Spis treści
Strony
Pobierz
|
|||||
|
|||||
INFORMACJE O AUTORACH Katarzyna Maniszewska Collegium Civitas, Warszawa, Polska Renee Stillings Study, Research, and Custom Programs Abroad (SRAS), USA Paulina Piasecka Collegium Civitas, Warszawa, Polska |
|||||
Andrew Holub
An Introduction to Human Evolved Psychology and Political Violence: Implications for Future Directions in Research and Practice
7 – 26
|
|||||
Słowa kluczowe evolutionary psychology |Human group dynamics |political violence |Future of scientific theoryStreszczenie Although media headlines may create the appearance that political violence is a new and burgeoning phenomenon in societies, its antecedents are entirely and undeniably at least as old as the human species. The study of human evolution can offer important insights into describing, explaining, predicting, and controlling political violence. Applying evolutionary theory has become, and will remain, and important cornerstone of the study of violence, including political violence. Doing so mandates a thorough understanding of the mechanisms of natural and sexual selection, and how these forces have designed minds with adaptations to solve problems presented by group living. The following is intended to be a brief introduction for students and scientists unfamiliar with the study of the evolved human mind, using human social violence as the model of illustration. In conclusion, recommendations for further developing scientific research into a metatheory to explain human (violent) behaviour is presented as a lofty, but increasingly tangible (through technological advances) endeavour for future researchers that will enable more effective social policies. INFORMACJE O AUTORZE
Oakland University in Rochester, USA
|
|||||
|
|||||
Słowa kluczowe Philippines |Drug war |Duterte |Abu SayyafStreszczenie President Rodrigo Duterte of the Philippines has enacted numerous extreme policies targeting drug dealers and users in the Philippines. Since his election there has also been an increase in Islamic terror activity. This paper seeks to explore whether these policies had an impact on the rise in terrorism in the country. INFORMACJE O AUTORZE
California State University, Fresno, USA
|
|||||
Mara Royse
Cultivating Children for War: A Case Study Comparing US Military Recruitment Strategies and Islamic State Radicalization Tactics
40 – 66
|
|||||
Słowa kluczowe Children |Radicalization |Recruitment |United States military |Islamic State |militarization |Targeting Youth |Socialization of Violence |Martyrdom |Glorification of WarStreszczenie This paper analyses the nuances of opposing systems of government and how they build societies around a militarized culture to attract children to their ranks. This will include a case study of the strategies implemented by the United States’ Military to maintain an all-volunteer force by encouraging enlistment and targeting youth with heavy advertisement and enticing benefits; and an additional case study comparing the U.S. Military strategies to the sophisticated and forceful tactics of the Islamic State caliphate to conscript all members of society into their ideology and world of perpetual violence. Extreme differences are noted that come naturally when comparing a democratic republic to a violent authoritarian extremist organization, but there are also significant similarities, as the United States acts as a sovereign state and the Islamic State seeks to become its own sovereign entity. This paper focuses on the recruitment of children as child soldiers, terrorists, and martyrs, who continue to be used in conflicts around the world, even where international humanitarian law is widely recognized and made legitimate on a global scale. Consequences of recruiting children will be recorded, and broader suggestions pulled from various think takes and international organizations will be woven into the conclusive remarks. INFORMACJE O AUTORZE
University of Texas at Austin, USA
|
|||||
Kayla Ritchie
The Politics of Security: How Social Constructions are utilized in the Securitization of Migration
67 – 81
|
|||||
Słowa kluczowe US Immigration policy |Social constructionism |securitization |Unauthorized immigrantsStreszczenie This work explores the relationship between social constructions and the securitization process. The theoretical basis of securitization should be married to the concept of social constructions when exploring the securitizing actor addressal of contact between a target group and a referent object. To illustrate this, this paper discusses the connection between US immigration policies and negative perceptions of unauthorized immigrants in the US. This leads to an analysis of why the phenomena of migration is treated as a major threat to domestic safety. The work demonstrates how and why importance is placed on securitization of a specific targeted group, unauthorized immigrants in the US, and the lengths taken to maintain their marginalization in society. This paper argues that negative conceptions of the worthiness and deservedness of unauthorized immigrants must be instilled and widely accepted to maintain and expand the power of the homeland defense infrastructure. INFORMACJE O AUTORZE
University of Tennessee at Chattanooga, USA
|
|||||
|
|||||
Słowa kluczowe terrorism |Foreign terrorist fighters |FTF |hybrid warfareStreszczenie This paper examines the history of foreign fighters in the Soviet Afghan War, Bosnia, and both Chechen conflicts. It then looks at the lasting impact of foreign fighters who fought in those regions. The paper concludes with a discussion on the future implications for Europe whose citizens have fought as foreign fighters in Iraq and Syria and who now may possibly decide to return home as the wars subside and whether it is possible to draw out any lessons learned from previous experiences from the Soviet Afghan, Bosnian, and both Chechnian Wars. INFORMACJE O AUTORZE
University of Texas at El Paso, USA
|
|||||
Meghan Lovett
The Growing Threat of the Alt-Right: Who Are They, How They Recruit, and How to Prevent Further Growth
94 – 111
|
|||||
Słowa kluczowe Extremism |Alt-Right |Neo-Nazi |terrorismStreszczenie This paper attempts to analyze the new international threat of the Alt-Right. It describes the difficulties surrounding defining the Alt-Right, the spread of ideology to European countries, the rhetoric and recruitment methods used by the Alt-Right and provides potential solutions to prevent recruitment in the future. This paper attempts to define the Alt-Right and provide clarity about what it entails within the ideology. It also describes the current problems associated with the lack of a formal definition. The paper then analyzes the spread of the ideology in Europe and describes the differences and similarities between the ideologies within the U.S. and Europe. Additionally, the paper provides insight into the recruitment methods, targets, and rhetoric of the Alt-Right as well gives possible strategies to help deter young people from being recruited. INFORMACJE O AUTORZE
University of Texas at Austin, USA
|
|||||
Alex Thompson
Democracy and Social Stability in the Age of Post-Truth, Fake News, and Social Media
112 – 123
|
|||||
Słowa kluczowe Post-truth |fake news |social media |misinformation |Disinformation |Filter bubbleStreszczenie The following research paper intends to highlight how Democracy and social stability are being affected by the changing factors in our political and technological discourse. The research includes the usage of post-truth, fake news, and misinformation and disinformation in political discourse as well as recent examples that have brought these actions into the public spotlight. The paper will also look at methods that the aggressors are using to spread their message such as troll factories, propaganda, and social media. Lastly, the paper will look at different cases of attacks on Democracy and destabilization of social stability in those countries. These cases include the terrorist attacks on Sri Lanka and their response to control public violence and panic, the 2018 US Intelligence Community response and proposals to stop meddling in US elections such as the midterm election, and proposals on how private sector companies that are in charge of social media platforms need to take measures to delete fake news and deweaponize their platform for terrorists. INFORMACJE O AUTORZE
Miami University, USA
|
|||||
|
|||||
Słowa kluczowe Dark Web |Tor |Bitcoin |Hidden WikiStreszczenie The Dark Web and its widely abused platforms are a major security concern for many governments today. The following paper will explore the evolving landscape and emerging threats found on the Dark Web. This article aims to provide context, and appropriate tactics that governments can employ in countering this new age of global terrorism and crime. As well as a comprehensive review of the tools and services associated with the Dark Web. INFORMACJE O AUTORZE
University of Pittsburgh, USA
|
|||||
|
|||||
Słowa kluczowe hybrid warfare |Self-defense forces |Asymmetrical conflict |Russian aggressionStreszczenie Russian aggression in Ukraine and other countries of the former Soviet space have increased tensions and reinforced questions of the state of security. In response, the citizenry of these countries has flocked to volunteer in self-defense forces that are being adopted by respective Ministries of Defense as reserve personnel in the case of invasion. These countries, and the Russian Federation, have opted to adopt asymmetrical means of warfare. While Estonia, Poland, and Ukraine have been reliant on American military support to supplement their own efforts, the Russian Federation has also been dependent on American military literature and using it to reshape their own military methodologies. Through a country case method, this article seeks to review and analyze the experiences of Estonia, Poland, and Ukraine in reaction to perceived Russian aggression. INFORMACJE O AUTORZE
University of Texas at El Paso, USA
|
|||||
Seth Kraman
Guidance Required for Protections of Cyber Participation in Hostilities Under International Humanitarian Law
166 – 178
|
|||||
Słowa kluczowe International Committee of the Red Cross |international humanitarian law |IHL |Armed conflict |Direct participation in hostilities |Targeting civilians |Cyber operationsStreszczenie Since the Second World War, the Geneva Conventions of 1949 and its Additional Protocols were developed to protect civilians from the consequences of armed conflicts by distinguishing them from combatants. With the advent of non-State armed groups and foreign participation in non-international conflicts, this distinction required clarification of the rules pertaining to the protection of civilians participating in armed conflicts. In 2009, the International Committee of the Red Cross (ICRC) released the Interpretive Guidance on the Notion of Direct Participation in Hostilities under International Humanitarian Law, providing recommendations for such situations. However, the emergence of cyber warfare now requires that this guidance be further expanded. The abuses resulting from the United States’ War on Terror illustrate the consequences of vague consensus on terrorism and gaps in international law. Independent interpretations, such as the Tallinn Manual on the International Law Applicable to Cyber Warfare (2013) and Tallinn Manual 2.0 (2017), provide the groundwork for the ICRC, but the continued existence of numerous interpretations surrounding cyber operations allow for the undermining of civilian protections. Thus, it is necessary for the ICRC to establish official protections of civilians for cyber participation in hostilities. INFORMACJE O AUTORZE
Miami University, USA
|
|||||
|
|||||
Słowa kluczowe Bitcoin |cryptocurrency |Security Threats |blockchain |Peer-To-Peer (P2P) Network |Public Ledger |Cryptography |Hash |Proof-of-work Mechanism |Fiat Currencies |Ransomware |Encryption |mining |Bitcoin ATM |Altcoins |Terrorist FinancingStreszczenie In this information age we are living in, we are on the cusp of a major technological paradigm shift that will have reverberating effects through every aspect of society; cryptocurrency implementation into major security threats has the potential of altering the security world as we know it. The purpose of paper is to provide the reader with a basic understanding of what cryptocurrency is, blockchain technology, the use of cryptocurrency by illicit actors, terrorist organization’s use of cryptocurrency, and ways in which law enforcement/security agencies can prevent the nefarious use of cryptocurrency. Additionally, this paper aims to provide resources to further expand on discussed topics; ultimately helping academics, decision makers, and policy setters with advancing the understanding of cryptocurrency in our modern world. INFORMACJE O AUTORZE
Grand Valley State University in Michigan, USA
|
|||||
|