The transformation of the Syrian Civil War from a bipolar to a tripolar conflict came from incompatible visions of Syria’s future within the Syrian Resistance Coalition.
The Botswana intelligence oversight regime falls short of addressing the conflicting needs of secrecy and democratic imperatives of transparency and accountability.
Despite the epistemological limitations of history, it can provide the field of intelligence with useful ways to expand its knowledge and debunk myths.
Because cyber attacks have been shown to be a widespread problem, cyber security must be taken seriously regardless of the fact that no state has yet officially declared a cyber war.
To enhance a military’s war-fighting capability and to increase the likelihood of success in operations, a network-centric approach to military operations is paramount.
Targeted killing without regard to due process is no more than extra-judicial executions. The international community should put in place a legal framework to govern targeted killing.
Faced with uncertainty, risk, and insecurity, humans face a ‘knowledge problem’ and search for information that will relieve these feelings and will better handle its weak spots and holes.
The War on Terror marked a new security culture of anticipatory surveillance problematic in producing a sense of security that stretches beyond the political realm.
From all of the threats falling under the cyber umbrella, acts carried out to cause terror and loss of life through damage to critical infrastructure present the largest danger.
The case of Wen Ho Lee supports Frederick L. Wettering’s claim that US counter-intelligence is alive, but not well.
Shifts in the threat of crime mean that in the future, cyberspace will be as dangerous as the physical battlefield. Can geospatial technologies de-problematize the ‘cyber’?
A multidisciplinary approach to understanding cyber terrorism is essential to compiling policies capable of responding to today’s problems and to future threats.