Spelling suggestions: "subject:"[een] NATIONAL SECURITY"" "subject:"[enn] NATIONAL SECURITY""
331 |
Cups, cowbells, medals, and flags sport and national identity in Germany, 1936-2006Burkel, Laurel M. 12 1900 (has links)
The present study addresses the role of sport in the evolution of modern German nationalism. This work contains: a.) an historical analysis of nationalism, culture and sport from the late eighteenth until the mid-twentieth century; b.) a case study of the 1936 Garmisch/Berlin Olympics as an example of virulent nationalism and racism; c.) a case study of the 2006 World Cup in Germany as an example of national identity in twenty-first century Germany in the wake of reunification and globalization. Sport has been central to how Germans see themselves from the end of the eighteenth century until the present. This work argues that an analysis of sports, domestic politics and diplomacy can offer those interested in nationalism in contemporary Europe a helpful means of analysis of a force that remains powerful, despite the construction of the European Union. While an analysis of the evolution of mass sport indicates that Germans no longer apply the kind of racist blood and soil nationalism so virulent in the early twentieth century, sport has shown a remarkable continuity as a mirror of German aspirations for their nation, which has changed fundamentally in the realms of culture, society, and economy in the twenty-first century.
|
332 |
The bioterrorism threat by non-state actors hype or horror?Thompson, Christopher M. 12 1900 (has links)
This thesis provides a capabilities-based approach to assessing the bioterrorism threat from non-state actors. Through comparative case study, prior bioterrorism attacks are analyzed to assess capability in the three areas necessary to complete a biological weapons attack: obtaining or isolating a pathogen, weaponizing the agent, and employing or disseminating the weapon. The three cases are the Rajneeshee cult in 1984, the Aum Shinrikyo cult in the early 1990's, and the United States Postal System anthrax attacks of 2001. In contrast to current wisdom that employing biological weapons is too difficult for non-state actors, this thesis reveals a broad spectrum of capability in all studies in the areas necessary to culminate an attack. Applications of these findings must be used to assess risk generally rather than against specific groups because capability is deemed to be exptremely difficult to track. The these finds that a significant threat exists but not large enough to be over-hyped above other national security concerns. In light of this, recommendations are provided for U.S. biodefense policy emphasis in the areas of the nonproliferation regime, attribution capabilities, and defending against the changing nature of future attacks with a particular emphasis on the public health system.
|
333 |
Why the United States underestimated the Soviet BW threatJaehnig, James S. 09 1900 (has links)
Biological weapons have the ability to inflict mass casualties while keeping existing infrastructure intact. They are inexpensive to manufacture, difficult to detect, and have a low signature for attribution. In the 1970s, the Soviet Union began amassing the largest stockpile of biological weapons worldwide. The U.S. Intelligence community repeatedly failed to detect the scope and character of this large-scale Soviet development effort despite implausible explanations for outbreaks of unexplained disease, credible ground reports from informants, and strange behavior patterns viewed through reconnaissance efforts. Toward the end of the Cold War, the U.S. Intelligence realized its grave error. Unfortunately, the majority of these weapons are unaccounted for today. By examining the reasons the Soviet Unionâ s biological weapons program went undetected, the United States may gain a better advantage for future assessments and prevent the large-scale stockpiling and development of biological weapons.
|
334 |
Rapidly deployable, self forming, wireless networks for maritime interdiction operationsStavroulakis, Georgios. 09 1900 (has links)
The term "Maritime Interdiction Operations" usually refers to Visit, Board, Search and Seizure (VBSS) operations executed today all over the world. These operations are conducted as a part of the maritime law enforcement policy of each country inside their respective territorial waters or as a part of the homeland security requirements as they are mandated today by the global war against terrorism. Very often lately, they are conducted by allied maritime forces in international waters as well. Although such operations might seem quite simple in execution, the global war against terrorism has dramatically increased their level of complexity. In the past, searching cargo ships for illegal or contraband cargo was not that complicated or that important for national security, but now, searching for non-proliferation, radiological or bio-chemical material, as well as for possible terrorists among the crew members of a ship, is a very complex operation that cannot tolerate mistakes or omissions. This thesis examines the requirements posed by a boarding team, either from the navy or the law enforcement community, on information flow from and to them, in order to enhance their situational awareness and decision making capability during Maritime Interdiction Operations. That information flow is provided by several wireless network technologies, implemented during field trials, as part of the NPS CENETIX (Center for Network Innovation and Experimentation) lab s maritime subset of experimentation. During these field trials, a wireless extension of the internet is deployed to the sea, allowing the boarding team to access information and collaborate with remotely located experts and respective operational commands, the technical aspects, the benefits and shortcomings of the utilized technologies and collaborative tools are screened against the maritime war fighter's operational requirements.
|
335 |
Applying network theory to develop a dedicated national intelligence networkTindall, James A. 09 1900 (has links)
CHDS State/Local / Adaptive terrorist organizational structure and the lack of intelligence sharing were to blame for terrorist attacks on September 11, 2001. Because terrorist groups are moving toward a less predictable, but more diverse, dynamic, and fluid structure, effective combativeness of terrorism requires fighting terrorists with a network. This network must be capable of collecting and sharing credible, reliable and corroborative information on an unprecedented scale, transcending geographic, agency, and political boundaries. This thesis demonstrates utilization of a network-theory approach for sharing information, which will be argued, can provide insight into the system dynamics of the U.S. IC because it allows a systematic, comparative analysis of the system representation and fundamental problems associated with information sharing. The problems associated with past intelligence failures can be overcome with such a system because the use of a dedicated, nationally networked system will allow completion of three primary tasks: (1) examination of the strength of criminal/terrorist connections, (2) identification of suspects and mapping of networks, and (3) prediction of future behavior and better likelihood of prevention, response, and prosecution. A dedicated national networked intelligence-sharing system called DNIN (Dedicated National Intelligence Network), including geographic areas, regional centers, personnel, computer IT networks, and policy options is discussed. / Scientist, U.S. Department of the Interior
|
336 |
Collaborative network evolution the Los Angeles terrorism early warning groupRust, Sunchlar M. 03 1900 (has links)
This study bridges the narrow divide between collaboration theory and networking and views organizations as a source of collaborative processes. Social network analysis is applied to determine how the Los Angeles Terrorism Early Warning Group (TEW) evolved from a small group of actors to a diverse, county-wide network bridging public-private, local-state-federal, and functional divides. The TEW demonstrates an example of organizational problem solving where a network facilitated collaboration in a wickedly complex and uncertain environment. The network's consensus-based innovation, collaborative processes, and meta-leadership helped the network evolve. These factors strengthened the collaborative ethos of the network and set the stage for success as the network meets current and future challenges. The TEW's bottom-up, consensus-based network expansion contrasts sharply with top-down collaborative approaches, such as the creation of the National Counterterrorism Center and Department of Homeland Security. Lessons from the TEW's well-paced evolution provide insight into how to facilitate collaborative action and build collaborative capacity for the future.
|
337 |
Approximate dynamic programming and aerial refuelingPanos, Dennis C. 06 1900 (has links)
Aerial refueling is an integral part of the United States military's ability to strike targets around the world with an overwhelming and continuous projection of force. However, with an aging fleet of refueling tankers and an indefinite replacement schedule the optimization of tanker usage is vital to national security. Optimizing tanker and receiver refueling operations is a complicated endeavor as it can involve over a thousand of missions during a 24 hour period, as in Operation Iraqi Freedom and Operation Enduring Freedom. Therefore, a planning model which increases receiver mission capability, while reducing demands on tankers, can be used by the military to extend the capabilities of the current tanker fleet. Aerial refueling optimization software, created in CASTLE Laboratory, solves the aerial refueling problem through a multi-period approximation dynamic programming approach. The multi-period approach is built around sequential linear programs, which incorporate value functions, to find the optimal refueling tracks for receivers and tankers. The use of value functions allows for a solution which optimizes over the entire horizon of the planning period. This approach varies greatly from the myopic optimization currently in use by the Air Force and produces superior results. The aerial refueling model produces fast, consistent, robust results which require fewer tankers than current planning methods. The results are flexible enough to incorporate stochastic inputs, such as: varying refueling times and receiver mission loads, while still meeting all receiver refueling requirements. The model's ability to handle real world uncertainties while optimizing better than current methods provides a great leap forward in aerial refueling optimization. The aerial refueling model, created in CASTLE Lab, can extend the capabilities of the current tanker fleet. / Contract number: N00244-99-G-0019 / US Navy (USN) author.
|
338 |
Climate change-related human security threats to border integrity and safeguarding for South AfricaVorster, Magriet 11 July 2014 (has links)
Climate change is a very current and contentious issue that has received a lot of
attention during the past two decades because of its global influence and impact.
Climate change affects the entire globe and the impact is mostly continental and
regional and is not limited along state borders. Whether a person or group believe in
the existence of global warming or not, the scientific evidence leaves no doubt that
the climate is changing (Mazo, 2010: 9). Climate change influence the environment
people live in and have a direct impact on all aspects of their daily lives.
In a globalized world almost all problems cross borders, and environmental issues
have long been recognized as among the most international and the most
transnational of all (Parsons, 2009: 5). Climate change acts as a “threat multiplier” by
exacerbating existing vulnerabilities, and must be analysed in relation to the adaptive
capacity of those affected (individuals, communities and states), taking account of
the wider political, socio-economic and demographic context (ACCES, 2011: 9).
Although climate change has a global impact, the African continent is likely to be
more severely affected than other regions of the globe and it will have a profound
negative impact on all facets of human security.
Long-term shifts in the climate seem likely to catalyse conflict by creating or
exacerbating food, water and energy scarcities, triggering population movements,
and placing larger groups of people in competition for more and more limited
resources. Increased climate variability, including the greater frequency of extreme
weather events, will also complicate access to resources, thereby exacerbating
conditions that are conducive to promoting conflict.
Southern Africa is described as a predominantly semi-arid region with high intra-
seasonal and inter-annual rainfall variability, with extreme events such as droughts
and floods occurring frequently. In Southern Africa, there has been an increase in
inter-annual variability of rainfall over the past 40 years, with more intense and
widespread droughts. Floods and droughts in Southern Africa are gradually
increasing in number and frequency as well and already the entire region is
considered a climate change "hotspot".
As can be seen from the findings of the various chapters, climate change has a very
complex predicted impact on all the dimensions of human security and a few major
key issues in this regard came to light. These issues include urbanisation, migration,
environmental degradation and biodiversity loss, water scarcity, spread of diseases,
slow onset climate change, economic decline and poverty, criminality and conflict.
The most profound issues that will have an impact on South African border integrity
and safeguarding include urbanisation, migration, environmental degradation and
biodiversity loss, water scarcity, spread of diseases, economic decline and poverty,
criminality and conflict. Migration can be singularly highlighted as it has the potential
to amplify and exacerbate all of the abovementioned issues.
States have national security strategies and policies in order to guide policy and
legislation to adequately protect the state from threats and to determine national
security priorities. Border safeguarding is an important aspect of state security and
strategy, policy and legislation, informed by the national security strategy and policy,
constantly have to evolve and adapt to changes in the threat pattern affecting states.
The border safeguarding environment of any state is very complex and faced with
multiple external and international threats. Climate change-related human security
threats will further amplify and complicate these threats as the impact of climate
change becomes more pronounced in the southern African region. In order for South
Africa to successfully address these threats in the border safeguarding environment
it is important that a sound National Security Strategy and Policy provide focus and
priorities for all government departments involved. This is a very complex field with
multiple factors and only the key issues are highlighted and discussed in this paper.
|
339 |
The War on Terror and the Separation of Powers Tug-of-WarBurnep, Gregory January 2016 (has links)
Thesis advisor: Shep Melnick / Most of the literature on the separation of powers in the war on terror vastly overstates the power of the presidency and pays little attention to the respective roles of Congress, the courts, and the bureaucracy in prosecuting that conflict. Scholars – especially those in the legal academy – have consistently failed to appreciate the ways in which the president has been, and continues to be, checked and constrained by a variety of forces. In my dissertation, I engage in highly detailed case studies of U.S. law and policy with respect to detention and military commissions in the war on terror. I pay special attention to the complex interactions that occurred within and between our governing institutions in these policy areas. There are two central arguments that come out of my research and run through my case studies. First, the political scientist Robert Kagan’s work on “adversarial legalism” is no longer simply applicable to the domestic policy realm. The proliferation of legal rules and extensive litigation has increasingly come to characterize foreign affairs as well, with important consequences for how the U.S. implements its national security policies and fights its armed conflicts. In short, adversarial legalism has gone to war. Second, loose talk about the “unitary” nature of the executive branch is misleading. The executive branch is a sprawling bureaucracy made up of diverse actors with different perspectives, preferences, and norms, and that bureaucracy has interacted with Congress and the courts in surprising ways to constrain the presidency in the war on terror. / Thesis (PhD) — Boston College, 2016. / Submitted to: Boston College. Graduate School of Arts and Sciences. / Discipline: Political Science.
|
340 |
Operation Condor : The U.S. involvement - A rational strategy or a political powerplay?Hedman, Amanda January 2019 (has links)
During 1975-1989 a transnational state-terror operation was carried out by several South American states called Operation Condor. Declassified documents show that the U.S. government assisted the operation with communication and intelligence techniques. This case-study is with a theory consuming method aiming to analyze the internal decision process within the U.S. government to assist Condor. The analysis is based on two theoretical frameworks by Allison Graham, the “Rational Actor” and “Governmental Politics”. By studying the cold war doctrine, the objectives of the U.S. and the political actors behind the assessment the aim is to understand the structures that shaped the final decision. The conclusion shows that the Cold War, political crises and power relations between politicians played a major role in the internal decision process.
|
Page generated in 0.0773 seconds