Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Public Affairs, Public Policy and Public Administration

Journal of Strategic Security

Threat assessment

Publication Year

Articles 1 - 7 of 7

Full-Text Articles in Law

Learning From Libya, Acting In Syria, Caitlin A. Buckley Jul 2012

Learning From Libya, Acting In Syria, Caitlin A. Buckley

Journal of Strategic Security

The international community has reached an impasse. The violence committed by Syrian President Assad's government against opposition forces, who have been calling for democratic reform, regime change, and expanded rights, has necessitated a response from the international community. This article explores various ways the international community could respond to the crisis in Syria and the consequences of each approach. It compares the current calamity in Syria to the crisis in Libya and examines the international community's response to the violence perpetrated by Qaddafi's regime. It further analyzes reports, primarily from the UN and news sources, about the ongoing predicament in …


Modeling Human Behavior To Anticipate Insider Attacks, Frank L. Greitzer , Ph.D., Ryan E. Hohimer Jul 2011

Modeling Human Behavior To Anticipate Insider Attacks, Frank L. Greitzer , Ph.D., Ryan E. Hohimer

Journal of Strategic Security

The insider threat ranks among the most pressing cyber-security challenges
that threaten government and industry information infrastructures.
To date, no systematic methods have been developed that provide a
complete and effective approach to prevent data leakage, espionage, and
sabotage. Current practice is forensic in nature, relegating to the analyst
the bulk of the responsibility to monitor, analyze, and correlate an overwhelming
amount of data. We describe a predictive modeling framework
that integrates a diverse set of data sources from the cyber domain, as well
as inferred psychological/motivational factors that may underlie malicious
insider exploits. This comprehensive threat assessment approach
provides …


Alternative Threat Methodology, Charles B. King Iii Mar 2011

Alternative Threat Methodology, Charles B. King Iii

Journal of Strategic Security

Of the many challenges facing risk analysis practitioners, perhaps the most difficult to overcome is in the field of terrorist threat analysis. When estimating the threat associated with naturally occurring events, historical data provides a great deal of insight into the frequency of those events. Threat associated with accidents applies many operations research tools to gauge future failure-rates (Failure Mode and Effects Analysis being perhaps the most widely known). However, estimating the probability of an individual's or group's attacking a specific (or even a generic) target is an element of risk analysis in which art and intuition are applied far …


The Weakest Link: The Risks Associated With Social Networking Websites, Yosef Lehrman May 2010

The Weakest Link: The Risks Associated With Social Networking Websites, Yosef Lehrman

Journal of Strategic Security

The relatively rapid rise in popularity of social networking services is now well known. MySpace, Twitter, and Facebook have become well known sites and terms. According to the Web traffic tracking site Alexa.com, as of December 2009, Facebook had 350 million registered users, MySpace just under 475 million, and Twitter 44.5 million. Many people think very little of posting prodigious amounts of personal information on social networking sites, not realizing that this information puts them at risk. Specifically, those in the law enforcement and military communities may not realize that information posted on these sites can compromise operational security and …


Extinguishing The Torch Of Terror: The Threat Of Terrorism And The 2010 Olympics, Serge E. Vidalis Nov 2009

Extinguishing The Torch Of Terror: The Threat Of Terrorism And The 2010 Olympics, Serge E. Vidalis

Journal of Strategic Security

With the change in seasons comes the expected change of insurgency operations in Afghanistan as Taliban and al-Qaida fighters mount their spring and summer offensives against both NATO forces and Afghanis sympathetic to foreign troops. As insurgents curtail their seasonal operations with the arrival of fall and winter, is it likely that a threat may arise from Afghanistan to affect the 2010 Olympics in Vancouver, British Columbia? As will be illustrated herein, the threat to the games will not be borne directly from the insurgency in Afghanistan but rather by the universal jihadist ideology of al-Qaida rather than the nationalist …


Islamist Distortions: Hizb Ut- Tahrir A Breeding Ground For Al- Qaida Recruitment, Krishna Mungur Nov 2009

Islamist Distortions: Hizb Ut- Tahrir A Breeding Ground For Al- Qaida Recruitment, Krishna Mungur

Journal of Strategic Security

In 1953, a radical splinter organization from the Muslim Brotherhood,Hizb ut-Tahrir (HuT), was founded by the Al-Azhar University (Cairo,Egypt) educated jurist Sheikh Taqiuddin an-Nabhani who criticized theMuslim Brotherhood for collaborating with Egyptian secularists, such as Gamal Abdel Nasser. A sizable portion of the more radical members of the Muslim Brotherhood broke away, to join Nabhani's budding movement. Today, HuT is known to operate in more than forty countries, calling for the restoration of the Islamic Caliphate, with a history of violence and links to violent terrorist organizations. Given increasing tensions in the region over the presence of coalition troops, Predator …


Keeping Our Campuses And Communities Safe, Ronald Goodman Sep 2009

Keeping Our Campuses And Communities Safe, Ronald Goodman

Journal of Strategic Security

Since the events of September 11, 2001, the U.S. population has a heightened awareness that tragedies can and do strike ordinary people without warning. The same can be said for the unfortunate abundance of campus shootings, where the next "9/11" occurred in 2007 on the campus of Virginia Tech. And yet, subsequent investigations into these horrific events often reveal that clues existed that might have pointed to the eventual violent outcome. It is unquestionable that to dramatically improve the safety and security of our cities we must rely upon the millions of eyes of our fellow citizens to unearth these …