Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

National Security

Discipline
Institution
Publication Year
Publication
Publication Type
File Type

Articles 1 - 30 of 126

Full-Text Articles in Social and Behavioral Sciences

Implication Of Artificial Intelligence On National Security For The Nigeria Security Agencies, Musa Zakari May 2024

Implication Of Artificial Intelligence On National Security For The Nigeria Security Agencies, Musa Zakari

Journal of Terrorism Studies

The study examines the implications of AI for national security in Nigeria in the field of military logistics for Nigerian security agencies. A documentary research design was utilized for the study. Document analysis of existing policies, reports, and case studies related to AI and national security in Nigeria was utilized. The study revealed that artificial intelligence (AI) has significant prospects for national security for Nigeria's security agencies. It was revealed that AI-powered technologies enable advanced surveillance capabilities, such as facial recognition and video analytics, which aid in identifying potential threats and monitoring security situations more effectively. The Air Force uses …


Rethinking Supply Chains: Mitigating The Risk Of Chinese Dependence And Protecting Us Semiconductor Intellectual Property, Jamison Finnamore Apr 2024

Rethinking Supply Chains: Mitigating The Risk Of Chinese Dependence And Protecting Us Semiconductor Intellectual Property, Jamison Finnamore

Helm's School of Government Conference - American Revival: Citizenship & Virtue

This paper explores the complex economic interdependence between the US, China, and Taiwan, specifically in the semiconductor industry. China’s increased aggression and intellectual property (IP) theft threatens to unbalance the iron triangle of US, China, and Taiwan trade relations. The problem overview elaborates on Taiwan’s crucial role in the semiconductor supply chain, and China’s threat against it. The argument is made that the US must take a nuanced and multifaceted approach to solving the diplomatic, economic, and military policy problem. Criteria for success are outlined, emphasizing the need to address root causes and not compromise US commitment to a free …


Brics: The World’S New Emerging Economic Alliance, Robert J. Flanigan Iii Apr 2024

Brics: The World’S New Emerging Economic Alliance, Robert J. Flanigan Iii

Master's Theses

National Security is ever-changing and evolving. As our nation moves forward in today’s world after the conclusion of the Iraq War and Afghanistan War, and moves into a new modern warfare, our nation must be on alert; searching for the next threat to keep our sovereignty alive and our citizens free and safe. This is especially important when nations who desire to harm our great nation find common interests in others to join forces against the United States of America. While looking at Brazil, Russia, India, China, and South Africa Coalition (BRICS) and what these countries coming together could do …


Ambitions Of Chinese Hegemony: An Analysis Of The Hundred Year Marathon, Ruben E. Frivold Oct 2023

Ambitions Of Chinese Hegemony: An Analysis Of The Hundred Year Marathon, Ruben E. Frivold

Liberty University Journal of Statesmanship & Public Policy

Few national security threats challenge the magnitude posed by the People’s Republic of China toward the United States. This current reality is due to various factors, including Chinese persistence in implementing a grand strategy while facing minimal U.S. resistance due to various foreign policy missteps over the last half-century. China’s overarching approach to geopolitics has been a subject of much discussion and has often been referred to by experts as the ‘hundred-year marathon.’ The term derives its name from China’s objective of usurping America’s position as hegemon by 2049, a significant year that falls on the one-hundredth anniversary of the …


Ai And National Security: The United States Risks Losing Its Competitive Edge, Royce Morris Oct 2023

Ai And National Security: The United States Risks Losing Its Competitive Edge, Royce Morris

Liberty University Journal of Statesmanship & Public Policy

Recent developments in artificial intelligence (AI) have caused concern over the ethical implications of large-scale AI implementation. As a result, leading technologists and computer scientists have advocated an incremental rather than comprehensive approach to AI development and implementation to allow ethical and structural guidelines to provide a public safety net. However, such an approach does not account for the geopolitical and national security implications of lagging behind competitors like China, who have publicly stated goals of reaching AI supremacy within the next ten years. This article presents a national security analysis of the risks to American national security by allowing …


A Unified Voice: The Us-Taliban Peace Deal, Matthew Feldstein May 2023

A Unified Voice: The Us-Taliban Peace Deal, Matthew Feldstein

The Gettysburg Journal for Public Policy

The United States signed a peace deal with the Taliban on February 29th, 2020 that would result in the complete withdrawal of US forces from the country at the end of a fourteenth month period, assuming the Taliban holds up their end of the deal. This would mark the end of one of the longest wars in United States history, lasting nearly two decades. The purpose of this paper is twofold, to determine if there is a presence of bias or misinformation by five major public policy think tanks in the United States and to examine the United …


Comparing The Evolution, Form, And Function Of Russian And Chinese Information Operations, Briana Berger Slowinski, Marissa J. Skulsky May 2023

Comparing The Evolution, Form, And Function Of Russian And Chinese Information Operations, Briana Berger Slowinski, Marissa J. Skulsky

Honors Theses

Russia and China are critical actors who deploy far-reaching and impactful information operations in pursuit of their national interests. Their use of information operations is multifaceted and should be subject to study due to how influential these operations are and how significant the effects can be. In pursuit of this knowledge, the aim of this study was to conduct an in-depth analysis of these two countries' information operations and how their operations differ. The first area analyzed was the evolution of these countries' modern day information operations, primarily looking for the factors and historical context which influenced the development of …


What Senior U.S. Leaders Say We Should Know About Cyber, Dr. Joseph H. Schafer May 2023

What Senior U.S. Leaders Say We Should Know About Cyber, Dr. Joseph H. Schafer

Military Cyber Affairs

On April 6, 2023, the Atlantic Council’s Cyber Statecraft Initiative hosted a panel discussion on the new National Cybersecurity Strategy. The panel featured four senior officials from the Office of the National Cyber Director (ONCD), the Department of State (DoS), the Department of Justice (DoJ), and the Department of Homeland Security (DHS). The author attended and asked each official to identify the most important elements that policymakers and strategists must understand about cyber. This article highlights historical and recent struggles to express cyber policy, the responses from these officials, and the author’s ongoing research to improve national security cyber policy.


The Eagle’S Eye On The Rising Dragon: Why The United States Has Shifted Its View Of China, Jackson Scott May 2023

The Eagle’S Eye On The Rising Dragon: Why The United States Has Shifted Its View Of China, Jackson Scott

Baker Scholar Projects

Since 1978, the People’s Republic of China (PRC) has long been viewed as an economic trading partner of the United States of America (US). The PRC has grown to be an economic powerhouse, and the US directly helped with that process and still benefits from it. However, during the mid-2010’s, US rhetoric began to turn sour against the PRC. The American government rhetoric toward the PRC, beginning with the Obama administration, switched. As Trump’s administration came along, they bolstered this rhetoric from non-friendly to more or less hostile. Then, Biden’s administration strengthened Trump’s rhetoric. Over the past ten years or …


The Eagle’S Eye On The Rising Dragon: Why The United States Has Shifted Its View Of China, Jackson Craig Scott May 2023

The Eagle’S Eye On The Rising Dragon: Why The United States Has Shifted Its View Of China, Jackson Craig Scott

Baker Scholar Projects

Since 1978, the People’s Republic of China (PRC) has long been viewed as an economic trading partner of the United States of America (US). The PRC has grown to be an economic powerhouse, and the US directly helped with that process and still benefits from it. However, during the mid-2010’s, US rhetoric began to turn sour against the PRC. The American government rhetoric toward the PRC, beginning with the Obama administration, switched. As Trump’s administration came along, they bolstered this rhetoric from non-friendly to more or less hostile. Then, Biden’s administration strengthened Trump’s rhetoric. Over the past ten years or …


A Conceptual Frame For Us Counterterrorism Policy: Examining The Effectiveness Against Al Qaeda And Its Associates Prior To 9/11, "Tod" Thomas Patrick Brown Apr 2023

A Conceptual Frame For Us Counterterrorism Policy: Examining The Effectiveness Against Al Qaeda And Its Associates Prior To 9/11, "Tod" Thomas Patrick Brown

Doctoral Dissertations and Projects

The United States (US) has been engaged in a “war on terrorism” to “defeat” al Qaeda since 2001. This study presented and tested an over-arching conceptual framework for US Counterterrorism (CT) policy. The conceptual frame was tested using qualitative thematic analysis of archival records from the Reagan through Clinton era. The research also used a case study of al Qaeda as the context to bound the selected records for the study. This new conceptual frame was used to evaluate the success, failure, and effects of US CT policy activities related to al Qaeda, using the records identified for the study. …


A Conceptual Frame For Us Counterterrorism Policy: Examining The Effectiveness Against Al Qaeda And Its Associates Prior To 9/11, "Tod" Thomas Patrick Brown Apr 2023

A Conceptual Frame For Us Counterterrorism Policy: Examining The Effectiveness Against Al Qaeda And Its Associates Prior To 9/11, "Tod" Thomas Patrick Brown

Publications

The United States (US) has been engaged in a “war on terrorism” to “defeat” al Qaeda since 2001. This study presented and tested an over-arching conceptual framework for US Counterterrorism (CT) policy. The conceptual frame was tested using qualitative thematic analysis of archival records from the Reagan through Clinton era. The research also used a case study of al Qaeda as the context to bound the selected records for the study. This new conceptual frame was used to evaluate the success, failure, and effects of US CT policy activities related to al Qaeda, using the records identified for the study. …


Using Game Theory To Model Tripolar Deterrence And Escalation Dynamics, Grace Farson Mar 2023

Using Game Theory To Model Tripolar Deterrence And Escalation Dynamics, Grace Farson

Honors Theses

The study investigated how game theory can been utilized to model multipolar escalation dynamics between Russia, China, and the United States. In addition, the study focused on analyzing various parameters that affected potential conflict outcomes to further new deterrence thought in a tripolar environment.

A preliminary game theoretic model was created to model and analyze escalation dynamics. The model was built upon framework presented by Zagare and Kilgour in their work ‘Perfect Deterrence’. The model is based on assumptions and rules set prior to game play. The model was then analyzed based upon these assumptions using a form of mathematical …


The China-Russia Axis: What Does It Want And How Will It Get It?, Douglas J. Joseph Jan 2023

The China-Russia Axis: What Does It Want And How Will It Get It?, Douglas J. Joseph

Liberty University Journal of Statesmanship & Public Policy

This paper examines the statements and actions by China and Russia and its leaders, ascertains what their economic and military objectives are and why, and describes how this powerful “Axis” intends to achieve them.


Security Analysis: A Critical Thinking Approach, Michael W. Collier Jan 2023

Security Analysis: A Critical Thinking Approach, Michael W. Collier

EKUOPEN: Open Textbooks

Security Analysis: A Critical-Thinking Approach is for anyone desiring to learn techniques for generating the best answers to complex questions and best solutions to complex problems. It furnishes current and future analysts in national security, homeland security, law enforcement, and corporate security an alternative, comprehensive process for conducting both intelligence analysis and policy analysis. The target audience is upper-division undergraduate students and new graduate students, along with entry-level practitioner trainees. The book centers on a Security Analysis Critical-Thinking Framework that synthesizes critical-thinking and existing analytic techniques. Ample examples are provided to assist readers in comprehending the material. Newly created material …


Post, Share, Like: The Role Of Facebook In The Russo-Ukrainian War, Hannah Michelle Snyder Jan 2023

Post, Share, Like: The Role Of Facebook In The Russo-Ukrainian War, Hannah Michelle Snyder

Honors Undergraduate Theses

Facebook is being used by both Russia and Ukraine as a tool of war, for very different purposes. This demonstrates that the platform no longer serves the sole function of connecting communities together. Existing literature has recognized that social media is being used in the current Russo-Ukrainian war but has yet to conduct comparative and contrastive analyses of Russian and Ukrainian social media strategies and effects. Conducting these analyses will illustrate not only what strategies are being used, but how they can be simultaneously advantageous and disadvantageous for belligerents. By focusing on one platform, Facebook, one can not only learn …


The Higher Education Risk To National Security: A Case Study Of The University Of Akron, Anna Back Jan 2023

The Higher Education Risk To National Security: A Case Study Of The University Of Akron, Anna Back

Williams Honors College, Honors Research Projects

There are numerous threats to U.S. National Security within higher education. Through this paper, I will provide an analysis of current and future threats using a literature review and informational interviewing. The literature review revealed four major National Security threats facing higher education institutions due to Foreign Intelligence Entities (FIE): foreign recruitment of faculty and students, increase in foreign students and screening difficulties, campus openness/easy access to facilities and information, and foreign funding for research. A set of informational interviews were conducted with The University of Akron faculty, employees, and partners to evaluate whether these same threats were present. The …


Developing An Equilibrium Of Protection Of The Right To Privacy And National Security In Terrorism Eradication In Indonesia, Wahyudi Djafar, Muhamad Syauqillah Nov 2022

Developing An Equilibrium Of Protection Of The Right To Privacy And National Security In Terrorism Eradication In Indonesia, Wahyudi Djafar, Muhamad Syauqillah

Journal of Terrorism Studies

Tension between privacy and security is nothing new, however due to the development of information and communication technology use as well as more intensive efforts of terrorism eradication have affected to the increasing level of the conflict. The need for national security is often similar to the situation of state of emergency, which enables the state to conduct several limitations to the implementation of right to privacy. Many states use the said justification and further position the element of national security to be in the superior position compared to the protection of civil liberties, including right to privacy. As …


Twenty-One Years Later: Reflections On 9/11, Bessie Blackburn, Shaddi Spencer, Hayden O'Connor Sep 2022

Twenty-One Years Later: Reflections On 9/11, Bessie Blackburn, Shaddi Spencer, Hayden O'Connor

Liberty University Journal of Statesmanship & Public Policy

Twenty-one years ago, one of the greatest attacks on the American republic occurred. On September 11, 2001, American Airlines Flights 11, 77, 93, and 177 were hijacked by Islamic extremists and crashed in New York City, Washington D.C., and Pennsylvania. The atrocity of these incidents and the extensive loss of life impacted not only the United States but the entire world. Nevertheless, in light of this tragedy the American people found unity in patriotism, rekindling a sense of national purpose in the form of the “Global War on Terrorism.” This document is a compilation of reflection articles written by individuals …


How Reagan’S National Security Decision Directives Can Be Applied Today, Audrey Sightler Apr 2022

How Reagan’S National Security Decision Directives Can Be Applied Today, Audrey Sightler

Helm's School of Government Conference - American Revival: Citizenship & Virtue

No abstract provided.


Tactical Mistakes: Women's Role In Terrorism, Laura Daniel Feb 2022

Tactical Mistakes: Women's Role In Terrorism, Laura Daniel

Liberty University Journal of Statesmanship & Public Policy

Since the 1970s, the word "terrorism" has become a well-known term. Almost two decades after 9/11, it has become a part of everyday vocabulary and, at times, dominates the news cycle. However, the faces we see associated with terrorism are mainly men. When talking of a training camp or a video claiming responsibility for terrorist attacks, women are not a part of the majority. However, women do play a significant role in terrorism. This article evaluates the history of women in terrorism and their positions in terror organizations, as well as the tactical mistake of overlooking women's role in global …


Tech And Authoritarianism: How The People’S Republic Of China Is Using Data To Control Hong Kong And Why The U.S. Is Vulnerable, Bryce Neary Jan 2022

Tech And Authoritarianism: How The People’S Republic Of China Is Using Data To Control Hong Kong And Why The U.S. Is Vulnerable, Bryce Neary

Seattle Journal of Technology, Environmental & Innovation Law

The aim of this article is to analyze and compare current events in the People's Republic of China and the United States to discuss the moral dilemmas that arise when establishing the boundary between national security interests and individual privacy rights. As we continue to intertwine our lives with technology, it has become increasingly important to establish clear privacy rights. The question then becomes: at what point should individuals sacrifice their rights for what the government considers the "greater good" of the country?

Further, this article analyzes the development of U.S. privacy law and its relationship to national security, technology, …


Learning From History: Real And Perceived Threats To National Security, David Dupont Jan 2022

Learning From History: Real And Perceived Threats To National Security, David Dupont

CGU Theses & Dissertations

Significant changes in American domestic security policies were generally associated with periods of military conflicts. Laws that would pave the way for legalizing the surveillance and internment of civilian populations have their origin in the Quasi-War. Likewise, the practice of state property seizure under the Office of Alien Property Custodian and limited internment programs were first established during WWI. Mass civilian internment came into existence leading up to WWII. This trajectory continued in modern times with the extensive system of domestic surveillance post-9/11. In this paper, I argue for gaining a historical comprehension of these issues by exploring their origins …


Spies, Sanctions, And Single-Party States: How American Sanctions Influence Intelligence Operations, Anthony J. Anta Jan 2022

Spies, Sanctions, And Single-Party States: How American Sanctions Influence Intelligence Operations, Anthony J. Anta

Honors Undergraduate Theses

States have a diverse and unique set of available mechanisms to deploy when seeking to interact in the international community. Economic sanctions have long been one such tool available for states looking to coerce or incentivize a change in the behavior of another state. Likewise, states have historically sought to influence and gain unknown knowledge on another state or actor. Covert intelligence operations have changed forms, mechanisms, and techniques, especially since the expansive advancements in technology in the 21st century. This paper seeks to understand the influence that economic sanctions have on the ability for single-party states to conduct …


Artificial Intelligence And National Security, Ryan Laverick Jan 2022

Artificial Intelligence And National Security, Ryan Laverick

Williams Honors College, Honors Research Projects

As technology advances at an exponential rate, it is becoming increasingly important to consider the ramifications of that technology in the geopolitical environment, and especially as it pertains to American national security. One of the most important categories of technological innovation that will likely disrupt the global balance of geopolitical power, especially along the US-China axis, is the advent and growing sophistication of artificial intelligence. In order to address the new and evolving national security challenges that will accompany this disruption, this paper seeks to define and explain the disparity in artificial intelligence capabilities between the United States and China. …


Fifth-Dimensional Warfare And National Security In Canada: Situating Microdeviation Theory Within C-59: An Act Respecting National Security Matters, Hayden Slight Jan 2022

Fifth-Dimensional Warfare And National Security In Canada: Situating Microdeviation Theory Within C-59: An Act Respecting National Security Matters, Hayden Slight

Theses and Dissertations (Comprehensive)

In an era of rapid technological change, the growing threat environment in the cyber dimension will continue to influence how a sovereign nation contends with attacks that can occur from any corner of the world. The growing adaptation and expansion of technology belonging to the Internet of Things (IoT) and the increasing prevalence of social media (Facebook, Twitter) has also influenced the spreading of attack surfaces that can become victim to exploitation by motivated parties including foreign states and terrorist groups. Against this backdrop, Canada’s own efforts to modernize and reinforce its own national security agencies resulted in the developing …


Congressional Oversight Of Modern Warfare: History, Pathologies, And Proposals For Reform, Oona A. Hathaway, Tobias Kuehne, Randi Michel, Nicole Ng Oct 2021

Congressional Oversight Of Modern Warfare: History, Pathologies, And Proposals For Reform, Oona A. Hathaway, Tobias Kuehne, Randi Michel, Nicole Ng

William & Mary Law Review

Despite significant developments in the nature of twenty-first century warfare, Congress continues to employ a twentieth century oversight structure. Modern warfare tactics, including cyber operations, drone strikes, and special operations, do not neatly fall into congressional committee jurisdictions. Counterterrorism and cyber operations, which are inherently multi-jurisdictional and highly classified, illustrate the problem. In both contexts, over the past several years Congress has addressed oversight shortcomings by strengthening its reporting requirements, developing relatively robust oversight regimes. But in solving one problem, Congress has created another: deeply entrenched information silos that inhibit the sharing of information about modern warfare across committees. This …


Cyber Intelligence In National Security, Dwi Rezki Sri Astarini, Muhammad Syaroni Rofii Jul 2021

Cyber Intelligence In National Security, Dwi Rezki Sri Astarini, Muhammad Syaroni Rofii

Journal of Strategic and Global Studies

Current information has become a very important commodity. Some even say that our society is already in an "information-based society". The ability to access and provide information quickly and accurately is very important for an organization, such as companies, universities, government agencies, and individuals. Once the importance of the value of information causes often the desired information can only be accessed by certain people. The fall of information in the hands of other parties can cause harm to the information owner. Security issues are an important aspect of an information system management. Unfortunately, this security problem often gets less attention …


Black Space Versus Blue Space: A Proposed Dichotomy Of Future Space Operations, Robert A. Bettinger, Carl A. Poole [*] Apr 2021

Black Space Versus Blue Space: A Proposed Dichotomy Of Future Space Operations, Robert A. Bettinger, Carl A. Poole [*]

Faculty Publications

This article will examine the proposed space operations structure by first outlining the historical foundations for differences in maritime and air domain military capabilities, specifically brown-w­ater versus blue-w­ater navies, and “local/ regional” versus “global” airpower. Next, the article will present the concept of black space and blue space in terms of an environment-­specific definition, as well as an examination of the technical capability requirements, mission types, and national prestige and geopolitical considerations underpinning the proposed operation types. Finally, the article will explore how the USSF might support future space exploration within the black-­space and blue-s­pace operations structure.


Cyber Mutually Assured Destruction & Counterproliferation For The 21st Century: “How I Stopped Worrying And Learned To Love The Software Exploit.”, Peter R. Pattara Jan 2021

Cyber Mutually Assured Destruction & Counterproliferation For The 21st Century: “How I Stopped Worrying And Learned To Love The Software Exploit.”, Peter R. Pattara

Liberty University Journal of Statesmanship & Public Policy

The growth of cyberspace has challenged existing frameworks for strategic competition. As a result, government, private, and academic planners seek to develop a novel framework for integrating cyberspace into diplomatic, military, and intelligence planning. This has been a difficult proposition and continues to be an area of vulnerability for the United States. To date, the United States has threatened nuclear retaliation for large scale cyber-attacks, but a comprehensive strategy has not been made publicly clear. However, this integration challenge has been encountered and solved previously. Nuclear weapons changed warfare in the twentieth century, but the United States used Mutual Assured …