Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 3 of 3

Full-Text Articles in Policy Design, Analysis, and Evaluation

The Korean Conflict And The United States National Security, Matthew Smith Jun 2013

The Korean Conflict And The United States National Security, Matthew Smith

Pepperdine Policy Review

The United States has a substantial interest in the Korean Conflict concerning its own national security. It is based primarily on the potential outcomes of the policies deriving from North Korea. The United States must maintain its relationship with South Korea in order to address any situation that arises on the Korean peninsula.


No Music In Timbuktu: A Brief Analysis Of The Conflict In Mali And Al Qaeda’S Rebirth, Nicholas Primo Jun 2013

No Music In Timbuktu: A Brief Analysis Of The Conflict In Mali And Al Qaeda’S Rebirth, Nicholas Primo

Pepperdine Policy Review

State Department officials stated at the end of 2011 that after a careful review of year's events concerning the terror group Al Qaeda, the threat of terrorism was now greatly diminished with little chance of retunring. Less than four months later, Al Qaeda affiliate group Al Qaeda in the Islamic Maghreb (AQIM) staged a coup in the West African country of Mali, effectively splitting the country in half. The article will analyze the conflict in Mali as an example of how Islamic fundamentalism and global terrorism of Al Qaeda has not dissipated, despite the best hopes of American foreign policymakers. …


The Rising Digital Missile Gap: The Security Threat Of The United States’ Cyber Inactivity, Christian Pedersen Jan 2013

The Rising Digital Missile Gap: The Security Threat Of The United States’ Cyber Inactivity, Christian Pedersen

Pepperdine Policy Review

Over the past two decades, the ubiquitousness of the internet has created new reals in which artistic expression, dialogue, and commerce have flourished. Yet the same technologies which bring about the conveniences of the modern age also carry the greatest threats to international security over the next few decades. Defense strategies and security protocols have failed to evolve at the same rate at which internet technologies have grown. While the eminence and complexity of cyber-attacks continues to be debatable, the fact remains that networks are vulnerable to attack by both foreign governments and non-state actors. Unless definitive and aggressive steps …