Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 89

Full-Text Articles in Defense and Security Studies

The Illogic Of The Biological Weapons Taboo., Phillip M. Mccauley, Rodger A. Payne Jul 2016

The Illogic Of The Biological Weapons Taboo., Phillip M. Mccauley, Rodger A. Payne

Rodger A. Payne

No abstract provided.


China's Contradictory Grand Strategy Manifestations: Examining The Rare Earths Export Restrictions And The One Belt, One Road Initiative, Lukas K. Danner Jun 2016

China's Contradictory Grand Strategy Manifestations: Examining The Rare Earths Export Restrictions And The One Belt, One Road Initiative, Lukas K. Danner

Dr. Lukas K. Danner

In the past few years, China has exhibited a rising assertiveness in international relations, including trade, although its official grand strategy remains "Peaceful Development." Examples of this contradictory trajectory are China's rare earth elements export restrictions (assertive) and the One Belt, One Road initiative (peaceful). This article seeks to establish, on the one hand, whether or not these examples are conforming to or diverging from "Peaceful Development," and therefore actually a manifestation of the alleged rising assertiveness on China's part, and on the other hand, identify the reason why China is acting ambivalently. To accomplish this, this article gives historical-cultural …


Implications Of The Dragon’S Rise For South Asia: Assessing China’S Nepal Policy, Bibek Chand, Lukas K. Danner Dec 2015

Implications Of The Dragon’S Rise For South Asia: Assessing China’S Nepal Policy, Bibek Chand, Lukas K. Danner

Dr. Lukas K. Danner

China has always been an important neighbour to Nepal which has otherwise historically been heavily influenced by India. The ‘rise of China’ has created a more outward-looking Middle Kingdom and so its influence in Nepal has significantly increased within the last decade. As a consequence, Nepal is experiencing growing interest from China. This article aims to give some historical background to Sino-Nepalese relations and to measure the most recent impact of the ‘rise of China’ on Nepal, particularly on its economic, military and political fronts. This is followed by a broader look at China’s policy towards Nepal, also taking into …


Turkey And Saudis In Syria: Aligned Interests, Clashing Revisionisms, Zenonas Tziarras Jun 2015

Turkey And Saudis In Syria: Aligned Interests, Clashing Revisionisms, Zenonas Tziarras

Zenonas Tziarras

In early May, 2015 it became known that Saudi Arabia and Turkey are supporting extremist Islamist groups in Syria against the regime of Bashar al-Assad. That Turkey, Saudi Arabia and Qatar, among others, have – mostly indirectly – been supporting Islamist groups is not news as similar reports have been emerging from time to time since 2011, if not earlier. But this policy with regard to the Syrian conflict became increasingly overt amidst growing instability and lack of Western commitment to Assad’s overthrow. According to The Independent and other media, Turkish and Saudi support focuses on the overarching jihadist group …


Assessing Isis One Year Later, Zenonas Tziarras Jun 2015

Assessing Isis One Year Later, Zenonas Tziarras

Zenonas Tziarras

A year ago the world witnessed the swift advances of the Islamic State of Iraq and al-Sham (ISIS) in Iraq and Syria. Though the emergence of the group was somewhat expected for those who have been following the regional developments of the past years it caught most of the world by surprise. At the same time, its brutal tactics, military victories, resilience, evolution and extreme ideology have led many to characterize it as the greatest regional and international security threat at the moment or the most dangerous Islamist threat contemporary history has seen.


Global Shifts And The East In Cyprus' Foreign Policy, Zenonas Tziarras May 2015

Global Shifts And The East In Cyprus' Foreign Policy, Zenonas Tziarras

Zenonas Tziarras

No abstract provided.


Integration Of And The Potential For Islamic Radicalization Among Ethnic Turks In Germany, Alev Dudek Apr 2015

Integration Of And The Potential For Islamic Radicalization Among Ethnic Turks In Germany, Alev Dudek

Alev Dudek

In spite of ongoing improvements, integration of ethnic Turks in Germany remains a challenge from the dominant culture perspective, whereas a deeply ingrained institutional and everyday racism and the lack of legal protection against discrimination pose a challenge to full participation of ethnic Turks from another perspective. In an increasingly xenophobic Europe, particularly Germany, an increase in potential for religious and nationalist radicalization in different groups including ethnic Turks is becoming more and more evident. This increase in radical attitudes is not necessarily caused by a lack of integration, as evidenced among well-integrated individuals.

In view of recent developments toward …


German Foreign Fighters In Syria And Iraq, Daniel H. Heinke, Jan Raudszus Dec 2014

German Foreign Fighters In Syria And Iraq, Daniel H. Heinke, Jan Raudszus

Dr. Daniel H. Heinke

Description of socio-demographic data on German Islamist fighters for the "Islamic State"/ISIL in Syria and Iraq; discussion of governmental countermeasures.


Cold War Ii: Those Evil Russkie He-Men Are Making Us Frack Ourselves,, Michael I. Niman Ph.D. Apr 2014

Cold War Ii: Those Evil Russkie He-Men Are Making Us Frack Ourselves,, Michael I. Niman Ph.D.

Michael I Niman Ph.D.

You have to admit, the timing is convenient, both for us handsome free Americans and for the cursed Russians. If you’re Russian, forget about the regular jailing of protesters and musicians, your he-man government and its bizarre hatred of gay folks, the degradation of your environment and rape of your natural resources, and the rise of a billionaire mafioso class. You now have rude hubristic Americans to monopolize your hate and fear. Ditto for Americans. Forget every issue we were fretting about the day before masked, Russian-speaking troops swarmed over the border and “did not invade” Crimea, annexing it and …


The Security Culture Of A Global And Multileveled Cyber Security, Zenonas Tziarras Jan 2014

The Security Culture Of A Global And Multileveled Cyber Security, Zenonas Tziarras

Zenonas Tziarras

This paper seeks to argue for the development of a global and multileveled management of cybersecurity. To do so we first define cybersecurity by situating it within the broader framework of the changing concept of security. To this end we look at the evolution of the security concept, mainly since the end of the Cold War, and its relationship to cybersecurity in today’s global affairs. Then we identify the referent object of security, the importance of cyberthreats, and the need for a multileveled management of cybersecurity and cyberthreats. For such a management to be possible and effective, this paper argues …


Book Review: The Arab Spring, Democracy And Security: Domestic And International Ramifications, Efraim Inbar (Ed), Zenonas Tziarras Oct 2013

Book Review: The Arab Spring, Democracy And Security: Domestic And International Ramifications, Efraim Inbar (Ed), Zenonas Tziarras

Zenonas Tziarras

To oer analysis on an on going political event is always a challenging task. Yet, the “Arab Spring” has given rise to many questions about the past, the present and the future of the Arab world and the Middle East more generally. The Arab Spring, Democracy and Security:Domesc and International Ramifications addresses some of these questions. The chapters of this edited volume have been written by selected Israeli scholars focusing on “issues such as democratization, the role of economic factors in political change and explanations for variations in regime stability in the Middle East.” The relationship between internal and external …


Lessons Learned From Pakistan: A Dissertation On The Bush-Obama Drone Doctrine, Michael A. Pipa Aug 2013

Lessons Learned From Pakistan: A Dissertation On The Bush-Obama Drone Doctrine, Michael A. Pipa

Michael A Pipa

The first use of the modern day attack drone by the United States was in Afghanistan in mid 2002, and for the past 11 years attack drones have been used by the United States in as many countries as Pakistan, Yemen and Somalia. When considering the alternatives to using drones, such as sending marines on the ground to complete a mission or flying a piloted jet over enemy territory to gather intelligence, as well as the military power that the use of these vehicles projects, the attack drone has become the weapon of choice in the war on terror for …


Rhode Island Helps To Weaken Iranian Regime, Donna M. Hughes Dr. Jul 2013

Rhode Island Helps To Weaken Iranian Regime, Donna M. Hughes Dr.

Donna M. Hughes

No abstract provided.


From Cyber Terrorism To State Actors’ Covert Cyber Operations, Jan Kallberg, Bhavani Thuraisingham Mar 2013

From Cyber Terrorism To State Actors’ Covert Cyber Operations, Jan Kallberg, Bhavani Thuraisingham

Jan Kallberg

Historically, since the Internet started to become a common feature in our lives, hackers have been seen as a major threat. This view has repeatedly been entrenched and distributed by media coverage and commentaries through the years. Instead the first twenty year of the Internet was acceptably secure, due to the limited abilities of the attackers, compared to the threat generated from a militarized Internet with state actors conducting cyber operations. In reality, the Internet have a reversed trajectory for its security where it has become more unsafe over time and moved from a threat to the individual to a …


Nuclear Deterrence In A Second Obama Term, Adam Lowther, Jan Kallberg Mar 2013

Nuclear Deterrence In A Second Obama Term, Adam Lowther, Jan Kallberg

Jan Kallberg

In the months prior to the 2012 presidential election in the United States, members of the Obama administration and sympathetic organizations inside the Beltway began floating the idea that the administration would pursue – after an Obama victory – further reductions in the US nuclear arsenal. With the ink still wet on the New ST ART Treaty, efforts to reduce the American arsenal to 1000 operationally deployed strategic nuclear weapons or, as some suggest, 500, is certainly premature. These efforts illustrate a poor understanding of nuclear deterrence theory and practice and the ramifications of a United States that lacks a …


Offensive Cyber: Superiority Or Stuck In Legal Hurdles?, Jan Kallberg Feb 2013

Offensive Cyber: Superiority Or Stuck In Legal Hurdles?, Jan Kallberg

Jan Kallberg

In recent years, offensive cyber operations have attracted significant interest from the non-Defense Department academic legal community, prompting numerous articles seeking to create a legal theory for cyber conflicts. Naturally, cyber operations should be used in an ethical way, but the hurdles generated by the legal community are staggering. At a time when the United States has already lost an estimated $4 trillion in intellectual property as a result of foreign cyber espionage, not to mention the loss of military advantage, focusing on what the United States cannot do in cyberspace only hinders efforts to defend the country from future …


Europe In A ‘Nato Light’ World - Building Affordable And Credible Defense For The Eu, Jan Kallberg, Adam Lowther Jan 2013

Europe In A ‘Nato Light’ World - Building Affordable And Credible Defense For The Eu, Jan Kallberg, Adam Lowther

Jan Kallberg

From an outsider’s perspective, the Common Security and Defense Policy and the efforts of the European Defense Agency are insufficient to provide Europe with the defense it will require in coming decades. While the European Union—particularly the members of the European Monetary Union—struggle to solve prolonged fiscal challenges, viable European security alternatives to an American-dominated security architecture are conspicuously absent from the documents and discussions that are coming from the European Council and at a time when the United States is engaged in an Asia-Pacific pivot. This is not to say that no thought has been given to defense issues. …


Cyber Operations Bridging From Concept To Cyber Superiority, Jan Kallberg, Bhavani Thuraisingham Jan 2013

Cyber Operations Bridging From Concept To Cyber Superiority, Jan Kallberg, Bhavani Thuraisingham

Jan Kallberg

The United States is preparing for cyber conflicts and ushering in a new era for national security. The concept of cyber operations is rapidly developing, and the time has come to transpose the conceptual heights to a broad ability to fight a strategic cyber conflict and defend the Nation in a cohesive way. Richard M. George, a former National Security Agency official, commented on recent developments: “Other countries are preparing for a cyberwar. If we’re not pushing the envelope in cyber, somebody else will.”1 Therefore, increased budgets are allocated to cyber operations research and education. The Defense Advanced Research Projects …


Turkiye'de Uyusturucu Maddenin Arz Boyutu: Uyusturucu Madde Piyasası, Ekici Behsat Jan 2013

Turkiye'de Uyusturucu Maddenin Arz Boyutu: Uyusturucu Madde Piyasası, Ekici Behsat

Ekici Behsat

No abstract provided.


Mandatory Foreign Language Training For All Military Members, Samuel W. Bettwy Jan 2013

Mandatory Foreign Language Training For All Military Members, Samuel W. Bettwy

Samuel W Bettwy

For too long now, DOD and the military services have been paying lip service to the need for foreign language capability across all ranks. It’s about time that DOD made real progress by mandating foreign language instruction at all levels of military training and schooling and by obtaining the funding needed to expand DLI’s mission to include meaningful language instruction for all servicemembers, both linguists and non-linguists. And by the way, shouldn’t the service academies make foreign language proficiency a requirement for graduation?


Multinational Corporations Are Overlooked Players In Stability, Security, Transition And Reconstruction Operations, Samuel W. Bettwy Jan 2013

Multinational Corporations Are Overlooked Players In Stability, Security, Transition And Reconstruction Operations, Samuel W. Bettwy

Samuel W Bettwy

It has long been acknowledged that multinational corporations have acquired legal personality under international law. Unlike states, however, MNCs are not precluded by notions of sovereignty and territorial inviolability. In the narrative of rogue and failing states and the emerging international norm of humanitarian intervention, most observers characterize MNCs as villainous predators. In states that have a permissive regulatory environment, MNCs exploit cheap labor, enable authoritarian regimes, and pollute the environment. Some observers believe that MNCs are also positive forces that contribute to the economic and political stability of the state and its people. Either way, combatant commanders need to …


Informing Lone-Offender Investigations, Randy Borum Jan 2013

Informing Lone-Offender Investigations, Randy Borum

Randy Borum

This article examines the current research on targeted violence by lone offenders to inform intelligence and criminal investigations. It begins by analyzing the definitions and nature of lone offender attacks, discusses the role of "radicalization," and the ways in which mental illnesses may or may not be relevant.


What We Do And Do Not Know: The Social Implications Of Defense, Bruce D. Mcdonald Iii Dec 2012

What We Do And Do Not Know: The Social Implications Of Defense, Bruce D. Mcdonald Iii

Bruce D. McDonald, III

The relationship between defense spending and economic growth has been a major topic of research and political debate for more than one hundred years. Although the relationship of interest is economically oriented, its theoretical underpinning has relied upon the social spillovers of the defense sector. This includes programs on community health, education, and access to technology. Despite this reliance, little is known about what social spillovers. This paper furthers our understanding of the defense-growth relationship by introducing the social spillovers that exist and clarifying how those spillovers occur. The author concludes with a discussion about the direction of future research …


Myth Of Indian Nuke Doctrine (Cpc Journal, No.1038, Us Air Force, Alabama, Shams Uz Zaman Mr. Dec 2012

Myth Of Indian Nuke Doctrine (Cpc Journal, No.1038, Us Air Force, Alabama, Shams Uz Zaman Mr.

Mr. Shams uz Zaman

No abstract provided.


Diseñando Colisiones De Satélites En La Guerra Cibernética Encubierta, Jan Kallberg Dec 2012

Diseñando Colisiones De Satélites En La Guerra Cibernética Encubierta, Jan Kallberg

Jan Kallberg

La guerra concentrada en la red depende de la red de información global para capacidades de combate conjuntas.3 La capa fundamental crea la capacidad de combate global como la columna vertebral espacial de la red de información donde los haberes espaciales son el elemento decisivo. EE.UU. depende de las capacidades espaciales para su éxito y la seguridad nacional de EE.UU. se basa hoy en día en un número limitado de satélites muy utilizados. Estos satélites son cruciales para la disuasión estratégica, la vigilancia, la recopilación de inteligencia y las comunicaciones militares. Si la disuasión estratégica falla, los satélites forman parte …


The Return Of Dr. Strangelove: How Austerity Makes Us Stop Worrying And Love The Bomb…And Cyber War, Jan Kallberg, Adam Lowther Nov 2012

The Return Of Dr. Strangelove: How Austerity Makes Us Stop Worrying And Love The Bomb…And Cyber War, Jan Kallberg, Adam Lowther

Jan Kallberg

With sequestration looming—generating significant cuts to defense spending—the United States may find itself increasingly relying on nuclear and cyber deterrence as an affordable way to guarantee national sovereignty and prevent major conflict. While earlier defense planning and acquisitions were based on economic conditions that no longer exist, Congress’ options to balance the budget by cutting defense spending are politically palatable because far fewer American are “defense voters” than “social welfare voters,” according to a number of recent public opinion surveys.


Analysis - Toward A New American Military., Adam Lowther, Jan Kallberg Oct 2012

Analysis - Toward A New American Military., Adam Lowther, Jan Kallberg

Jan Kallberg

In releasing the United States Department of Defense’s (DoD) Sustaining U.S. Global Leadership: Priorities for 21st Century Defense and Defense Budget Priorities and Choices in January 2012, President Barack Obama and Secretary of Defense Leon Panetta offered a rationale for the administration’s reductions in defense spending. By stating that the shift in strategic direction is an effort to “put our fiscal house in order” and a response to the 2011 Budget Control Act, which requires DoD to reduce spending by $487 billion between fiscal years 2012 and 2021, the United States’ NATO partners in Europe were given considerable reason for …


Pak Nukes: Frenzy In Western Media (Cpc Journal, No.1025, Us Air Force, Alabama), Shams Uz Zaman Mr. Sep 2012

Pak Nukes: Frenzy In Western Media (Cpc Journal, No.1025, Us Air Force, Alabama), Shams Uz Zaman Mr.

Mr. Shams uz Zaman

Focus on the reports published in the US media against Pakistani nuclear capability.


The Return Of Dr. Strangelove, Jan Kallberg, Adam Lowther Aug 2012

The Return Of Dr. Strangelove, Jan Kallberg, Adam Lowther

Jan Kallberg

With the prospect of sequestration looming, the United States may find itself increasingly rely ing on nuclear and cy ber deterrence as an affordable means of guaranteeing national sovereignty and preventing major conflict between the U.S. and potential adversaries in the Asia-Pacific. While earlier defense planning and acquisition were based on economic conditions that no longer ex ist, Congress’s options to balance the budget by cutting defense spending are politically palatable because far fewer American are “defense v oters” relative to “social welfare voters,” according to a number of recent public opinion surveys. The simple fact is China’s rise has …


Common Criteria Meets Realpolitik Trust, Alliances, And Potential Betrayal, Jan Kallberg Jul 2012

Common Criteria Meets Realpolitik Trust, Alliances, And Potential Betrayal, Jan Kallberg

Jan Kallberg

Common Criteria for Information Technology Security Evaluation has the ambition to be a global standard for IT-security certification. The issued certifications are mutually recognized between the signatories of the Common Criteria Recognition Arrangement. The key element in any form of mutual relationships is trust. A question raised in this paper is how far trust can be maintained in Common Criteria when additional signatories enter with conflicting geopolitical interests to earlier signatories. Other issues raised are control over production, the lack of permanent organization in the Common Criteria, which leads to concerns of being able to oversee the actual compliance. As …