Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 16 of 16

Full-Text Articles in Social and Behavioral Sciences

Terrorism In Africa: An Analysis Of The Efficacy Of U.S. Counterterrorism, Max Yong Apr 2024

Terrorism In Africa: An Analysis Of The Efficacy Of U.S. Counterterrorism, Max Yong

Global Tides

This paper seeks to identify whether United States aid to Africa has impacted violent terrorist activity on the continent. The existing literature has produced a range of critiques. Many have voiced concern about foreign terrorist organizations (FTO) growing and blame ineffective efforts by the U.S. for this reality. Instances of African nations, in the face of persisting security challenges from FTOs, turning to political adversaries of the U.S. for assistance is evidence of this sentiment. Furthermore, terror attacks since the onset of the U.S. Global War on Terror (GWOT) have only remained higher than in the previous era. Others have …


She Speaks For Millions: The Emergence Of Female Diplomatic Voices In The Russo-Ukrainian War, Amber Brittain-Hale Jan 2024

She Speaks For Millions: The Emergence Of Female Diplomatic Voices In The Russo-Ukrainian War, Amber Brittain-Hale

Education Division Scholarship

This research critically investigates the public diplomacy strategies deployed by a cohort of influential female European leaders on Twitter during the Russo-Ukrainian War of 2022-2023. The study comprises eight leaders - Kallas (Estonia), Marin (Finland), von der Leyen (President of the European Commission), Metsola (President of the European Parliament), Sandu (Moldova), Simonyte (Lithuania), Zourabichvili (Georgia), and Meloni (Italy) - representing millions of constituents. By mirroring the analytical attention given to Ukraine's President, Volodymyr Zelenskyy, this study scrutinizes the distinct approaches and dif erences in emotional, cognitive, and structural language use between these influential female figures and President Zelenskyy in their …


Clausewitzian Theory Of War In The Age Of Cognitive Warfare, Amber Brittain-Hale Dec 2023

Clausewitzian Theory Of War In The Age Of Cognitive Warfare, Amber Brittain-Hale

Education Division Scholarship

We can reconceptualise warfare by contrasting Clausewitz with the modern practice of cognitive warfare, as evidenced by Ukraine’s defence methodologies. The strategic orchestration of ‘infopolitik’ and the sophisticated use of social media can shape narratives and public perception. This article revisits Clausewitz’s tenet of war as a political instrument and juxtaposes it with contemporary conflict’s multidimensional tactics. By scrutinising Ukraine’s digital and psychological warfare tactics, one may question the applicability of Clausewitz’s framework, seeking to understand if these novel dimensions of warfare compel a redefinition or an expansion of his thesis to navigate the complexities of contemporary geopolitical confrontations.


A Fake Future: The Threat Of Foreign Disinformation On The U.S. And Its Allies, Brandon M. Rubsamen Apr 2023

A Fake Future: The Threat Of Foreign Disinformation On The U.S. And Its Allies, Brandon M. Rubsamen

Global Tides

This paper attempts to explain the threat that foreign disinformation poses for the United States Intelligence Community and its allies. The paper examines Russian disinformation from both a historical and contemporary context and how its effect on Western democracies may only be exacerbated in light of Chinese involvement and evolving technologies. Fortunately, the paper also studies practices and strategies that the United States Intelligence Community and its allied foreign counterparts may use to respond. It is hoped that this study will help shed further light on Russian and Chinese disinformation campaigns and explain how the Intelligence Community can efficiently react.


The Vilnius Summit: A Platform For Female Leadership And Flexibility In Europe's Security Infrastructure, Amber Brittain-Hale Jan 2023

The Vilnius Summit: A Platform For Female Leadership And Flexibility In Europe's Security Infrastructure, Amber Brittain-Hale

Education Division Scholarship

This paper examines the strategic evolution of Europe’s security framework in the context of the Russo-Ukrainian War and the concluded Vilnius Summit — a critical juncture, with the possibility of selecting a new Secretary General. Among the nominees was Kaja Kallas, Estonia’s Prime Minister, whose innovative vision advocated a departure from traditional models. Kallas promoted a more inclusive and flexible NATO membership structure, more active and robust support for Ukraine against Russian aggression, increased roles for women in security architecture and policymaking, and the utilisation of public diplomacy and strategic communication in novel ways. The summit culminated in the reappointment …


Reflecting Back On The Ebola Outbreak And The Future Of Bioterrorism, Christian Pedersen Jul 2017

Reflecting Back On The Ebola Outbreak And The Future Of Bioterrorism, Christian Pedersen

Pepperdine Policy Review

In the wake of the 2014 Ebola outbreak, policy makers have focused on the public health components which led to the outbreak, the efforts to control it, and mitigate the impact of the outbreak. Some of the most enlightening aspects of the outbreak, pertain to National Security. The crisis demonstrated some crucial challenges the United States would have to plan for to effectively respond to a bioterrorist attack.


Why Bashar Al-Assad Remains In Power, Taylor Clausen Mar 2015

Why Bashar Al-Assad Remains In Power, Taylor Clausen

Global Tides

It has been almost four years since Syria descended into a vicious civil war. Still, Bashar Al-Assad remains in power despite predictions from Western powers. My paper analyses three distinct events that contribute to the continued rule of Bashar Al-Assad. It concludes with two policy options that the United States could enact to weaken Assad's position in Syria.


Unanswered Questions: Modernizing The Us Nuclear Arsenal And Forces?, Todd C. Royal Jan 2015

Unanswered Questions: Modernizing The Us Nuclear Arsenal And Forces?, Todd C. Royal

Pepperdine Policy Review

The United State strategic nuclear triad, consisting of land-based heavy bombers, intercontinental ballistic missiles (ICBMs), and submarine-launched ballistic missiles (SLBMs) has been the ultimate provider of security for the US and its allies since the end of World War II. But with decades of neglect it is time for the US government to decide what it wants too do with the triad where recent problems have put the nuclear arsenal in a national light. These new revelations and challenges the US faces for its nuclear forces will be analyzed.


Much Ado About Cyber-Space: Cyber-Terrorism And The Reformation Of The Cyber-Security, Christian Pedersen Jan 2014

Much Ado About Cyber-Space: Cyber-Terrorism And The Reformation Of The Cyber-Security, Christian Pedersen

Pepperdine Policy Review

The threats residing in cyber-space are becoming well understood by policymakers and security experts alike. However, cyber-security defenses and strategies cannot solely be directed towards nation states, as non-governmental actors – such as transnational crime groups and terrorist organizations are becoming increasingly reliant upon internet technologies. Attacks on the digital components of the critical infrastructure, have the potential to unleash devastation on the United States. In a time when reliability and ethnicity of the National Security Administration, the Nation’s leading digital intelligence organization, are becoming increasingly questioned; defensive measures need to be improved to prevent future attacks and improve the …


The Korean Conflict And The United States National Security, Matthew Smith Jun 2013

The Korean Conflict And The United States National Security, Matthew Smith

Pepperdine Policy Review

The United States has a substantial interest in the Korean Conflict concerning its own national security. It is based primarily on the potential outcomes of the policies deriving from North Korea. The United States must maintain its relationship with South Korea in order to address any situation that arises on the Korean peninsula.


No Music In Timbuktu: A Brief Analysis Of The Conflict In Mali And Al Qaeda’S Rebirth, Nicholas Primo Jun 2013

No Music In Timbuktu: A Brief Analysis Of The Conflict In Mali And Al Qaeda’S Rebirth, Nicholas Primo

Pepperdine Policy Review

State Department officials stated at the end of 2011 that after a careful review of year's events concerning the terror group Al Qaeda, the threat of terrorism was now greatly diminished with little chance of retunring. Less than four months later, Al Qaeda affiliate group Al Qaeda in the Islamic Maghreb (AQIM) staged a coup in the West African country of Mali, effectively splitting the country in half. The article will analyze the conflict in Mali as an example of how Islamic fundamentalism and global terrorism of Al Qaeda has not dissipated, despite the best hopes of American foreign policymakers. …


The Rising Digital Missile Gap: The Security Threat Of The United States’ Cyber Inactivity, Christian Pedersen Jan 2013

The Rising Digital Missile Gap: The Security Threat Of The United States’ Cyber Inactivity, Christian Pedersen

Pepperdine Policy Review

Over the past two decades, the ubiquitousness of the internet has created new reals in which artistic expression, dialogue, and commerce have flourished. Yet the same technologies which bring about the conveniences of the modern age also carry the greatest threats to international security over the next few decades. Defense strategies and security protocols have failed to evolve at the same rate at which internet technologies have grown. While the eminence and complexity of cyber-attacks continues to be debatable, the fact remains that networks are vulnerable to attack by both foreign governments and non-state actors. Unless definitive and aggressive steps …


Changes In Intelligence For An Age Of Terror (Gregory F. Treverton. Intelligence For An Age Of Terror. Cambridge: Cambridge University Press, 2009.), Scott Miller Jan 2010

Changes In Intelligence For An Age Of Terror (Gregory F. Treverton. Intelligence For An Age Of Terror. Cambridge: Cambridge University Press, 2009.), Scott Miller

Global Tides

Book review of Gregory F. Treverton's Intelligence for an Age of Terror (Cambridge: Cambridge University Press, 2009).


Identifying The Postmodern/Cold War Interlock— Soliciting A Security Studies Pedagogy Au Courant, Michael R. Mcrill Jan 2009

Identifying The Postmodern/Cold War Interlock— Soliciting A Security Studies Pedagogy Au Courant, Michael R. Mcrill

Global Tides

One scholarly faction contends that the arenas of security studies and international politics have remained essentially the same post-World War II. The other sees the 1960s as illuminating a fundamental paradigm shift concerning security studies. The latter group asserts that the majority of security concerns has either been dropped or sharply shifted post-Cold War. Since then, studies have expanded to encompass a scholarly plea for broader definitions of national security. The advent and increase of nonmilitary threats has led many to argue that these threats must be considered within the arena of national security concerns, and other scholars assert that …


Pals For Pals: The U.S. And Pakistan, Anna Mcdermott Jan 2009

Pals For Pals: The U.S. And Pakistan, Anna Mcdermott

Global Tides

Of all the nuclear arsenals in the world, Pakistan’s faces the most risk. With over forty terrorist organizations active within the country, frequent power fluxes between the military, government and intelligence agencies, and a history of security breaches plaguing its nuclear program, Pakistan makes North Korea seem secure and stable. With all the challenges that face the safety of Pakistan’s nuclear arsenal, it still lacks one basic security technology, Permissive Action Links (PALs), which are use control devices that make it virtually impossible for any unauthorized person to detonate a nuclear weapon. Over the years, there have been barriers that …


Influence In An Age Of Terror: A Framework Of Response To Islamist Influence Operations, John Deniston Jan 2007

Influence In An Age Of Terror: A Framework Of Response To Islamist Influence Operations, John Deniston

Global Tides

Adversarial influence operations perpetrated by Islamist terrorist networks confront the most foundational of America’s national defense capabilities: the will of the American people to fight. This assertion is predicated on four key determinations. First, Islamist terrorist networks use influence operations as an integral tool of global jihad. Second, these adversarial influence operations should be perceived as attacks and, subsequently, should demand response. Third, a wide array of US Government tools and institutions currently exists to counter this challenge. Fourth, precision-strike doctrine and cyber-attack response frameworks provide instructional examples of methods to create a coordinated US Government response to such influence …