153,106 research outputs found

    Reducing United States Military Involvement

    Get PDF
    This paper addresses the effect that a tactical reduction of United States military personnel could potentially have on the threat of terrorism against the American homeland. While terrorist factions employ varying strategies to further their causes of opposition to western society and occupation, the United States continues to discreetly carry out policies that support incumbent governments and pursue high-risk targets at the risk of civilian casualties. The impact of this hostility can be derived from historical perspectives of neocolonialism and hegemony, but it is crucial to continue to maintain global security interests to prevent international terrorism. This paper explains the importance of the intelligence aspect of counter-terrorism and the various suggestions of transparency and better utilization of resources to uphold prevention of homeland terrorism

    Reducing Biological Risks to Security: International Policy Recommendations for the Obama Administration

    Get PDF
    Summarizes discussions among biotechnology and life sciences experts on the risks of bioterrorism and threats to public health and agriculture. Assesses current efforts and makes recommendations for strengthening global prevention and response measures

    Perspectives for Cyber Strategists on Law for Cyberwar

    Get PDF
    The proliferation of martial rhetoric in connection with the release of thousands of pages of sensitive government documents by the WikiLeaks organization underlines how easily words that have legal meanings can be indiscriminately applied to cyber events in ways that can confuse decision makers and strategists alike. The WikiLeaks phenomenon is but the latest in a series of recent cyber-related incidents––ranging from cyber crises in Estonia and Georgia to reports of the Stuxnet cyberworm allegedly infecting Iranian computers––that have contributed to a growing perception that “cyberwar” is inevitable, if not already underway. All of this generates a range of legal questions, with popular wisdom being that the law is inadequate or lacking entirely. Lt Gen Keith B. Alexander, the first commander of US Cyber Command, told Congress at his April 2010 confirmation hearings that there was a “mismatch between our technical capabilities to conduct operations and the governing laws and policies.” Likewise, Jeffrey Addicott, a highly respected cyber-law authority, asserts that “international laws associated with the use of force are woefully inadequate in terms of addressing the threat of cyberwarfare.” This article takes a somewhat different tact concerning the ability of the law of armed conflict (LOAC) to address cyber issues. Specifically, it argues that while there is certainly room for improvement in some areas, the basic tenets of LOAC are sufficient to address the most important issues of cyberwar. Among other things, this article contends that very often the real difficulty with respect to the law and cyberwar is not any lack of “law,” per se, but rather in the complexities that arise in determining the necessary facts which must be applied to the law to render legal judgments

    Identifying the science and technology dimensions of emerging public policy issues through horizon scanning

    Get PDF
    Public policy requires public support, which in turn implies a need to enable the public not just to understand policy but also to be engaged in its development. Where complex science and technology issues are involved in policy making, this takes time, so it is important to identify emerging issues of this type and prepare engagement plans. In our horizon scanning exercise, we used a modified Delphi technique [1]. A wide group of people with interests in the science and policy interface (drawn from policy makers, policy adviser, practitioners, the private sector and academics) elicited a long list of emergent policy issues in which science and technology would feature strongly and which would also necessitate public engagement as policies are developed. This was then refined to a short list of top priorities for policy makers. Thirty issues were identified within broad areas of business and technology; energy and environment; government, politics and education; health, healthcare, population and aging; information, communication, infrastructure and transport; and public safety and national security.Public policy requires public support, which in turn implies a need to enable the public not just to understand policy but also to be engaged in its development. Where complex science and technology issues are involved in policy making, this takes time, so it is important to identify emerging issues of this type and prepare engagement plans. In our horizon scanning exercise, we used a modified Delphi technique [1]. A wide group of people with interests in the science and policy interface (drawn from policy makers, policy adviser, practitioners, the private sector and academics) elicited a long list of emergent policy issues in which science and technology would feature strongly and which would also necessitate public engagement as policies are developed. This was then refined to a short list of top priorities for policy makers. Thirty issues were identified within broad areas of business and technology; energy and environment; government, politics and education; health, healthcare, population and aging; information, communication, infrastructure and transport; and public safety and national security

    Terrorism, Security, and the Threat of Counterterrorism

    Get PDF

    Capital and Punishment: Resource Scarcity Increases Endorsement of the Death Penalty

    Get PDF
    Faced with punishing severe offenders, why do some prefer imprisonment whereas others impose death? Previous research exploring death penalty attitudes has primarily focused on individual and cultural factors. Adopting a functional perspective, we propose that environmental features may also shape our punishment strategies. Individuals are attuned to the availability of resources within their environments. Due to heightened concerns with the costliness of repeated offending, we hypothesize that individuals tend toward elimination-focused punishments during times of perceived scarcity. Using global and United States data sets (studies 1 and 2), we find that indicators of resource scarcity predict the presence of capital punishment. In two experiments (studies 3 and 4), we find that activating concerns about scarcity causes people to increase their endorsement for capital punishment, and this effect is statistically mediated by a reduced willingness to risk repeated offenses. Perceived resource scarcity shapes our punishment preferences, with important policy implications

    What makes ISAF s/tick: An investigation of the politics of coalition burden-sharing

    Get PDF
    This paper is interested in conceptualising the often raised issue of over- and under-contributing in coalition operations; that of how and why members of complex coalitions2 may be punching above and below their weight, respectively. To this end, the first section presents a parsimonious baseline assumption regarding what variables may fundamentally inform coalition burden-sharing, to subsequently discuss how much each of these are found to play a role in the Afghanistan context. The second section elaborates on this by assessing the perception and the interpretation of threats by coalition member countries, related to Afghanistan, as this pertains to prioritising other variables within the scheme outlined in the previous section. The third and fourth sections then proceed to examine and further enrich the existing literature on coalition burden-sharing, and provide further insights regarding the operations of the International Security Assistance Force–Afghanistan, and regarding ISAF member-country decisionmaking; the objective here is to generate further refined assumptions, that can permit a preliminary assessment of the phenomenon of uneven burden-sharing in ISAF, complementing the initial baseline expectations

    The impact of Singapore’s military development on Malaysia’s security

    Get PDF
    In this intense era of military and defense development in South East Asia, Singapore has emergence as the fastest country in the development of military capabilities.The rapid military development that started in 1965 has made Singapore become the strongest and finest in military and defense compared to other Southeast Asia nations. Singapore’s decision to be independent from Malaysia has forced it to be self-reliant, especially in terms of security and defense.Singapore adopted the approach to develop and strengthen its defense and military system after achieving independence in 1965.Its increasing economic development in1990 has influenced the military development process and defense system.This rapid expansion has made Singapore emergence as the strongest and most advanced in military capabilities country in the Southeast Asian region.The offensive defense doctrine practiced such as forward defense, poison shrimp, pre-emptive strike and strategic weaponry ownership had raised concerns among leaders in the Southeast Asian countries.At the same time, Malaysia has also taken action to speed up its military development, diversifying the defense doctrine including total defense, complete military with modern and sophisticated defense equipment.It is speculated as a result of the security impact that Malaysia face from Singapore’s military development.Hence, this study tries to elaborate the impact or security implications on Malaysia resulting from Singapore’s military development from the Malaysian military perspective
    • 

    corecore