Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Public Affairs, Public Policy and Public Administration

National Security

Institution
Publication Year
Publication
Publication Type
File Type

Articles 1 - 30 of 85

Full-Text Articles in Social and Behavioral Sciences

Rethinking Supply Chains: Mitigating The Risk Of Chinese Dependence And Protecting Us Semiconductor Intellectual Property, Jamison Finnamore Apr 2024

Rethinking Supply Chains: Mitigating The Risk Of Chinese Dependence And Protecting Us Semiconductor Intellectual Property, Jamison Finnamore

Helm's School of Government Conference - American Revival: Citizenship & Virtue

This paper explores the complex economic interdependence between the US, China, and Taiwan, specifically in the semiconductor industry. China’s increased aggression and intellectual property (IP) theft threatens to unbalance the iron triangle of US, China, and Taiwan trade relations. The problem overview elaborates on Taiwan’s crucial role in the semiconductor supply chain, and China’s threat against it. The argument is made that the US must take a nuanced and multifaceted approach to solving the diplomatic, economic, and military policy problem. Criteria for success are outlined, emphasizing the need to address root causes and not compromise US commitment to a free …


Ai And National Security: The United States Risks Losing Its Competitive Edge, Royce Morris Oct 2023

Ai And National Security: The United States Risks Losing Its Competitive Edge, Royce Morris

Liberty University Journal of Statesmanship & Public Policy

Recent developments in artificial intelligence (AI) have caused concern over the ethical implications of large-scale AI implementation. As a result, leading technologists and computer scientists have advocated an incremental rather than comprehensive approach to AI development and implementation to allow ethical and structural guidelines to provide a public safety net. However, such an approach does not account for the geopolitical and national security implications of lagging behind competitors like China, who have publicly stated goals of reaching AI supremacy within the next ten years. This article presents a national security analysis of the risks to American national security by allowing …


A Unified Voice: The Us-Taliban Peace Deal, Matthew Feldstein May 2023

A Unified Voice: The Us-Taliban Peace Deal, Matthew Feldstein

The Gettysburg Journal for Public Policy

The United States signed a peace deal with the Taliban on February 29th, 2020 that would result in the complete withdrawal of US forces from the country at the end of a fourteenth month period, assuming the Taliban holds up their end of the deal. This would mark the end of one of the longest wars in United States history, lasting nearly two decades. The purpose of this paper is twofold, to determine if there is a presence of bias or misinformation by five major public policy think tanks in the United States and to examine the United …


Comparing The Evolution, Form, And Function Of Russian And Chinese Information Operations, Briana Berger Slowinski, Marissa J. Skulsky May 2023

Comparing The Evolution, Form, And Function Of Russian And Chinese Information Operations, Briana Berger Slowinski, Marissa J. Skulsky

Honors Theses

Russia and China are critical actors who deploy far-reaching and impactful information operations in pursuit of their national interests. Their use of information operations is multifaceted and should be subject to study due to how influential these operations are and how significant the effects can be. In pursuit of this knowledge, the aim of this study was to conduct an in-depth analysis of these two countries' information operations and how their operations differ. The first area analyzed was the evolution of these countries' modern day information operations, primarily looking for the factors and historical context which influenced the development of …


What Senior U.S. Leaders Say We Should Know About Cyber, Dr. Joseph H. Schafer May 2023

What Senior U.S. Leaders Say We Should Know About Cyber, Dr. Joseph H. Schafer

Military Cyber Affairs

On April 6, 2023, the Atlantic Council’s Cyber Statecraft Initiative hosted a panel discussion on the new National Cybersecurity Strategy. The panel featured four senior officials from the Office of the National Cyber Director (ONCD), the Department of State (DoS), the Department of Justice (DoJ), and the Department of Homeland Security (DHS). The author attended and asked each official to identify the most important elements that policymakers and strategists must understand about cyber. This article highlights historical and recent struggles to express cyber policy, the responses from these officials, and the author’s ongoing research to improve national security cyber policy.


The Eagle’S Eye On The Rising Dragon: Why The United States Has Shifted Its View Of China, Jackson Scott May 2023

The Eagle’S Eye On The Rising Dragon: Why The United States Has Shifted Its View Of China, Jackson Scott

Baker Scholar Projects

Since 1978, the People’s Republic of China (PRC) has long been viewed as an economic trading partner of the United States of America (US). The PRC has grown to be an economic powerhouse, and the US directly helped with that process and still benefits from it. However, during the mid-2010’s, US rhetoric began to turn sour against the PRC. The American government rhetoric toward the PRC, beginning with the Obama administration, switched. As Trump’s administration came along, they bolstered this rhetoric from non-friendly to more or less hostile. Then, Biden’s administration strengthened Trump’s rhetoric. Over the past ten years or …


The Eagle’S Eye On The Rising Dragon: Why The United States Has Shifted Its View Of China, Jackson Craig Scott May 2023

The Eagle’S Eye On The Rising Dragon: Why The United States Has Shifted Its View Of China, Jackson Craig Scott

Baker Scholar Projects

Since 1978, the People’s Republic of China (PRC) has long been viewed as an economic trading partner of the United States of America (US). The PRC has grown to be an economic powerhouse, and the US directly helped with that process and still benefits from it. However, during the mid-2010’s, US rhetoric began to turn sour against the PRC. The American government rhetoric toward the PRC, beginning with the Obama administration, switched. As Trump’s administration came along, they bolstered this rhetoric from non-friendly to more or less hostile. Then, Biden’s administration strengthened Trump’s rhetoric. Over the past ten years or …


A Conceptual Frame For Us Counterterrorism Policy: Examining The Effectiveness Against Al Qaeda And Its Associates Prior To 9/11, "Tod" Thomas Patrick Brown Apr 2023

A Conceptual Frame For Us Counterterrorism Policy: Examining The Effectiveness Against Al Qaeda And Its Associates Prior To 9/11, "Tod" Thomas Patrick Brown

Publications

The United States (US) has been engaged in a “war on terrorism” to “defeat” al Qaeda since 2001. This study presented and tested an over-arching conceptual framework for US Counterterrorism (CT) policy. The conceptual frame was tested using qualitative thematic analysis of archival records from the Reagan through Clinton era. The research also used a case study of al Qaeda as the context to bound the selected records for the study. This new conceptual frame was used to evaluate the success, failure, and effects of US CT policy activities related to al Qaeda, using the records identified for the study. …


A Conceptual Frame For Us Counterterrorism Policy: Examining The Effectiveness Against Al Qaeda And Its Associates Prior To 9/11, "Tod" Thomas Patrick Brown Apr 2023

A Conceptual Frame For Us Counterterrorism Policy: Examining The Effectiveness Against Al Qaeda And Its Associates Prior To 9/11, "Tod" Thomas Patrick Brown

Doctoral Dissertations and Projects

The United States (US) has been engaged in a “war on terrorism” to “defeat” al Qaeda since 2001. This study presented and tested an over-arching conceptual framework for US Counterterrorism (CT) policy. The conceptual frame was tested using qualitative thematic analysis of archival records from the Reagan through Clinton era. The research also used a case study of al Qaeda as the context to bound the selected records for the study. This new conceptual frame was used to evaluate the success, failure, and effects of US CT policy activities related to al Qaeda, using the records identified for the study. …


The China-Russia Axis: What Does It Want And How Will It Get It?, Douglas J. Joseph Jan 2023

The China-Russia Axis: What Does It Want And How Will It Get It?, Douglas J. Joseph

Liberty University Journal of Statesmanship & Public Policy

This paper examines the statements and actions by China and Russia and its leaders, ascertains what their economic and military objectives are and why, and describes how this powerful “Axis” intends to achieve them.


Security Analysis: A Critical Thinking Approach, Michael W. Collier Jan 2023

Security Analysis: A Critical Thinking Approach, Michael W. Collier

EKUOPEN: Open Textbooks

Security Analysis: A Critical-Thinking Approach is for anyone desiring to learn techniques for generating the best answers to complex questions and best solutions to complex problems. It furnishes current and future analysts in national security, homeland security, law enforcement, and corporate security an alternative, comprehensive process for conducting both intelligence analysis and policy analysis. The target audience is upper-division undergraduate students and new graduate students, along with entry-level practitioner trainees. The book centers on a Security Analysis Critical-Thinking Framework that synthesizes critical-thinking and existing analytic techniques. Ample examples are provided to assist readers in comprehending the material. Newly created material …


The Higher Education Risk To National Security: A Case Study Of The University Of Akron, Anna Back Jan 2023

The Higher Education Risk To National Security: A Case Study Of The University Of Akron, Anna Back

Williams Honors College, Honors Research Projects

There are numerous threats to U.S. National Security within higher education. Through this paper, I will provide an analysis of current and future threats using a literature review and informational interviewing. The literature review revealed four major National Security threats facing higher education institutions due to Foreign Intelligence Entities (FIE): foreign recruitment of faculty and students, increase in foreign students and screening difficulties, campus openness/easy access to facilities and information, and foreign funding for research. A set of informational interviews were conducted with The University of Akron faculty, employees, and partners to evaluate whether these same threats were present. The …


Developing An Equilibrium Of Protection Of The Right To Privacy And National Security In Terrorism Eradication In Indonesia, Wahyudi Djafar, Muhamad Syauqillah Nov 2022

Developing An Equilibrium Of Protection Of The Right To Privacy And National Security In Terrorism Eradication In Indonesia, Wahyudi Djafar, Muhamad Syauqillah

Journal of Terrorism Studies

Tension between privacy and security is nothing new, however due to the development of information and communication technology use as well as more intensive efforts of terrorism eradication have affected to the increasing level of the conflict. The need for national security is often similar to the situation of state of emergency, which enables the state to conduct several limitations to the implementation of right to privacy. Many states use the said justification and further position the element of national security to be in the superior position compared to the protection of civil liberties, including right to privacy. As …


Twenty-One Years Later: Reflections On 9/11, Bessie Blackburn, Shaddi Spencer, Hayden O'Connor Sep 2022

Twenty-One Years Later: Reflections On 9/11, Bessie Blackburn, Shaddi Spencer, Hayden O'Connor

Liberty University Journal of Statesmanship & Public Policy

Twenty-one years ago, one of the greatest attacks on the American republic occurred. On September 11, 2001, American Airlines Flights 11, 77, 93, and 177 were hijacked by Islamic extremists and crashed in New York City, Washington D.C., and Pennsylvania. The atrocity of these incidents and the extensive loss of life impacted not only the United States but the entire world. Nevertheless, in light of this tragedy the American people found unity in patriotism, rekindling a sense of national purpose in the form of the “Global War on Terrorism.” This document is a compilation of reflection articles written by individuals …


How Reagan’S National Security Decision Directives Can Be Applied Today, Audrey Sightler Apr 2022

How Reagan’S National Security Decision Directives Can Be Applied Today, Audrey Sightler

Helm's School of Government Conference - American Revival: Citizenship & Virtue

No abstract provided.


Tactical Mistakes: Women's Role In Terrorism, Laura Daniel Feb 2022

Tactical Mistakes: Women's Role In Terrorism, Laura Daniel

Liberty University Journal of Statesmanship & Public Policy

Since the 1970s, the word "terrorism" has become a well-known term. Almost two decades after 9/11, it has become a part of everyday vocabulary and, at times, dominates the news cycle. However, the faces we see associated with terrorism are mainly men. When talking of a training camp or a video claiming responsibility for terrorist attacks, women are not a part of the majority. However, women do play a significant role in terrorism. This article evaluates the history of women in terrorism and their positions in terror organizations, as well as the tactical mistake of overlooking women's role in global …


Fifth-Dimensional Warfare And National Security In Canada: Situating Microdeviation Theory Within C-59: An Act Respecting National Security Matters, Hayden Slight Jan 2022

Fifth-Dimensional Warfare And National Security In Canada: Situating Microdeviation Theory Within C-59: An Act Respecting National Security Matters, Hayden Slight

Theses and Dissertations (Comprehensive)

In an era of rapid technological change, the growing threat environment in the cyber dimension will continue to influence how a sovereign nation contends with attacks that can occur from any corner of the world. The growing adaptation and expansion of technology belonging to the Internet of Things (IoT) and the increasing prevalence of social media (Facebook, Twitter) has also influenced the spreading of attack surfaces that can become victim to exploitation by motivated parties including foreign states and terrorist groups. Against this backdrop, Canada’s own efforts to modernize and reinforce its own national security agencies resulted in the developing …


Cyber Intelligence In National Security, Dwi Rezki Sri Astarini, Muhammad Syaroni Rofii Jul 2021

Cyber Intelligence In National Security, Dwi Rezki Sri Astarini, Muhammad Syaroni Rofii

Journal of Strategic and Global Studies

Current information has become a very important commodity. Some even say that our society is already in an "information-based society". The ability to access and provide information quickly and accurately is very important for an organization, such as companies, universities, government agencies, and individuals. Once the importance of the value of information causes often the desired information can only be accessed by certain people. The fall of information in the hands of other parties can cause harm to the information owner. Security issues are an important aspect of an information system management. Unfortunately, this security problem often gets less attention …


Black Space Versus Blue Space: A Proposed Dichotomy Of Future Space Operations, Robert A. Bettinger, Carl A. Poole [*] Apr 2021

Black Space Versus Blue Space: A Proposed Dichotomy Of Future Space Operations, Robert A. Bettinger, Carl A. Poole [*]

Faculty Publications

This article will examine the proposed space operations structure by first outlining the historical foundations for differences in maritime and air domain military capabilities, specifically brown-w­ater versus blue-w­ater navies, and “local/ regional” versus “global” airpower. Next, the article will present the concept of black space and blue space in terms of an environment-­specific definition, as well as an examination of the technical capability requirements, mission types, and national prestige and geopolitical considerations underpinning the proposed operation types. Finally, the article will explore how the USSF might support future space exploration within the black-­space and blue-s­pace operations structure.


Cyber Mutually Assured Destruction & Counterproliferation For The 21st Century: “How I Stopped Worrying And Learned To Love The Software Exploit.”, Peter R. Pattara Jan 2021

Cyber Mutually Assured Destruction & Counterproliferation For The 21st Century: “How I Stopped Worrying And Learned To Love The Software Exploit.”, Peter R. Pattara

Liberty University Journal of Statesmanship & Public Policy

The growth of cyberspace has challenged existing frameworks for strategic competition. As a result, government, private, and academic planners seek to develop a novel framework for integrating cyberspace into diplomatic, military, and intelligence planning. This has been a difficult proposition and continues to be an area of vulnerability for the United States. To date, the United States has threatened nuclear retaliation for large scale cyber-attacks, but a comprehensive strategy has not been made publicly clear. However, this integration challenge has been encountered and solved previously. Nuclear weapons changed warfare in the twentieth century, but the United States used Mutual Assured …


Liberalism Versus Fundamentalism: The Ideological Conflict Between Tocqueville And Qtub, Mary Catherine E. Morris Jul 2020

Liberalism Versus Fundamentalism: The Ideological Conflict Between Tocqueville And Qtub, Mary Catherine E. Morris

Liberty University Journal of Statesmanship & Public Policy

This paper seeks to conclude whether Qtub has successfully discredited the values supported by Tocqueville to draw more Muslims to support an increased role of religion in society and influence the majority of Muslims to conduct violent jihad. It is hypothesized that Muslims agree with Qtub that Islam must be increasingly influential in society, but the majority do not seek to increase its role through, or for the purposes of, violent jihad. Differing in their views on freedom and liberty, freedom of religion and separation of church and state, and man-made laws but agreeing on the negative effects of materialism, …


The Sovereignty Solution: A Common Sense Approach To Global Security, Andrew Higgins Jul 2020

The Sovereignty Solution: A Common Sense Approach To Global Security, Andrew Higgins

Liberty University Journal of Statesmanship & Public Policy

The Sovereignty Solution calls for a new grand strategy for the United States. The current security paradigm, the book’s authors hold, has yet to be properly modified from a 20th-century cast of mind. The ad hoc system inherited after the end of the Cold War now fails because it too often applies national power equally to each emerging threat. But security challenges in the 21st century arise so quickly and unexpectedly that continuing in this manner incurs overextension and further, risks strategic defeat. If the United States continues to behave as if it can be in all …


Europe And Asia’S Melded Future: A Critique Of The Dawn Of Eurasia, Faith A. Chudkowski Jul 2020

Europe And Asia’S Melded Future: A Critique Of The Dawn Of Eurasia, Faith A. Chudkowski

Liberty University Journal of Statesmanship & Public Policy

This book review examines political scientist Bruno Maçães’ The Dawn of Eurasia, which presents the emergent Eurasia, China and Russia’s role in shaping it, and what preceded this shift. His book delves into the background that shows the pairing of Europe and Asia to be key in understanding today’s political landscape. Maçães writes that the world has stepped into globalization’s second stage, which is unsteady due to the heightening juxtaposition of different nations that muddle the geopolitics of Europe and Asia. He goes on to argue that this new moment has made a shift in power feasible and appealing …


Alternate Warfare: The Unseen Weapons Of Mass Destruction, Elyse Keener Jul 2020

Alternate Warfare: The Unseen Weapons Of Mass Destruction, Elyse Keener

Liberty University Journal of Statesmanship & Public Policy

Biological warfare is a national security concern that transcends centuries. In the current international climate, biowarfare is of particular interest due to the COVID-19 pandemic. This article seeks to follow historical cases of biological warfare and international response to these cases in order to understand the implications of COVID-19, if it were to be weaponized. Also covered is the current capabilities that Russia, China, and Iran are assessed to possess.


Combining Competition And Cooperation: A Guide To U.S. Space Relations, Paul Prentice, Nathan Waite Jul 2020

Combining Competition And Cooperation: A Guide To U.S. Space Relations, Paul Prentice, Nathan Waite

Liberty University Journal of Statesmanship & Public Policy

Space is the future for humanity. Whether that is a future of amity and cooperation, or competition and conflict depends in large part to what America makes it. While America cannot afford to entirely abandon cooperation with the world in the final frontier, neither can it afford to cede the advantage in a new field of potential warfare to adversaries in China and Russia. What is needed is a moderate path of competition where necessary and cooperation where beneficial, in order to most fully advance the cause of American national security. By utilizing arms treaties to prevent Chinese domination, while …


The Effects Of Unauthorized Immigrants On Crime, Shane C. Shannon Apr 2020

The Effects Of Unauthorized Immigrants On Crime, Shane C. Shannon

Student Publications

The effects of immigrants on crime has been the subject of hostile conversations and bold claims. As anti-immigrant sentiments see an increase in mainstream society, the empirical research suggesting an explanation to such claims are direly needed. Using PEW Research databases, and the States 2016 database in Stata, I evaluate the effects of unauthorized immigrant density of a given region on various crime rates of the aforementioned region. In particular, I assess the violent crime rate, murder crime rate, and property crime rates of states in America. Utilizing confidence intervals, ordinary least squares regression models (OLS), and a number of …


Narrative Policy Analysis, John W. Burns Apr 2020

Narrative Policy Analysis, John W. Burns

Student Publications

This review explores the book All Hell Breaking Loose: The Pentagons View on Climate Change, written by Micheal Klare, highlighting how the US national security offices are viewing and responding to the ominous looming threats posed by climate change.


The Bureaucratic Politics Of The Federal Bureau Of Investigation, Cooper Hearn Dec 2019

The Bureaucratic Politics Of The Federal Bureau Of Investigation, Cooper Hearn

Political Science Undergraduate Honors Theses

This is a comprehensive study of how the administrative powers of the Federal Bureau of Investigation (FBI) have evolved in response to external political forces. To analyze the changes made to FBI administrative powers, this project will assess theories of public administration, bureaucratic politics, various congressional statutes, court rulings, and executive policies that have affected the bureau’s capacity to perform investigations and intelligence operations.


Acknowledging The Impact Of Climate Change On National Security: A Long And Winding Road, Linda A. Malone Sep 2019

Acknowledging The Impact Of Climate Change On National Security: A Long And Winding Road, Linda A. Malone

Linda A. Malone

No abstract provided.


Pelibatan Organisasi Masyarakat Dalam Intelijen Keamanan Nasional, Yudha Fernando Jul 2019

Pelibatan Organisasi Masyarakat Dalam Intelijen Keamanan Nasional, Yudha Fernando

Jurnal Kajian Stratejik Ketahanan Nasional

The problem examined in this study is the role of civil society in intelligence activities for national security,

while the purpose is to determine the role and form of civil society can play in intelligence activities. Theories

that researchers use include theories of intelligence, national security, institutions and sociology. The research

approach used in this study is a qualitative approach and the type of descriptive qualitative research using a case

study model. Researchers used interview techniques, document studies and observations. Then the data is

analyzed with an interactive analysis model and validated. There are two roles that can be bound …