Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Defense and Security Studies

National Security

Institution
Publication Year
Publication
Publication Type

Articles 1 - 30 of 48

Full-Text Articles in Social and Behavioral Sciences

Implication Of Artificial Intelligence On National Security For The Nigeria Security Agencies, Musa Zakari May 2024

Implication Of Artificial Intelligence On National Security For The Nigeria Security Agencies, Musa Zakari

Journal of Terrorism Studies

The study examines the implications of AI for national security in Nigeria in the field of military logistics for Nigerian security agencies. A documentary research design was utilized for the study. Document analysis of existing policies, reports, and case studies related to AI and national security in Nigeria was utilized. The study revealed that artificial intelligence (AI) has significant prospects for national security for Nigeria's security agencies. It was revealed that AI-powered technologies enable advanced surveillance capabilities, such as facial recognition and video analytics, which aid in identifying potential threats and monitoring security situations more effectively. The Air Force uses …


Rethinking Supply Chains: Mitigating The Risk Of Chinese Dependence And Protecting Us Semiconductor Intellectual Property, Jamison Finnamore Apr 2024

Rethinking Supply Chains: Mitigating The Risk Of Chinese Dependence And Protecting Us Semiconductor Intellectual Property, Jamison Finnamore

Helm's School of Government Conference - American Revival: Citizenship & Virtue

This paper explores the complex economic interdependence between the US, China, and Taiwan, specifically in the semiconductor industry. China’s increased aggression and intellectual property (IP) theft threatens to unbalance the iron triangle of US, China, and Taiwan trade relations. The problem overview elaborates on Taiwan’s crucial role in the semiconductor supply chain, and China’s threat against it. The argument is made that the US must take a nuanced and multifaceted approach to solving the diplomatic, economic, and military policy problem. Criteria for success are outlined, emphasizing the need to address root causes and not compromise US commitment to a free …


Brics: The World’S New Emerging Economic Alliance, Robert J. Flanigan Iii Apr 2024

Brics: The World’S New Emerging Economic Alliance, Robert J. Flanigan Iii

Master's Theses

National Security is ever-changing and evolving. As our nation moves forward in today’s world after the conclusion of the Iraq War and Afghanistan War, and moves into a new modern warfare, our nation must be on alert; searching for the next threat to keep our sovereignty alive and our citizens free and safe. This is especially important when nations who desire to harm our great nation find common interests in others to join forces against the United States of America. While looking at Brazil, Russia, India, China, and South Africa Coalition (BRICS) and what these countries coming together could do …


Ai And National Security: The United States Risks Losing Its Competitive Edge, Royce Morris Oct 2023

Ai And National Security: The United States Risks Losing Its Competitive Edge, Royce Morris

Liberty University Journal of Statesmanship & Public Policy

Recent developments in artificial intelligence (AI) have caused concern over the ethical implications of large-scale AI implementation. As a result, leading technologists and computer scientists have advocated an incremental rather than comprehensive approach to AI development and implementation to allow ethical and structural guidelines to provide a public safety net. However, such an approach does not account for the geopolitical and national security implications of lagging behind competitors like China, who have publicly stated goals of reaching AI supremacy within the next ten years. This article presents a national security analysis of the risks to American national security by allowing …


Comparing The Evolution, Form, And Function Of Russian And Chinese Information Operations, Briana Berger Slowinski, Marissa J. Skulsky May 2023

Comparing The Evolution, Form, And Function Of Russian And Chinese Information Operations, Briana Berger Slowinski, Marissa J. Skulsky

Honors Theses

Russia and China are critical actors who deploy far-reaching and impactful information operations in pursuit of their national interests. Their use of information operations is multifaceted and should be subject to study due to how influential these operations are and how significant the effects can be. In pursuit of this knowledge, the aim of this study was to conduct an in-depth analysis of these two countries' information operations and how their operations differ. The first area analyzed was the evolution of these countries' modern day information operations, primarily looking for the factors and historical context which influenced the development of …


What Senior U.S. Leaders Say We Should Know About Cyber, Dr. Joseph H. Schafer May 2023

What Senior U.S. Leaders Say We Should Know About Cyber, Dr. Joseph H. Schafer

Military Cyber Affairs

On April 6, 2023, the Atlantic Council’s Cyber Statecraft Initiative hosted a panel discussion on the new National Cybersecurity Strategy. The panel featured four senior officials from the Office of the National Cyber Director (ONCD), the Department of State (DoS), the Department of Justice (DoJ), and the Department of Homeland Security (DHS). The author attended and asked each official to identify the most important elements that policymakers and strategists must understand about cyber. This article highlights historical and recent struggles to express cyber policy, the responses from these officials, and the author’s ongoing research to improve national security cyber policy.


The Eagle’S Eye On The Rising Dragon: Why The United States Has Shifted Its View Of China, Jackson Scott May 2023

The Eagle’S Eye On The Rising Dragon: Why The United States Has Shifted Its View Of China, Jackson Scott

Baker Scholar Projects

Since 1978, the People’s Republic of China (PRC) has long been viewed as an economic trading partner of the United States of America (US). The PRC has grown to be an economic powerhouse, and the US directly helped with that process and still benefits from it. However, during the mid-2010’s, US rhetoric began to turn sour against the PRC. The American government rhetoric toward the PRC, beginning with the Obama administration, switched. As Trump’s administration came along, they bolstered this rhetoric from non-friendly to more or less hostile. Then, Biden’s administration strengthened Trump’s rhetoric. Over the past ten years or …


The Eagle’S Eye On The Rising Dragon: Why The United States Has Shifted Its View Of China, Jackson Craig Scott May 2023

The Eagle’S Eye On The Rising Dragon: Why The United States Has Shifted Its View Of China, Jackson Craig Scott

Baker Scholar Projects

Since 1978, the People’s Republic of China (PRC) has long been viewed as an economic trading partner of the United States of America (US). The PRC has grown to be an economic powerhouse, and the US directly helped with that process and still benefits from it. However, during the mid-2010’s, US rhetoric began to turn sour against the PRC. The American government rhetoric toward the PRC, beginning with the Obama administration, switched. As Trump’s administration came along, they bolstered this rhetoric from non-friendly to more or less hostile. Then, Biden’s administration strengthened Trump’s rhetoric. Over the past ten years or …


A Conceptual Frame For Us Counterterrorism Policy: Examining The Effectiveness Against Al Qaeda And Its Associates Prior To 9/11, "Tod" Thomas Patrick Brown Apr 2023

A Conceptual Frame For Us Counterterrorism Policy: Examining The Effectiveness Against Al Qaeda And Its Associates Prior To 9/11, "Tod" Thomas Patrick Brown

Publications

The United States (US) has been engaged in a “war on terrorism” to “defeat” al Qaeda since 2001. This study presented and tested an over-arching conceptual framework for US Counterterrorism (CT) policy. The conceptual frame was tested using qualitative thematic analysis of archival records from the Reagan through Clinton era. The research also used a case study of al Qaeda as the context to bound the selected records for the study. This new conceptual frame was used to evaluate the success, failure, and effects of US CT policy activities related to al Qaeda, using the records identified for the study. …


The China-Russia Axis: What Does It Want And How Will It Get It?, Douglas J. Joseph Jan 2023

The China-Russia Axis: What Does It Want And How Will It Get It?, Douglas J. Joseph

Liberty University Journal of Statesmanship & Public Policy

This paper examines the statements and actions by China and Russia and its leaders, ascertains what their economic and military objectives are and why, and describes how this powerful “Axis” intends to achieve them.


Security Analysis: A Critical Thinking Approach, Michael W. Collier Jan 2023

Security Analysis: A Critical Thinking Approach, Michael W. Collier

EKUOPEN: Open Textbooks

Security Analysis: A Critical-Thinking Approach is for anyone desiring to learn techniques for generating the best answers to complex questions and best solutions to complex problems. It furnishes current and future analysts in national security, homeland security, law enforcement, and corporate security an alternative, comprehensive process for conducting both intelligence analysis and policy analysis. The target audience is upper-division undergraduate students and new graduate students, along with entry-level practitioner trainees. The book centers on a Security Analysis Critical-Thinking Framework that synthesizes critical-thinking and existing analytic techniques. Ample examples are provided to assist readers in comprehending the material. Newly created material …


The Higher Education Risk To National Security: A Case Study Of The University Of Akron, Anna Back Jan 2023

The Higher Education Risk To National Security: A Case Study Of The University Of Akron, Anna Back

Williams Honors College, Honors Research Projects

There are numerous threats to U.S. National Security within higher education. Through this paper, I will provide an analysis of current and future threats using a literature review and informational interviewing. The literature review revealed four major National Security threats facing higher education institutions due to Foreign Intelligence Entities (FIE): foreign recruitment of faculty and students, increase in foreign students and screening difficulties, campus openness/easy access to facilities and information, and foreign funding for research. A set of informational interviews were conducted with The University of Akron faculty, employees, and partners to evaluate whether these same threats were present. The …


Developing An Equilibrium Of Protection Of The Right To Privacy And National Security In Terrorism Eradication In Indonesia, Wahyudi Djafar, Muhamad Syauqillah Nov 2022

Developing An Equilibrium Of Protection Of The Right To Privacy And National Security In Terrorism Eradication In Indonesia, Wahyudi Djafar, Muhamad Syauqillah

Journal of Terrorism Studies

Tension between privacy and security is nothing new, however due to the development of information and communication technology use as well as more intensive efforts of terrorism eradication have affected to the increasing level of the conflict. The need for national security is often similar to the situation of state of emergency, which enables the state to conduct several limitations to the implementation of right to privacy. Many states use the said justification and further position the element of national security to be in the superior position compared to the protection of civil liberties, including right to privacy. As …


Twenty-One Years Later: Reflections On 9/11, Bessie Blackburn, Shaddi Spencer, Hayden O'Connor Sep 2022

Twenty-One Years Later: Reflections On 9/11, Bessie Blackburn, Shaddi Spencer, Hayden O'Connor

Liberty University Journal of Statesmanship & Public Policy

Twenty-one years ago, one of the greatest attacks on the American republic occurred. On September 11, 2001, American Airlines Flights 11, 77, 93, and 177 were hijacked by Islamic extremists and crashed in New York City, Washington D.C., and Pennsylvania. The atrocity of these incidents and the extensive loss of life impacted not only the United States but the entire world. Nevertheless, in light of this tragedy the American people found unity in patriotism, rekindling a sense of national purpose in the form of the “Global War on Terrorism.” This document is a compilation of reflection articles written by individuals …


How Reagan’S National Security Decision Directives Can Be Applied Today, Audrey Sightler Apr 2022

How Reagan’S National Security Decision Directives Can Be Applied Today, Audrey Sightler

Helm's School of Government Conference - American Revival: Citizenship & Virtue

No abstract provided.


Fifth-Dimensional Warfare And National Security In Canada: Situating Microdeviation Theory Within C-59: An Act Respecting National Security Matters, Hayden Slight Jan 2022

Fifth-Dimensional Warfare And National Security In Canada: Situating Microdeviation Theory Within C-59: An Act Respecting National Security Matters, Hayden Slight

Theses and Dissertations (Comprehensive)

In an era of rapid technological change, the growing threat environment in the cyber dimension will continue to influence how a sovereign nation contends with attacks that can occur from any corner of the world. The growing adaptation and expansion of technology belonging to the Internet of Things (IoT) and the increasing prevalence of social media (Facebook, Twitter) has also influenced the spreading of attack surfaces that can become victim to exploitation by motivated parties including foreign states and terrorist groups. Against this backdrop, Canada’s own efforts to modernize and reinforce its own national security agencies resulted in the developing …


Cyber Intelligence In National Security, Dwi Rezki Sri Astarini, Muhammad Syaroni Rofii Jul 2021

Cyber Intelligence In National Security, Dwi Rezki Sri Astarini, Muhammad Syaroni Rofii

Journal of Strategic and Global Studies

Current information has become a very important commodity. Some even say that our society is already in an "information-based society". The ability to access and provide information quickly and accurately is very important for an organization, such as companies, universities, government agencies, and individuals. Once the importance of the value of information causes often the desired information can only be accessed by certain people. The fall of information in the hands of other parties can cause harm to the information owner. Security issues are an important aspect of an information system management. Unfortunately, this security problem often gets less attention …


Black Space Versus Blue Space: A Proposed Dichotomy Of Future Space Operations, Robert A. Bettinger, Carl A. Poole [*] Apr 2021

Black Space Versus Blue Space: A Proposed Dichotomy Of Future Space Operations, Robert A. Bettinger, Carl A. Poole [*]

Faculty Publications

This article will examine the proposed space operations structure by first outlining the historical foundations for differences in maritime and air domain military capabilities, specifically brown-w­ater versus blue-w­ater navies, and “local/ regional” versus “global” airpower. Next, the article will present the concept of black space and blue space in terms of an environment-­specific definition, as well as an examination of the technical capability requirements, mission types, and national prestige and geopolitical considerations underpinning the proposed operation types. Finally, the article will explore how the USSF might support future space exploration within the black-­space and blue-s­pace operations structure.


Cyber Mutually Assured Destruction & Counterproliferation For The 21st Century: “How I Stopped Worrying And Learned To Love The Software Exploit.”, Peter R. Pattara Jan 2021

Cyber Mutually Assured Destruction & Counterproliferation For The 21st Century: “How I Stopped Worrying And Learned To Love The Software Exploit.”, Peter R. Pattara

Liberty University Journal of Statesmanship & Public Policy

The growth of cyberspace has challenged existing frameworks for strategic competition. As a result, government, private, and academic planners seek to develop a novel framework for integrating cyberspace into diplomatic, military, and intelligence planning. This has been a difficult proposition and continues to be an area of vulnerability for the United States. To date, the United States has threatened nuclear retaliation for large scale cyber-attacks, but a comprehensive strategy has not been made publicly clear. However, this integration challenge has been encountered and solved previously. Nuclear weapons changed warfare in the twentieth century, but the United States used Mutual Assured …


Liberalism Versus Fundamentalism: The Ideological Conflict Between Tocqueville And Qtub, Mary Catherine E. Morris Jul 2020

Liberalism Versus Fundamentalism: The Ideological Conflict Between Tocqueville And Qtub, Mary Catherine E. Morris

Liberty University Journal of Statesmanship & Public Policy

This paper seeks to conclude whether Qtub has successfully discredited the values supported by Tocqueville to draw more Muslims to support an increased role of religion in society and influence the majority of Muslims to conduct violent jihad. It is hypothesized that Muslims agree with Qtub that Islam must be increasingly influential in society, but the majority do not seek to increase its role through, or for the purposes of, violent jihad. Differing in their views on freedom and liberty, freedom of religion and separation of church and state, and man-made laws but agreeing on the negative effects of materialism, …


The Sovereignty Solution: A Common Sense Approach To Global Security, Andrew Higgins Jul 2020

The Sovereignty Solution: A Common Sense Approach To Global Security, Andrew Higgins

Liberty University Journal of Statesmanship & Public Policy

The Sovereignty Solution calls for a new grand strategy for the United States. The current security paradigm, the book’s authors hold, has yet to be properly modified from a 20th-century cast of mind. The ad hoc system inherited after the end of the Cold War now fails because it too often applies national power equally to each emerging threat. But security challenges in the 21st century arise so quickly and unexpectedly that continuing in this manner incurs overextension and further, risks strategic defeat. If the United States continues to behave as if it can be in all …


Alternate Warfare: The Unseen Weapons Of Mass Destruction, Elyse Keener Jul 2020

Alternate Warfare: The Unseen Weapons Of Mass Destruction, Elyse Keener

Liberty University Journal of Statesmanship & Public Policy

Biological warfare is a national security concern that transcends centuries. In the current international climate, biowarfare is of particular interest due to the COVID-19 pandemic. This article seeks to follow historical cases of biological warfare and international response to these cases in order to understand the implications of COVID-19, if it were to be weaponized. Also covered is the current capabilities that Russia, China, and Iran are assessed to possess.


Combining Competition And Cooperation: A Guide To U.S. Space Relations, Paul Prentice, Nathan Waite Jul 2020

Combining Competition And Cooperation: A Guide To U.S. Space Relations, Paul Prentice, Nathan Waite

Liberty University Journal of Statesmanship & Public Policy

Space is the future for humanity. Whether that is a future of amity and cooperation, or competition and conflict depends in large part to what America makes it. While America cannot afford to entirely abandon cooperation with the world in the final frontier, neither can it afford to cede the advantage in a new field of potential warfare to adversaries in China and Russia. What is needed is a moderate path of competition where necessary and cooperation where beneficial, in order to most fully advance the cause of American national security. By utilizing arms treaties to prevent Chinese domination, while …


The Effects Of Unauthorized Immigrants On Crime, Shane C. Shannon Apr 2020

The Effects Of Unauthorized Immigrants On Crime, Shane C. Shannon

Student Publications

The effects of immigrants on crime has been the subject of hostile conversations and bold claims. As anti-immigrant sentiments see an increase in mainstream society, the empirical research suggesting an explanation to such claims are direly needed. Using PEW Research databases, and the States 2016 database in Stata, I evaluate the effects of unauthorized immigrant density of a given region on various crime rates of the aforementioned region. In particular, I assess the violent crime rate, murder crime rate, and property crime rates of states in America. Utilizing confidence intervals, ordinary least squares regression models (OLS), and a number of …


Narrative Policy Analysis, John W. Burns Apr 2020

Narrative Policy Analysis, John W. Burns

Student Publications

This review explores the book All Hell Breaking Loose: The Pentagons View on Climate Change, written by Micheal Klare, highlighting how the US national security offices are viewing and responding to the ominous looming threats posed by climate change.


The Bureaucratic Politics Of The Federal Bureau Of Investigation, Cooper Hearn Dec 2019

The Bureaucratic Politics Of The Federal Bureau Of Investigation, Cooper Hearn

Political Science Undergraduate Honors Theses

This is a comprehensive study of how the administrative powers of the Federal Bureau of Investigation (FBI) have evolved in response to external political forces. To analyze the changes made to FBI administrative powers, this project will assess theories of public administration, bureaucratic politics, various congressional statutes, court rulings, and executive policies that have affected the bureau’s capacity to perform investigations and intelligence operations.


Acknowledging The Impact Of Climate Change On National Security: A Long And Winding Road, Linda A. Malone Sep 2019

Acknowledging The Impact Of Climate Change On National Security: A Long And Winding Road, Linda A. Malone

Linda A. Malone

No abstract provided.


Pelibatan Organisasi Masyarakat Dalam Intelijen Keamanan Nasional, Yudha Fernando Jul 2019

Pelibatan Organisasi Masyarakat Dalam Intelijen Keamanan Nasional, Yudha Fernando

Jurnal Kajian Stratejik Ketahanan Nasional

The problem examined in this study is the role of civil society in intelligence activities for national security,

while the purpose is to determine the role and form of civil society can play in intelligence activities. Theories

that researchers use include theories of intelligence, national security, institutions and sociology. The research

approach used in this study is a qualitative approach and the type of descriptive qualitative research using a case

study model. Researchers used interview techniques, document studies and observations. Then the data is

analyzed with an interactive analysis model and validated. There are two roles that can be bound …


Kajian Strategi Dan Global : Strategi Keamanan Nasional, Koesnadi Kardi Jan 2018

Kajian Strategi Dan Global : Strategi Keamanan Nasional, Koesnadi Kardi

Jurnal Kajian Stratejik Ketahanan Nasional

National Security Strategy is a vast subject involving a daunting array of interrelated subelements woven in intricate, sometimes vague, and ever-changing patterns. Its processes are often irregular and confusing and always based on difficult decisions laden with serious risks. In short, it is a subject undestood by few and confusing to most. It is, at the same time, a subject of everwhelming important to the fate of civilization itself. Col. Dennis M. Drew and Dr. Donald M have done a considerable service by drawing together many of the diverse threads of national security strategy into a coherent whole. They consider …


Reflecting Back On The Ebola Outbreak And The Future Of Bioterrorism, Christian Pedersen Jul 2017

Reflecting Back On The Ebola Outbreak And The Future Of Bioterrorism, Christian Pedersen

Pepperdine Policy Review

In the wake of the 2014 Ebola outbreak, policy makers have focused on the public health components which led to the outbreak, the efforts to control it, and mitigate the impact of the outbreak. Some of the most enlightening aspects of the outbreak, pertain to National Security. The crisis demonstrated some crucial challenges the United States would have to plan for to effectively respond to a bioterrorist attack.