<?xml version="1.0" ?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>'National Security' - Tagged Articles - Inquiries Journal</title>
    <link>http://www.inquiriesjournal.com/keyword/national-security</link>
    <description>Inquiries Journal provides undergraduate and graduate students around the world a platform for the wide dissemination of academic work over a range of core disciplines.</description>
    <language>en-us</language>
    <pubDate>Tue, 05 May 2026 15:17:02 -0400</pubDate>
    <lastBuildDate>Tue, 05 May 2026 15:17:02 -0400</lastBuildDate>
	
			<item>
				<title>Securitization, Framing, and the Threat of Right-Wing Militias Under Donald Trump</title>
				<link>http://www.inquiriesjournal.com/articles/1913/securitization-framing-and-the-threat-of-right-wing-militias-under-donald-trump</link>
				<description>By Mia  Wolosky - This paper assesses the political preferences and ideologies of the Trump administration and how they influenced framing issues in a way that has underestimated the threats of right-wing militia groups in the United States. President Trump and officials within his administration used rhetoric to place emphasis on the security concerns associated with immigration and far left-wing groups, while failing to condemn violence coming from the right. This paper analyzes how framing, and the securitization of certain issues, downplayed and encouraged the persistent threat of far right-wing domestic terrorists...</description>
				<pubDate>Tue, 05 Oct 2021 10:23 EDT</pubDate>
				<guid>http://www.inquiriesjournal.com/articles/1913/securitization-framing-and-the-threat-of-right-wing-militias-under-donald-trump</guid>
			</item>
			<item>
				<title>Climate Change as a Security Issue in the Indo-Pacific Region: Borders, Environmental Phenomena and Preexisting Vulnerabilities</title>
				<link>http://www.inquiriesjournal.com/articles/1759/climate-change-as-a-security-issue-in-the-indo-pacific-region-borders-environmental-phenomena-and-preexisting-vulnerabilities</link>
				<description>By Billie R. Trinder - In recent years, climate change has been increasingly framed as a security issue, with some theorists going so far as to call it the most important security issue of the 21st century. This paper will examine the relationship between climate change and human security through the lens of environmental possibilism (Sprout, 1965), recognizing related environmental phenomena as risk intensifiers. It is recognized that climate change acts as a risk multiplier to violent conflict rather than a direct cause, where the vulnerability and ability or inability of populations to adapt to environmental change...</description>
				<pubDate>Fri, 15 Feb 2019 09:38 EST</pubDate>
				<guid>http://www.inquiriesjournal.com/articles/1759/climate-change-as-a-security-issue-in-the-indo-pacific-region-borders-environmental-phenomena-and-preexisting-vulnerabilities</guid>
			</item>
			<item>
				<title>The Political Rationality of Terror: Understanding Terrorism as the Result of Organizational Goal-Seeking</title>
				<link>http://www.inquiriesjournal.com/articles/1500/the-political-rationality-of-terror-understanding-terrorism-as-the-result-of-organizational-goal-seeking</link>
				<description>By Guy  Lowicz - In the early 1990s, two terrorist organizations, Hamas and the Fatah-led Palestinian Liberation Organization (PLO), were using terrorism to promote their political plight of Palestinian self-determination. Although both organizations vowed to use armed struggles to promote the Palestinian plight, Fatah chose to desert violence in favor of legitimate political channels. In the beginning, terrorism proved to be effective for both groups in mobilizing popular support, legitimizing their cause, and raising capital. After years of armed tactics that proved fruitful, Yassir Arafat, Fatah&amp;rsquo;s leader...</description>
				<pubDate>Mon, 28 Nov 2016 12:50 EST</pubDate>
				<guid>http://www.inquiriesjournal.com/articles/1500/the-political-rationality-of-terror-understanding-terrorism-as-the-result-of-organizational-goal-seeking</guid>
			</item>
			<item>
				<title>Consequences of Iraqi De-Baathification</title>
				<link>http://www.inquiriesjournal.com/articles/1415/consequences-of-iraqi-de-baathification</link>
				<description>By Cherish M. Zinn - Ambassador Paul Bremer of the Coalition Provisional Authority, America&#39;s interim government between Saddam&#39;s fall and the independent establishment of a new Iraqi government, issued two specific orders during his term which combined to create a power vacuum in the weakened nation. The first order, or the De-Baathification order, eliminated the top four tiers of Saddam&#39;s Baath party from current and future positions of civil service. The second disbanded the Iraqi military. Both orders worked to eliminate the institutional memory of all Iraqi institutions, requiring Bremer to establish the nation...</description>
				<pubDate>Mon, 23 May 2016 12:00 EDT</pubDate>
				<guid>http://www.inquiriesjournal.com/articles/1415/consequences-of-iraqi-de-baathification</guid>
			</item>
			<item>
				<title>Hearts and Minds: A Comparison of Counter-Radicalization Strategies in Britain and the United States</title>
				<link>http://www.inquiriesjournal.com/articles/1413/hearts-and-minds-a-comparison-of-counter-radicalization-strategies-in-britain-and-the-united-states</link>
				<description>By Adrienne  Ou - Bataclan. San Bernadino. One need not read any further to understand how radicalization is crucial to counterterrorism and national security. Some states have implemented counter-radicalization strategies to cull terrorism at its root. These tactics fall within two broad groups: the North American method, which emphasizes behavioral radicalization, and the European method, which stresses cognitive radicalization. This paper compares the two methods by examining counter-radicalization strategies in the United States and in the United Kingdom. Case studies explain the social ramifications and the...</description>
				<pubDate>Mon, 23 May 2016 12:00 EDT</pubDate>
				<guid>http://www.inquiriesjournal.com/articles/1413/hearts-and-minds-a-comparison-of-counter-radicalization-strategies-in-britain-and-the-united-states</guid>
			</item>
			<item>
				<title>Crossed Wires: International Cooperation on Cyber Security</title>
				<link>http://www.inquiriesjournal.com/articles/1341/crossed-wires-international-cooperation-on-cyber-security</link>
				<description>By Madeline  Carr - Although cyber security is quite clearly a &amp;lsquo;post-state&#39; problem, it has actually proven very difficult to move beyond a Westphalian conception of either the problem or the possible solutions. This leads to a central paradox about cyber security as we currently conceive it: on the one hand, it appears to be a problem that cannot be dealt with effectively by state instruments like the military or law enforcement but despite that, there remains a strong expectation that the state retains responsibility for providing security in this realm. This paradox has led to an emphasis in cyber security...</description>
				<pubDate>Sun, 31 Jan 2016 12:00 EST</pubDate>
				<guid>http://www.inquiriesjournal.com/articles/1341/crossed-wires-international-cooperation-on-cyber-security</guid>
			</item>
			<item>
				<title>Book Review: &quot;Cyber War Will Not Take Place&quot;</title>
				<link>http://www.inquiriesjournal.com/articles/1342/book-review-cyber-war-will-not-take-place</link>
				<description>By Justine  Chauvin - In Cyber War Will Not Take Place1, Thomas Rid develops his argument on the concept of &quot;cyberwar&quot;, previously formulated in an article of the same name2 published in January 2012. His chief point is that &quot;cyber war has never happened in the past, it does not occur in the present, and it is unlikely that it will disturb our future&quot;;3 ergo the use of this concept to describe cyberoffenses is misleading.4 He has also written several articles related to cyberwar5, cyberweapons6 and cyberpeace,7 in which he argues against the militarization of the debate about cyberattacks,8 and in particular the confusing...</description>
				<pubDate>Sun, 31 Jan 2016 12:00 EST</pubDate>
				<guid>http://www.inquiriesjournal.com/articles/1342/book-review-cyber-war-will-not-take-place</guid>
			</item>
			<item>
				<title>The Internet as a Slippery Object of State Security: The Problem of Physical Border Insensitivity, Anonymity and Global Interconnectedness</title>
				<link>http://www.inquiriesjournal.com/articles/1344/the-internet-as-a-slippery-object-of-state-security-the-problem-of-physical-border-insensitivity-anonymity-and-global-interconnectedness</link>
				<description>By Memphis  Krickeberg - Cybersecurity is presented in the growing literature on the subject as an essentially &quot;slippery&quot; object for state security.1 The Internet puts a lot of stress on the conventional conception of state security as the insurance of the state&#39;s survival in the international realm. In addition, cybersecurity supposedly leads to a reconfiguration of state security which must be apprehended through new paradigms. In this article we establish a typology of the main arguments found in cybersecurity discourses that emphasize fundamental differences between cybersecurity and more conventional factors of state...</description>
				<pubDate>Sun, 31 Jan 2016 12:00 EST</pubDate>
				<guid>http://www.inquiriesjournal.com/articles/1344/the-internet-as-a-slippery-object-of-state-security-the-problem-of-physical-border-insensitivity-anonymity-and-global-interconnectedness</guid>
			</item>
			<item>
				<title>An Analysis on the Regulation of Grey Market Cyber Materials</title>
				<link>http://www.inquiriesjournal.com/articles/1193/an-analysis-on-the-regulation-of-grey-market-cyber-materials</link>
				<description>By Kelsey  Annu-Essuman - The creation of the computer network system and its spread throughout the international realm has opened doors for new ways of gathering information as well as manipulating this information for both protective and malicious purposes. While the material stored within computer systems is often thought of as being privy to the user of that system and whomever the user decides to share their data with, the rise in cyberattacks has proven otherwise. Cyber &quot;crime&quot; or &quot;attacks&quot;─the exploitation of Internet and, more generally, computer vulnerabilities in order to access and use private information ─...</description>
				<pubDate>Sat, 01 Nov 2014 12:00 EDT</pubDate>
				<guid>http://www.inquiriesjournal.com/articles/1193/an-analysis-on-the-regulation-of-grey-market-cyber-materials</guid>
			</item>
			<item>
				<title>U.S. Policy Toward Africa: Application of U.S. Africa Command Signals Africa&#39;s Increasing Strategic Importance</title>
				<link>http://www.inquiriesjournal.com/articles/1192/us-policy-toward-africa-application-of-us-africa-command-signals-africas-increasing-strategic-importance</link>
				<description>By James  DeTemple - The U.S. has a responsibility to defend its security interests globally and be ready respond to emerging crises anywhere in the world at a moment&#39;s notice. The global U.S. military command and control structure divides the world into various geographic regions for the employment of U.S. military forces in support of the U.S. national security strategy. It is an international reality that reflects U.S. regional policies, including U.S. policy toward Africa. The relatively new USAFRICOM is one of six U.S. Department of Defense geographic commands &amp;ndash; the U.S. Africa Command (Africa), U.S. Central...</description>
				<pubDate>Sat, 01 Nov 2014 12:00 EDT</pubDate>
				<guid>http://www.inquiriesjournal.com/articles/1192/us-policy-toward-africa-application-of-us-africa-command-signals-africas-increasing-strategic-importance</guid>
			</item>
			<item>
				<title>The Case of Edward Snowden: A Different Path</title>
				<link>http://www.inquiriesjournal.com/articles/1196/the-case-of-edward-snowden-a-different-path</link>
				<description>By Jessica  Blusiewicz - Unsurprisingly, the vast majority of respondents who believe Snowden harmed US security interests also believe he should be punished; however, public opinion on the whole has been divided along an almost even split as to whether Snowden should face such prosecution.4 Despite this split, the fact remains that he leaked classified information by circumventing the protected whistleblowing structure within the Intelligence Community (IC). Well aware of his contractual obligations, Snowden still decided to disclose evidence, in an unauthorized and very public way, indicting the NSA for overstepping...</description>
				<pubDate>Sat, 01 Nov 2014 12:00 EDT</pubDate>
				<guid>http://www.inquiriesjournal.com/articles/1196/the-case-of-edward-snowden-a-different-path</guid>
			</item>
			<item>
				<title>Defending the Cyber Realm</title>
				<link>http://www.inquiriesjournal.com/articles/1082/defending-the-cyber-realm</link>
				<description>By Alex  Middleton - There is a widespread belief that as societies and governments become increasingly reliant upon information technology, they in turn are becoming more vulnerable to a whole range of cyber-threats.1 Whether these dangers are capable of generating enough damage to warrant a redistribution of government resources is the question at the heart of this essay. This paper provides an evaluation of the cyber-threat arguing that it deserves recognition as a top-tier priority given that it poses some significant challenges to both national security and economic prosperity. Whilst cyber -crime falls under...</description>
				<pubDate>Wed, 01 Jan 2014 07:58 EST</pubDate>
				<guid>http://www.inquiriesjournal.com/articles/1082/defending-the-cyber-realm</guid>
			</item>
			<item>
				<title>Denuclearization: A Models-Based Approach</title>
				<link>http://www.inquiriesjournal.com/articles/1599/denuclearization-a-models-based-approach</link>
				<description>By Conor  Hughes - With nuclear proliferation a major threat to international security, this study examines the factors that led three countries to denuclearize by applying Scott Sagan&#39;s three models: security, domestic politics, and norms. Rather than only observing security issues, which is the most common practice, this study also analyzes the importance of the other two models in denuclearization. The domestic politics model takes account of changes in leadership and state policies when denuclearization occurred. The norms model considers the prestige nuclear weapons bring and their role for the country, as...</description>
				<pubDate>Tue, 31 Dec 2013 12:00 EST</pubDate>
				<guid>http://www.inquiriesjournal.com/articles/1599/denuclearization-a-models-based-approach</guid>
			</item>
			<item>
				<title>Somali Piracy: Causes and Consequences</title>
				<link>http://www.inquiriesjournal.com/articles/579/somali-piracy-causes-and-consequences</link>
				<description>By Miles G. Kellerman - These accusations are actually quite legitimate. The United Nations estimates that illegal fishing companies from Europe and Asia rob Somali coastlines of over $300 million a year, mostly in the pursuit of yellow tuna.[17] In addition, a 2005 UN Environmental Report highlighted a long history of illegal dumping off the coast of Somalia, most notably from &amp;ldquo;&#39;Ndrangheta&amp;rdquo;, an Italian criminal organization.[18] According to the report, it costs European companies $2.50 to dispose of one ton of waste off the horn of Africa, as opposed to $250 a ton to dispose of such material cleanly in...</description>
				<pubDate>Fri, 30 Sep 2011 09:58 EDT</pubDate>
				<guid>http://www.inquiriesjournal.com/articles/579/somali-piracy-causes-and-consequences</guid>
			</item>
			<item>
				<title>Somali Refugees in Kenya: Security Deficiencies and Public Health Concerns as a Result of Ineffective Policy</title>
				<link>http://www.inquiriesjournal.com/articles/563/somali-refugees-in-kenya-security-deficiencies-and-public-health-concerns-as-a-result-of-ineffective-policy</link>
				<description>By Samuel L. Aronson - Somalia is home to roughly 9 million people, the overwhelming majority of whom are ethnic Somalis (UN Statistics Division 2010). The country has been plagued with conflict and disorder beginning just years after it attained independence. Following the overthrow of President Siad Barre in 1991 and the chaos that subsequently ensued, Somalis migrated rapidly from inside the boundaries of Somalia and settled in various nearby locations within East Africa. The largest recipient of Somali refugees in Africa is Kenya, with an influx of thousands more every month for roughly the last twenty years. Officially...</description>
				<pubDate>Tue, 23 Aug 2011 08:05 EDT</pubDate>
				<guid>http://www.inquiriesjournal.com/articles/563/somali-refugees-in-kenya-security-deficiencies-and-public-health-concerns-as-a-result-of-ineffective-policy</guid>
			</item>
			<item>
				<title>Ungoverned Space, Fragile States, and Global Threats: Deconstructing Linkages</title>
				<link>http://www.inquiriesjournal.com/articles/413/ungoverned-space-fragile-states-and-global-threats-deconstructing-linkages</link>
				<description>By Chloe A. Diggins - It is widely recognized that state security is no longer contingent upon a balance of power or the threat of conquering states, but global stability is now instead jeopardized by weak or fragile states. Fragile states represent chaos, disorder, and underdevelopment, and their very existence threatens not only the security of the developed world, but the capitalist, consumer-driven lifestyle to which the Western world is accustomed. Of critical concern are the global circulatory flows affiliated with poverty, conflict, and migration, which carry the potential to destabilize and undermine Western...</description>
				<pubDate>Mon, 21 Mar 2011 10:05 EDT</pubDate>
				<guid>http://www.inquiriesjournal.com/articles/413/ungoverned-space-fragile-states-and-global-threats-deconstructing-linkages</guid>
			</item>
			<item>
				<title>The Public Sphere&#39;s Private Intelligence</title>
				<link>http://www.inquiriesjournal.com/articles/1254/the-public-spheres-private-intelligence</link>
				<description>By Peter  Gruskin - With attacks abounding in the various theatres of war abroad and even domestically, the U.S. government needed a backup security force as well as support for high-technology products that only the private sector could provide. Many private citizens, some of whom had left the intelligence community years before, were already &amp;ldquo;cleared,&amp;rdquo; and the political incentives were already in place to increase funding for non-governmental assistance to classified work. It was an opportunity to broaden the abilities of various agencies&amp;mdash;technical and human in their needs&amp;mdash;to make American...</description>
				<pubDate>Mon, 01 Nov 2010 12:00 EDT</pubDate>
				<guid>http://www.inquiriesjournal.com/articles/1254/the-public-spheres-private-intelligence</guid>
			</item>
			<item>
				<title>The Millenium Challenge Account: Foreign Aid and International Development Programs of the Bush Administration</title>
				<link>http://www.inquiriesjournal.com/articles/273/the-millenium-challenge-account-foreign-aid-and-international-development-programs-of-the-bush-administration</link>
				<description>By Ashley R. Notini - The United States presidency is a complex role, encompassing both domestic and foreign policy responsibilities. As a major world power, the United States has a large role in the realm of foreign policy, and it is the duty of the president to assume the role of an international figurehead. Aside from being one of the most politically powerful nations, the United States enjoys its status as one of the wealthiest nations in the international system. However, immense political power and wealth have resulted in the need for the United States to devote a significant amount of its resources toward the...</description>
				<pubDate>Tue, 27 Jul 2010 04:13 EDT</pubDate>
				<guid>http://www.inquiriesjournal.com/articles/273/the-millenium-challenge-account-foreign-aid-and-international-development-programs-of-the-bush-administration</guid>
			</item>
			<item>
				<title>Torturing America: Securing the American Interest</title>
				<link>http://www.inquiriesjournal.com/articles/1262/torturing-america-securing-the-american-interest</link>
				<description>By Zain  Pasha - Even before his inauguration, President Barack Obama made it clear that he believed torture was morally reprehensible and promised that under his administration the U.S. would no longer practice torture.1 Accordingly, on April 16th, 2009 Mr. Obama and the U.S. Department of Justice authorized the release of C.I.A memos detailing the methods of torture that were authorized under the George W. Bush administration.2 The release of the C.I.A. memos elicited an almost immediate reaction from former Vice President Richard Bruce Cheney, who in an interview with Fox News on April 21st, 2009 criticized...</description>
				<pubDate>Thu, 15 Apr 2010 12:00 EDT</pubDate>
				<guid>http://www.inquiriesjournal.com/articles/1262/torturing-america-securing-the-american-interest</guid>
			</item>
			<item>
				<title>Fixing International Security: Reforming the Security Council</title>
				<link>http://www.inquiriesjournal.com/articles/1283/fixing-international-security-reforming-the-security-council</link>
				<description>By Andrew  Kao - The United Nations Security Council is the most important organ in the United Nations, charged with determining &amp;ldquo;the existence of any threat to peace, breach of peace, or act of aggression&amp;rdquo; and to &amp;ldquo;maintain or restore international security&amp;rdquo; with military force if necessary. 1 The first attempts at reforming the Security Council was made on December 17, 1963, where the United Nations General Assembly voted to amend Article 23 of the UN charter, increasing the non-permanent members of the Security Council. 2 More recently, the former-Secretary General Kofi Annan&amp;rsquo;s &amp;...</description>
				<pubDate>Tue, 15 Apr 2008 12:00 EDT</pubDate>
				<guid>http://www.inquiriesjournal.com/articles/1283/fixing-international-security-reforming-the-security-council</guid>
			</item>
			<item>
				<title>Securing the Skies: Threats to Civil Aviation From International Terrorism</title>
				<link>http://www.inquiriesjournal.com/articles/1163/securing-the-skies-threats-to-civil-aviation-from-international-terrorism</link>
				<description>By Paul  Williams - Threats to international security may assume many guises all of which  deserve thorough analysis. Indeed, as we approach the new millennium,  there are a multitude of &amp;lsquo;morbid symptoms&amp;rsquo; which threaten to thwart any  attempts at achieving global security; these include international  terrorism. Yet despite the obvious hurdles that threats and  vulnerabilities present there is, at present, a more fundamental problem  which precludes the fulfilment of international security; namely, there  is no consensus as to what it is that we seek or how it is to be  attained. Like Jason aboard the...</description>
				<pubDate>Wed, 01 Jan 1997 12:00 EST</pubDate>
				<guid>http://www.inquiriesjournal.com/articles/1163/securing-the-skies-threats-to-civil-aviation-from-international-terrorism</guid>
			</item>
			<item>
				<title>Nuclear Weapons Proliferation and the Efficacy of Deterrence</title>
				<link>http://www.inquiriesjournal.com/articles/1164/nuclear-weapons-proliferation-and-the-efficacy-of-deterrence</link>
				<description>By Luke  Wilcock - Nuclear weapons were first used in anger during the Second World War  against the Japanese. The Horishima and Nagasaki experience left nobody  in any doubt that nuclear weapons were unique. Never before had so much  destruction been meted out so suddenly by just two bombs. By the  mid-1960s the number of countries openly possessing nuclear weapons had  risen to five. The United States had been the first, closely followed by  the Soviet Union, Britain, France, and China. The 1968 Nuclear  Non-Proliferation Treaty set out to prevent the further spread of  nuclear weapons by making it illegal for...</description>
				<pubDate>Wed, 01 Jan 1997 12:00 EST</pubDate>
				<guid>http://www.inquiriesjournal.com/articles/1164/nuclear-weapons-proliferation-and-the-efficacy-of-deterrence</guid>
			</item>
	</channel>
</rss>
