Journal of Strategic Security
[9 followers] Follow
Open Access journal
ISSN (Print) 1944-0464 - ISSN (Online) 1944-0472
Published by Henley-Putnam University [1 journal]
- Critical Thinking for Strategic Intelligence, Second Edition. By Katherine
Hibbs Pherson and Randolph H. Pherson. Thousand Oaks, CA: CQ Press (an
imprint of Sage Publications, Inc.), 2017.
Authors: Christine E. Bender
PubDate: Wed, 08 Mar 2017 10:08:14 PST
- Cyber Insecurity: Navigating The Perils of the Next Information Age.
Edited by Richard M. Harrison and Trey Herr. Lanham, MD: Rowman and
Authors: Jeffrey A. James; Ph.D.
PubDate: Wed, 08 Mar 2017 10:08:06 PST
- How America Lost its Secrets: Edward Snowden, The Man and The Theft. By
Edward Jay Epstein. New York, N.Y.; Alfred A. Knopf, 2017.
Authors: Millard E. Moon, Ed.D; Colonel (ret),
PubDate: Wed, 08 Mar 2017 10:08:01 PST
- Common Thread? The Role of Professional Orientation in U.S. and Non-U.S.
Intelligence Studies Programs
Authors: Jonathan Smith 3496573
Abstract: As the field of intelligence studies continue to expand, knowledge of faculty and programs outside the United States remains limited. Beyond a few studies which consider the larger “Anglosphere’, there remains the question of whether programs in different countries are approaching this academic study from a comparable perspective. Utilizing a survey of individual faculty members, as well as interviews with program leadership, this study finds that there is a shared emphasis on practical application. From faculty background to program objectives, intelligence studies degree programs inside and outside of the United States appear to share this common focus.
PubDate: Tue, 07 Mar 2017 09:42:54 PST
- Functionality of Radicalization: A Case Study of Hizb ut-Tahrir
Authors: Farhaan Wali
Abstract: Moving beyond the concern with causes of radicalization, this article explores the transformative aspect of radicalization within Hizb ut-Tahrir (The Liberation Party). The personal narratives obtained from this ethnographic fieldwork are placed into a frame of reference related to how radicalization occurs within Hizb ut-Tahrir. Gaining insight into this social phenomenon required an ‘ethnographic’ approach, which allowed me to study members of Hizb ut-Tahrir in their natural setting. My access to Hizb ut-Tahrir put me in the unique position of being able to gather the biographical information required to study radicalization. In essence, I sought to acquire, from within the group setting, an understanding of how members become indoctrinated within Hizb ut-Tahrir. As the findings reveal, Hizb ut-Tahrir radicalization is a narrow cognitive process that has distinct behavioural outcomes.
PubDate: Tue, 07 Mar 2017 09:42:48 PST
- From Tactical to Strategic Deception Detection: Application of
Authors: Iain D. Reid et al.
Abstract: Deception detection has ubiquitously focussed upon detecting deceit in the individual, whether in national security, forensic or business-related environments. In contrast an understanding of how to identify deception committed by multiple individuals or groups challenging strategic interests has been neglected. In this article - to enhance understanding of practitioners working across security, intelligence and forensic areas - a process of psychological synthesis is advocated. Psychological synthesis incorporates a multitude of approaches reflecting contextual requirements towards deception detection across verbal/linguistic behavior, non-verbal behavior, online interactions and intelligence analysis approaches. These combined with in-depth understanding of individuals’ cultures, personality and manner of presentation can be understood in challenging environments. Juxtaposed to these factors psychological synthesis considers how intelligence, surveillance and evidence may be used in detecting deception and identifying links between individuals engaging in deception and related activities. An illustration of how such an approach may work is provided through a scenario of a terrorist incident and how a tailored deception detection approach may seek to counter such a threat.
PubDate: Tue, 07 Mar 2017 09:42:44 PST
- Continuity and Change in the Operational Dynamics of the Islamic State
Authors: James L. Regens et al.
Abstract: In this article we estimate the influence of leadership changes on the operational dynamics associated with terrorist attacks conducted by the Islamic State and its predecessors. Because the focus of our research is empirical, the study uses data for 2,131 successful attacks between October 2002 and December 2014 to examine differentials in operational tempo, attack severity, primary tactics employed, and principal targets. The data are aggregated on a monthly basis to estimate the probabilities associated with specific attack sequences in terms of the following primary tactics: (1) firearms, (2) explosives, (3) hostage-taking/kidnapping, and (4) attacks involving combinations of (1), (2), and/or (3). The analysis is placed in a broad historical and strategic context in order to explore two key issues: (1) The effect of leadership change on terrorist group activity and (2) The implications for counterterrorism and counterinsurgency efforts. Our analysis reveals a myriad of conceptual, theoretical, and policy implications.
PubDate: Tue, 07 Mar 2017 09:42:39 PST
- Measuring the Popular Resonance of Daesh’s Propoganda
Authors: William M. Marcellino et al.
Abstract: We describe an innovative approach to social media analysis, combining corpus linguists and statistical methods to measure the resonance of Daesh's propaganda to a sample population (Eqypt). The findings from this research effort demonstrate that: (1) Daesh's messaging is measurable and distinct from other Salafi groups, such as the Egyptian Muslim Brotherhood; (2) while Daesh’s messaging generally do not resonate with Egyptians, its uptake increased in Upper Egypt and the Sinai regions during 2014; and (3) this method can be applied more broadly to measure the spread of violent extremist messaging across regional populations over time.
PubDate: Tue, 07 Mar 2017 09:42:34 PST
- Redefining Hybrid Warfare: Russia’s Non-linear War against the West
Authors: Tad A. Schnaufer II
Abstract: The term hybrid warfare fails to properly describe Russian operations in Ukraine and elsewhere. Russia has undertaken unconventional techniques to build its influence and test the boundaries of a shaken international system. Notably, Russia’s actions in Ukraine display an evolved style of warfare that goes beyond its initial label of hybrid warfare. The term non-linear war (NLW) will be defined in this article to encompass Russia’s actions and allow policymakers the correct framework to discuss and respond to Russia. NLW plays to the advantage of countries like Russia and constitute the future of warfare.
PubDate: Tue, 07 Mar 2017 09:42:29 PST
- China’s Cyber Initiatives Counter International Pressure
Authors: Emilio Iasiello
Abstract: Prior to its historic 2015 “no hack” pact for commercial advantage with the United States, Beijing has been engaged drafting and passing legislation, most with specific cyber components, to enhance its security posture while protecting its economic interests. This approach is in stark contrast to United States efforts that have demonstrated a focus on “acting globally, thinking locally” philosophy wherein most of its cyber efforts have been outwardly facing and are distinct from other security considerations. This paper suggests that by strengthening its domestic front with a legal framework, Beijing is preparing itself to counter any foreign initiative contrary to Beijing’s plans (e.g., cyber norms of behavior, cyber sanctions, etc.) by being able to exert legal measures against foreign interests in country, thereby preserving its cyber sovereignty.
PubDate: Tue, 07 Mar 2017 09:42:23 PST