The Journal on Terrorism and Security Analysis SPRING 2015 | 10th EDITION CONTRIBUTORS Lukas Bretzinger Steven Bucci Maura Cremin Katrin Heger Jeff Howell Dorothy Martucci Cameron Reed Emily Schneider Sascha Schuster Ivan Sascha Sheehan Kitty Veress Elizabeth Weingarten Journal on Terrorism and Security Analysis 10th Edition (Spring 2015) Syracuse University Syracuse, NY 13244 Editorial Staff Editor-in-Chief Associate Editors Ben Kopp Darienn Powers Chris Moritt Brittani Howell Managing Editors Aleksander Fersuson Ronald Lee Steven Nelson Zachery Lucus Jason Stanley Christopher Folk Matt Crouch Charlie Mansour Charles Midkiff Luke Marzaloes Assistant Editors Klaxon C Wilson Paige Donegan Shannon Kane Christopher Kim Jesse Campion Jansher Rasa Kyle Lundin Caleb Merrill Drew Pappert Clark Fonda Dan Haverty Kory Crichton Cody Carbone Harlan Weir Blake Vierra Tony Iozzo Dinesh Sharma Christopher Conrad Casey Kooring Contents .............................................................................1 Dr. Steven Bucci & Maura Cremin DARK CYBER: Some Downsides of Technologies ....................................................13 JeffPiracy Howell, Averted: Jr. Esq. A Defense of Private Maritime Security Companies as a Critical Part of Breaking the Piracy Cycle in the Gulf of Aden ................................................................................................... Dr.Balancing Ivan Sascha Ends, Sheehan Ways, and Means: The Case for Reviving Support for “Regime Change from Within” in Iran 27 ....................................................................................... Dorothy Martucci, Esq. The Treason Imperative: Terror as Treason 37 .................................... Katrin Heger Is Boko Haram Likely to Move Towards More Effective Governance? 52 and Urban Spaces........................................................................................................................................... LukasOut of Bretzinger,the Mountains? Cameron A Quantitative Reed, & Sascha Approach Schuster to Political Violence 67 ............................................................................................................... EmilyBeyond Schneider the Jihadi & Bride:Elizabeth Our Weingarten Distorted Understanding of Women’s Motivations to Join Extremist Organizations 79 ............................................................................... KittyEuropean Veress Jihadi-Tourism: A Review on European Foreign Fighters and Europe’s Counterterrorism Responses in 2014 85 ..................................................................................................................................................... Contributors 93 Message from the Editor-in-Chief The Journal on Terrorism and Security Analysis (JTSA), now in its 10th edition, is a student run publication administered by a joint team of dedicated students from both the Syracuse University College of Law and the Maxwell School of Citizenship and Public Affairs. We strive to publish quality papers from national security experts and practitioners as well as from students with a strong interest in the field. The Student Association on Terrorism and Security Analysis (SATSA) is a student-run program dedicated to a high level of academic scholarship and research by not only producing this journal but also with our conference held in the spring each year. I believe this edition represents the true diversity that comprises the field of national security and terrorism related studies. We were fortunate enough to receive papers from current Masters students as well as from past College of Law graduates. In addition to these former students, we were able to receive submissions from some very established experts in the field. In keeping with this editions theme of diversity I think you will find that the subject matter covers a lot of varying material. To the public the field of national security ebbs and flows with whatever the hot issue is presented in the media, one day it could be Somali piracy and when that falls out of popularity then conversation moves on to topics like cyber security. I think this edition represents that all issues that concern our public safety are relevant conversation at any time. The world is a small place and security issues truly do represent a global threat with new problems emerging every day. It is our hope to try and bring academic scholarship and awareness to as many issues as we can. The JTSA staff would like to thank the faculty and staff of the Institute for National Security and Counterterrorism (INSCT) without whom this journal would not be possible. Their continued financial and inspirational support is what allows us to do this. I would like to especially thank Martin Walls whom I have come to know as an invaluable resource. Additionally, we would like to thank Melanie Anne Stopyra, the Director of the Syracuse Office of Publications and their staff, who was willing to work with tight deadlines and an inexperienced Editor-in-Chief. I would also like to note that the front cover image “World Icon” by Juan Pablo Bravo was made available courtesy of The Noun Project. Again I cannot thank INSCT, the JTSA Staff and SATSA enough. I can only hope that the reader enjoys our journal as much as we have enjoyed being a part of its production. Sincerely, Chris Moritt Editor-in-Chief DARK CYBER: Some Downsides of Technologies Dr. Steven Bucci & Maura Cremin Introduction In the last half century, the human experience has changed at a more rapid pace than at any time in history. This is the result of many factors, but one stands out above all the rest: the rise of the Internet. With the development and explosive growth of the Web, the entire nature of human interaction has changed. Never before have people been as closely connected as they now are. At any given moment, it is completely feasible that business owners in London are speaking to clients in Seoul, that residents of Chicago are sending emails to relatives in Florence, that professors at a university in Texas are sending assignments to students studying in Peru. I live in Washington, D.C., teach for Long Island University, with students serving in combat in Afghanistan. These sorts of exchanges are instantaneous, and they bring our world closer together than it has been at any point. Certainly, there is a vast array of benefits that come from this sort of technology. The ease and speed with which individuals can communicate across great distances is perhaps one of the most obvious. Additionally, the increased ability of individuals to access information has increased public knowledge, and has contributed, in many instances, to keeping governments, businesses, and non-profits responsible for their actions. Cyber technologies have improved the efficiency of businesses, thereby, lowering costs and prices for consumers while providing more private sector jobs. A huge number of our technological advancements, from transportation to energy to communication involve, and have been improved in some way by, the influence of cyber technology. The gains that society has received from this sector are really almost impossible to quantify. But cyber technology has a dark side. This cannot be ignored. In spite of all of the benefits that have come with it, huge risks have accompanied them. With the incredible ease of access to information that the Internet provides, it also diminishes secrecy, both for individuals and for governments which may have very good reason for keeping information classified. It is also becoming increasingly centralized, while at the same time allowing for increasing user anonymity, which could potentially have a very stultifying effect on democracy and accountability. Perhaps most dangerous is the fact that the almost universal reliance of the planet’s humanity on cyber technology has rendered us all vulnerable to any failure of the system. These vulnerabilities are very real, and they represent huge considerations. However, they are not a reason for a Luddite call to turn away from cyber. Cyber technologies are an important part of modern societies, and the benefits that they provide are even greater than the risks they entail. Nevertheless, Americans must be aware of the dangers of cyber, and be prepared to take measures, both privately and publicly, to protect against any damaging failure of our cyber infrastructure. Vigilance, not regression, must bePrivacy: the rallying An Archaic cry of those Concept? concerned for the future of cyber security. One of the most significant potential dangers of cyber technology is the risk that it poses to individual privacy. Many tools that are1 commonly used by businesses as well as government have the potential, if used improperly, to lead to severe infringements on individual privacy. However, all of these technologies also serve valuable needs of both the private and public sector. Therefore, they cannot and should not be eliminated. So that the public can be vigilant against possible abuse of these tools, their potential weaknesses must nevertheless be recognized. The national debate spurred by the NSA/ SnowdenData Mining revelations was stark evidence that we still need to work on this area. 1 One of the foremost tools that has the potential to be manipulated in a manner harmful to public interest is data mining . Sometimes known as knowledge discovery, data mining occurs when computer technology is used to2 shift through enormous quantities of data in order to extract meaning from that data. This
Details
-
File Typepdf
-
Upload Time-
-
Content LanguagesEnglish
-
Upload UserAnonymous/Not logged-in
-
File Pages100 Page
-
File Size-