Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 14 of 14

Full-Text Articles in Entire DC Network

Wide Area Motion Imagery And The Colonial Antecedents Of Surveillance, Dinesh Napal Oct 2023

Wide Area Motion Imagery And The Colonial Antecedents Of Surveillance, Dinesh Napal

Journal of Strategic Security

Wide area motion imagery (WAMI) technologies are procured by federal and state security institutions across the United States, due to their capacity to surveil at an extraordinary scale. Innovation in WAMI development seeks to make them more compact or convenient to use and employ in a variety of situations. The increased use of WAMI, particularly through uncrewed aerial combat vehicle (UCAV) systems and operations, is able to render visible people, communities, and behaviors at an unprecedented level. This has implications for individuals’ and communities’ perception of surveillance and the ontology of security. The experience of being secured or kept safe …


Securing Elections Through International Law: A Tool For Combatting Disinformation Operations?, İrem Işik, Ömer F. Bi̇ldi̇k, Tayanç T. Molla Jan 2022

Securing Elections Through International Law: A Tool For Combatting Disinformation Operations?, İrem Işik, Ömer F. Bi̇ldi̇k, Tayanç T. Molla

Journal of Strategic Security

According to the U.S. Department of Justice, in 2014, the Russian government-connected Internet Research Agency (IRA) initiated an information operation on social media platforms to manipulate the U.S. population concerning the 2016 U.S. presidential elections. This has revealed that social media platforms enable the spread of fake news among the masses globally and can thus become a means of disrupting the electoral process for foreign actors. This article addresses state-sponsored disinformation operations on social media that target foreign voters. It considers it crucial to counter such operations to protect the security and integrity of the elections in the digital age, …


Past Attacks, Future Risks: Where Are We 20-Years After 9/11?, Sarah Jane Fox , Ph.D. Oct 2021

Past Attacks, Future Risks: Where Are We 20-Years After 9/11?, Sarah Jane Fox , Ph.D.

Journal of Strategic Security

his year, 2021, marks the 20th anniversary since 9/11, recorded as the ‘day that changed the world.’ Security remains an area where governments and airlines are continuously struggling to stay ahead, but since 9/11 there have been other challenges to the air transport industry – not least Covid-19.

This research primarily critically reviews the actions taken in the aftermath of 9/11 from the US and EU perspective, before consideration is given to the current/present situation, the new, and emerging challenges being faced. The research is undertaken through a legal/policy perspective.

The findings are that internationally and regionally, …


An Unfulfilled Promise: The Genocide Convention And The Obligation Of Prevention, Zachary A. Karazsia Feb 2019

An Unfulfilled Promise: The Genocide Convention And The Obligation Of Prevention, Zachary A. Karazsia

Journal of Strategic Security

This article addresses the under-theorized dual-mandate of the United Nations Convention on the Prevention and Punishment of the Crime of Genocide. The Convention was drafted in the wake of the Holocaust and other Nazi genocidal atrocities committed during World War II. The primary mission of the Genocide Convention was to establish a uniform definition of this scourge, and insert its prevention and punishment into the list of obligations states hold within the current international legal regime. Based on the past 70 years, it is clear that the international community has overwhelmingly failed to uphold the Genocide Convention’s prevention mandate. The …


Defining A Class Of Cyber Weapons As Wmd: An Examination Of The Merits, Benjamin B. Hatch Apr 2018

Defining A Class Of Cyber Weapons As Wmd: An Examination Of The Merits, Benjamin B. Hatch

Journal of Strategic Security

This article examines the merits of defining a class of offensive destructive cyber weapons as weapons of mass destruction (WMD). It analyzes the growing danger of destructive cyber weapons in the future joint operating environment and the devastating effects they may have in the physical domain. Further, it outlines evidence that specifically coded, offensive destructive cyber weapons would meet the spirit and intent of the three academic conditions for categorization as WMD. It argues the merits of categorizing a class of destructive cyber weapons as WMD, and addresses important factors required to examine advantages afforded to policy makers. Towards this …


No Place To Hide: Edward Snowden, The Nsa, And The U.S. Surveillance State. By Glenn Greenwald, New York, Ny: Metropolitan Books, 2014., Richard J. Kilroy Jr., Ph.D. Oct 2016

No Place To Hide: Edward Snowden, The Nsa, And The U.S. Surveillance State. By Glenn Greenwald, New York, Ny: Metropolitan Books, 2014., Richard J. Kilroy Jr., Ph.D.

Journal of Strategic Security

No abstract provided.


China’S Three Warfares Strategy Mitigates Fallout From Cyber Espionage Activities, Emilio Iasiello Jul 2016

China’S Three Warfares Strategy Mitigates Fallout From Cyber Espionage Activities, Emilio Iasiello

Journal of Strategic Security

China is engaged in longstanding cyber espionage against the U.S., as well as other nations, to collect sensitive public and private information in support of national objectives laid out in its 12th Five Year Plan. Foreign governments citing China’s malfeasance have rebuked these activities, a claim vehemently denied by Beijing. In response, China is leveraging the “Three Warfares” an integrated three-prong information warfare strategy to combat these accusations by leveraging Media, Legal, and Psychological components designed to influence the international community. While the United States has threatened the imposition of economic sanctions, Beijing has successfully parried consequential actions by …


Deterring And Dissuading Cyberterrorism, John J. Klein Jan 2015

Deterring And Dissuading Cyberterrorism, John J. Klein

Journal of Strategic Security

Cyberterrorism, while being written about since the early 2000s, is still not fully understood as a strategic concept and whether such actions can be deterred is hotly contested. Some strategists and policy makers believe that acts of cyberterrorism, especially by non-state actors, may prove to be undeterrable. Yet the leadership of both state and non-state actors tend to act rationally and function strategically, and therefore they can, in fact, be deterred to some degree. Helping to shape the legitimate options following a significant cyberattack, the Law of Armed Conflict has salient considerations for the deterrence of cyberterrorism, particularly the principles …


Learning From Libya, Acting In Syria, Caitlin A. Buckley Jul 2012

Learning From Libya, Acting In Syria, Caitlin A. Buckley

Journal of Strategic Security

The international community has reached an impasse. The violence committed by Syrian President Assad's government against opposition forces, who have been calling for democratic reform, regime change, and expanded rights, has necessitated a response from the international community. This article explores various ways the international community could respond to the crisis in Syria and the consequences of each approach. It compares the current calamity in Syria to the crisis in Libya and examines the international community's response to the violence perpetrated by Qaddafi's regime. It further analyzes reports, primarily from the UN and news sources, about the ongoing predicament in …


Deterring And Dissuading Nuclear Terrorism, John J. Klein Apr 2012

Deterring And Dissuading Nuclear Terrorism, John J. Klein

Journal of Strategic Security

While nuclear deterrence theory may be well-suited to dealing with nuclear-armed states, its suitability for deterring nuclear terrorism has frequently been questioned since 9/11. While terrorist organizations do not necessarily act uniformly or according to the same underlying beliefs, many of the most aggressive organizations are motivated by an ideology that embraces martyrdom and an apocalyptic vision.1 This ideology may be based on religion or a desire to overthrow a government. Consequently, terrorists motivated by ideology who intend to use a stolen or improvised nuclear device against the United States or its interests may not care about the resulting military …


Riot Control Agents And Chemical Weapons Arms Control In The United States, Sean P. Giovanello Jan 2012

Riot Control Agents And Chemical Weapons Arms Control In The United States, Sean P. Giovanello

Journal of Strategic Security

This article examines the issue of riot control agents as it relates to the subject of chemical weapons arms control at the international level and, more specifically, implications for the United States. The article examines how the issue of riot control agents has complicated efforts for the United States to enter into and ratify chemical weapons-related arms control agreements. The article provides an overview of chemical weapons, examines the relevant arms control agreements, explores why and how riot control agents influence debates over the merits of these treaties, and explains why riot control agents remain a contentious issue in chemical …


"Small Boats, Weak States, Dirty Money: Piracy And Maritime Terrorism In The Modern World," Martin N. Murphy, (New York: Columbia University Press, 2009), Francis D. Bonadonna , Capt. Jul 2011

"Small Boats, Weak States, Dirty Money: Piracy And Maritime Terrorism In The Modern World," Martin N. Murphy, (New York: Columbia University Press, 2009), Francis D. Bonadonna , Capt.

Journal of Strategic Security

No abstract provided.


New Start: The Contentious Road To Ratification, Elizabeth Zolotukhina Mar 2011

New Start: The Contentious Road To Ratification, Elizabeth Zolotukhina

Journal of Strategic Security

Senate ratification of the New START treaty re-established effective bilateral inspection and monitoring of American and Russian nuclear holdings and has the potential to further enhance U.S.-Russian cooperation on key issues, including containing the Iranian nuclear program, and further reductions in the two countries' arsenals. Although the accord was widely heralded as a foreign policy success of the Obama administration, the contentious Senate ratification may impede future progress on arms control.


Start: Overcoming Remaining Challenges, Elizabeth Zolotukhina Sep 2009

Start: Overcoming Remaining Challenges, Elizabeth Zolotukhina

Journal of Strategic Security

During the administrations of Presidents George W. Bush and VladimirPutin, the governments of Russia and the United States could not agreeon how to codify their balance of strategic offensive nuclear forces after the existing Strategic Arms Reductions Treaty (START) expired onDecember 5, 2009.1 The United States and Russia are currently engagedin negotiations to replace START with a new treaty before the end of this year.