By Major David J. Stuckenberg and Dr. Anthony L. Contento — This Article examines the global state of freshwater scarcity and the often-neglected linkages of water scarcity to economic, social, political, legal, and security consequences arising from disruptions, failures, or attacks on water access and distribution systems. Poorly understood links between access to adequate water and national stability pose severe global security risks.
By Maj. Richard Hossfeld; Brooke Hossfeld; Maj. David Dixon — Instead of waiting passively for effective WHO reform, the United States Government—which currently provides more funding to the WHO than any other member—should act as the authority to influence disease response coordination and declare epidemic and/or pandemic outbreak on behalf of the world.
It’s 2020 and Boston has become a haven for homicide. Believing that an uptick in drug trafficking is responsible for the uptick in homicides—and left behind by its inability to break into the traffickers’ encrypted devices and communications—the Boston Police Department has a potential solution to its unsolved homicide problem: drones.
By Dan E. Stigall — This Article highlights the degree to which institutional frailty in the Indian justice sector poses a national security risk to the United States, and illuminates policy choices that can serve to mitigate this potential threat to U.S. persons and national interests. In particular, this Article demonstrates that a revitalized Indian justice sector would help create a bulwark against regional instability and the pernicious threat posed by global jihadist groups currently seeking a foothold in South Asia.
By Major R. Scott Adams. This Article will show that LOAC does not transform combatants into noncombatants under the hors de combat concept. It will then show that current U.S. policy is overly restrictive by erroneously granting noncombatant status to persons hors de combat.
Threats against aviation change constantly; countermeasures developed to combat emergent threats will become obsolete as new threats appear. Therefore, it is imperative for security practitioners to stay ahead of their enemies by identifying potential threats. This Article discusses ways in which current procedures fall short and should be reassessed.