Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Business (6)
- Law (6)
- Public Affairs, Public Policy and Public Administration (6)
- Social and Behavioral Sciences (6)
- Defense and Security Studies (5)
-
- National Security Law (5)
- Portfolio and Security Analysis (5)
- Arts and Humanities (1)
- Astrophysics and Astronomy (1)
- Computer Sciences (1)
- History (1)
- Holocaust and Genocide Studies (1)
- Human Rights Law (1)
- Information Security (1)
- International Business (1)
- International Law (1)
- International Relations (1)
- Law and Politics (1)
- Peace and Conflict Studies (1)
- Physical Sciences and Mathematics (1)
- Political Science (1)
- Publication Year
Articles 1 - 17 of 17
Full-Text Articles in Entire DC Network
Wide Area Motion Imagery And The Colonial Antecedents Of Surveillance, Dinesh Napal
Wide Area Motion Imagery And The Colonial Antecedents Of Surveillance, Dinesh Napal
Journal of Strategic Security
Wide area motion imagery (WAMI) technologies are procured by federal and state security institutions across the United States, due to their capacity to surveil at an extraordinary scale. Innovation in WAMI development seeks to make them more compact or convenient to use and employ in a variety of situations. The increased use of WAMI, particularly through uncrewed aerial combat vehicle (UCAV) systems and operations, is able to render visible people, communities, and behaviors at an unprecedented level. This has implications for individuals’ and communities’ perception of surveillance and the ontology of security. The experience of being secured or kept safe …
Round Table (Full Symposium): What’S Raphaël Lemkin Got To Do With Genocide Studies? A Conversation On Gender, Culture, Economics, Categorical Violence, And Colonization With Professors Sarah Federman, Dirk Moses, Max Pensky, And Scott Straus, A. Dirk Moses, Sarah Federman, Scott Straus, Max Pensky, Douglas Irvin-Erickson
Round Table (Full Symposium): What’S Raphaël Lemkin Got To Do With Genocide Studies? A Conversation On Gender, Culture, Economics, Categorical Violence, And Colonization With Professors Sarah Federman, Dirk Moses, Max Pensky, And Scott Straus, A. Dirk Moses, Sarah Federman, Scott Straus, Max Pensky, Douglas Irvin-Erickson
Genocide Studies and Prevention: An International Journal
No abstract provided.
“Lasso The Moon? Is It Possible? What About Hack The Moon? Today’S International Framework For Activities On The Moon”, Diane M. Janosek, Armando Seay, Josa P. Natera
“Lasso The Moon? Is It Possible? What About Hack The Moon? Today’S International Framework For Activities On The Moon”, Diane M. Janosek, Armando Seay, Josa P. Natera
Military Cyber Affairs
The global interest in the moon and outer space continues to skyrocket. The current U.S. commercial investment in space is $350 billion annually, and it is expected to grow to $1 Trillion or more by 2040. The U.S. military investment in space defense and research likewise continues to grow, with the total investment amount remaining classified. With the frequent activity in space, as well as concerns about attacks to US space assets to and from space, the U.S, created the United States Space Command and its Space Force. With private space travel, nanosatellites, lunar exploration, and the proliferation of space …
Securing Elections Through International Law: A Tool For Combatting Disinformation Operations?, İrem Işik, Ömer F. Bi̇ldi̇k, Tayanç T. Molla
Securing Elections Through International Law: A Tool For Combatting Disinformation Operations?, İrem Işik, Ömer F. Bi̇ldi̇k, Tayanç T. Molla
Journal of Strategic Security
According to the U.S. Department of Justice, in 2014, the Russian government-connected Internet Research Agency (IRA) initiated an information operation on social media platforms to manipulate the U.S. population concerning the 2016 U.S. presidential elections. This has revealed that social media platforms enable the spread of fake news among the masses globally and can thus become a means of disrupting the electoral process for foreign actors. This article addresses state-sponsored disinformation operations on social media that target foreign voters. It considers it crucial to counter such operations to protect the security and integrity of the elections in the digital age, …
Past Attacks, Future Risks: Where Are We 20-Years After 9/11?, Sarah Jane Fox , Ph.D.
Past Attacks, Future Risks: Where Are We 20-Years After 9/11?, Sarah Jane Fox , Ph.D.
Journal of Strategic Security
his year, 2021, marks the 20th anniversary since 9/11, recorded as the ‘day that changed the world.’ Security remains an area where governments and airlines are continuously struggling to stay ahead, but since 9/11 there have been other challenges to the air transport industry – not least Covid-19.
This research primarily critically reviews the actions taken in the aftermath of 9/11 from the US and EU perspective, before consideration is given to the current/present situation, the new, and emerging challenges being faced. The research is undertaken through a legal/policy perspective.
The findings are that internationally and regionally, …
An Unfulfilled Promise: The Genocide Convention And The Obligation Of Prevention, Zachary A. Karazsia
An Unfulfilled Promise: The Genocide Convention And The Obligation Of Prevention, Zachary A. Karazsia
Journal of Strategic Security
This article addresses the under-theorized dual-mandate of the United Nations Convention on the Prevention and Punishment of the Crime of Genocide. The Convention was drafted in the wake of the Holocaust and other Nazi genocidal atrocities committed during World War II. The primary mission of the Genocide Convention was to establish a uniform definition of this scourge, and insert its prevention and punishment into the list of obligations states hold within the current international legal regime. Based on the past 70 years, it is clear that the international community has overwhelmingly failed to uphold the Genocide Convention’s prevention mandate. The …
The Duty To Prevent Genocide Under International Law: Naming And Shaming As A Measure Of Prevention, Björn Schiffbauer
The Duty To Prevent Genocide Under International Law: Naming And Shaming As A Measure Of Prevention, Björn Schiffbauer
Genocide Studies and Prevention: An International Journal
In contrast to prosecuting and punishing committed acts of genocide, the Genocide Convention is silent as to means of preventing future acts. Today it is generally accepted that the duty to prevent is legally binding, but there is still uncertainty in international law about its specific content. This article seeks to fill this gap in the light of the object and purpose of the Genocide Convention. It provides a minimum requirement approach, i.e. indispensable State actions to comply with their duty to prevent: naming and shaming situations of genocide as what they are. Even situations from times before the Genocide …
Defining A Class Of Cyber Weapons As Wmd: An Examination Of The Merits, Benjamin B. Hatch
Defining A Class Of Cyber Weapons As Wmd: An Examination Of The Merits, Benjamin B. Hatch
Journal of Strategic Security
This article examines the merits of defining a class of offensive destructive cyber weapons as weapons of mass destruction (WMD). It analyzes the growing danger of destructive cyber weapons in the future joint operating environment and the devastating effects they may have in the physical domain. Further, it outlines evidence that specifically coded, offensive destructive cyber weapons would meet the spirit and intent of the three academic conditions for categorization as WMD. It argues the merits of categorizing a class of destructive cyber weapons as WMD, and addresses important factors required to examine advantages afforded to policy makers. Towards this …
No Place To Hide: Edward Snowden, The Nsa, And The U.S. Surveillance State. By Glenn Greenwald, New York, Ny: Metropolitan Books, 2014., Richard J. Kilroy Jr., Ph.D.
No Place To Hide: Edward Snowden, The Nsa, And The U.S. Surveillance State. By Glenn Greenwald, New York, Ny: Metropolitan Books, 2014., Richard J. Kilroy Jr., Ph.D.
Journal of Strategic Security
No abstract provided.
China’S Three Warfares Strategy Mitigates Fallout From Cyber Espionage Activities, Emilio Iasiello
China’S Three Warfares Strategy Mitigates Fallout From Cyber Espionage Activities, Emilio Iasiello
Journal of Strategic Security
China is engaged in longstanding cyber espionage against the U.S., as well as other nations, to collect sensitive public and private information in support of national objectives laid out in its 12th Five Year Plan. Foreign governments citing China’s malfeasance have rebuked these activities, a claim vehemently denied by Beijing. In response, China is leveraging the “Three Warfares” an integrated three-prong information warfare strategy to combat these accusations by leveraging Media, Legal, and Psychological components designed to influence the international community. While the United States has threatened the imposition of economic sanctions, Beijing has successfully parried consequential actions by …
Deterring And Dissuading Cyberterrorism, John J. Klein
Deterring And Dissuading Cyberterrorism, John J. Klein
Journal of Strategic Security
Cyberterrorism, while being written about since the early 2000s, is still not fully understood as a strategic concept and whether such actions can be deterred is hotly contested. Some strategists and policy makers believe that acts of cyberterrorism, especially by non-state actors, may prove to be undeterrable. Yet the leadership of both state and non-state actors tend to act rationally and function strategically, and therefore they can, in fact, be deterred to some degree. Helping to shape the legitimate options following a significant cyberattack, the Law of Armed Conflict has salient considerations for the deterrence of cyberterrorism, particularly the principles …
Learning From Libya, Acting In Syria, Caitlin A. Buckley
Learning From Libya, Acting In Syria, Caitlin A. Buckley
Journal of Strategic Security
The international community has reached an impasse. The violence committed by Syrian President Assad's government against opposition forces, who have been calling for democratic reform, regime change, and expanded rights, has necessitated a response from the international community. This article explores various ways the international community could respond to the crisis in Syria and the consequences of each approach. It compares the current calamity in Syria to the crisis in Libya and examines the international community's response to the violence perpetrated by Qaddafi's regime. It further analyzes reports, primarily from the UN and news sources, about the ongoing predicament in …
Deterring And Dissuading Nuclear Terrorism, John J. Klein
Deterring And Dissuading Nuclear Terrorism, John J. Klein
Journal of Strategic Security
While nuclear deterrence theory may be well-suited to dealing with nuclear-armed states, its suitability for deterring nuclear terrorism has frequently been questioned since 9/11. While terrorist organizations do not necessarily act uniformly or according to the same underlying beliefs, many of the most aggressive organizations are motivated by an ideology that embraces martyrdom and an apocalyptic vision.1 This ideology may be based on religion or a desire to overthrow a government. Consequently, terrorists motivated by ideology who intend to use a stolen or improvised nuclear device against the United States or its interests may not care about the resulting military …
Riot Control Agents And Chemical Weapons Arms Control In The United States, Sean P. Giovanello
Riot Control Agents And Chemical Weapons Arms Control In The United States, Sean P. Giovanello
Journal of Strategic Security
This article examines the issue of riot control agents as it relates to the subject of chemical weapons arms control at the international level and, more specifically, implications for the United States. The article examines how the issue of riot control agents has complicated efforts for the United States to enter into and ratify chemical weapons-related arms control agreements. The article provides an overview of chemical weapons, examines the relevant arms control agreements, explores why and how riot control agents influence debates over the merits of these treaties, and explains why riot control agents remain a contentious issue in chemical …
"Small Boats, Weak States, Dirty Money: Piracy And Maritime Terrorism In The Modern World," Martin N. Murphy, (New York: Columbia University Press, 2009), Francis D. Bonadonna , Capt.
"Small Boats, Weak States, Dirty Money: Piracy And Maritime Terrorism In The Modern World," Martin N. Murphy, (New York: Columbia University Press, 2009), Francis D. Bonadonna , Capt.
Journal of Strategic Security
No abstract provided.
New Start: The Contentious Road To Ratification, Elizabeth Zolotukhina
New Start: The Contentious Road To Ratification, Elizabeth Zolotukhina
Journal of Strategic Security
Senate ratification of the New START treaty re-established effective bilateral inspection and monitoring of American and Russian nuclear holdings and has the potential to further enhance U.S.-Russian cooperation on key issues, including containing the Iranian nuclear program, and further reductions in the two countries' arsenals. Although the accord was widely heralded as a foreign policy success of the Obama administration, the contentious Senate ratification may impede future progress on arms control.
Start: Overcoming Remaining Challenges, Elizabeth Zolotukhina
Start: Overcoming Remaining Challenges, Elizabeth Zolotukhina
Journal of Strategic Security
During the administrations of Presidents George W. Bush and VladimirPutin, the governments of Russia and the United States could not agreeon how to codify their balance of strategic offensive nuclear forces after the existing Strategic Arms Reductions Treaty (START) expired onDecember 5, 2009.1 The United States and Russia are currently engagedin negotiations to replace START with a new treaty before the end of this year.