Open Access. Powered by Scholars. Published by Universities.®

Discipline
Institution
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 1 - 30 of 4241

Full-Text Articles in Defense and Security Studies

Bandon Dunes Golf Resort Emergency Response And Preparedness Project Proposal, Georgia Williams Dec 2019

Bandon Dunes Golf Resort Emergency Response And Preparedness Project Proposal, Georgia Williams

HSEM 494 Practicum/Capstone Project

Bandon Dunes Golf Resort has the priority of keeping their employees and guests safe on the property. This means the Resort must understand, plan, and respond to various threats in the area. Bandon Dunes Golf Resort is located along the Oregon coast just outside of the City of Bandon. The Resort must be prepared to respond to more common business disruptions and threats to the hospitality industry or private sector as well as infrequent catastrophic threats like an earthquake/tsunami on the Cascadia Subduction Zone. This catastrophic earthquake has been looming for years and would have a great effect on ...


Police Medical Field-Screening Proposal Plan, Logan Stevens Dec 2019

Police Medical Field-Screening Proposal Plan, Logan Stevens

HSEM 494 Practicum/Capstone Project

This proposal document examines the collaboration between the Bend Police Department, Deschutes County Sheriff’s Office Jail, and St. Charles Medical Center Emergency Department and takes into consideration the professional opinions of all stakeholders who currently serve the community of Central Oregon in a variety of different capacities. The Bend Police Department (Bend PD) would like to see a solution that would benefit the citizens served by the department, while supporting the department’s core values of teamwork, integrity, and excellence. Bend PD is concerned about officer efficiency because it is critical for the department to strive to be good ...


On Environmental, Climate Change & National Security Law, Mark P. Nevitt Sep 2019

On Environmental, Climate Change & National Security Law, Mark P. Nevitt

Faculty Scholarship at Penn Law

This Article offers a new way to think about climate change. Two new climate change assessments — the 2018 Fourth National Climate Assessment (NCA) and the United Nations Intergovernmental Panel’s Special Report on Climate Change — prominently highlight climate change’s multifaceted national security risks. Indeed, not only is climate change a “super wicked” environmental problem, it also accelerates existing national security threats, acting as both a “threat accelerant” and “catalyst for conflict.” Further, climate change increases the intensity and frequency of extreme weather events while threatening nations’ territorial integrity and sovereignty through rising sea levels. It causes both internal displacement ...


Countering Violent Extremism In Trinidad And Tobago: An Evaluation, Daniel P. Aldrich, Raghunath Mahabir Sep 2019

Countering Violent Extremism In Trinidad And Tobago: An Evaluation, Daniel P. Aldrich, Raghunath Mahabir

Daniel P Aldrich

Much research has focused on explaining the very high rate of radicalization among a small number of Caribbean island nations. This paper instead investigates the history and current status of countering violent extremism policies in Trinidad and Tobago, focusing on government, international partners, and local NGO programming in the field. Through an analysis of extended interviews with grassroots organizations, politicians, and members of the security administration alongside a desk review of existing literature and evaluations of CVE programming, we seek to illuminate gaps between official policies and actual, on the ground practices. While authorities in Trinidad and Tobago have recognized ...


The Baltics And Ukraine: Geopolitical Hotspots, Bert Chapman Aug 2019

The Baltics And Ukraine: Geopolitical Hotspots, Bert Chapman

Libraries Faculty and Staff Scholarship and Research

Provides detailed historical overview and contemporary analysis on why the Baltics and Ukraine are historical and remain contemporary geopolitical hotspots. Provides analysis of cultural economic, environmental, and security factors influencing long-standing contentiousness over these regions. Places emphasis on how Russian behavior and policies influence this contentiousness. Concludes by noting that differences between the U.S. and its allies and conflicts within the U.S. Government may limit the ability of the U.S. to effectively respond to events in these disputed regions.


Defense Spending By State - Nevada Fiscal Year 2017, Peter Grema, Caitlin Saladino, William E. Brown Aug 2019

Defense Spending By State - Nevada Fiscal Year 2017, Peter Grema, Caitlin Saladino, William E. Brown

Economic Development & Workforce

This Fact Sheet reprints two pages from the March 2019 DEFENSE SPENDING BY STATE (FISCAL YEAR 2017) publication issued by the United States Department of Defense: Office of Economic Adjustment for the purposes of relaying information related to defense spending in the State of Nevada.1 The original report presents data from fiscal year 2017, the most recent annual data available at the time of publication.


Good For The Military - Bad For The Nation?, George Fust Aug 2019

Good For The Military - Bad For The Nation?, George Fust

West Point Research Papers

Has an overreliance on the military as a one-size-fits-all solution become so engrained that we no longer consider alternatives? Are domestic politics so intertwined with foreign affairs that the citizenry has no choice but to accept veterans to fill the ranks of the executive branch? Is there hope for the future? Can we rebalance the general orientation of our government? The outcome to all these questions can be arrived at in a favorable way if our military continues to embrace the Huntingtonian notion of objective control. If professionalism continues to guide the actions of our military’s senior leaders and ...


Multi-Domain Operations, Bad For Civil-Military Relations?, George Fust Aug 2019

Multi-Domain Operations, Bad For Civil-Military Relations?, George Fust

West Point Research Papers

Is it possible that the U.S. military’s newest warfighting concept is bad for civil-military relations? The current lexicon for this new concept is multi-domain operations, or simply MDO.


Civ-Mil In Danger? Blame The Pundits, Not The Academies., George Fust Aug 2019

Civ-Mil In Danger? Blame The Pundits, Not The Academies., George Fust

West Point Research Papers

I teach civil-military relations at the U.S. Military Academy at West Point. While searching for readings for an elective course taught in the spring semester, I came across a 2010 article written in the L.A. Times, “An increasingly politicized military.” One passage stood out: “By all accounts, the curricula of the service academies and the war colleges give remarkably little attention to the central importance of civilian control. They do not systematically expose up-and-coming officers to intensive case studies and simulations designed to give them a sense of the principle’s real-world implications.” So where are we now ...


Current Military Academy Service Obligation: Good For Civil-Military Relations, George Fust Aug 2019

Current Military Academy Service Obligation: Good For Civil-Military Relations, George Fust

West Point Research Papers

Imagine receiving a free undergraduate education at one of the best colleges in the United States. The military academies provide this. Any economist, however, will tell you that there is no such thing as a free lunch. The American tax payer foots the bill for all those who are admitted to attend one of the military’s academies. In exchange, these citizens will commission as officers and serve an obligation of five years on active duty. The most recent National Defense Authorization Act (NDAA) includes a section directing the Secretary of Defense to assess if this five-year service obligation should ...


National Capacities And Residual Contamination (Croatia), Geneva International Center For Humanitarian Demining, Croatian Mine Action Centre Aug 2019

National Capacities And Residual Contamination (Croatia), Geneva International Center For Humanitarian Demining, Croatian Mine Action Centre

Global CWD Repository

Croatia is affected by explosive ordnance (EO) contamination that consists of mines and, to a lesser extent, explosive remnants of war (ERW), including cluster munition remnants, caused by the legacy of four years of armed conflict associated with the break-up of the former Socialist Federal Republic of Yugoslavia in the early 1990s.

This case study documents Croatia’s experience of developing national systems and capacities to address residual contamination and to identify and present good practices and lessons learnt. In addition, this case study highlights the importance of a participatory and transparent long-term strategic planning process, including a comprehensive and ...


You Can’T Surge Trust: Lessons On Working With Allies And Partners, George Fust Jul 2019

You Can’T Surge Trust: Lessons On Working With Allies And Partners, George Fust

West Point Research Papers

Today’s increasingly complex global operating environment can change at the speed of a tweet or viral video. It is therefore imperative for US forces to have the relationships that offer flexibility and options for any contingency—relationships established in advance of unforeseeable events. The world’s interconnectedness and US defense requirements demand partners and allies with whom we work effectively to bridge cultural gaps. Those relationships increase interoperability by creating realistic expectations and combating what can at times emerge as negative stereotypes. Further, shared experiences can help overcome misunderstandings and foster friendships that will be critical in times of ...


An Alternative Perspective Of Veteran Disapproval Of Recent Wars: The Civil-Military Health Of The Nation Is Strong, George Fust Jul 2019

An Alternative Perspective Of Veteran Disapproval Of Recent Wars: The Civil-Military Health Of The Nation Is Strong, George Fust

West Point Research Papers

A Pew Research Center report published on July 10 suggests that most veterans of the conflicts in Iraq and Afghanistan believe these wars are “not worth fighting.” What are the implications of these findings? What can they reveal about the health of U.S. civil-military relations? Is it dangerous for the guardians to be opposed to the mission they are directed to accomplish?


Highland Falls Is America, George Fust Jul 2019

Highland Falls Is America, George Fust

West Point Research Papers

In 1957 Samuel Huntington published a highly influential book called the Soldier and the State. In the last paragraph he famously wrote “Highland Falls [represents] the American spirit at its most commonplace…today America can learn more from West Point than West Point from America.” This passage was controversial at the time and even cost Huntington tenure at Harvard. The book would go on to influence generations of civil-military relations scholars. While the sentiment may have been accurate in the 1950s, today’s Highland Falls represents everything America should be.


Citizen Chávez: The State, Social Movements, And Publics, Anthony Peter Spanakos Jul 2019

Citizen Chávez: The State, Social Movements, And Publics, Anthony Peter Spanakos

Anthony Spanakos

Scholars are divided over whether the emancipatory politics promised by new social movements can be attained within civil society or whether seizure of the state apparatus is necessary. The Bolivarian Revolution led by President Hugo Chávez presents a crucial case for examining this question. Chávez’s use of the state apparatus has been fundamental in broadening the concept of citizenship, but this extension of citizenship has occurred alongside the deliberate exclusion of others. This has not only limited its appeal as a citizenship project but created counterpublics that challenge the functioning of the government and its very legitimacy. Analysis of ...


Deriving A Solution To Venezuela: Civil-Military Relations Can Help, George Fust Jul 2019

Deriving A Solution To Venezuela: Civil-Military Relations Can Help, George Fust

West Point Research Papers

How does one define “healthy” civil-military relations? The simplest definition would suggest a nation’s military is subordinate to its ruling body. In other words, the guys with all the guns listens to those without any. So how then would we evaluate this relationship in a country like Venezuela?


The Trojan Horse In Your Head: Cognitive Threats And How To Counter Them, Lora Pitman Jul 2019

The Trojan Horse In Your Head: Cognitive Threats And How To Counter Them, Lora Pitman

Graduate Program in International Studies Theses & Dissertations

Vulnerabilities of the human mind caused by the way it is designed to processes information have always been exploited in warfare, since the dawn of humanity. History is marked with frequent use of deceits and manipulations over the centuries, with examples ranging from the use of the Trojan Horse to Facebook’s user-profiling. While largely used over time, these tactics, that I call cognitive threats, have not been collectively examined. I hypothesize that they pose a security issue to which prevention strategies on different levels could be successfully applied. The research questions that this study asks are what the characteristics ...


Vietnam Ageing Study Management Of Explosive Remnants Of War (More), Geneva International Center For Humanitarian Demining Jul 2019

Vietnam Ageing Study Management Of Explosive Remnants Of War (More), Geneva International Center For Humanitarian Demining

Global CWD Repository

Every conflict leaves behind explosive remnants of war (ERW) in lesser or greater quantities depending upon the nature and duration of the conflict and the types and quantities of weapons used. How ERW are dealt with reflects local circumstances and conditions, as well as the influence of international humanitarian law (IHL), the availability of resources and prioritisation choices made by governments, international institutions and agencies. In many cases an initial period of proactive effort is followed, sooner or later, by the adoption of more reactive policies and practices. The duration of the transition period varies from country to country, but ...


Long-Term Risk Management Tools And Protocols For Residual Explosive Ordnance Mitigation (Vietnam), Geneva International Center For Humanitarian Demining, Vietnam National Mine Action Center Jul 2019

Long-Term Risk Management Tools And Protocols For Residual Explosive Ordnance Mitigation (Vietnam), Geneva International Center For Humanitarian Demining, Vietnam National Mine Action Center

Global CWD Repository

The Management of Residual Explosive Remnants of War (MORE) framework is a holistic long-term risk management (LTRM) approach for handling the reality of risks posed by explosive ordnance (EO). The current Geneva International Centre for Humanitarian Demining (GICHD) project in Vietnam includes – amongst other objectives – the development and pilot of LTRM processes, tools and protocols in several provinces. Vietnam offers ideal preconditions for the testing of the concept.

Vietnam not being a signatory of binding conventions, yet with the recently signed national mine action decree, leaves the national authority and national mine action centre with the question of how to ...


Al-Qaeda Versus Boko Haram: Ideologies, Goals, And Outcomes, Radhika Shah Jun 2019

Al-Qaeda Versus Boko Haram: Ideologies, Goals, And Outcomes, Radhika Shah

International Journal of Security Studies

Since the 9/11 attacks, Islam has remained at the center of the global terrorism debate. In order to weaken Islamist terrorist groups, it is crucial to understand nuance differences in their ideologies and goals. This research focuses on two such groups, Boko Haram and al-Qaeda, and argues that despite the two groups’ Salafi-jihadist roots, the groups harbor sharply different ideologies and goals—and thus, different outcomes. The research finds that al-Qaeda adheres to a rigid organizational and goal-oriented structure, while Boko Haram’s bureaucracy is less clear and less organized. While al-Qaeda has a number of stated goals, Boko ...


Radicalization Through The Internet: How Isis Became So Successful And Why The United States Needs To Catch Up, Ana Sofia Florez May 2019

Radicalization Through The Internet: How Isis Became So Successful And Why The United States Needs To Catch Up, Ana Sofia Florez

Senior Theses

It is no secret the Islamic State of Syria, otherwise known as ISIS, has become one of the most dangerous and brutal terrorist organizations in recent history. In recent years the Islamic State has been gaining strength and followers from around the world. Individuals from other countries will leave their homes and families after contact through social media to travel to Syria and fight alongside the organization. This thesis provides insight on the dangerous implications ISIS’s perfection on online recruitment and their successful radicalization tactics has. It will also provide an explanation as to why nations, specifically the United ...


Disaggregating The United States Military: An Analysis Of The Current Organizational And Management Structure Of U.S. National Security Policy As It Relates To Military Operations In Space, Joseph M. Zeman May 2019

Disaggregating The United States Military: An Analysis Of The Current Organizational And Management Structure Of U.S. National Security Policy As It Relates To Military Operations In Space, Joseph M. Zeman

MSU Graduate Theses

This thesis was written to provide the reader with a comprehensive assessment about the realities of the current organizational and management structure of United States national security policy as it relates to the conduct of military operations in space. To create an encompassing argument, this thesis considers the current organizational structure of United States space policy while acknowledging that space has, in fact, become a warfighting domain. A reorganization of this magnitude has the potential to generate a succinct chain of command for military space operations while condensing the space acquisitions process and ultimately providing military space operations with the ...


An Examination Of The Potential Threat Of A State-Sponsored Biological Attack Against The United States: A Study Of Policy Implications, Courtney Anne Pfluke May 2019

An Examination Of The Potential Threat Of A State-Sponsored Biological Attack Against The United States: A Study Of Policy Implications, Courtney Anne Pfluke

MSU Graduate Theses

In 2002, US Navy Seals found a list of pathogens in an Afghanistan cave that Al Qaeda had planned to use in a series of biological attacks. Unique about the discovery was that the pathogens were not limited to human ones. Six pathogens targeted livestock and four targeted crops. Despite this discovery, limited attention has been given to the possibility of a state-sponsored terrorist attack utilizing biological agents against the US population, food source, or water supply. Throughout history, biological agents have been developed for use as an offensive weapon for both states and terrorist groups. The United States may ...


Terrorism In The 2020s: Examining The Global Threat Landscape, Landon W. Swearngin May 2019

Terrorism In The 2020s: Examining The Global Threat Landscape, Landon W. Swearngin

MSU Graduate Theses

This thesis uses quantitative and qualitative research methods to (1) explore the global trends and trajectories of terrorism, (2) identify emerging strategic challenges, and (3) outline an opportunity analysis for U.S. counterterrorism strategy. Collectively, this project provides a strategic forecast for terrorism in the 2020s, demonstrating that terrorism is becoming increasingly dangerous, dynamic, and difficult to defeat.


Forensic Analysis Of Spy Applications In Android Devices, Shinelle Hutchinson, Umit Karabiyik May 2019

Forensic Analysis Of Spy Applications In Android Devices, Shinelle Hutchinson, Umit Karabiyik

Annual ADFSL Conference on Digital Forensics, Security and Law

Smartphones with Google's Android operating system are becoming more and more popular each year, and with this increased user base, comes increased opportunities to collect more of these users' private data. There have been several instances of malware being made available via the Google Play Store, which is one of the predominant means for users to download applications. One effective way of collecting users' private data is by using Android Spyware. In this paper, we conduct a forensic analysis of a malicious Android spyware application and present our findings. We also highlight what information the application accesses and what ...


A Three-Pronged Analysis Of The Proposal For A United States Space Force, Justin Della, Angelica Gould, Christian Junio, Michael Pope, James Sacca, Cristina Viana, Kirsti Wattles, Michael Weinhoffer May 2019

A Three-Pronged Analysis Of The Proposal For A United States Space Force, Justin Della, Angelica Gould, Christian Junio, Michael Pope, James Sacca, Cristina Viana, Kirsti Wattles, Michael Weinhoffer

International Journal of Security Studies

On June 18, 2018, at a meeting of the National Space Council, President Trump announced that he had directed the Department of Defense and the Pentagon “to immediately begin the process necessary to establish a space force as the sixth branch of the armed forces.” There are distinct legal, logistical, budgetary, and political challenges that must be resolved before a Space Force comes into being, and this paper provides insight into all of these issues. The legal section notes that while certain military activities are permitted in outer space, defensive weapons are likely the only systems that a Space Force ...


Iraq Programme Report 2018, United Nations Mine Action Service May 2019

Iraq Programme Report 2018, United Nations Mine Action Service

Global CWD Repository

Upon request from the Government of Iraq and the United Nations, the United Nations Mine Action Service (UNMAS) was formally established in June 2015 to lead the efforts, in close collaboration with the Iraqi government, to mitigate explosive hazards in country. Our mission is to facilitate the safe, dignified, and voluntary return of internally displaced persons to their homes. UNMAS achieves this mandate through three different response modalities: » First, we provide explosive hazard management in support of humanitarian and stabilization efforts. » Second, we deliver risk education at the community, national and regional level to protect the local population from the ...


Federal, State And Local Law Enforcement Agency Interoperability Capabilities And Cyber Vulnerabilities, Tyrone Trapnell May 2019

Federal, State And Local Law Enforcement Agency Interoperability Capabilities And Cyber Vulnerabilities, Tyrone Trapnell

Electronic Theses and Dissertations

The National Data Exchange (N-DEx) System is the central informational hub located at the Federal Bureau of Investigation (FBI). Its purpose is to provide network subscriptions to all Federal, state and local level law enforcement agencies while increasing information collaboration across all domains. The National Data Exchange users must satisfy the Advanced Permission Requirements, confirming the terms of N-DEx information use, and the Verification Requirement (verifying the completeness, timeliness, accuracy, and relevancy of N-DEx information) through coordination with the record-owning agency (Management, 2018). A network infection model is proposed to simulate the spread impact of various cyber-attacks within Federal, state ...


Constructing And Destructing The Peace: Models Of International Engagement In Post-Conflict States, Colin Churchill May 2019

Constructing And Destructing The Peace: Models Of International Engagement In Post-Conflict States, Colin Churchill

Political Science Honors Projects

Variance in the stability of post-conflict states presents an interesting predicament. What causes this variance in states two or three decades removed from civil conflict? In this paper, I argue that the type of engagement that international actors take towards post-conflict states explains differences in stability. I draw out four distinct models of international engagement from three case studies of Lebanon, Bosnia and Herzegovina, and Northern Ireland that present the different ways that international actors have constructively and destructively engaged in these states. Furthering this analysis is an examination of the transition or possible transition between models in the cases.


Safety & Risk Management News, Otterbein University May 2019

Safety & Risk Management News, Otterbein University

Otterbein Police Department

No abstract provided.