Open Access. Powered by Scholars. Published by Universities.®

PDF

Selected Works

2013

Articles 1 - 14 of 14

Full-Text Articles in Military and Veterans Studies

Who Should Uphold International Law, And Why Do Syrians Support The Regime?, Ahmed E. Souaiaia Sep 2013

Who Should Uphold International Law, And Why Do Syrians Support The Regime?, Ahmed E. Souaiaia

Ahmed E SOUAIAIA

Answering a reporter’s question if bombing Syria is needed in order to preserve his credibility since he was the one who set a red line, President Obama replied: “First of all, I didn't set a red line. The world set a red line. The world set a red line when governments representing 98 percent of the world's population said the use of chemical weapons are abhorrent and passed a treaty forbidding their use even when countries are engaged in war. Congress set a red line when it ratified that treaty..."

It is true that international law and treaties have prohibited …


Serving Those Who Serve: Outreach And Instruction For Student Cadets And Veterans, Nancy E. Fawley, Nikki Kyrsak Aug 2013

Serving Those Who Serve: Outreach And Instruction For Student Cadets And Veterans, Nancy E. Fawley, Nikki Kyrsak

Nancy Fawley

Student cadets and veterans new to college have unique academic needs, and the abrupt switch from civilian to Corps life for new students at a military university can be challenging. Likewise, transitioning from military life to civilian life as a veteran student can be overwhelming. The libraries at Norwich University and The University of Alabama are supporting programs to assist new students in the transition from civilian to Corps life and from military to civilian life, respectively. While these students are at different stages of their military careers, cadets and veterans have common attributes that inform library support and instruction, …


Lessons Learned From Pakistan: A Dissertation On The Bush-Obama Drone Doctrine, Michael A. Pipa Aug 2013

Lessons Learned From Pakistan: A Dissertation On The Bush-Obama Drone Doctrine, Michael A. Pipa

Michael A Pipa

The first use of the modern day attack drone by the United States was in Afghanistan in mid 2002, and for the past 11 years attack drones have been used by the United States in as many countries as Pakistan, Yemen and Somalia. When considering the alternatives to using drones, such as sending marines on the ground to complete a mission or flying a piloted jet over enemy territory to gather intelligence, as well as the military power that the use of these vehicles projects, the attack drone has become the weapon of choice in the war on terror for …


Book Review: The Generals By Thomas E. Ricks, Robert Weaver Jun 2013

Book Review: The Generals By Thomas E. Ricks, Robert Weaver

Robert Weaver

No abstract provided.


From Cyber Terrorism To State Actors’ Covert Cyber Operations, Jan Kallberg, Bhavani Thuraisingham Mar 2013

From Cyber Terrorism To State Actors’ Covert Cyber Operations, Jan Kallberg, Bhavani Thuraisingham

Jan Kallberg

Historically, since the Internet started to become a common feature in our lives, hackers have been seen as a major threat. This view has repeatedly been entrenched and distributed by media coverage and commentaries through the years. Instead the first twenty year of the Internet was acceptably secure, due to the limited abilities of the attackers, compared to the threat generated from a militarized Internet with state actors conducting cyber operations. In reality, the Internet have a reversed trajectory for its security where it has become more unsafe over time and moved from a threat to the individual to a …


Nuclear Deterrence In A Second Obama Term, Adam Lowther, Jan Kallberg Mar 2013

Nuclear Deterrence In A Second Obama Term, Adam Lowther, Jan Kallberg

Jan Kallberg

In the months prior to the 2012 presidential election in the United States, members of the Obama administration and sympathetic organizations inside the Beltway began floating the idea that the administration would pursue – after an Obama victory – further reductions in the US nuclear arsenal. With the ink still wet on the New ST ART Treaty, efforts to reduce the American arsenal to 1000 operationally deployed strategic nuclear weapons or, as some suggest, 500, is certainly premature. These efforts illustrate a poor understanding of nuclear deterrence theory and practice and the ramifications of a United States that lacks a …


Chapter 13: Operation Neptune Spear: Was Killing Bin Laden A Legitimate Military Objective?, Kevin H. Govern Feb 2013

Chapter 13: Operation Neptune Spear: Was Killing Bin Laden A Legitimate Military Objective?, Kevin H. Govern

Kevin H. Govern

In this chapter I take the killing of Osama bin Laden as a test case for considering the moral and legal status of intentionally killing individuals deemed a threat to national security, under conditions in which the object of the targeted attack is offered little or no opportunity to surrender to attacking forces. The target in such operations, in short, is treated as though he were a belligerent: a person placed on a kill list may be targeted in a way that would be legitimate if he were an enemy combatant. In such cases, we think of him as having …


Offensive Cyber: Superiority Or Stuck In Legal Hurdles?, Jan Kallberg Feb 2013

Offensive Cyber: Superiority Or Stuck In Legal Hurdles?, Jan Kallberg

Jan Kallberg

In recent years, offensive cyber operations have attracted significant interest from the non-Defense Department academic legal community, prompting numerous articles seeking to create a legal theory for cyber conflicts. Naturally, cyber operations should be used in an ethical way, but the hurdles generated by the legal community are staggering. At a time when the United States has already lost an estimated $4 trillion in intellectual property as a result of foreign cyber espionage, not to mention the loss of military advantage, focusing on what the United States cannot do in cyberspace only hinders efforts to defend the country from future …


Europe In A ‘Nato Light’ World - Building Affordable And Credible Defense For The Eu, Jan Kallberg, Adam Lowther Jan 2013

Europe In A ‘Nato Light’ World - Building Affordable And Credible Defense For The Eu, Jan Kallberg, Adam Lowther

Jan Kallberg

From an outsider’s perspective, the Common Security and Defense Policy and the efforts of the European Defense Agency are insufficient to provide Europe with the defense it will require in coming decades. While the European Union—particularly the members of the European Monetary Union—struggle to solve prolonged fiscal challenges, viable European security alternatives to an American-dominated security architecture are conspicuously absent from the documents and discussions that are coming from the European Council and at a time when the United States is engaged in an Asia-Pacific pivot. This is not to say that no thought has been given to defense issues. …


Cyber Operations Bridging From Concept To Cyber Superiority, Jan Kallberg, Bhavani Thuraisingham Jan 2013

Cyber Operations Bridging From Concept To Cyber Superiority, Jan Kallberg, Bhavani Thuraisingham

Jan Kallberg

The United States is preparing for cyber conflicts and ushering in a new era for national security. The concept of cyber operations is rapidly developing, and the time has come to transpose the conceptual heights to a broad ability to fight a strategic cyber conflict and defend the Nation in a cohesive way. Richard M. George, a former National Security Agency official, commented on recent developments: “Other countries are preparing for a cyberwar. If we’re not pushing the envelope in cyber, somebody else will.”1 Therefore, increased budgets are allocated to cyber operations research and education. The Defense Advanced Research Projects …


Informing Lone-Offender Investigations, Randy Borum Jan 2013

Informing Lone-Offender Investigations, Randy Borum

Randy Borum

This article examines the current research on targeted violence by lone offenders to inform intelligence and criminal investigations. It begins by analyzing the definitions and nature of lone offender attacks, discusses the role of "radicalization," and the ways in which mental illnesses may or may not be relevant.


Spillovers Of Veterans Hospice Care: The Economic And Social Impact Of Palliative Care, Maximiliano Mendieta, Bruce D. Mcdonald Iii Dec 2012

Spillovers Of Veterans Hospice Care: The Economic And Social Impact Of Palliative Care, Maximiliano Mendieta, Bruce D. Mcdonald Iii

Bruce D. McDonald, III

In exchange for military service in the United States, soldiers are promised a benefits package inclusive of health and education after the completion of their service. While the economic effects of the defense-growth relationship are well known, this study takes a unique approach to understanding the relationship between veterans and society by investigating the social and economic spillovers of veterans hospice care. This study shows that as an early adopter of hospice care, the U.S. Department of Veterans Affairs maximized its efficiency through sponsoring innovative research on geriatric care, introducing competition into the health sector, and legitimizing death and dying …


What We Do And Do Not Know: The Social Implications Of Defense, Bruce D. Mcdonald Iii Dec 2012

What We Do And Do Not Know: The Social Implications Of Defense, Bruce D. Mcdonald Iii

Bruce D. McDonald, III

The relationship between defense spending and economic growth has been a major topic of research and political debate for more than one hundred years. Although the relationship of interest is economically oriented, its theoretical underpinning has relied upon the social spillovers of the defense sector. This includes programs on community health, education, and access to technology. Despite this reliance, little is known about what social spillovers. This paper furthers our understanding of the defense-growth relationship by introducing the social spillovers that exist and clarifying how those spillovers occur. The author concludes with a discussion about the direction of future research …


Post Mission, Red Teaming The Details Of The Devil., Carter Matherly Dec 2012

Post Mission, Red Teaming The Details Of The Devil., Carter Matherly

Carter Matherly PhD

Red Teaming is an analytical process that will reduce threat by identifying previously unobserved or unrecognized threats through visualization of the battlefield from the enemy’s point of view, via synthesization of the enemies’ decision making processes while removing relatively common analytical bias and perceptions. Despite the invaluable data these teams are able to produce there is little guidance available to assist Red teams in exploiting their gained knowledge of threats. This has ultimately led to these teams being under employed as simple OPFOR (opposing forces) with little thought to post mission analysis or applications. Could a post mission analytical review …