Skip to main content (Press Enter).
Toggle navigation
US Army War College - Strategic Studies Institute
US Army War College - Strategic Studies Institute
Search Army War College - SSI:
Search
Search
Search Army War College - SSI:
Search
Home
Who We Are
Faculty & Staff
Contact Us
Opportunities
Visiting Professors
Carlisle
Events
List of Events
CLSC
CLSC Dialogues
About CLSC
Carlisle PLA
Research
Insights
External Articles
Regional Issues
European Security
South & Latin America
Research & Commentary
Annual Estimate
2023 PLA Conference
PLA Logistics and Sustainment (PLA) Conference 2022
SSI Worldwide
INDOPACOM
Study of Internal Conflict
SOIC Study Methodology
SOIC Conflict Studies
Integrated Research Project Topics (IRPs)
Archived Content
Remembering 9/11, 20 Years Later
Special Commentary COVID-19
SSI Media
Podcasts
Decisive Point Podcast
Conversations on Strategy
CLSC Dialogues
SSI Live Podcast
Lectures and Panels
Recent Publications
USAWC Press
Parameters
Decisive Point Podcast
Conversations on Strategy Podcast
Parameters Bookshelf
Articles & Editorials
Publications Site
Publishing Guide
Press Tips
CLSC Dialogues
Home
:
SSI Media
:
Recent Publications
Results:
Tag:
Border Control
Security Implications for the United States from Iranian and Hezbollah Activities in Latin America
December 18, 2024
— This presentation will examine engagement with Latin America by Iran, its government agents, and surrogate groups such as Hezbollah, including terrorist finance, terrorism, and other activities and their evolution in recent years. It will address the interaction of that presence with the risk of escalating the conflict in the Middle East and weak...
MORE
Deterring Cybertrespass and Securing Cyberspace: Lessons from United States Border Control Strategies
December 1, 2016
— Author: Dr Mary ManjikianPerhaps the best starting point for those looking to “borrow” a deterrent strategy for cyberspace from other fields is not the example of nuclear deterrence but instead the example of United States-Mexican border security. The nuclear deterrent analogy is not the best fit for understanding cyber-deterrence—due to the ways...
MORE
Roots of Terror
May 1, 2007
— Author: Ms Corinna Johnson Many of the traditional processes used to identify and prosecute terrorists operate at a pace too slow to keep up with terrorists’ ability to change and reorganize. Terrorists have adopted structurally independent modes of organization in diverse environments; counterterrorism policies must adopt methods to track...
MORE