JOURNAL OF STRATEGIC SECURITY
vol 1.1 (2008)
- Redefining Terrorism: Why Mexican Drug Trafficking is More than Just Organized Crime.pdf
- Short Takes: Intelligence-Service Psychology: A German Perspective.pdf
Volume 2.3
- Countering the Somali Pirates: Harmonizing the International Response.pdf
- Keeping our Campuses and Communities Safe.pdf
- Guerilla Warfare & Law Enforcement: Combating the 21st Century Terrorist Cell within the U.S.pdf
- Toward a New Trilateral Strategic Security Relationship: United States, Canada, and Mexico.pdf
- Strategic Asymmetric Deception and Its Role in the Current Threat Environment.pdf
Volume 3.2
- The Weakest Link: The Risks Associated with Social Networking Websites.pdf
- Small to Mid-Size Sporting Events: Are We Prepared to Recover from an Attack?.pdf
Volume 3.4
- The Security Impact of Oil Nationalization: Alternate Futures Scenarios.pdf
- International Security Strategy and Global Population Aging.pdf
- Operation Opera: an Ambiguous Success.pdf
Volume 4.3
- Radicalization and the Use of Social Media.pdf
- Gangs, Terrorism, and Radicalization.pdf
- Four Lessons from the Study of Fundamentalism and Psychology of Religion.pdf
- Extraordinary Rendition and U.S. Counterterrorism Policy.pdf
Volume 6.2
Volume 7, No. 2, Special Issue Summer 2014: The Global SOF Network
- The Global SOF Network: Posturing Special Operations Forces to Ensure Global Security in the 21st Century.pdf
- Global SOF and Interagency Collaboration.pdf
- Forces of Habit: Global SOF’s Role in Countering Illicit Drug Trafficking.pdf
- Enabling Local Solutions to Global Problems: The Role of Cultural Intelligence in Building Global SOF Networks.pdf
- From the Ground Up: The Importance of Preserving SOF Capacity Building Skills.pdf
- Redefining the Indirect Approach, Defining Special Operations Forces (SOF) Power, and the Global Networking of SOF.pdf
- The Dawn of a New Age? Democracies and Military Victory.pdf
- Diversionary Foreign Policy in Authoritarian States: The Use of Multiple Diversionary Strategies by Saddam Hussein during the Gulf War.pdf
- Intelligence and Public Diplomacy: The Changing Tide.pdf
VOLUME 7.4 THE DRONE ISSUE
- The Strategy of Drone Warfare.pdf
- Pandora’s Presumption: Drones and the Problematic Ethics of Techno-War.pdf
- Drones: The American Controversy.pdf
- Investigating the Relationship Between Drone Warfare and Civilian Casualties in Gaza.pdf
Volume 8.1
- The Influence of U.S. Strategic Culture on Innovation and Adaptation in the U.S. Army.pdf
- The Grand Strategy of Nonstate Actors: Theory and Implications.pdf
Volume 8.2
- Understanding the Intelligence Cycle.pdf
- OSINT, New Technologies, Education: Expanding Opportunities and Threats. A New Paradigm.pdf
- Training Intelligence Producers and Consumers for the Future: The Dutch Approach.pdf
- Critical Thinking Instruction in Academia: What can the U.S. Intelligence Community Expect?.pdf
- Financial Intelligence: Uses and Teaching Methods(Innovative Approaches from Subject Matter Experts).pdf
- Legislating Against the Threat: The U.S. & Canadian Policy Elite Response to The Terrorist Threat.pdf
- Talking truth to power for the Intelligence Professional – feeling the fear and doing it anyway!.pdf
- Teaching the Intelligence Process: The Killing of Bin Laden as a Case Study.pdf
- Intelligence Analysis and the Bureau: The Evolution of Analysis and the Analyst Position in the FBI, 1908-2013.pdf
Volume 8.3
- Lessons Learned from Intelligence Internships from Three Midwest Universities.pdf
- Generating Effective Patrol Strategies to Enhance U.S. Border Security.pdf
- The Threat of Domestic Bioterrorism: Fact or Fiction.pdf
- Planes, Plans, Plots: How They Found the Missiles.pdf
- The Portable Sensor System: Addressing the Recognition Gap in Modern Surveillance Systems.pdf
- Improving the Quality of Analysis in Fusion Centers: Making the Most of the Nation’s Investment.pdf
- A Board Game to Teach the Rudiments of Intelligence in an Airport Context.pdf
- The Method to our Madness: Learning by Doing in a Criminal Intelligence Course.pdf
- Role of Neuro-Psychological Studies in Intelligence Education.pdf
- Teaching about ‘Area 51’? How to Cover Secret Government Technology and Capabilities in Intelligence Studies Courses.pdf
- The Future of Intelligence Studies.pdf
- The Role of Culture in Intelligence Reform.pdf
Volume 8.4
- Professionalizing Intelligence Analysis.pdf
- Cultures, Conditions, and Cognitive Closure: Breaking Intelligence Studies’ Dependence on Security Studies.pdf
- Terra Incognita: Mapping American Intelligence Education Curriculum.pdf
- Setauket to Abbottabad: The Value of Film and Television in Teaching Human Intelligence.pdf
- Human Functions, Machine Tools, and the Role of the Analyst.pdf
- Developing a Better Understanding of the Personal Dimensions of Working at the Central Intelligence Agency.pdf
- Before and Beyond Anticipatory Intelligence: Assessing the Potential for Crowdsourcing and Intelligence Studies.pdf
- Social Media and U.S. Intelligence Agencies: Just Trending or a Real Tool to Engage and Educate?.pdf
- Global Climate Change as a Threat to U.S. National Security.pdf
- All Propaganda is Dangerous, but Some are More Dangerous than Others: George Orwell and the Use of Literature as Propaganda.pdf
- Critical Infrastructure Protection: Maintenance is National Security.pdf
POLITICAL RESEARCH ORGANIZATION
National Security Agency’s – The Next Wave
- Vol. 21 | No. 1 | 2015: Building a science of cybersecurity: The next move.pdf
- Vol. 20 | No. 4 | 2014: Big Data.pdf
- Vol. 20 | No. 3 | 2014:Technology Forecasting.pdf
- Vol. 20 | No. 2 | 2013: High Performance Computing.pdf
- Vol. 20 | No. 1 | 2013: 20th anniversary issue of The Next Wave.pdf
- Vol. 19 | No. 4 | 2012: National Program for Cybersecurity Science.pdf
- Vol. 19 | No. 3 | 2012: NSA’s Technology Transfer Program.pdf
- Vol. 19 | No. 2 | 2012: Cybersecurity.pdf
- Vol. 19 | No. 1 | 2011: High Confidence Software and Systems.pdf
- Vol. 18 | No. 4 | 2011: Technology Forecasting.pdf
- Vol. 18 | No. 3 | 2010: Network Tomography.pdf
- Vol. 18 | No. 2 | 2009: Open Source.pdf
- Vol. 18 | No. 1 | 2009: Center for Advanced Study of Language.pdf
- Vol. 17 | No. 4 | 2009: Cloud Computing.pdf
- Vol. 17 | No. 3 | 2008: Revolutionary Technologies.pdf
- Vol. 17 | No. 2 | 2008: Information Visualization.pdf
- Vol. 17 | No. 1 | 2008: Security & Change.pdf