Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Journal

National security

Discipline
Institution
Publication Year
Publication

Articles 1 - 30 of 93

Full-Text Articles in Entire DC Network

Ai And National Security: The United States Risks Losing Its Competitive Edge, Royce Morris Oct 2023

Ai And National Security: The United States Risks Losing Its Competitive Edge, Royce Morris

Liberty University Journal of Statesmanship & Public Policy

Recent developments in artificial intelligence (AI) have caused concern over the ethical implications of large-scale AI implementation. As a result, leading technologists and computer scientists have advocated an incremental rather than comprehensive approach to AI development and implementation to allow ethical and structural guidelines to provide a public safety net. However, such an approach does not account for the geopolitical and national security implications of lagging behind competitors like China, who have publicly stated goals of reaching AI supremacy within the next ten years. This article presents a national security analysis of the risks to American national security by allowing …


Like Treating The Symptom Rather Than The Cause - The Omission Of Courses Over Terrorism In Nsa Designated Institutions, Ida L. Oesteraas Oct 2023

Like Treating The Symptom Rather Than The Cause - The Omission Of Courses Over Terrorism In Nsa Designated Institutions, Ida L. Oesteraas

Journal of Cybersecurity Education, Research and Practice

The National Security Agency (NSA) awards Center of Academic Excellence (CAE) designations to institutions that commit to producing cybersecurity professionals who will work in careers that reduce vulnerabilities in our national infrastructure. A review of the curricula in the 327 institutions and their degree programs reveal that only two programs offer a required course about terrorism. Given the fluid nature of terrorism and its threat to national infrastructure, the omission is concerning. It is recommended that NSA-certified cybersecurity programs begin implementing educational content that aim to teach about this emerging crime and justice issue. One suggestion is to embrace the …


Digitized Statecraft In Multilateral Treaty Participation: Global Quasi-Legislative Behavior Of 193 Sovereign States. By Takashi Inoguchi And Lien Thi Quynh Le. Singapore: Springer Nature, 2021., Melisa Perut, Etel Solingen, Ph.D. Apr 2023

Digitized Statecraft In Multilateral Treaty Participation: Global Quasi-Legislative Behavior Of 193 Sovereign States. By Takashi Inoguchi And Lien Thi Quynh Le. Singapore: Springer Nature, 2021., Melisa Perut, Etel Solingen, Ph.D.

Journal of Strategic Security

No abstract provided.


Military Advisors, Service Strategies, And Great Power Competition, Mike Anderson Apr 2023

Military Advisors, Service Strategies, And Great Power Competition, Mike Anderson

Journal of Strategic Security

United States professional military advisors play a critical role across the spectrum of conflict within the various services’ strategies in support of the overall National Defense Strategy. In an era of great power competition, the role of advisory forces within the shadow of large-scale conflict, provide a crucial edge for the US military services fulfilling their strategic role. Within each of the services’ unique strategies - the Army’s multidomain operations, the Marine Corps expeditionary advanced base operations nested within the Navy’s broader littoral operations in a contested environment, and the Air Force’s forward projecting agile basing concept - advisors from …


Role Of The State Intelligence Agency In Managing The Covid-19 Pandemic In Indonesia, Yofitri Heny Wahyuli Feb 2023

Role Of The State Intelligence Agency In Managing The Covid-19 Pandemic In Indonesia, Yofitri Heny Wahyuli

Jurnal Politik

The COVID-19 pandemic has prompted governments in various countries to involve a wide range of actors, including intelligence. Since the beginning of 2020, the State Intelligence Agency (BIN) in Indonesia has been actively involved in dealing with the COVID-19 pandemic. The deployment of intelligence bodies in handling a pandemic is a common practice that many democratic countries do. However, intelligence must operate within the confines of its mandate, function, and democratic principles. This paper will examine the issues regarding the roles of BIN in dealing with the pandemic in Indonesia. Data sources for this study were obtained by applying a …


Regulating The Use Of Military Human Enhancements That Can Cause Side Effects Under The Law Of Armed Conflict: Towards A Method-Based Approach, Yang Liu Jan 2023

Regulating The Use Of Military Human Enhancements That Can Cause Side Effects Under The Law Of Armed Conflict: Towards A Method-Based Approach, Yang Liu

American University National Security Law Brief

The development of human enhancement (HE) technology has rendered its military potential increasingly noticed by major military powers. It can be expected that “enhanced warfighters” or “super soldiers” will be used on the battleground in the foreseeable future, which can give rise to many legal issues.


The Tallinn Manual 2.0 On Nation-State Cyber Operations Affecting Critical Infrastructure, Terence Check Jan 2023

The Tallinn Manual 2.0 On Nation-State Cyber Operations Affecting Critical Infrastructure, Terence Check

American University National Security Law Brief

Protecting critical infrastructure from cyber threats is difficult and complex. News headlines abound with reports that show how critical infrastructure—ranging from voting machines to steel mills—have become increasingly vulnerable to cyber operations from state and sophisticated nonstate actors. As critical infrastructure becomes increasingly entangled with the Internet and as new tactics, techniques, and procedures rapidly proliferate and evolve, governments and businesses alike must contend with a mutating threat environment that may put sensitive and highly important critical infrastructure assets in serious jeopardy. The vulnerabilities of critical infrastructure, which provide vital services and functions to societies, may pose a particularly tempting …


The Need For An Australian Regulatory Code For The Use Of Artificial Intelligence (Ai) In Military Application, Sascha-Dominik Dov Bachmann, Richard V. Grant Jan 2023

The Need For An Australian Regulatory Code For The Use Of Artificial Intelligence (Ai) In Military Application, Sascha-Dominik Dov Bachmann, Richard V. Grant

American University National Security Law Brief

Artificial Intelligence (AI) is enabling rapid technological innovation and is ever more pervasive, in a global technological eco-system lacking suitable governance and absence of regulation over AI-enabled technologies. Australia is committed to being a global leader in trusted secure and responsible AI and has escalated the development of its own sovereign AI capabilities. Military and Defence organisations have similarly embraced AI, harnessing advantages for applications supporting battlefield autonomy, intelligence analysis, capability planning, operations, training, and autonomous weapons systems. While no regulation exists covering AI-enabled military systems and autonomous weapons, these platforms must comply with International Humanitarian Law, the Law of …


A Defense Perspective On A Reliable And Sustainable Supply Of Critical Minerals, Matthew D. Zolnowski Jan 2023

A Defense Perspective On A Reliable And Sustainable Supply Of Critical Minerals, Matthew D. Zolnowski

Canada-United States Law Journal

Canada-United States Law Institute 2022 Experts' Meeting


National Security As A Means To A Commercial End: Call For A New Approach, Yong-Shik Lee Jan 2023

National Security As A Means To A Commercial End: Call For A New Approach, Yong-Shik Lee

Nebraska Law Review

While corporations do not enjoy unfettered freedom—they are constrained by legal, political, and social requirements and expectations—governments must have legitimate grounds when they compel corporations to act. After investigating the nationwide semiconductor shortage, the U.S. Secretary of Commerce warned that the government might invoke national security to compel semiconductor producers to disclose sensitive business information. The government has also invoked national security to justify extensive tariffs imposed on imported steel and aluminum products, leading to a major trade dispute. Years of neoliberal policy have created a perceived (though not necessarily functional) separation between government and industry. This separation encourages and, …


Creating Light At Tunnel’S End: Ukraine’S Post-War Urban Recovery, Russell W. Glenn Jan 2023

Creating Light At Tunnel’S End: Ukraine’S Post-War Urban Recovery, Russell W. Glenn

Journal of Strategic Security

The US response to Iraq’s recovery in the aftermath of 2003 Operation Iraqi Freedom suffered from an initial conclusion that it was the country’s petroleum infrastructure rather than its electrical networks that were in greater need of recovery resources. The resulting misallocation of resources delayed power restoration to much of the country and frustrated those in affected regions.

Whether the cause is war or a catastrophe sparked by Mother Nature, accurately identifying and correctly prioritizing post-disaster requirements is fundamental to an effective and efficient response. Ukraine has demonstrated a commendable ability to repair war damage even as conflict continues, but …


Decision Advantage: Intelligence In International Politics From The Spanish Armada To Cyberwar. By Jennifer E. Sims. Oxford: Oxford University Press, 2022., Adam D.M. Svendsen Jan 2023

Decision Advantage: Intelligence In International Politics From The Spanish Armada To Cyberwar. By Jennifer E. Sims. Oxford: Oxford University Press, 2022., Adam D.M. Svendsen

Journal of Strategic Security

This article provides an annotated review essay of Jennifer E. Sims’ book, Decision Advantage (2022). She communicates several valuable insights into how intelligence manifests in international affairs. Qualities are accomplished through Sims’ development of the concept and theory of ‘decision advantage’ in a variety of intelligence contexts, articulated via a series of different historical case studies ranging chronologically from the Spanish Armada to Cyberwar. Alongside acknowledging intelligence systems and engineering, notions of ‘intelligence power’ and ‘intelligence advantage(s)’ emerge as central, together with ideas of agility and adaptability amongst exponents. While undeniably forming a useful start, what Sims’ work ultimately discloses …


Understanding Pakistan’S Nuclear Security Regime, Tahir Azad, Karl Dewey Jan 2023

Understanding Pakistan’S Nuclear Security Regime, Tahir Azad, Karl Dewey

Journal of Strategic Security

Following Russia’s invasion of Ukraine in February 2022 there has been renewed attention on the security and protection of civilian nuclear infrastructure. This has been a long-standing issue in Pakistan, where the security of the country’s nuclear estate has attracted considerable international attention for decades. However, rather than looking at Pakistan’s civilian estate, assessments have instead prioritised the security of the country’s nuclear arsenal. They have also been widely divergent: Western analysts have raised serious concerns over Pakistan’s ability to secure sensitive nuclear materials, the country’s domestic instability and its poor non-proliferation history. In contrast Pakistani officials downplay these risks, …


The Pivotal Role Of International Human Rights Law In Defeating Cybercrime: Amid A (Un-Backed) Global Treaty On Cybercrime, Professor Fatemah Albader Nov 2022

The Pivotal Role Of International Human Rights Law In Defeating Cybercrime: Amid A (Un-Backed) Global Treaty On Cybercrime, Professor Fatemah Albader

Vanderbilt Journal of Transnational Law

On May 26, 2021, the General Assembly of the United Nations adopted a resolution approving the drafting of a new global treaty on cybercrime, which commenced in February 2022. The proposed UN agreement on cybercrime regulation has garnered significant criticism among the international community, namely by state delegates, human rights advocates, and nongovernmental organizations. Fears stem from the belief that such a treaty would be used to legitimize abusive practices and undermine fundamental human rights. National cybercrime laws already unduly restrict human rights. However, at a time where the global community has moved toward a digital world, it becomes even …


Balancing Grand Strategy For America To Offset Thucydides’S Trap With China, Anubhav S. Goswami Jul 2022

Balancing Grand Strategy For America To Offset Thucydides’S Trap With China, Anubhav S. Goswami

Journal of Strategic Security

China’s vastly increased economic and military might has alarmed the United States about sustaining its relative power in the world. Observing the growing influence of Beijing in the international world order, experts of ‘great power competition’ are now asking: What will be the reaction of the United States once China achieves parity or even comes close to achieving parity with Washington? As could be expected from its nature, the question has generated sharp polarising viewpoints but none has spawned more interest and controversy than Harvard Professor Graham T. Allison’s ‘Thucydides’ Trap’ discourse which argues that China’s spectacular rise could lead …


Strategy In An Uncertain Domain: Threat And Response In Cyberspace, Joe Devanny, Luiz Rogerio Franco Goldoni, Breno Pauli Medeiros Jul 2022

Strategy In An Uncertain Domain: Threat And Response In Cyberspace, Joe Devanny, Luiz Rogerio Franco Goldoni, Breno Pauli Medeiros

Journal of Strategic Security

Over the last decade, "cyber power" has become an increasingly prominent concept and instrument of national strategy. This article explores the nature of contemporary cyber power, focusing on how states should respond to "cyber uncertainty." Cases of cyber operations against Estonia, Georgia, and Ukraine, as well as cyber operations conducted (and suffered) by the United States, highlight the evolving role of cyber operations as an instrument of statecraft. Given the complexity of cyber forensics and the polluted information environment of the global public sphere, the public diplomacy of coordinated attribution statements cannot be expected to cut through conclusively or uniformly. …


Tiktok, Cfius, And The Splinternet, Jake T. Seiler May 2022

Tiktok, Cfius, And The Splinternet, Jake T. Seiler

University of Miami International and Comparative Law Review

This note will discuss the role that the Committee on Foreign Investment in the United States (“CFIUS” or “the Committee”) has played in foreign relations and how it contributes to the balkanization of the internet today. The Committee is an interagency body that reviews foreign investments for potential national security threats. Recently, CFIUS has been in the spotlight for its role in the sale of TikTok, a cellphone app owned by a popular Chinese corporation, ByteDance. While much of CFIUS’ review in the past has been focused on Chinese-owned corporations, there is much debate about whether or not countries should …


Revisiting Domestic Intelligence, John P. Sullivan, Genevieve Lester Apr 2022

Revisiting Domestic Intelligence, John P. Sullivan, Genevieve Lester

Journal of Strategic Security

This article looks at the evolution of US domestic intelligence prior to and since 9/11 in light of the Capitol attacks. It also reviews the literature and practice of intelligence reform in the context of foreign comparative experience (France, UK, Canada, Australia). It looks at the promise of fusion centers, cocontemporay domestic intelligence models, and the continuing need for domestic intelligence reform.

Additional Keywords: Domestic Intelligence, Intelligence Reform, Intelligence Fusion


Securing Elections Through International Law: A Tool For Combatting Disinformation Operations?, İrem Işik, Ömer F. Bi̇ldi̇k, Tayanç T. Molla Jan 2022

Securing Elections Through International Law: A Tool For Combatting Disinformation Operations?, İrem Işik, Ömer F. Bi̇ldi̇k, Tayanç T. Molla

Journal of Strategic Security

According to the U.S. Department of Justice, in 2014, the Russian government-connected Internet Research Agency (IRA) initiated an information operation on social media platforms to manipulate the U.S. population concerning the 2016 U.S. presidential elections. This has revealed that social media platforms enable the spread of fake news among the masses globally and can thus become a means of disrupting the electoral process for foreign actors. This article addresses state-sponsored disinformation operations on social media that target foreign voters. It considers it crucial to counter such operations to protect the security and integrity of the elections in the digital age, …


Domains Of Peace: Cyberspace And The First Global Expression Without War, Matt Flynn Jan 2022

Domains Of Peace: Cyberspace And The First Global Expression Without War, Matt Flynn

Journal of Strategic Security

The ongoing war in Ukraine appears to validate war as it always is. A look at the evolution of domains offers something different. When this step is taken, it becomes clear that humanity chooses the violence defining war. Cyber realities today reveal how technological innovation has stymied war, taking humanity into a pre-existing condition repudiating war and leaving cyberspace as the first global expression without war. Once accepting that truth, nations can contemplate the discovery of a domain offering an expression of peace as a cognitive battlespace overrides the physical application of use of force. This feat means peace finds …


Military Leadership By Intellectual Officers: A Case Study Of The Idf, Haim Yogev, Ronen A. Cohen, Eyal Lewin Jan 2022

Military Leadership By Intellectual Officers: A Case Study Of The Idf, Haim Yogev, Ronen A. Cohen, Eyal Lewin

Journal of Strategic Security

Morris Janowitz believed that for an army to be victorious it needs to be led by as many intellectual forces as possible, just as any organization needs organizational intellectualism to prosper. It is agreed in scholarly literature that the intellectual must author various articles and manifestos to express their viewpoints, mindset, and philosophy in the public sphere. Based on Janowitz’s belief and using the Israeli Defense Forces (IDF) as a case study, this research offers a model for a generic research methodology that can be practiced elsewhere. The mission was to find the extent to which the higher echelons of …


Book Review: This Is How They Tell Me The World Ends: The Cyberweapons Arms Race (2020) By Nicole Perlroth, Amy C. Gaudion Jan 2022

Book Review: This Is How They Tell Me The World Ends: The Cyberweapons Arms Race (2020) By Nicole Perlroth, Amy C. Gaudion

Dickinson Law Review (2017-Present)

No abstract provided.


If You Think Ai Won't Eclipse Humanity, You're Probably Just A Human, Gary D. Brown Dec 2021

If You Think Ai Won't Eclipse Humanity, You're Probably Just A Human, Gary D. Brown

William & Mary Bill of Rights Journal

Building machines that can replicate human thinking and behavior has fascinated people for hundreds of years. Stories about robots date from ancient history through da Vinci to the present. Whether designed to save labor or lives, to provide companionship or protection, loyal, capable, productive machines are a dream of humanity.

The modern manifestation of this interest in using human-like technology to advance social interests is artificial intelligence (AI). This is a paper about what that interest in AI means and how it might develop in the world of national security.

This abstract has been adapted from the author's introduction.


Deep Fakes: The Algorithms That Create And Detect Them And The National Security Risks They Pose, Nick Dunard Sep 2021

Deep Fakes: The Algorithms That Create And Detect Them And The National Security Risks They Pose, Nick Dunard

James Madison Undergraduate Research Journal (JMURJ)

The dissemination of deep fakes for nefarious purposes poses significant national security risks to the United States, requiring an urgent development of technologies to detect their use and strategies to mitigate their effects. Deep fakes are images and videos created by or with the assistance of AI algorithms in which a person’s likeness, actions, or words have been replaced by someone else’s to deceive an audience. Often created with the help of generative adversarial networks, deep fakes can be used to blackmail, harass, exploit, and intimidate individuals and businesses; in large-scale disinformation campaigns, they can incite political tensions around the …


Peran Negara D Alam Menjaga Kedaulatan Pada Ruang Maya (Cyberspace) Sebagai Upaya Perlindungan Terhadap Masyarakat, Nurharis Wijaya Jul 2021

Peran Negara D Alam Menjaga Kedaulatan Pada Ruang Maya (Cyberspace) Sebagai Upaya Perlindungan Terhadap Masyarakat, Nurharis Wijaya

"Dharmasisya” Jurnal Program Magister Hukum FHUI

Development of Internet technology has the potential to boost economic growth of a country. On the other hand, Internet technology also increases the amount and form of threat to the sovereignty of a state in the virtual world. Sovereignty in cyberspace become an important topic in the discussion of national and international security. In the context of the definition of space was no longer relevant in the light confined to the Regional Land, Sea, and Air. Developments Period increasingly cradles State with indulgence will ease in accessing information technology, which is certainly without successfully taking on the role that space-Maya …


National Security As A Public Interest Consideration In Uk Merger Control, Ioannis Kokkoris Jul 2021

National Security As A Public Interest Consideration In Uk Merger Control, Ioannis Kokkoris

Journal of Strategic Security

The article will discuss the boundaries of UK merger control set by national security concerns against the background of public interest considerations in the decisional practice of the competent authorities. The article will first present an overview of the existing legal framework for considering public interest when reviewing mergers and acquisitions in strategic industries or companies. It will then present the main precedents where issues of national security were raised and will discuss how the CMA and the Secretary of State assessed these transactions from both a competition and national security angle. Finally, the article will present the recent legislative …


Psychological Casualties As A Source Of Friction During War And A Mediator Of Coerced Peace Efforts, Karl Umbrasas Apr 2021

Psychological Casualties As A Source Of Friction During War And A Mediator Of Coerced Peace Efforts, Karl Umbrasas

Journal of Strategic Security

The United States homeland does not enjoy sanctuary in the twenty-first century geopolitical environment. Near-peer rivals, such as China and Russia, have capabilities that can impact the United States homeland during a high-end war. Adversaries’ aerospace capabilities have the potential to cause large volumes of psychological casualties among the United States population. Psychological casualties during a high-end war could serve as the basis for a mass call to end a war due to the altered information processing seen among traumatized people. Such a call to end a war could result in unfavorable peace settlements. The United States homeland must improve …


Strategic Security In Northern Europe: The Implications Of Russian Anti-Access/Area Denial Strategies In Developing Complex Threat Environments, Herb Kemp Phd Apr 2021

Strategic Security In Northern Europe: The Implications Of Russian Anti-Access/Area Denial Strategies In Developing Complex Threat Environments, Herb Kemp Phd

Journal of Strategic Security

Anti-Access/Area Denial (A2/AD) is a term that came into use to describe an environment in which an air and air defense force could use a combination of surface-launched ballistic missiles, surface and air launched cruise missiles and long-range surface-to-air missiles to prevent an opposing force from accessing or operating within a large airspace effectively. The descriptions and subsequent analyses of the penetrability of these environments often rests on assessments of the capabilities of just a few newly developed missiles and may fail to consider the additional complexity induced by the large array of the entire complement of air, land and …


Secrecy In U.S. National Security: Why A Paradigm Shift Is Needed, Steven Aftergood Jan 2021

Secrecy In U.S. National Security: Why A Paradigm Shift Is Needed, Steven Aftergood

Secrecy and Society

No abstract provided.


Winning The Digital War: Cyber Ideology And The Spectrum Of Conflict, Matthew Flynn Jan 2021

Winning The Digital War: Cyber Ideology And The Spectrum Of Conflict, Matthew Flynn

Journal of Strategic Security

Cyberspace allows ideology to dictate who wins a war. That technological medium has marginalized violence to such an extent that a belligerent must make a cognitive effort a priority. That focus means humanity has at last reached a coveted threshold where ideas determine a war’s outcome. This article traces that evolution along the “spectrum of conflict,” a military categorization encompassing all of war. This act of reductionism must confront cyber realities that alter an understanding of war as one driven by acts of violence. This feat means a digital peace finds an equal footing with war arising from a cyber …