Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 12 of 12

Full-Text Articles in Policy Design, Analysis, and Evaluation

Security By Contractor: Outsourcing In Peace And Stability Operations, Volker Franke Dec 2013

Security By Contractor: Outsourcing In Peace And Stability Operations, Volker Franke

Volker C. Franke

No abstract provided.


The Korean Conflict And The United States National Security, Matthew Smith Jun 2013

The Korean Conflict And The United States National Security, Matthew Smith

Pepperdine Policy Review

The United States has a substantial interest in the Korean Conflict concerning its own national security. It is based primarily on the potential outcomes of the policies deriving from North Korea. The United States must maintain its relationship with South Korea in order to address any situation that arises on the Korean peninsula.


No Music In Timbuktu: A Brief Analysis Of The Conflict In Mali And Al Qaeda’S Rebirth, Nicholas Primo Jun 2013

No Music In Timbuktu: A Brief Analysis Of The Conflict In Mali And Al Qaeda’S Rebirth, Nicholas Primo

Pepperdine Policy Review

State Department officials stated at the end of 2011 that after a careful review of year's events concerning the terror group Al Qaeda, the threat of terrorism was now greatly diminished with little chance of retunring. Less than four months later, Al Qaeda affiliate group Al Qaeda in the Islamic Maghreb (AQIM) staged a coup in the West African country of Mali, effectively splitting the country in half. The article will analyze the conflict in Mali as an example of how Islamic fundamentalism and global terrorism of Al Qaeda has not dissipated, despite the best hopes of American foreign policymakers. …


From Cyber Terrorism To State Actors’ Covert Cyber Operations, Jan Kallberg, Bhavani Thuraisingham Mar 2013

From Cyber Terrorism To State Actors’ Covert Cyber Operations, Jan Kallberg, Bhavani Thuraisingham

Jan Kallberg

Historically, since the Internet started to become a common feature in our lives, hackers have been seen as a major threat. This view has repeatedly been entrenched and distributed by media coverage and commentaries through the years. Instead the first twenty year of the Internet was acceptably secure, due to the limited abilities of the attackers, compared to the threat generated from a militarized Internet with state actors conducting cyber operations. In reality, the Internet have a reversed trajectory for its security where it has become more unsafe over time and moved from a threat to the individual to a …


Nuclear Deterrence In A Second Obama Term, Adam Lowther, Jan Kallberg Mar 2013

Nuclear Deterrence In A Second Obama Term, Adam Lowther, Jan Kallberg

Jan Kallberg

In the months prior to the 2012 presidential election in the United States, members of the Obama administration and sympathetic organizations inside the Beltway began floating the idea that the administration would pursue – after an Obama victory – further reductions in the US nuclear arsenal. With the ink still wet on the New ST ART Treaty, efforts to reduce the American arsenal to 1000 operationally deployed strategic nuclear weapons or, as some suggest, 500, is certainly premature. These efforts illustrate a poor understanding of nuclear deterrence theory and practice and the ramifications of a United States that lacks a …


Offensive Cyber: Superiority Or Stuck In Legal Hurdles?, Jan Kallberg Feb 2013

Offensive Cyber: Superiority Or Stuck In Legal Hurdles?, Jan Kallberg

Jan Kallberg

In recent years, offensive cyber operations have attracted significant interest from the non-Defense Department academic legal community, prompting numerous articles seeking to create a legal theory for cyber conflicts. Naturally, cyber operations should be used in an ethical way, but the hurdles generated by the legal community are staggering. At a time when the United States has already lost an estimated $4 trillion in intellectual property as a result of foreign cyber espionage, not to mention the loss of military advantage, focusing on what the United States cannot do in cyberspace only hinders efforts to defend the country from future …


Europe In A ‘Nato Light’ World - Building Affordable And Credible Defense For The Eu, Jan Kallberg, Adam Lowther Jan 2013

Europe In A ‘Nato Light’ World - Building Affordable And Credible Defense For The Eu, Jan Kallberg, Adam Lowther

Jan Kallberg

From an outsider’s perspective, the Common Security and Defense Policy and the efforts of the European Defense Agency are insufficient to provide Europe with the defense it will require in coming decades. While the European Union—particularly the members of the European Monetary Union—struggle to solve prolonged fiscal challenges, viable European security alternatives to an American-dominated security architecture are conspicuously absent from the documents and discussions that are coming from the European Council and at a time when the United States is engaged in an Asia-Pacific pivot. This is not to say that no thought has been given to defense issues. …


Cyber Operations Bridging From Concept To Cyber Superiority, Jan Kallberg, Bhavani Thuraisingham Jan 2013

Cyber Operations Bridging From Concept To Cyber Superiority, Jan Kallberg, Bhavani Thuraisingham

Jan Kallberg

The United States is preparing for cyber conflicts and ushering in a new era for national security. The concept of cyber operations is rapidly developing, and the time has come to transpose the conceptual heights to a broad ability to fight a strategic cyber conflict and defend the Nation in a cohesive way. Richard M. George, a former National Security Agency official, commented on recent developments: “Other countries are preparing for a cyberwar. If we’re not pushing the envelope in cyber, somebody else will.”1 Therefore, increased budgets are allocated to cyber operations research and education. The Defense Advanced Research Projects …


Homeland Security Grant Program: An Analysis Of The Determinants Of Federal Homeland Security Funding To States, Michaela Miles Jan 2013

Homeland Security Grant Program: An Analysis Of The Determinants Of Federal Homeland Security Funding To States, Michaela Miles

MPA/MPP/MPFM Capstone Projects

Ever since the devastating attacks of 9/11, America has made terrorism prevention a top priority, and the Department of Homeland Security has transferred billions of dollars to states in Domestic Preparedness and Anti-Terrorism programs. However, there has been much debate on how these funds are allocated, many speculating that some states receive more funding than others as “pork.”

Basing an analysis of funding on a variety of determinants, it can be concluded that this speculation might very well be the case. An analysis of allocation of federal Homeland Security funds to states was conducted, hypothesizing the following variables were determinants …


Activities And Achievements: Progress Report 2011-2013, Center For Governance And Sustainability, University Of Massachusetts Boston, Maria Ivanova, Craig Murphy, James Gustave Speth, Christiana Figueres, Alice Odingo Jan 2013

Activities And Achievements: Progress Report 2011-2013, Center For Governance And Sustainability, University Of Massachusetts Boston, Maria Ivanova, Craig Murphy, James Gustave Speth, Christiana Figueres, Alice Odingo

Center for Governance and Sustainability Publications

We joined the University of Massachusetts Boston in the fall of 2010 to develop a new doctoral program in global governance and human security, the first of its kind in the United States. In the spring of 2011, we launched the Center for Governance and Sustainability in an effort to bring academic rigor to real-world policy challenges in environment, development, and sustainability governance.

The Center is housed at the John W. McCormack Graduate School of Policy and Global Studies, which takes pride in offering a world-class interdisciplinary education and engaging in values-driven research, demonstrating a deep commitment to making a …


The Rising Digital Missile Gap: The Security Threat Of The United States’ Cyber Inactivity, Christian Pedersen Jan 2013

The Rising Digital Missile Gap: The Security Threat Of The United States’ Cyber Inactivity, Christian Pedersen

Pepperdine Policy Review

Over the past two decades, the ubiquitousness of the internet has created new reals in which artistic expression, dialogue, and commerce have flourished. Yet the same technologies which bring about the conveniences of the modern age also carry the greatest threats to international security over the next few decades. Defense strategies and security protocols have failed to evolve at the same rate at which internet technologies have grown. While the eminence and complexity of cyber-attacks continues to be debatable, the fact remains that networks are vulnerable to attack by both foreign governments and non-state actors. Unless definitive and aggressive steps …


What We Do And Do Not Know: The Social Implications Of Defense, Bruce D. Mcdonald Iii Dec 2012

What We Do And Do Not Know: The Social Implications Of Defense, Bruce D. Mcdonald Iii

Bruce D. McDonald, III

The relationship between defense spending and economic growth has been a major topic of research and political debate for more than one hundred years. Although the relationship of interest is economically oriented, its theoretical underpinning has relied upon the social spillovers of the defense sector. This includes programs on community health, education, and access to technology. Despite this reliance, little is known about what social spillovers. This paper furthers our understanding of the defense-growth relationship by introducing the social spillovers that exist and clarifying how those spillovers occur. The author concludes with a discussion about the direction of future research …