Open Access. Powered by Scholars. Published by Universities.®

Defense and Security Studies

2013

Articles 1 - 30 of 42

Full-Text Articles in Public Policy

Security By Contractor: Outsourcing In Peace And Stability Operations, Volker Franke Dec 2013

Security By Contractor: Outsourcing In Peace And Stability Operations, Volker Franke

Volker C. Franke

No abstract provided.


Export Controls: A Contemporary History, Bert Chapman Dec 2013

Export Controls: A Contemporary History, Bert Chapman

Libraries Faculty and Staff Presentations

Provides highlights of my recently published book Export Controls: A Contemporary History. Describes the roles played by multiple U.S. Government agencies and congressional oversight committees in this policymaking arena including the Commerce, Defense, State, and Treasury Departments. It also reviews the roles played by international government organizations such as the Missile Technology Control Regime, export oriented businesses, and research intensive universities.


13th Meeting Of The States Parties To The Anti-Personnel Mine Ban Convention (2013), Apmbc Dec 2013

13th Meeting Of The States Parties To The Anti-Personnel Mine Ban Convention (2013), Apmbc

Global CWD Repository

The 13MSP was a formal meeting of the 161 States which have accepted the 1997 Convention on the Prohibition of the Use, Stockpiling, Production and Transfer of Anti-Personnel Mines and on their Destruction. It was held in accordance with Article 11 of the Convention and pursuant to the decisions of the 2009 Second Review Conference and the 2012 Twelfth Meeting of the States Parties (12MSP).

The 13MSP was important because it was the last annual assessment of the application of the Cartagena Action Plan 2010-2014 prior to Convention’s Third Review Conference in 2014. This assessment of challenges encountered and work …


Ddasaccident809, Hd-Aid Nov 2013

Ddasaccident809, Hd-Aid

Global CWD Repository

The four Explosive Ordnance Disposal Marines were clearing the range of unexploded ordnance and consolidating it as part of an annual training exercise, according to a Marine report about the results of the investigation. The Marines moved 40-millimeter rounds into one area surrounding an M60 105-millimeter white phosphorous round that could not be safely moved, the investigation found. They were moving rounds from the consolidation point to the demolition pit when one of the rounds exploded in the demolition pit, causing the other 40- millimeter rounds at the consolidation point and the demolition pit to explode, the investigation found.


The Fourth Meeting Of States Parties To The Convention On Cluster Munitions (2013), Ccm Sep 2013

The Fourth Meeting Of States Parties To The Convention On Cluster Munitions (2013), Ccm

Global CWD Repository

The Fourth Meeting of States Parties (4MSP) took place in Lusaka, Zambia, from 9 to 13 September 2013 and gathered some 464 delegates from 58 States Parties, 18 signatories States, 30 observer States and 12 international organizations (see list below). The 4MSP was opened by Ambassador Steffen Kongstad, President of the 3MSP. During the opening session, H.E Wylbur Simuusa Minster of Foreign Affairs of the Republic of Zambia was elected by the Meeting as President of the 4MSP.


Lessons Learned From Pakistan: A Dissertation On The Bush-Obama Drone Doctrine, Michael A. Pipa Aug 2013

Lessons Learned From Pakistan: A Dissertation On The Bush-Obama Drone Doctrine, Michael A. Pipa

Michael A Pipa

The first use of the modern day attack drone by the United States was in Afghanistan in mid 2002, and for the past 11 years attack drones have been used by the United States in as many countries as Pakistan, Yemen and Somalia. When considering the alternatives to using drones, such as sending marines on the ground to complete a mission or flying a piloted jet over enemy territory to gather intelligence, as well as the military power that the use of these vehicles projects, the attack drone has become the weapon of choice in the war on terror for …


To Walk The Earth In Safety 12th Edition (Fy2012), Us Dos Pm/Wra Aug 2013

To Walk The Earth In Safety 12th Edition (Fy2012), Us Dos Pm/Wra

Global CWD Repository

In 2013, we celebrate 20 years of U.S. Government agencies working together to lead the international donor community in supporting the clearance of landmines and explosive remnants of war (ERW), as well as the destruction of at-risk and unsecured weapons and munitions. The United States first became involved in humanitarian demining in 1988 by sending a team to assess the landmine situation in Afghanistan. In 1993, U.S. assistance took an important step forward when the Department of State (DOS), Department of Defense (DOD), and the U.S. Agency for International Development (USAID) formed an interagency partnership to coordinate U.S. humanitarian demining …


Mine Action And Land Issues In Columbia, Sharmala Naidoo, Camilo Pardo, Christina Theim Jensen Jul 2013

Mine Action And Land Issues In Columbia, Sharmala Naidoo, Camilo Pardo, Christina Theim Jensen

Global CWD Repository

The purpose of this report is to examine the key links between land issues and mine action in Colombia and to provide practical ‘do no harm’ guidance to mine action organisations to ensure that mine action facilitates the return of Internally Displaced Persons (IDPs), promotes tenure security and contributes to longer term socio-economic recovery.


The Korean Conflict And The United States National Security, Matthew Smith Jun 2013

The Korean Conflict And The United States National Security, Matthew Smith

Pepperdine Policy Review

The United States has a substantial interest in the Korean Conflict concerning its own national security. It is based primarily on the potential outcomes of the policies deriving from North Korea. The United States must maintain its relationship with South Korea in order to address any situation that arises on the Korean peninsula.


No Music In Timbuktu: A Brief Analysis Of The Conflict In Mali And Al Qaeda’S Rebirth, Nicholas Primo Jun 2013

No Music In Timbuktu: A Brief Analysis Of The Conflict In Mali And Al Qaeda’S Rebirth, Nicholas Primo

Pepperdine Policy Review

State Department officials stated at the end of 2011 that after a careful review of year's events concerning the terror group Al Qaeda, the threat of terrorism was now greatly diminished with little chance of retunring. Less than four months later, Al Qaeda affiliate group Al Qaeda in the Islamic Maghreb (AQIM) staged a coup in the West African country of Mali, effectively splitting the country in half. The article will analyze the conflict in Mali as an example of how Islamic fundamentalism and global terrorism of Al Qaeda has not dissipated, despite the best hopes of American foreign policymakers. …


A False Start: The Role Of Ballistic Missile Defense In Us-Russian Relations, Matthew Elisha Dillon May 2013

A False Start: The Role Of Ballistic Missile Defense In Us-Russian Relations, Matthew Elisha Dillon

Senior Thesis Projects, 2013

In response to Iranian nuclear ambition the US and NATO have enacted a collective security initiative that will install Ballistic Missile Defense (BMD) technology throughout Europe. However, during an otherwise cooperative period in US-Russian relations (e.g., the Obama administration’s “Reset” and the New Strategic Arms Reduction Treaty or START), NATO’s posture in Eastern Europe has compelled Russia to likewise reinforce its defenses and develop measures to incapacitate opposing BMD systems. This research analyzes the political impacts of BMD on US-Russian relations, focusing particularly on NATO’s European Phased Adaptive Approach (EPAA) program--described above.


Who We Are: Incarcerated Students And The New Prison Literature, 1995-2010, Reilly Hannah N. Lorastein May 2013

Who We Are: Incarcerated Students And The New Prison Literature, 1995-2010, Reilly Hannah N. Lorastein

Honors Projects

This project focuses on American prison writings from the late 1990s to the 2000s. Much has been written about American prison intellectuals such as Malcolm X, George Jackson, Eldridge Cleaver, and Angela Davis, who wrote as active participants in black and brown freedom movements in the United States. However the new prison literature that has emerged over the past two decades through higher education programs within prisons has received little to no attention. This study provides a more nuanced view of the steadily growing silent population in the United States through close readings of Openline, an inter-disciplinary journal featuring …


Kyl, Jon, Bert Chapman May 2013

Kyl, Jon, Bert Chapman

Libraries Faculty and Staff Scholarship and Research

Provides an summary of the political career of Arizona Senator John Kyl who served in the Senate from 1995-2013 and as a congressional representative from 1987-1994.


Defense, U.S. Department Of, Bert Chapman May 2013

Defense, U.S. Department Of, Bert Chapman

Libraries Faculty and Staff Scholarship and Research

Provides an overview of U.S. Department of Defense activities in the western U.S. including the military's increasing emphasis on Asia-Pacific strategic trends and developments.


Demining Programme Office In The Falkland Islands - Technical Support 2013, Colin King Apr 2013

Demining Programme Office In The Falkland Islands - Technical Support 2013, Colin King

Global CWD Repository

A series of three reports were published by the Demining Programme Office in the Falkland Islands (Malvinas).

This publication reports on exploitation work that was carried out on SB-33, SB-81 and P4B mines during Phase 1 of clearance operations. This work was conducted on the following items:

  • C3B anti-tank mines recovered from SA064
  • An SB-33 anti-personnel mine discovered outside the mine rows of SA064
  • Components of booby traps recovered from SA064

The findings from this work were intended to assess the condition of the ordnance in order to:

  • Establish the general condition of the mines
  • Indicate their ability to function, …


Clearance Of M16 Anti-Personnel Mines In Chile, Erik Tollefsen Apr 2013

Clearance Of M16 Anti-Personnel Mines In Chile, Erik Tollefsen

Global CWD Repository

This report responds to a request for advice on safe and efficient procedures for clearance of M16 bounding fragmentation type anti-personnel mines in a minefield in the Picton Islands.

Following an invitation from Colonel Mendoza from CNAD, the GICHD Director, Ambassador Stephan Husy, visited Chile from the 20 to 29 January 2012. The GICHD Director had visited Chile previously when he focused on the minefields in the north of the country. Accompanying the GICHD Director was Ms Aurora Martinez, the GICHD focal point for Spanish speaking countries and specialist on information management. Mr Erik Tollefsen, the GICHD advisor on EOD, …


Falkland Islands Malvinas Exploitation Report 2013, C. King Associates Ltd. Apr 2013

Falkland Islands Malvinas Exploitation Report 2013, C. King Associates Ltd.

Global CWD Repository

A series of three reports were published by the Demining Programme Office in the Falkland Islands (Malvinas).

This publication reports on exploitation work that was carried out on SB-33, SB-81 and P4B mines during Phase 1 of clearance operations. This work was conducted on the following items:

  • C3B anti-tank mines recovered from SA064
  • An SB-33 anti-personnel mine discovered outside the mine rows of SA064
  • Components of booby traps recovered from SA064

The findings from this work were intended to assess the condition of the ordnance in order to:

  • Establish the general condition of the mines
  • Indicate their ability to function, …


A Guide On Transitioning Mine Action Programmes To National Ownership, Unmas Apr 2013

A Guide On Transitioning Mine Action Programmes To National Ownership, Unmas

Global CWD Repository

This guide focuses on transitioning mine action programmes1 to national ownership. The GICHD and United Nations Mine Action Service (UNMAS) commissioned case studies of transition in nine mine/ERW-affected countries to provide the evidence base for this guide. The case studies document programme implementation in very different environments – from least developed to developing countries and from low to very high levels of landmine/ERW contamination. Regardless of context, mine action programmes in all nine countries have achieved significant progress in clearance, stockpile destruction, Mine Risk Education (MRE) and even victim assistance. Many lives have been saved, the survivors helped and the …


Lessons Learned From Pakistan: A Dissertation On The Bush-Obama Drone Doctrine, Michael A. Pipa Apr 2013

Lessons Learned From Pakistan: A Dissertation On The Bush-Obama Drone Doctrine, Michael A. Pipa

Independent Study Project (ISP) Collection

The first use of the modern day attack drone by the United States was in Afghanistan in mid 2002, and for the past 11 years attack drones have been used by the United States in as many countries as Pakistan, Yemen and Somalia. When considering the alternatives to using drones, such as sending marines on the ground to complete a mission or flying a piloted jet over enemy territory to gather intelligence, as well as the military power that the use of these vehicles projects, the attack drone has become the weapon of choice in the war on terror for …


Demining Programme Office In The Falkland Islands - Technical Support 2013, Fenix -. Insight Ldt. Apr 2013

Demining Programme Office In The Falkland Islands - Technical Support 2013, Fenix -. Insight Ldt.

Global CWD Repository

The aim of this report is to outline the findings from exploitation work provided within the Falkland Islands demining programme during the third phase of clearance. The findings from this work were intended to assess the condition of the ordnance in order to: establish the general condition of the mines; indicate their ability to function; and to highlight significant change in their characteristics. Work was carried out by Colin King, technical director of Fenix Insight Ltd, from 19 – 22 March 2013.


Handover Of Released Land | Common Procedures And Good Practices, Gichd, Gender In Mine Action Apr 2013

Handover Of Released Land | Common Procedures And Good Practices, Gichd, Gender In Mine Action

Global CWD Repository

This report is based on the findings of eight country case studies. The research was carried out by GMAP and the GICHD.

It includes handover procedures and policies and standards. It also consolidates good practice and lessons learnt, assesses whether gender considerations are taken into account, and presents general recommendations.


"You Never Leave Anyone Behind": A Story Of The Young Unemployed Veteran, Jack Nettleton Apr 2013

"You Never Leave Anyone Behind": A Story Of The Young Unemployed Veteran, Jack Nettleton

Senior Theses and Projects

This thesis analyzes the current opportunities and challenges for young, Post-9/11 veterans reintegrating back into civilian life. Young veterans of the Iraq and Afghanistan wars have higher unemployment rates compared to their non-military counterparts. This thesis explores how multiple deployments and higher percentages of physical disabilities contribute to the uniqueness of the young veteran’s challenge to obtain employment. Despite the many benefits provided by the VA, young veterans often have to endure very long waiting periods before the VA can process and grant their benefits. The thesis also identifies three individual states with different economic profiles that contribute to either …


"You Never Leave Anyone Behind": A Story Of The Young Unemployed Veteran, Jack Nettleton Apr 2013

"You Never Leave Anyone Behind": A Story Of The Young Unemployed Veteran, Jack Nettleton

Senior Theses and Projects

No abstract provided.


From Cyber Terrorism To State Actors’ Covert Cyber Operations, Jan Kallberg, Bhavani Thuraisingham Mar 2013

From Cyber Terrorism To State Actors’ Covert Cyber Operations, Jan Kallberg, Bhavani Thuraisingham

Jan Kallberg

Historically, since the Internet started to become a common feature in our lives, hackers have been seen as a major threat. This view has repeatedly been entrenched and distributed by media coverage and commentaries through the years. Instead the first twenty year of the Internet was acceptably secure, due to the limited abilities of the attackers, compared to the threat generated from a militarized Internet with state actors conducting cyber operations. In reality, the Internet have a reversed trajectory for its security where it has become more unsafe over time and moved from a threat to the individual to a …


Nuclear Deterrence In A Second Obama Term, Adam Lowther, Jan Kallberg Mar 2013

Nuclear Deterrence In A Second Obama Term, Adam Lowther, Jan Kallberg

Jan Kallberg

In the months prior to the 2012 presidential election in the United States, members of the Obama administration and sympathetic organizations inside the Beltway began floating the idea that the administration would pursue – after an Obama victory – further reductions in the US nuclear arsenal. With the ink still wet on the New ST ART Treaty, efforts to reduce the American arsenal to 1000 operationally deployed strategic nuclear weapons or, as some suggest, 500, is certainly premature. These efforts illustrate a poor understanding of nuclear deterrence theory and practice and the ramifications of a United States that lacks a …


Ddasaccident805, Hd-Aid Mar 2013

Ddasaccident805, Hd-Aid

Global CWD Repository

Whilst the Team leader was at the CP reporting the find, the three deminers – [Victim No.1], [Victim No.2] and [Victim No.3] - moved from their lanes to view the PMN. It was at this stage that [Victim No.1] stepped on the missed PMN. The missed mine was located approximately 1.5 metres from the marked PMN.


Offensive Cyber: Superiority Or Stuck In Legal Hurdles?, Jan Kallberg Feb 2013

Offensive Cyber: Superiority Or Stuck In Legal Hurdles?, Jan Kallberg

Jan Kallberg

In recent years, offensive cyber operations have attracted significant interest from the non-Defense Department academic legal community, prompting numerous articles seeking to create a legal theory for cyber conflicts. Naturally, cyber operations should be used in an ethical way, but the hurdles generated by the legal community are staggering. At a time when the United States has already lost an estimated $4 trillion in intellectual property as a result of foreign cyber espionage, not to mention the loss of military advantage, focusing on what the United States cannot do in cyberspace only hinders efforts to defend the country from future …


Europe In A ‘Nato Light’ World - Building Affordable And Credible Defense For The Eu, Jan Kallberg, Adam Lowther Jan 2013

Europe In A ‘Nato Light’ World - Building Affordable And Credible Defense For The Eu, Jan Kallberg, Adam Lowther

Jan Kallberg

From an outsider’s perspective, the Common Security and Defense Policy and the efforts of the European Defense Agency are insufficient to provide Europe with the defense it will require in coming decades. While the European Union—particularly the members of the European Monetary Union—struggle to solve prolonged fiscal challenges, viable European security alternatives to an American-dominated security architecture are conspicuously absent from the documents and discussions that are coming from the European Council and at a time when the United States is engaged in an Asia-Pacific pivot. This is not to say that no thought has been given to defense issues. …


Cyber Operations Bridging From Concept To Cyber Superiority, Jan Kallberg, Bhavani Thuraisingham Jan 2013

Cyber Operations Bridging From Concept To Cyber Superiority, Jan Kallberg, Bhavani Thuraisingham

Jan Kallberg

The United States is preparing for cyber conflicts and ushering in a new era for national security. The concept of cyber operations is rapidly developing, and the time has come to transpose the conceptual heights to a broad ability to fight a strategic cyber conflict and defend the Nation in a cohesive way. Richard M. George, a former National Security Agency official, commented on recent developments: “Other countries are preparing for a cyberwar. If we’re not pushing the envelope in cyber, somebody else will.”1 Therefore, increased budgets are allocated to cyber operations research and education. The Defense Advanced Research Projects …


Unicef 2012 Annual Report, Unicef Jan 2013

Unicef 2012 Annual Report, Unicef

Global CWD Repository

2012 was a year of recognizing results for children. As the Millennium Development Goals deadline approaches, we have cause to celebrate declining poverty rates, the near eradication of polio, increased immunizations, more girls attending school, improved access to clean water and nutrition, and more children surviving and thriving beyond their fifth birthdays than ever before.

But results are no excuse for rest. Too many children continue to struggle, clinging to the lowest rungs of the development ladder: a boy missing out on a vaccination because he lives in a remote, hard-to-reach community; a girl denied her rightful place in the …