Open Access. Powered by Scholars. Published by Universities.®

National Security Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences

2012

Institution
Keyword
Publication
Publication Type

Articles 31 - 43 of 43

Full-Text Articles in National Security Law

A Systems-Based Approach To Intelligence Reform, Austen Givens Apr 2012

A Systems-Based Approach To Intelligence Reform, Austen Givens

Journal of Strategic Security

The terrorist attacks of September 11, 2001 prompted the most comprehensive changes to the U.S. Intelligence Community (IC) since its creation via the National Security Act of 1947. Recent structural and organizational reforms, such as efforts to enhance information sharing and recruit speakers of hard-target languages, have also triggered new challenges to successful transformation. In light of the systemic problems facing the IC, this paper argues that systems engineering, a discipline increasingly useful in organizational change, offers a more efficient, holistic approach to the intelligence reform process than the status quo. Systems engineering views the IC as an integrated and …


Cover & Front Matter Apr 2012

Cover & Front Matter

Journal of Strategic Security

No abstract provided.


Ten Years Of Gwot, The Failure Of Democratization And The Fallacy Of “Ungoverned Spaces”, David P. Oakley, Patrick Proctor Apr 2012

Ten Years Of Gwot, The Failure Of Democratization And The Fallacy Of “Ungoverned Spaces”, David P. Oakley, Patrick Proctor

Journal of Strategic Security

October 7, 2011, marked a decade since the United States invaded Afghanistan and initiated the Global War on Terrorism (GWOT). While most ten-year anniversary gifts involve aluminum, tin, or diamonds, the greatest gift U.S. policymakers can present American citizens is a reconsideration of the logic that guides America's counterterrorism strategy. Although the United States has successfully averted large-scale domestic terrorist attacks, its inability to grasp the nature of the enemy has cost it dearly in wasted resources and, more importantly, lost lives. Two of the most consistent and glaring policy flaws revolve around the concepts of filling "ungoverned spaces" and …


Deterring And Dissuading Nuclear Terrorism, John J. Klein Apr 2012

Deterring And Dissuading Nuclear Terrorism, John J. Klein

Journal of Strategic Security

While nuclear deterrence theory may be well-suited to dealing with nuclear-armed states, its suitability for deterring nuclear terrorism has frequently been questioned since 9/11. While terrorist organizations do not necessarily act uniformly or according to the same underlying beliefs, many of the most aggressive organizations are motivated by an ideology that embraces martyrdom and an apocalyptic vision.1 This ideology may be based on religion or a desire to overthrow a government. Consequently, terrorists motivated by ideology who intend to use a stolen or improvised nuclear device against the United States or its interests may not care about the resulting military …


Policy Intervention In Fata: Why Discourse Matters, Nazya Fiaz Dr. Apr 2012

Policy Intervention In Fata: Why Discourse Matters, Nazya Fiaz Dr.

Journal of Strategic Security

Despite years of wide-scale counterterrorism measures in Pakistan's FATA (Federally Administered Tribal Areas), the injection of substantial funds, and the "close" collaboration between the United States and Pakistan, the ugly truth is that the extremism and militancy in FATA continues to recruit members. Moreover, there is little indication that the killing of Usama bin Ladin will have any significant effect on reducing support for militancy. While taking stock of these realities, this article will not seek to rehash the many successes and failures of the counterterrorist operations in FATA. Instead, its purpose will be to argue that while the causes …


You Say You Want A (Nonviolent) Revolution, Well Then What? Translating Western Thought, Strategic Ideological Cooptation, And Institution Building For Freedom For Governments Emerging Out Of Peaceful Chaos, Donald J. Kochan Mar 2012

You Say You Want A (Nonviolent) Revolution, Well Then What? Translating Western Thought, Strategic Ideological Cooptation, And Institution Building For Freedom For Governments Emerging Out Of Peaceful Chaos, Donald J. Kochan

Donald J. Kochan

With nonviolent revolution in particular, displaced governments leave a power and governance vacuum waiting to be filled. Such vacuums are particularly susceptible to what this Article will call “strategic ideological cooptation.” Following the regime disruption, peaceful chaos transitions into a period in which it is necessary to structure and order the emergent governance scheme. That period in which the new government scheme emerges is particularly fraught with danger when growing from peaceful chaos because nonviolent revolutions tend to be decentralized, unorganized, unsophisticated, and particularly vulnerable to cooptation. Any external power wishing to influence events in societies emerging out of peaceful …


Nato Expansion During The Cold War And After, Evan Jaroff Mar 2012

Nato Expansion During The Cold War And After, Evan Jaroff

Claremont-UC Undergraduate Research Conference on the European Union

No abstract provided.


The Advanced Persistent Threat And The Role Of Cybersecurity Education, Gary C. Kessler Mar 2012

The Advanced Persistent Threat And The Role Of Cybersecurity Education, Gary C. Kessler

Security Studies & International Affairs - Daytona Beach

"The changing face of infowar • The Advanced Persistent Threat • Examples of recent cyber attacks • Mitigation and preparation • Formalizing the response • The role(s) of education"--Overview


The Advanced Persistent Threat And The Role Of Cybersecurity Education, Gary C. Kessler Mar 2012

The Advanced Persistent Threat And The Role Of Cybersecurity Education, Gary C. Kessler

Applied Aviation Sciences - Daytona Beach

No abstract provided.


Adapting To The Twenty-First Century: A Flexible Nato, Sarah Bohman Feb 2012

Adapting To The Twenty-First Century: A Flexible Nato, Sarah Bohman

Claremont-UC Undergraduate Research Conference on the European Union

No abstract provided.


Carlos Figueroa On State Power And Democracy: Before And During The Presidency Of George W. Bush. By Andrew Kolin. New York, Ny: Palgrave Macmillan, 2011. 251pp., Carlos Figueroa Jan 2012

Carlos Figueroa On State Power And Democracy: Before And During The Presidency Of George W. Bush. By Andrew Kolin. New York, Ny: Palgrave Macmillan, 2011. 251pp., Carlos Figueroa

Human Rights & Human Welfare

A review of:

State Power and Democracy: Before and During the Presidency of George W. Bush. By Andrew Kolin. New York, NY: Palgrave Macmillan, 2011. 251pp.


National Security In The Information Age, Rosa Brooks Jan 2012

National Security In The Information Age, Rosa Brooks

Georgetown Law Faculty Publications and Other Works

The information environment has been changing right along with the broader security environment. Today, the information environment connects almost everyone, almost everywhere, almost instantaneously. The media environment has become global, and there’s no longer such thing as “the news cycle” —everything is 24/7. Barriers between US and global publics have virtual disappeared: Everything and anything can “go viral” instantly, and it’s no longer possible to say one thing to a US audience and another thing to a foreign audience and assume no one will ever set the statements side by side. The Pakistani military has a very clear idea of …


The Many Languages Of Cctv, David J. Brooks Dr., Jeff Corkill Dec 2011

The Many Languages Of Cctv, David J. Brooks Dr., Jeff Corkill

David J Brooks Dr.

Closed circuit television (CCTV) has become a common form of technology, infused within many parts of our life, such as public, private, social and work environments. Whether CCTV is used in the media in a voyeuristic mode for the production of Big Brother, in public transport to reduce assaults or in a public street surveillance system to improve safety, the technology is in essence the same. Over the last 20 years, there has been much discussion on CCTV effectiveness. This discussion, in particular from the UK, has been significant in its scope.