STRENGTH ANALYSIS: European Union Civil Protection for Emergency Management

As part of a standard “SWOT” Analysis – the aspect of Collaboration is an important set of Strengths that can enhance the Planning, Organization, Equipment, Training and Exercising (POETE) to reduce or eliminate Threats and Risks for any country’s Emergency Management practitioners.
Singapore Betting on Laws to Force Social Media Corporations to Improve Privacy Security

If Singapore has its way, social media corporations will be required by LAW to enact community standards, including content moderation automation to protect end-users from harmful content. The proposed law ...
Improving Ukraine Cybersecurity Policy Defense

Now that Russia has deployed an official attack against Ukraine and invaded their territory; increased security must be launched to counter the attack. First strategy is always to protect citizens’; ...
Russian Cyber Warfare Tactics: Lessons Learned from the Attack on Estonia in 2007

Introduction The Russian Federation (Russia) has established a well-earned reputation for cyber warfare tactics. Their ability to sow division and increase tensions within other nations through disinformation campaigns and by ...
Ukraine Cyber Security Posture and Known Vulnerabilities Russia Could Exploit

Ukraine’s public and private sector computer information system vulnerabilities face potential exploitation. The culprit allegedly seeking to exploit Ukraine’s computer information systems is Russia. The collection of intelligence by journalists ...
China Coal Crisis and its impact on the global energy crisis

China is facing an energy crisis and its ability to effectively manage its reliance on coal as an energy source. Research conveys that China’s government is rationing the usage of ...
A Brief Analysis of India’s Intelligence Community and its Relation to the United States

Introduction India and the United States (US) have a rocky relationship, yet depend on each other to maintain their best interests. This article analyzes this relationship through the lens of ...
Cybersecurity Law and Public Policy Concerns in Southeast Asia and Malaysia

The European Union has been working in concert with the United States and Canada as well as other countries, Parliaments, and Ministries, with hopes of enacting laws to deter cyber ...
Israeli-Palestinian Conflict

Ramadan is a Muslim celebrated holiday and April 13th marked its beginning. Since then, the pressure between Israel and Palestine has been more intense than normal. The holy city of ...
Destabilization in the Central African Republic

Introduction The Central African Republic (CAR) has suffered a history of conflict since its independence in 1960. The nature of this conflict is often regarded under sectarian terms. However, this ...
Challenging Global Perceptions of the United States

Introduction Throughout the Cold War, the Soviet Union conducted multiple covert disinformation campaigns against the United States. One such operation was the U.S. Army Field Manual 30-31B (hereinafter referred to ...
President Biden and China President on National Security

China has been designated a serious threat to national security for the United States since former president Donald J. Trump took office. During his administration, former president Donald J. Trump ...
Concerns of National Security and Foreign Trade with China

In 2003, Anthony Wayne, Assistant Secretary for Economic and Business Affairs for the California Chamber of Commerce International Trade breakfast shared these words in his opening speech regarding how foreign ...
Myanmar Coup and US Relations

On February 1 st 2021 the Tatmadow, Myanmar’s military, officially declared a year-long state of emergency ultimately declaring that Min Aung Hlaing, Commander-in-Chief of Defense services had absolute power. In ...
National Security Cybersecurity Public Policy Concerns in East Asia

Increased Cybercrime continues impacting deterrence efforts deployed by National Security strategist globally. Unlike the United States and European Commission who have developed and implemented clearly conveyed national cybersecurity public policy ...
Understanding China’s Intelligence and Cyber Threat

Introduction As the United States (U.S.) Government starts to look away from counterterrorism efforts in the Middle East officials are starting to realize China took advantage of the opportunity to ...