Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Austerity (6)
- Cyber Operations (6)
- Cyber (5)
- Cyber operations (5)
- Deterrence (5)
-
- Nukes (5)
- Sequestration (5)
- Cyber defense (4)
- NATO (4)
- Nuclear (4)
- Security Studies (4)
- China (3)
- Cyber Operations in Space (3)
- Cyberwar (3)
- Europe (3)
- International Affairs (3)
- State actor (3)
- Articles (2)
- Authority (2)
- Budget (2)
- Counter cyber (2)
- Cyber deterrence (2)
- Cyber space (2)
- Defense (2)
- Foreign policy (2)
- Government (2)
- India (2)
- Information Assurance (2)
- International Organizations (2)
- Iran (2)
- Publication Year
- Publication
-
- Jan Kallberg (14)
- Beat Habegger (4)
- Bruce D. McDonald, III (2)
- Dr. Lukas K. Danner (2)
- Mr. Shams uz Zaman (2)
-
- Alev Dudek (1)
- Andrew J Grotto (1)
- David A Schultz (1)
- Donald J. Kochan (1)
- Donna M. Hughes (1)
- Dr. Daniel H. Heinke (1)
- George Dimitriu (1)
- Michael A Pipa (1)
- Michael Diathesopoulos (1)
- Michael I Niman Ph.D. (1)
- Omololu Michael FAGBADEBO (1)
- Rodger A. Payne (1)
- Salvador Santino Jr. F Regilme (1)
- Zenonas Tziarras (1)
Articles 1 - 30 of 38
Full-Text Articles in Defense and Security Studies
The Illogic Of The Biological Weapons Taboo., Phillip M. Mccauley, Rodger A. Payne
The Illogic Of The Biological Weapons Taboo., Phillip M. Mccauley, Rodger A. Payne
Rodger A. Payne
No abstract provided.
China's Contradictory Grand Strategy Manifestations: Examining The Rare Earths Export Restrictions And The One Belt, One Road Initiative, Lukas K. Danner
China's Contradictory Grand Strategy Manifestations: Examining The Rare Earths Export Restrictions And The One Belt, One Road Initiative, Lukas K. Danner
Dr. Lukas K. Danner
Implications Of The Dragon’S Rise For South Asia: Assessing China’S Nepal Policy, Bibek Chand, Lukas K. Danner
Implications Of The Dragon’S Rise For South Asia: Assessing China’S Nepal Policy, Bibek Chand, Lukas K. Danner
Dr. Lukas K. Danner
Global Shifts And The East In Cyprus' Foreign Policy, Zenonas Tziarras
Global Shifts And The East In Cyprus' Foreign Policy, Zenonas Tziarras
Zenonas Tziarras
No abstract provided.
Integration Of And The Potential For Islamic Radicalization Among Ethnic Turks In Germany, Alev Dudek
Integration Of And The Potential For Islamic Radicalization Among Ethnic Turks In Germany, Alev Dudek
Alev Dudek
In spite of ongoing improvements, integration of ethnic Turks in Germany remains a challenge from the dominant culture perspective, whereas a deeply ingrained institutional and everyday racism and the lack of legal protection against discrimination pose a challenge to full participation of ethnic Turks from another perspective. In an increasingly xenophobic Europe, particularly Germany, an increase in potential for religious and nationalist radicalization in different groups including ethnic Turks is becoming more and more evident. This increase in radical attitudes is not necessarily caused by a lack of integration, as evidenced among well-integrated individuals.
In view of recent developments toward …
German Foreign Fighters In Syria And Iraq, Daniel H. Heinke, Jan Raudszus
German Foreign Fighters In Syria And Iraq, Daniel H. Heinke, Jan Raudszus
Dr. Daniel H. Heinke
Cold War Ii: Those Evil Russkie He-Men Are Making Us Frack Ourselves,, Michael I. Niman Ph.D.
Cold War Ii: Those Evil Russkie He-Men Are Making Us Frack Ourselves,, Michael I. Niman Ph.D.
Michael I Niman Ph.D.
You have to admit, the timing is convenient, both for us handsome free Americans and for the cursed Russians. If you’re Russian, forget about the regular jailing of protesters and musicians, your he-man government and its bizarre hatred of gay folks, the degradation of your environment and rape of your natural resources, and the rise of a billionaire mafioso class. You now have rude hubristic Americans to monopolize your hate and fear. Ditto for Americans. Forget every issue we were fretting about the day before masked, Russian-speaking troops swarmed over the border and “did not invade” Crimea, annexing it and …
Lessons Learned From Pakistan: A Dissertation On The Bush-Obama Drone Doctrine, Michael A. Pipa
Lessons Learned From Pakistan: A Dissertation On The Bush-Obama Drone Doctrine, Michael A. Pipa
Michael A Pipa
The first use of the modern day attack drone by the United States was in Afghanistan in mid 2002, and for the past 11 years attack drones have been used by the United States in as many countries as Pakistan, Yemen and Somalia. When considering the alternatives to using drones, such as sending marines on the ground to complete a mission or flying a piloted jet over enemy territory to gather intelligence, as well as the military power that the use of these vehicles projects, the attack drone has become the weapon of choice in the war on terror for …
Rhode Island Helps To Weaken Iranian Regime, Donna M. Hughes Dr.
Rhode Island Helps To Weaken Iranian Regime, Donna M. Hughes Dr.
Donna M. Hughes
No abstract provided.
From Cyber Terrorism To State Actors’ Covert Cyber Operations, Jan Kallberg, Bhavani Thuraisingham
From Cyber Terrorism To State Actors’ Covert Cyber Operations, Jan Kallberg, Bhavani Thuraisingham
Jan Kallberg
Historically, since the Internet started to become a common feature in our lives, hackers have been seen as a major threat. This view has repeatedly been entrenched and distributed by media coverage and commentaries through the years. Instead the first twenty year of the Internet was acceptably secure, due to the limited abilities of the attackers, compared to the threat generated from a militarized Internet with state actors conducting cyber operations. In reality, the Internet have a reversed trajectory for its security where it has become more unsafe over time and moved from a threat to the individual to a …
Nuclear Deterrence In A Second Obama Term, Adam Lowther, Jan Kallberg
Nuclear Deterrence In A Second Obama Term, Adam Lowther, Jan Kallberg
Jan Kallberg
In the months prior to the 2012 presidential election in the United States, members of the Obama administration and sympathetic organizations inside the Beltway began floating the idea that the administration would pursue – after an Obama victory – further reductions in the US nuclear arsenal. With the ink still wet on the New ST ART Treaty, efforts to reduce the American arsenal to 1000 operationally deployed strategic nuclear weapons or, as some suggest, 500, is certainly premature. These efforts illustrate a poor understanding of nuclear deterrence theory and practice and the ramifications of a United States that lacks a …
Offensive Cyber: Superiority Or Stuck In Legal Hurdles?, Jan Kallberg
Offensive Cyber: Superiority Or Stuck In Legal Hurdles?, Jan Kallberg
Jan Kallberg
In recent years, offensive cyber operations have attracted significant interest from the non-Defense Department academic legal community, prompting numerous articles seeking to create a legal theory for cyber conflicts. Naturally, cyber operations should be used in an ethical way, but the hurdles generated by the legal community are staggering. At a time when the United States has already lost an estimated $4 trillion in intellectual property as a result of foreign cyber espionage, not to mention the loss of military advantage, focusing on what the United States cannot do in cyberspace only hinders efforts to defend the country from future …
Europe In A ‘Nato Light’ World - Building Affordable And Credible Defense For The Eu, Jan Kallberg, Adam Lowther
Europe In A ‘Nato Light’ World - Building Affordable And Credible Defense For The Eu, Jan Kallberg, Adam Lowther
Jan Kallberg
From an outsider’s perspective, the Common Security and Defense Policy and the efforts of the European Defense Agency are insufficient to provide Europe with the defense it will require in coming decades. While the European Union—particularly the members of the European Monetary Union—struggle to solve prolonged fiscal challenges, viable European security alternatives to an American-dominated security architecture are conspicuously absent from the documents and discussions that are coming from the European Council and at a time when the United States is engaged in an Asia-Pacific pivot. This is not to say that no thought has been given to defense issues. …
Cyber Operations Bridging From Concept To Cyber Superiority, Jan Kallberg, Bhavani Thuraisingham
Cyber Operations Bridging From Concept To Cyber Superiority, Jan Kallberg, Bhavani Thuraisingham
Jan Kallberg
The United States is preparing for cyber conflicts and ushering in a new era for national security. The concept of cyber operations is rapidly developing, and the time has come to transpose the conceptual heights to a broad ability to fight a strategic cyber conflict and defend the Nation in a cohesive way. Richard M. George, a former National Security Agency official, commented on recent developments: “Other countries are preparing for a cyberwar. If we’re not pushing the envelope in cyber, somebody else will.”1 Therefore, increased budgets are allocated to cyber operations research and education. The Defense Advanced Research Projects …
What We Do And Do Not Know: The Social Implications Of Defense, Bruce D. Mcdonald Iii
What We Do And Do Not Know: The Social Implications Of Defense, Bruce D. Mcdonald Iii
Bruce D. McDonald, III
The relationship between defense spending and economic growth has been a major topic of research and political debate for more than one hundred years. Although the relationship of interest is economically oriented, its theoretical underpinning has relied upon the social spillovers of the defense sector. This includes programs on community health, education, and access to technology. Despite this reliance, little is known about what social spillovers. This paper furthers our understanding of the defense-growth relationship by introducing the social spillovers that exist and clarifying how those spillovers occur. The author concludes with a discussion about the direction of future research …
Myth Of Indian Nuke Doctrine (Cpc Journal, No.1038, Us Air Force, Alabama, Shams Uz Zaman Mr.
Myth Of Indian Nuke Doctrine (Cpc Journal, No.1038, Us Air Force, Alabama, Shams Uz Zaman Mr.
Mr. Shams uz Zaman
No abstract provided.
Diseñando Colisiones De Satélites En La Guerra Cibernética Encubierta, Jan Kallberg
Diseñando Colisiones De Satélites En La Guerra Cibernética Encubierta, Jan Kallberg
Jan Kallberg
La guerra concentrada en la red depende de la red de información global para capacidades de combate conjuntas.3 La capa fundamental crea la capacidad de combate global como la columna vertebral espacial de la red de información donde los haberes espaciales son el elemento decisivo. EE.UU. depende de las capacidades espaciales para su éxito y la seguridad nacional de EE.UU. se basa hoy en día en un número limitado de satélites muy utilizados. Estos satélites son cruciales para la disuasión estratégica, la vigilancia, la recopilación de inteligencia y las comunicaciones militares. Si la disuasión estratégica falla, los satélites forman parte …
The Return Of Dr. Strangelove: How Austerity Makes Us Stop Worrying And Love The Bomb…And Cyber War, Jan Kallberg, Adam Lowther
The Return Of Dr. Strangelove: How Austerity Makes Us Stop Worrying And Love The Bomb…And Cyber War, Jan Kallberg, Adam Lowther
Jan Kallberg
With sequestration looming—generating significant cuts to defense spending—the United States may find itself increasingly relying on nuclear and cyber deterrence as an affordable way to guarantee national sovereignty and prevent major conflict. While earlier defense planning and acquisitions were based on economic conditions that no longer exist, Congress’ options to balance the budget by cutting defense spending are politically palatable because far fewer American are “defense voters” than “social welfare voters,” according to a number of recent public opinion surveys.
Analysis - Toward A New American Military., Adam Lowther, Jan Kallberg
Analysis - Toward A New American Military., Adam Lowther, Jan Kallberg
Jan Kallberg
In releasing the United States Department of Defense’s (DoD) Sustaining U.S. Global Leadership: Priorities for 21st Century Defense and Defense Budget Priorities and Choices in January 2012, President Barack Obama and Secretary of Defense Leon Panetta offered a rationale for the administration’s reductions in defense spending. By stating that the shift in strategic direction is an effort to “put our fiscal house in order” and a response to the 2011 Budget Control Act, which requires DoD to reduce spending by $487 billion between fiscal years 2012 and 2021, the United States’ NATO partners in Europe were given considerable reason for …
The Return Of Dr. Strangelove, Jan Kallberg, Adam Lowther
The Return Of Dr. Strangelove, Jan Kallberg, Adam Lowther
Jan Kallberg
With the prospect of sequestration looming, the United States may find itself increasingly rely ing on nuclear and cy ber deterrence as an affordable means of guaranteeing national sovereignty and preventing major conflict between the U.S. and potential adversaries in the Asia-Pacific. While earlier defense planning and acquisition were based on economic conditions that no longer ex ist, Congress’s options to balance the budget by cutting defense spending are politically palatable because far fewer American are “defense v oters” relative to “social welfare voters,” according to a number of recent public opinion surveys. The simple fact is China’s rise has …
Common Criteria Meets Realpolitik Trust, Alliances, And Potential Betrayal, Jan Kallberg
Common Criteria Meets Realpolitik Trust, Alliances, And Potential Betrayal, Jan Kallberg
Jan Kallberg
Common Criteria for Information Technology Security Evaluation has the ambition to be a global standard for IT-security certification. The issued certifications are mutually recognized between the signatories of the Common Criteria Recognition Arrangement. The key element in any form of mutual relationships is trust. A question raised in this paper is how far trust can be maintained in Common Criteria when additional signatories enter with conflicting geopolitical interests to earlier signatories. Other issues raised are control over production, the lack of permanent organization in the Common Criteria, which leads to concerns of being able to oversee the actual compliance. As …
Towards Cyber Operations The New Role Of Academic Cyber Security Research And Education, Jan Kallberg, Bhavani Thuraisingham
Towards Cyber Operations The New Role Of Academic Cyber Security Research And Education, Jan Kallberg, Bhavani Thuraisingham
Jan Kallberg
Abstract – The shift towards cyber operations represents a shift not only for the defense establishments worldwide but also cyber security research and education. Traditionally cyber security research and education has been founded on information assurance, expressed in underlying subfields such as forensics, network security, and penetration testing. Cyber security research and education is connected to the homeland security agencies and defense through funding, mutual interest in the outcome of the research, and the potential job market for graduates. The future of cyber security is both defensive information assurance measures and active defense driven information operations that jointly and coordinately …
You Say You Want A (Nonviolent) Revolution, Well Then What? Translating Western Thought, Strategic Ideological Cooptation, And Institution Building For Freedom For Governments Emerging Out Of Peaceful Chaos, Donald J. Kochan
Donald J. Kochan
With nonviolent revolution in particular, displaced governments leave a power and governance vacuum waiting to be filled. Such vacuums are particularly susceptible to what this Article will call “strategic ideological cooptation.” Following the regime disruption, peaceful chaos transitions into a period in which it is necessary to structure and order the emergent governance scheme. That period in which the new government scheme emerges is particularly fraught with danger when growing from peaceful chaos because nonviolent revolutions tend to be decentralized, unorganized, unsophisticated, and particularly vulnerable to cooptation. Any external power wishing to influence events in societies emerging out of peaceful …
Operationele Ontwikkeling Van De Nederlandse Special Operations Forces, 2005-2010, George Dimitriu, Gijs Tuinman, Martijn Van Der Vorm
Operationele Ontwikkeling Van De Nederlandse Special Operations Forces, 2005-2010, George Dimitriu, Gijs Tuinman, Martijn Van Der Vorm
George Dimitriu
Between 2005 and 2010 Dutch Special Operations Forces (SOF) carried out three mission in Afghanistan. The authors describe these missions in which both Army SOF and Marine SOF took part. They describe SOF and analyze the planning and execution of SOF missions. Further, they discuss the insights and developments that resulted from these experiences. By doing this, they not only clarify but also explain recent developments in the Dutch SOF realm. The lessons learned and best practices identified are a sound foundation for the future of Dutch SOF. (article in Dutch).
Designer Satellite Collisions From Covert Cyber War, Jan Kallberg
Designer Satellite Collisions From Covert Cyber War, Jan Kallberg
Jan Kallberg
Outer space has enjoyed two decades of fairly peaceful development since the Cold War, but once again it is becoming more competitive and contested, with increased militarization. Therefore, it is important the United States maintain its space superiority to ensure it has the capabilities required by modern warfare for successful operations. Today is different from earlier periods of space development,1 because there is not a blatantly overt arms race in space,2 but instead a covert challenge to US interests in maintaining superiority, resilience, and capability. A finite number of states consider themselves geopolitical actors; however, as long as the United …
Moving Toward Comparability: Assessing Per-Student Costs In K-12, Robert J. Eger Iii, Bruce D. Mcdonald Iii
Moving Toward Comparability: Assessing Per-Student Costs In K-12, Robert J. Eger Iii, Bruce D. Mcdonald Iii
Bruce D. McDonald, III
The current classifications for public school costs are provided by the National Center for Educational Statistics. To improve comparability between school districts, this paper provides an alternative classification with fewer numbers of expenditure categories and sub-categories. We also introduce distinctions between school-based and non-school based administration costs and between elementary and secondary schools to provide an identification of possible sources of inefficiency. The new classification is then applied to five comparable urban school districts Atlanta, Boston, Mobile, Nashville, and Newark. We find (1) that teacher salaries per student are affected by school level disaggregation; (2) that separating administrative costs into …
Complex Matrix Of Indo-Pak-Us Relations (Frontier Post) 2011, Shams Uz Zaman Mr.
Complex Matrix Of Indo-Pak-Us Relations (Frontier Post) 2011, Shams Uz Zaman Mr.
Mr. Shams uz Zaman
Define the complex relationship between India, Pakistan and the US focusing on the converging and diverging points.
Waldo In The Light Of Austerity And Federal Debt Crisis, Part 2, Jan Kallberg
Waldo In The Light Of Austerity And Federal Debt Crisis, Part 2, Jan Kallberg
Jan Kallberg
Waldo’s predictions about the future for public administration describe five areas that would be problematic in the future: legitimacy, authority, knowledge, control, and confidence. Legitimacy includes not only that the government is legally legitimized but capable and focused on an intention to deliver the “good society.” Authority, according to Waldo, is the ability to implement policy with the acceptance of the people based on rationalism, expectations of public good, ethics, superior knowledge, and institutional contexts. Knowledge is institutional knowledge, the ability to arrange and utilize knowledge within the bureaucracy since coordination is the major challenge in knowledge management. Government has …
Waldo In The Light Of Austerity And Federal Debt Crisis, Part 1, Jan Kallberg
Waldo In The Light Of Austerity And Federal Debt Crisis, Part 1, Jan Kallberg
Jan Kallberg
Dwight Waldo wrote The Enterprise of Public Administration in 1979 looking back on a long and fruitful academic career, but also as a reflection about the future for public administration. Can a 30 year old book still be relevant? You bet. Today, the public sector is increasingly facing fiscal challenges. Federal, state, and local governments throughout the country have major budget deficits followed by austerity measures that undermine the ability to deliver the good life of the future. In this day and age rereading Dwight Waldo’s The Enterprise of Public Administration is an intellectual exercise worth pursuing. Several of Dwight …
Don’T’ Know Much About History: Constitutional Text, Practice, And Presidential Power, David A. Schultz
Don’T’ Know Much About History: Constitutional Text, Practice, And Presidential Power, David A. Schultz
David A Schultz
Assertions of presidential supremacy and power in affairs often invoke history, including events during the administration of George Washington, to defend their assertions. This article raises some questions regarding what we can learn from history for constitutional argument. It concedes generally that historical facts can support or buttress constitution argument, but more specifically it contends that acts undertaken by George Washington are problematic assertions for presidential power, especially those that assert “supremacist” or broad if not exclusive claims for presidential foreign policy authority. To do that, this article first describes how history is employed as constitutional argument for presidential power. …