation with considerable economic and military power, India has shown keen interest in demonstrating its role as a major security provider in the IOR. In the Southwest Indian Ocean too, India has sought to develop a security presence and strengthen its position by capitalising on its historic ties with the littoral nations of the region through provision of military training, defence equipment and security advisors. India’s efforts are mostly directed at making the Indian influence more visible in the strategic affairs of the region that seem to be clouded by the increasing Chinese forays into the region. …


Nato Under Pressure, Lyubomir Monov Apr 2019

Nato Under Pressure, Lyubomir Monov

Journal of Strategic Security

This article examines some of the formidable challenges and concerns of North Atlantic Treaty Organization that could influence its unity and integrity. A combination of issues that encompass military problems, internal political glitches and critical rhetoric from the President of the United States may undermine NATO’ s capacity to act in the best interest of its members. Now even more than ever before, this causes uncertainty about the future of the Alliance. Therefore, this paper opens a discussion about possible scenarios for NATO’s disintegration and how this might affect some of the smallest member states, namely, Bulgaria. Admittedly, the security …


Halting Boko Haram / Islamic State's West Africa Province Propaganda In Cyberspace With Cybersecurity Technologies, Sunday O. Ogunlana Apr 2019

Halting Boko Haram / Islamic State's West Africa Province Propaganda In Cyberspace With Cybersecurity Technologies, Sunday O. Ogunlana

Journal of Strategic Security

Terrorists use cyberspace and social media technology to create fear and spread violent ideologies, which pose a significant threat to public security. Researchers have documented the importance of the application of law and regulation in dealing with the criminal activities in cyberspace. Using routine activity theory, this article assessed the effectiveness of technological approaches to mitigating the expansion and organization of terrorism in cyberspace. Data collection included open-source documents, government threat assessments, legislation, policy papers, and peer-reviewed academic literature and semistructured interviews with fifteen security experts in Nigeria. The key findings were that the new generation of terrorists who are …


The Future Of Strategic Information And Cyber-Enabled Information Operations, Ben Hatch Jan 2019

The Future Of Strategic Information And Cyber-Enabled Information Operations, Ben Hatch

Journal of Strategic Security

To prepare for future challenges across the continuum of conflict, the United States (US) must optimize how it manages, counters, defends, and exploits the effects of information by organizing for strategic information and cyber-enabled information operations across and through multiple domains. Currently, information related capabilities are fielded across the United States Government (USG) among multiple organizations and agencies, and therefore lack efficiencies normally gained through combined action, unity of command, and unity of effort. In considering a solution to these challenges, this study examines historic and current examples of successful information operations to show organization matters, and reviews options to …


Profiling Lone-Actor Terrorists: A Cross-Sectional Study Of Lone-Actor Terrorists In Western Europe (2015–2016), Mohammadmoein Khazaeli Jah, Ardavan Khoshnood Jan 2019

Profiling Lone-Actor Terrorists: A Cross-Sectional Study Of Lone-Actor Terrorists In Western Europe (2015–2016), Mohammadmoein Khazaeli Jah, Ardavan Khoshnood

Journal of Strategic Security

Lone-actor terrorism is a growing threat in Western European countries as the numbers of lone-actor terrorist attacks have multiplied over the last 15 years. However, knowledge on this type of terrorism is insufficient. This current study evaluates whether there are any common personal, social, psychological, and operational characteristics among lone-actor terrorists (LATs) and whether any profile can be drawn in regard to a lone-actor terrorist. The authors identified 36 LATs between January 1, 2015, and December 31, 2016, in Western European countries through the Global Terrorism Database. The study profiled these LATs regarding their sociodemographic characteristics, attack characteristics, method of …