Open Access. Powered by Scholars. Published by Universities.®

Defense and Security Studies Commons

Open Access. Powered by Scholars. Published by Universities.®

4,241 Full-Text Articles 2,268 Authors 994,764 Downloads 126 Institutions

All Articles in Defense and Security Studies

Faceted Search

4,241 full-text articles. Page 2 of 125.

Radicalization Through The Internet: How Isis Became So Successful And Why The United States Needs To Catch Up, Ana Sofia Florez 2019 Fordham University

Radicalization Through The Internet: How Isis Became So Successful And Why The United States Needs To Catch Up, Ana Sofia Florez

Senior Theses

It is no secret the Islamic State of Syria, otherwise known as ISIS, has become one of the most dangerous and brutal terrorist organizations in recent history. In recent years the Islamic State has been gaining strength and followers from around the world. Individuals from other countries will leave their homes and families after contact through social media to travel to Syria and fight alongside the organization. This thesis provides insight on the dangerous implications ISIS’s perfection on online recruitment and their successful radicalization tactics has. It will also provide an explanation as to why nations, specifically the United ...


Disaggregating The United States Military: An Analysis Of The Current Organizational And Management Structure Of U.S. National Security Policy As It Relates To Military Operations In Space, Joseph M. Zeman 2019 Missouri State University

Disaggregating The United States Military: An Analysis Of The Current Organizational And Management Structure Of U.S. National Security Policy As It Relates To Military Operations In Space, Joseph M. Zeman

MSU Graduate Theses

This thesis was written to provide the reader with a comprehensive assessment about the realities of the current organizational and management structure of United States national security policy as it relates to the conduct of military operations in space. To create an encompassing argument, this thesis considers the current organizational structure of United States space policy while acknowledging that space has, in fact, become a warfighting domain. A reorganization of this magnitude has the potential to generate a succinct chain of command for military space operations while condensing the space acquisitions process and ultimately providing military space operations with the ...


An Examination Of The Potential Threat Of A State-Sponsored Biological Attack Against The United States: A Study Of Policy Implications, Courtney Anne Pfluke 2019 Missouri State University

An Examination Of The Potential Threat Of A State-Sponsored Biological Attack Against The United States: A Study Of Policy Implications, Courtney Anne Pfluke

MSU Graduate Theses

In 2002, US Navy Seals found a list of pathogens in an Afghanistan cave that Al Qaeda had planned to use in a series of biological attacks. Unique about the discovery was that the pathogens were not limited to human ones. Six pathogens targeted livestock and four targeted crops. Despite this discovery, limited attention has been given to the possibility of a state-sponsored terrorist attack utilizing biological agents against the US population, food source, or water supply. Throughout history, biological agents have been developed for use as an offensive weapon for both states and terrorist groups. The United States may ...


Terrorism In The 2020s: Examining The Global Threat Landscape, Landon W. Swearngin 2019 Missouri State University

Terrorism In The 2020s: Examining The Global Threat Landscape, Landon W. Swearngin

MSU Graduate Theses

This thesis uses quantitative and qualitative research methods to (1) explore the global trends and trajectories of terrorism, (2) identify emerging strategic challenges, and (3) outline an opportunity analysis for U.S. counterterrorism strategy. Collectively, this project provides a strategic forecast for terrorism in the 2020s, demonstrating that terrorism is becoming increasingly dangerous, dynamic, and difficult to defeat.


Forensic Analysis Of Spy Applications In Android Devices, Shinelle Hutchinson, Umit Karabiyik 2019 Sam Houston State University

Forensic Analysis Of Spy Applications In Android Devices, Shinelle Hutchinson, Umit Karabiyik

Annual ADFSL Conference on Digital Forensics, Security and Law

Smartphones with Google's Android operating system are becoming more and more popular each year, and with this increased user base, comes increased opportunities to collect more of these users' private data. There have been several instances of malware being made available via the Google Play Store, which is one of the predominant means for users to download applications. One effective way of collecting users' private data is by using Android Spyware. In this paper, we conduct a forensic analysis of a malicious Android spyware application and present our findings. We also highlight what information the application accesses and what ...


A Three-Pronged Analysis Of The Proposal For A United States Space Force, Justin Della, Angelica Gould, Christian Junio, Michael Pope, James Sacca, Cristina Viana, Kirsti Wattles, Michael Weinhoffer 2019 Embry-Riddle Aeronautical University, Daytona Beach

A Three-Pronged Analysis Of The Proposal For A United States Space Force, Justin Della, Angelica Gould, Christian Junio, Michael Pope, James Sacca, Cristina Viana, Kirsti Wattles, Michael Weinhoffer

International Journal of Security Studies

On June 18, 2018, at a meeting of the National Space Council, President Trump announced that he had directed the Department of Defense and the Pentagon “to immediately begin the process necessary to establish a space force as the sixth branch of the armed forces.” There are distinct legal, logistical, budgetary, and political challenges that must be resolved before a Space Force comes into being, and this paper provides insight into all of these issues. The legal section notes that while certain military activities are permitted in outer space, defensive weapons are likely the only systems that a Space Force ...


Iraq Programme Report 2018, United Nations Mine Action Service 2019 UNMAS

Iraq Programme Report 2018, United Nations Mine Action Service

Global CWD Repository

Upon request from the Government of Iraq and the United Nations, the United Nations Mine Action Service (UNMAS) was formally established in June 2015 to lead the efforts, in close collaboration with the Iraqi government, to mitigate explosive hazards in country. Our mission is to facilitate the safe, dignified, and voluntary return of internally displaced persons to their homes. UNMAS achieves this mandate through three different response modalities: » First, we provide explosive hazard management in support of humanitarian and stabilization efforts. » Second, we deliver risk education at the community, national and regional level to protect the local population from the ...


Federal, State And Local Law Enforcement Agency Interoperability Capabilities And Cyber Vulnerabilities, Tyrone Trapnell 2019 University of Central Florida

Federal, State And Local Law Enforcement Agency Interoperability Capabilities And Cyber Vulnerabilities, Tyrone Trapnell

Electronic Theses and Dissertations

The National Data Exchange (N-DEx) System is the central informational hub located at the Federal Bureau of Investigation (FBI). Its purpose is to provide network subscriptions to all Federal, state and local level law enforcement agencies while increasing information collaboration across all domains. The National Data Exchange users must satisfy the Advanced Permission Requirements, confirming the terms of N-DEx information use, and the Verification Requirement (verifying the completeness, timeliness, accuracy, and relevancy of N-DEx information) through coordination with the record-owning agency (Management, 2018). A network infection model is proposed to simulate the spread impact of various cyber-attacks within Federal, state ...


Constructing And Destructing The Peace: Models Of International Engagement In Post-Conflict States, Colin Churchill 2019 Macalester College

Constructing And Destructing The Peace: Models Of International Engagement In Post-Conflict States, Colin Churchill

Political Science Honors Projects

Variance in the stability of post-conflict states presents an interesting predicament. What causes this variance in states two or three decades removed from civil conflict? In this paper, I argue that the type of engagement that international actors take towards post-conflict states explains differences in stability. I draw out four distinct models of international engagement from three case studies of Lebanon, Bosnia and Herzegovina, and Northern Ireland that present the different ways that international actors have constructively and destructively engaged in these states. Furthering this analysis is an examination of the transition or possible transition between models in the cases.


Safety & Risk Management News, Otterbein University 2019 Otterbein University

Safety & Risk Management News, Otterbein University

Otterbein Police Department

No abstract provided.


The Effect Of Foreign Aid On Political Violence: Learning From Case Studies Of Nigeria And Sierra Leone, Charlotte Rohrer 2019 Ursinus College

The Effect Of Foreign Aid On Political Violence: Learning From Case Studies Of Nigeria And Sierra Leone, Charlotte Rohrer

Politics Honors Papers

Policymakers in OECD countries regularly cite reducing political violence as a fundamental purpose of foreign aid. For example, countries such as Pakistan and Iraq have received considerable amounts of aid meant to address the root causes of political violence. This project analyzes quantitative and qualitative evidence to assess whether foreign aid can reduce political violence. The quantitative and qualitative analyses study Boko Haram in Nigeria and the Revolutionary United Front in Sierra Leone to focus on regional and country-wide political violence. The study further focuses on aid projects in Sierra Leone and Nigeria as a means to reduce or curb ...


The Controversial F-35 Joint Strike Fighter: America's Most Expensive Weapons System And Its Global Impact, Bert Chapman 2019 Purdue University

The Controversial F-35 Joint Strike Fighter: America's Most Expensive Weapons System And Its Global Impact, Bert Chapman

Libraries Faculty and Staff Creative Materials

Presentation describing my 2019 Palgrave Macmillan book Global Defense Procurement and the F-35 Joint Strike Fighter. It describes this aircraft and places particular emphasis on the government information resources from multiple countries used in writing this book.


British Government Information Resources, Bert Chapman 2019 Purdue University

British Government Information Resources, Bert Chapman

Libraries Faculty and Staff Creative Materials

Provides an overview of British Government information resources. Contents include basic British economic and political background and information from British Government websites including the Department of Environment, Food, and Rural Affairs (DEFRA), Brexit related material produced by British government agencies such as the Department for Exiting the European Union,, the Ministry of Defence, the National Museum of the Royal Navy, the Home Office Visas and Immigration Section, the Office of National Statistics, Her Majesty's Treasury, the British Parliament including parliamentary committees and research agencies, the website of Member of Parliament (MP) Jacob Rees-Mogg (Conservative-North East Somerset), a webcast of ...


The Defense Industrial Base: How Idiosyncratic And Historical Influences Dictate Its Future, Henry Walter 2019 University of North Georgia

The Defense Industrial Base: How Idiosyncratic And Historical Influences Dictate Its Future, Henry Walter

International Social Science Review

The Defense Industrial Base is the river from which American military dominance flows. However, the Industrial Base is just as—if not more—vulnerable to floods and droughts as a typical industry. Tracing the sector’s historical and economic foundations helps illuminate existing gaps and strengths that can present strategic challenges and benefits. This paper aims to connect those trends to existing and future capabilities. Although the Industrial Base will take time to fill the demands of the new $700-plus billion defense budget, the more concerning strategic issues are that the budget, and subsequently, the Industrial Base are leaving a ...


Fatal Attractions, Elective Affinities, And Deadly Epistemologies, Editor 2019 Embry-Riddle Aeronautical University

Fatal Attractions, Elective Affinities, And Deadly Epistemologies, Editor

International Bulletin of Political Psychology

This article cites film, the novel, and news report to underline the deadly seriousness of the quest for knowledge.


Espionage: Why Did Hanssen Do It?, Editor 2019 Embry-Riddle Aeronautical University

Espionage: Why Did Hanssen Do It?, Editor

International Bulletin of Political Psychology

This article describes speculative elements of a post-dictive profile on Robert P. Hanssen’s convictions for espionage and conspiracy.


India’S Surgical Strikes: Response To Strategic Imperatives, Karthika Sasikumar 2019 San Jose State University

India’S Surgical Strikes: Response To Strategic Imperatives, Karthika Sasikumar

Faculty Publications

In September 2016, militants who were allegedly backed by Pakistan attacked an Indian Army camp in Uri. The government in New Delhi was facing important regional elections. It faced intense public pressure to muster a military response. Such a response, however, ran the risk of triggering a nuclear exchange. Ten days after the Uri attack, India reported that it had carried out ‘surgical strikes’ on terrorist training camps in Pakistan-controlled territory. The paper examines this specific episode in India–Pakistan deterrence dynamics, focusing on the nomenclature ‘surgical strikes’. The paper argues that the choice of the term itself is new ...


To Walk The Earth In Safety 2019, PM WRA 2019 U.S. Department of State

To Walk The Earth In Safety 2019, Pm Wra

Global CWD Repository

This 18th Edition of To Walk the Earth In Safety summarizes the United States’ Conventional Weapons Destruction (CWD) programs in 2018. CWD assistance provides the United States with a powerful and flexible tool to help partner countries manage their stockpiles of munitions, destroy excess small arms and light weapons (SA/LW) and clear explosive hazards such as landmines, improvised explosive devices (IEDs), and unexploded ordnance (UXO). Our assistance also helps countries destroy illicitly-held or poorly-secured man-portable air defense systems (MANPADS) and mitigate their threat to civilian aviation and public safety.

In today’s dynamic world, threats to U.S ...


The Political Psychology Of Crossroads, Editor 2019 Embry-Riddle Aeronautical University

The Political Psychology Of Crossroads, Editor

International Bulletin of Political Psychology

This article elaborates on how the construct of crossroads has situated within political psychological discourse.


A Political Psychology Of Obituary, Editor 2019 Embry-Riddle Aeronautical University

A Political Psychology Of Obituary, Editor

International Bulletin of Political Psychology

This article ascribes political psychological relevance to the recent death of Russian critic and documentarian Maya Turovskaya.


Digital Commons powered by bepress