scholarly journals New Program Connects Ocean Health and National Security

Eos ◽  
2019 ◽  
Vol 100 ◽  
Author(s):  
Randy Showstack

Sen. Sheldon Whitehouse says the security risk along the U.S.–Mexican border pales compared with the security threat from the decline in ocean health.

Author(s):  
Matthew Kroenig

This chapter analyzes the Russian Federation through the lens of its domestic political system. Russia may pose the greatest near-term national security threat to the United States and its allies, but it has a key vulnerability: its domestic political institutions. Its autocratic system is undermining its international effectiveness. Its economy is smaller than Italy’s. It lacks effective alliances. And its military is overly focused on domestic threats and is ill-equipped for the strategic-technological competitions of the 21st century. It is dangerous and it can disrupt the U.S.-led order. But it will not be in a position to be a true peer competitor to the United States any time soon. So long as it continues to be ruled by President Vladimir Putin, or another similar dictator, Russia will not be able to mount a serious challenge to U.S. global leadership.


JURIST ◽  
2021 ◽  
Vol 1 ◽  
pp. 2-10
Author(s):  
Maria A. Egorova ◽  
◽  
Anna V. Belitskaya ◽  

Rapid digital economy development brings about not only new opportunities, but new risks as well. Absence of any virtual borders, simplicity of transactions between investors from different countries created by digital technologies and the difficulty in the identification of persons entering into such transactions create a national security threat causing the need for the public regulation of the digital environment. This conclusion is especially relevant in respect of cryptocurrency relationships presenting an international alternative to national payment relationships.


Author(s):  
James E. Baker

This article discusses covert action within the context of the U.S. law. The first section describes the main elements of the U.S. legal regime, including the definition of covert action and the “traditional activity” exceptions, the elements of a covert action finding, and the thresholds and requirements for congressional notification. The second section describes some of the significant limitations on the conduct of covert action. The third section discusses the nature of executive branch legal practice in this area of the law. And the last section draws conclusions about the role of national security law within the context of covert action.


Author(s):  
Matthew M. Aid

This article discusses the National Security Agency under the Obama Administration. Upon his inauguration on January 20, 2009, Obama inherited from the Bush administration an intelligence community embroiled in political controversies. Of the sixteen agencies of the intelligence community, the National Security Agency (NSA) faced the greatest scrutiny from the new Obama administration and the Congress. NSA was the largest and the most powerful member of the U.S. intelligence community. Since its formation in 1952, NSA has managed and directed all U.S. government signals intelligence (SIGINT) collection. It is the collector and processor of communications intelligence (COMINT) and the primary processor of foreign instrumentation signals intelligence (FISINT). And since 1958, NSA has been the coordinator of the U.S. government's national electronics intelligence (ELINT) program. It has also the task of overseeing the security of the U.S. government's communications and data processing systems, and since the 1980s, NSA has managed the U.S. government's national operation security (OPSEC) program. In this article, the focus is on the challenges faced by the NSA during the Bush administration; the role played by the NSA during the wars in Afghanistan and Iraq; and the challenges faced by the Obama administration in confronting a series of thorny legal and policy issues relating to NSA's eavesdropping program.


1990 ◽  
Vol 19 (1) ◽  
pp. 5-20
Author(s):  
Larry W. Bowman

Relationships between U.S. government officials and academic specialists working on national security and foreign policy issues with respect to Africa are many and complex. They can be as informal as a phone call or passing conversation or as formalized as a consulting arrangement or research contract. Many contacts exist and there is no doubt that many in both government and the academy value these ties. There have been, however, ongoing controversies about what settings and what topics are appropriate to the government/academic interchange. National security and foreign policy-making in the U.S. is an extremely diffuse process.


2016 ◽  
Vol 33 (2) ◽  
pp. 1-24
Author(s):  
David Belt

Why, in the aftermath of 9/11, did a segment of the U.S. popular security experts, political elite, media, and other institutions classify not just al-Qaeda but Islam itself as a security threat, thereby countering the prevailing professional consensus and White House policy that maintained a distinction between terrorism and Islam?Why did this “politically incorrect” or counternarrative expand and degenerate into a scare over the country’s “Islamization” by its tiny Muslim population? Why is this security myth so convincing that legislators in two dozen states introduced bills to prevent the Shariah’s spread and a Republican presidential front-runner exclaimed:“I believe Shariah is a mortal threat to the survival of freedom in the United States and in the world as we know it”? This analysis offers a framework that conceptualizes popular discourses as highly interested fields of political struggle, deepens the prevailing characterization of this part of the U.S. popular discourse as “Islamophobia,” and analyzes how it has functioned politically at the domestic level. Specifically, it examines how a part of the conservative elite and institutions, political entrepreneurs already involved in the ongoing culture wars, seized upon Islam in the emotion-laden wake of 9/11 as another opportune site to advance their struggle against their domestic political opponents, “the Left,” and the more progressive societal institutions and culture in general.


Sign in / Sign up

Export Citation Format

Share Document