Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Terrorism

Public Affairs, Public Policy and Public Administration

Institution
Publication Year
Publication
Publication Type

Articles 1 - 30 of 33

Full-Text Articles in Entire DC Network

2023 Annual Estimate Of The Strategic Security Environment, Usawc Ssi Aug 2023

2023 Annual Estimate Of The Strategic Security Environment, Usawc Ssi

Monographs, Collaborative Studies, & IRPs

The Annual Estimate of the Strategic Security Environment serves as a guide for academics and practitioners in the defense community on the current challenges and opportunities in the strategic environment. This year’s publication outlines key strategic issues across the four broad themes of Regional Challenges and Opportunities, Domestic Challenges, Institutional Challenges, and Domains Impacting US Strategic Advantage. These themes represent a wide range of topics affecting national security and provide a global assessment of the strategic environment to help focus the defense community on research and publication. Strategic competition with the People’s Republic of China and the implications of …


A Hollow Victory And Unending Problem: The Undying Anti-Russian Insurgency In Ukraine, Abraham Ashley Jan 2023

A Hollow Victory And Unending Problem: The Undying Anti-Russian Insurgency In Ukraine, Abraham Ashley

MSU Graduate Theses

This thesis uses quantitative and qualitative research methods to: (1) explore the base causes of insurgency in Ukraine, (2) examine the historical basis for Ukrainian insurgency, (3) provide historical examples of successful and unsuccessful insurgencies to contrast against Ukraine, and (4) provide recommendations for NATO and Ukrainian policy. Collectively, this project demonstrates that current Russian counterinsurgency tactics will not be successful without significant adjustment. This Ukrainian insurgency may also derail the possibility of peace in the region.


Countering Terrorism On Tomorrow’S Battlefield: Critical Infrastructure Security And Resiliency (Nato Coe-Dat Handbook 2), Sarah J. Lohmann, Lucas M. Cox, Denise Feldner, Trevor P. Helmy, Frank J. Kuzminski, Marcus Mohlin, Aleksander Olech, Wuraola Oyewusi, Gabriel T. Raicu, Silke Ruhl, Sabrina Schulz, Máté Tóth, Megan A. Ward Dec 2022

Countering Terrorism On Tomorrow’S Battlefield: Critical Infrastructure Security And Resiliency (Nato Coe-Dat Handbook 2), Sarah J. Lohmann, Lucas M. Cox, Denise Feldner, Trevor P. Helmy, Frank J. Kuzminski, Marcus Mohlin, Aleksander Olech, Wuraola Oyewusi, Gabriel T. Raicu, Silke Ruhl, Sabrina Schulz, Máté Tóth, Megan A. Ward

Monographs, Collaborative Studies, & IRPs

Every day, malicious actors target emerging technologies and medical resilience or seek to wreak havoc in the wake of disasters brought on by climate change, energy insecurity, and supply-chain disruptions. Countering Terrorism on Tomorrow’s Battlefield is a handbook on how to strengthen critical infrastructure resilience in an era of emerging threats. The counterterrorism research produced for this volume is in alignment with NATO’s Warfighting Capstone Concept, which details how NATO Allies can transform and maintain their advantage despite new threats for the next two decades. The topics are rooted in NATO’s Seven Baseline requirements, which set the standard for enhancing …


Shortcut To Terrorism: Self-Radicalization And Lone- Wolf Terror Acts: A Case Study Of Indonesia, Stanislaus Riyanta May 2022

Shortcut To Terrorism: Self-Radicalization And Lone- Wolf Terror Acts: A Case Study Of Indonesia, Stanislaus Riyanta

Journal of Terrorism Studies

A surprising phenomenon was observed in the lone-wolf terror terrorism that occurred in Indonesia. This is associated with the fact that the perpetrators of seven out of thirteen cases reported were exposed to radical information through social media and the internet without directly joining a terrorist group. The process involved the intensive exploration of the internet by people previously interested in radicalism content which eventually led to self-radicalization and the subsequent terror acts. Meanwhile, Fathali M Moghaddam proposed that the process of radicalization before a terror act is conducted involves six stages of action known as the staircase to terrorism. …


Law Enforcement Policy And Personnel Responses To Terrorism: Do Prior Attacks Predict Current Preparedness?, Bryce Kirk May 2022

Law Enforcement Policy And Personnel Responses To Terrorism: Do Prior Attacks Predict Current Preparedness?, Bryce Kirk

Graduate Theses and Dissertations

Terrorism has been on the mind of the American people and politicians alike since the 9/11 attacks over two decades ago. In the years since, there has been a massive shift in law enforcement priorities from community-oriented policing (COP) to homeland security-oriented policing. This was especially evident in the establishment of the Department of Homeland Security (DHS) shortly after the attacks on the World Trade Center and Pentagon in 2001, which was established to aid law enforcement entities with terrorism preparedness. While prior literature has addressed a variety of factors that have contributed to terrorism preparedness, very little research has …


The Evolution Of United States - Central Asian Security Policy Post-9/11: Military, Terrorism, And Cyber-Security, Shamsuddin Karimi Jan 2021

The Evolution Of United States - Central Asian Security Policy Post-9/11: Military, Terrorism, And Cyber-Security, Shamsuddin Karimi

FIU Electronic Theses and Dissertations

Rudyard Kipling once described and wrote about the Great Game as a way to outline 19th century great power politics in the struggle for empire in Central Asia. While Kipling’s tale of spy-craft and espionage is fiction, the political philosophy behind the story has never lost relevance. The struggle for political dominance in Central Asia continued through the twentieth century in the Cold War as well as into twenty-first century after the terrorist attacks on September 11, 2001. Although the great power players may have changed over the past 120 years, the importance of Central Asia has not.

This …


Study On The Implementation Of The Regulations Of Terrorism Activities In Social Media, Angga Dewanto Basari, Muhammad Syauqillah, Asep Usman Ismail Jul 2020

Study On The Implementation Of The Regulations Of Terrorism Activities In Social Media, Angga Dewanto Basari, Muhammad Syauqillah, Asep Usman Ismail

Journal of Strategic and Global Studies

The legal scope of the Terrorism Law and the Information and Electronic Transactions Law in Indonesia is considered as lacking to cover the problem of cybercrime in social media. Aside from literature review, this paper is also supported by data from direct interview with the Head of Counterterrorism Special Detachment 88 (Densus 88 AT) of Indonesian National Police. The data found out that the Terrorism Law is a repressive response towards terrorism crimes that have already occured, but less preventive to future crimes. The existence of laws in Indonesia is often one step behind its crime. The difference of perception …


Asymmetric Threats: Analyzing The Future Of Nuclear Terrorism & Cyber Attacks; The Value Of Deterrence Theory For Addressing The Challenges Of Nuclear Terrorism In The Age Of 21st Century Cybersecurity, Oliver Demmert-Shelfo May 2020

Asymmetric Threats: Analyzing The Future Of Nuclear Terrorism & Cyber Attacks; The Value Of Deterrence Theory For Addressing The Challenges Of Nuclear Terrorism In The Age Of 21st Century Cybersecurity, Oliver Demmert-Shelfo

Political Science & International Studies | Senior Theses

Given the rapid development and ease of access to technology, the threat of extremist organizations utilizing cyberspace as a means to target critical American strategic infrastructure is of increasing concern. The risk posed by the acquisition of fissile material, sabotage, or use of a nuclear device by an extremist organization has been exasperated due to technological development outpacing strategy. Despite policy-makers’ attempts to protect the public from cyber-attacks and nuclear terrorism, the federal policies in place have failed to account for the continual evolution of technology and the gaps in security that this advancement brings. Through examining documents from congressional …


Women As Nontraditional Terrorists, Giorgi Beruashvili Jan 2020

Women As Nontraditional Terrorists, Giorgi Beruashvili

Honors Undergraduate Theses

Terrorist organizations have always been predominantly dominated by male members in numbers of participants, supporters, and leaders. Despite men having the majority of the roles, oftentimes the world witnesses attack executed by female terrorists which deal a substantial amount of damage to the infrastructure and the peaceful civilians surrounding them. Furthermore, the sense of unpredictability and unpreparedness from the counterterrorist forces and the general public adds up to the overall advantage women possess in the field of terrorism over men. Considering these observations, one can argue that women have grown to be far more dangerous and successful in the field …


Exploring Contemporary Counterterrorism And Perspectives Of Terrorism Experts To Combat Boko Haram, Enyinaya Njoku Jan 2020

Exploring Contemporary Counterterrorism And Perspectives Of Terrorism Experts To Combat Boko Haram, Enyinaya Njoku

Walden Dissertations and Doctoral Studies

Within the last decade, the terrorist attacks by Boko Haram have been the topic of considerable scholarly focus; yet, there remains a lack of knowledge and understanding about the causes of failure in counterterrorism measures by the Nigerian government in Borno State. Using Wilner’s contemporary deterrence theory as the foundation, the purpose of this case study of the Nigeria Police Force (NPF) was to bridge the gap in knowledge to understand the causes of failure in counterterrorism measures by the Nigerian government and to explore alternate approaches to the counterterrorism efforts in Borno State to deter Boko Haram. Data were …


Transportation, Terrorism And Crime: Deterrence, Disruption And Resilience, Daniel C. Goodrich, Frances L. Edwards Jan 2020

Transportation, Terrorism And Crime: Deterrence, Disruption And Resilience, Daniel C. Goodrich, Frances L. Edwards

Mineta Transportation Institute Publications

Abstract: Terrorists likely have adopted vehicle ramming as a tactic because it can be carried out by an individual (or “lone wolf terrorist”), and because the skills required are minimal (e.g. the ability to drive a car and determine locations for creating maximum carnage). Studies of terrorist activities against transportation assets have been conducted to help law enforcement agencies prepare their communities, create mitigation measures, conduct effective surveillance and respond quickly to attacks.

This study reviews current research on terrorist tactics against transportation assets, with an emphasis on vehicle ramming attacks. It evaluates some of the current attack strategies, and …


Current Trends In Small Unmanned Aircraft Systems: Implications For U.S. Special Operations Forces, J. Philip Craiger, Diane Maye Zorri Sep 2019

Current Trends In Small Unmanned Aircraft Systems: Implications For U.S. Special Operations Forces, J. Philip Craiger, Diane Maye Zorri

Publications

This paper assesses current trends in small unmanned aircraft systems (sUAS) technology and its applications to the Special Operations Forces (SOF) community. Of critical concern to SOF is that commercial-off-the-shelf (COTS) sUAS technologies are relatively inexpensive, improving at a dramatic rate, and widely available throughout the world. Insurgents, terrorists, violent extremist organizations (VEOs) and other nefarious actors have used COTS sUAS to conduct offensive attacks as well as to develop battlefield situation awareness; these technological improvements combined with their widespread availability will require enhanced and rapidly adaptive counter-sUAS measures in the future. To understand the most current trends in the …


Terrorism In The 2020s: Examining The Global Threat Landscape, Landon W. Swearngin May 2019

Terrorism In The 2020s: Examining The Global Threat Landscape, Landon W. Swearngin

MSU Graduate Theses

This thesis uses quantitative and qualitative research methods to (1) explore the global trends and trajectories of terrorism, (2) identify emerging strategic challenges, and (3) outline an opportunity analysis for U.S. counterterrorism strategy. Collectively, this project provides a strategic forecast for terrorism in the 2020s, demonstrating that terrorism is becoming increasingly dangerous, dynamic, and difficult to defeat.


Identifikasi Ancaman Pci (Positif Clandestine Intelligence) Berbentuk Cyber Terrorism Terhadap Keamanan Nasional, Yudha Fernando Jan 2019

Identifikasi Ancaman Pci (Positif Clandestine Intelligence) Berbentuk Cyber Terrorism Terhadap Keamanan Nasional, Yudha Fernando

Jurnal Kajian Stratejik Ketahanan Nasional

Penelitian ini dilatarbelakangi oleh kewaspadaan terhadap perkembangan teknologi dunia maya yang begitu cepat sehingga menyebabkan ketergantungan padanya di hampir semua bidang. Kondisi ini berpotensi menimbulkan ancaman terhadap kemeriahan nasional kita di berbagai bidang, terutama di sektor keamanan nasional. Para peneliti mencoba mengidentifikasi ancaman Positive Clandestin Intelligence (PCI) dalam bentuk terorisme cyber pada keamanan nasional, sehingga dapat membawa para pemangku kepentingan ke tingkat pengetahuan yang lebih baik. Beberapa teori dan konsep yang digunakan peneliti terkait dengan ancaman, keamanan nasional, intelijen klandestin positif, terorisme, dan terorisme cyber (CT). Pendekatan penelitian yang digunakan dalam penelitian ini adalah pendekatan kualitatif dan jenis penelitiannya adalah …


Conceptions About Terrorism: How Fearful Are We And How Does That Affect Us?, Rebecca Jackson Jan 2019

Conceptions About Terrorism: How Fearful Are We And How Does That Affect Us?, Rebecca Jackson

Honors Undergraduate Theses

Since the crusades, terrorism has been a form of violence used to promote some kind of agenda, whether political, social, religious or ideological (Martin 2018). With many different definitions of what constitutes terrorism, it is somewhat difficult to measure what exact impact terrorism has had globally. Attacks such as those on 9/11 in the United States and the Manchester bombings have been accepted worldwide as examples of acts of international terrorism. International terrorist attacks have lasting effects on both those directly affected as well as the larger community and beyond. Studies have shown that Americans are overly afraid of terrorism …


Declaration Of The Modern Caliphate: Understanding The Importance Of Mosul To Isil, Megan Marchetti, Matthew J. Smith, Ken Wallace Apr 2018

Declaration Of The Modern Caliphate: Understanding The Importance Of Mosul To Isil, Megan Marchetti, Matthew J. Smith, Ken Wallace

Politics, Philosophy, and Legal Studies: Student Scholarship & Creative Works

This paper examines the importance of the Iraqi city of Mosul to ISIL. Special attention is given to the conquering of Mosul, ISIL's governance, and the Battle of Mosul.


Patterns Within Nine Preattack Phases That Emerged In Israel Suicide Bombing Cases, Aaron Richman Jan 2018

Patterns Within Nine Preattack Phases That Emerged In Israel Suicide Bombing Cases, Aaron Richman

Walden Dissertations and Doctoral Studies

From 2000 to 2013, Israel had the second highest number of deaths from suicide attacks and was on the list of countries that may experience increases in terrorism due to ongoing conflicts. Suicide bombings present highly complex situations for counterterrorism and counterinsurgency professionals. Using Freeman, Tucker, and Merton's framework of 9 preattack phases as the primary theoretical constuct, the purpose of this multiple case study was to explore specific patterns that consistently emerged in the adversary planning process for 6 successful or failed suicide bombing cases in Israel. Secondary, archival data were acquired through a data use agreement with a …


The Future Of Nuclear Security: A Medical Physicist’S Perspective, Katharine E. Thomson Dec 2017

The Future Of Nuclear Security: A Medical Physicist’S Perspective, Katharine E. Thomson

International Journal of Nuclear Security

Planning for the future of nuclear security is a vital and complex task, requiring cooperation and contribution from many disciplines and industries. This diversity of expertise should include the medical sector, which faces many of the same challenges as the nuclear industry: controlling access to dangerous material, creating a strong security culture, cooperating with the wider world and engaging the public.

Medical physicists, of which the author is one, oversee all aspects of small-scale radiation use. This paper discusses three key areas increasingly important to both medical and nuclear uses of radioactive materials: public engagement, prevention of nuclear and radiological …


Midnight In America: Nuclear Electromagnetic Pulse And The 21st Century Threat To The United States, Angela Weaver Aug 2017

Midnight In America: Nuclear Electromagnetic Pulse And The 21st Century Threat To The United States, Angela Weaver

MSU Graduate Theses

The electromagnetic pulse (EMP) effects produced by the detonation of a nuclear weapon at high altitude are capable of causing widespread destruction in the U.S. homeland with few to no immediate casualties. The threat of nuclear EMP attack against the United States was recognized as probable during the Cold War but as time passed, the threat lost consciousness among U.S. policy makers as other issues and threats rose to the forefront. Simultaneously, the United States military and civilian society grew increasingly reliant upon emerging electronic systems and capabilities while adversary nations and rogue states rapidly pursued nuclear weapons capabilities. Today, …


A Radical Idea: Applying Psychological Strategy To Combat Foreign Fighters Defending The Islamic State, David Michael Smaney May 2017

A Radical Idea: Applying Psychological Strategy To Combat Foreign Fighters Defending The Islamic State, David Michael Smaney

MSU Graduate Theses

This thesis focuses on the necessity of psychological strategies to combat the Islamic State’s recruitment of foreign fighters. This thesis argues that psychological strategies are a primary weapon due to the psychological nature of the war against the Islamic State, which is a part of the overall war of ideas. This thesis does not consider psychological strategies for other aspects of U.S. counterterrorism strategy, nor does it reflect the difficulties involved with developing U.S. strategies in the U.S. federal government. Furthermore, this thesis only focuses on foreign fighter defending and supporting the Islamic State, which is the successor of Al …


The Making Of A Virtual Monster: Ideological Criticism On The Isis Hate And Extremism, Md Shah Jahan Jan 2017

The Making Of A Virtual Monster: Ideological Criticism On The Isis Hate And Extremism, Md Shah Jahan

All Graduate Theses, Dissertations, and Other Capstone Projects

The 9/11 incident and its subsequent terrorism specifically the rise of radical Islamist groups like ISIS (Islamic State of Iraq and Syria), and al-Qaeda astounds the world. ISIS’s propaganda technique using digital media helps the terrorist group motivate and recruit a large group of people from around the world. Terrorist incidents like the Dhaka café in 2016 and France soccer game attack in 2015 provide a glimpse of ISIS ferocity and barbarism with its subsequent series of attacks. This research examines the kind of rhetorical language that ISIS leaders and followers use to support their ideologies. And, how the internet …


Pennsylvania 2016 Pre-Election Poll On Policy And Governance, Alexander Siedschlag Nov 2016

Pennsylvania 2016 Pre-Election Poll On Policy And Governance, Alexander Siedschlag

Publications

Pennsylvanians mainly see Homeland Security as a comprehensive effort of the federal government to fight terrorism at home and abroad. While it most often has a positive connotation, the multi-faceted mission space of homeland security is widely unknown.


Differential Reinforcement In The Online Radicalization Of Western Muslim Women Converts, Heather Cone Jan 2016

Differential Reinforcement In The Online Radicalization Of Western Muslim Women Converts, Heather Cone

Walden Dissertations and Doctoral Studies

The emerging phenomenon of Western women Islamic converts learning radicalized ideology through social media constitutes a challenge to cyber policy makers hampered by a lack of gender-nuanced radicalization research. The purpose of this exploratory qualitative case study was to develop a greater understanding of how the differential reinforcement tenet of social learning theory may help to explain the conversion and radicalization of Western women towards a fundamentalist Islamic ideology through their participation in the social media. Key research questions explored how participation in online social media may create vulnerability towards radicalization and exploitation. The blogs of 3 different Western women …


Book Reviews, Usawc Press Dec 2015

Book Reviews, Usawc Press

The US Army War College Quarterly: Parameters

No abstract provided.


Much Ado About Cyber-Space: Cyber-Terrorism And The Reformation Of The Cyber-Security, Christian Pedersen Jan 2014

Much Ado About Cyber-Space: Cyber-Terrorism And The Reformation Of The Cyber-Security, Christian Pedersen

Pepperdine Policy Review

The threats residing in cyber-space are becoming well understood by policymakers and security experts alike. However, cyber-security defenses and strategies cannot solely be directed towards nation states, as non-governmental actors – such as transnational crime groups and terrorist organizations are becoming increasingly reliant upon internet technologies. Attacks on the digital components of the critical infrastructure, have the potential to unleash devastation on the United States. In a time when reliability and ethnicity of the National Security Administration, the Nation’s leading digital intelligence organization, are becoming increasingly questioned; defensive measures need to be improved to prevent future attacks and improve the …


Radicalization In The Homeland—The Need For Community Partnership And Education, Gabriel C. Lajeunesse Sep 2010

Radicalization In The Homeland—The Need For Community Partnership And Education, Gabriel C. Lajeunesse

Gabriel C. Lajeunesse

By educating our citizenry on the process and signs of radicalization we encourage early detection and warning of potential terror activities in the homeland. Without such an effort, we are at a marked disadvantage.


The Word On Terrorism Threat As Terrorism Threat, Ibpp Editor May 2010

The Word On Terrorism Threat As Terrorism Threat, Ibpp Editor

International Bulletin of Political Psychology

The author discusses terrorism (and terms associated with it), considering the social rhetoric surrounding the terms as well as other potential meanings. The constraints of the words used to define these terms of terror are considered.


Geo-Politics, The ‘War On Terror’ And The Competitiveness Of The City Of London, Richard Woodward Jul 2007

Geo-Politics, The ‘War On Terror’ And The Competitiveness Of The City Of London, Richard Woodward

Books/Book Chapters

No abstract provided.


Human Rights And The War On Terror: Complete 2005 - 2007 Topical Research Digest, Jack Donnelly, Simon Amajuru, Susannah Compton, Robin Davey, Syd Dillard, Amanda Donahoe, Charles Hess, Sydney Fisher, Kelley Laird, Victoria Lowdon, Chris Maggard, Alexandra Nichols, Travis Ning, Toni Panetta, Greg Sanders, James Smithwick, Angela Woolliams, Chris Saeger, Sarah Bania-Dobyns, Eric Dibbern, David Gillespie, Latife Bulur, Katie Friesen, Arika Long, Arianna Nowakowski, Joel R. Pruce Jan 2007

Human Rights And The War On Terror: Complete 2005 - 2007 Topical Research Digest, Jack Donnelly, Simon Amajuru, Susannah Compton, Robin Davey, Syd Dillard, Amanda Donahoe, Charles Hess, Sydney Fisher, Kelley Laird, Victoria Lowdon, Chris Maggard, Alexandra Nichols, Travis Ning, Toni Panetta, Greg Sanders, James Smithwick, Angela Woolliams, Chris Saeger, Sarah Bania-Dobyns, Eric Dibbern, David Gillespie, Latife Bulur, Katie Friesen, Arika Long, Arianna Nowakowski, Joel R. Pruce

Human Rights & Human Welfare

“9/11 changed everything.” Not really. In fact, there has been far more continuity than change over the past six years in both international and domestic politics. Nonetheless, human rights often have been harmed—although not by terrorism but by “the war on terror.”


Influence In An Age Of Terror: A Framework Of Response To Islamist Influence Operations, John Deniston Jan 2007

Influence In An Age Of Terror: A Framework Of Response To Islamist Influence Operations, John Deniston

Global Tides

Adversarial influence operations perpetrated by Islamist terrorist networks confront the most foundational of America’s national defense capabilities: the will of the American people to fight. This assertion is predicated on four key determinations. First, Islamist terrorist networks use influence operations as an integral tool of global jihad. Second, these adversarial influence operations should be perceived as attacks and, subsequently, should demand response. Third, a wide array of US Government tools and institutions currently exists to counter this challenge. Fourth, precision-strike doctrine and cyber-attack response frameworks provide instructional examples of methods to create a coordinated US Government response to such influence …