Global Security and Intelligence Studies Volume 4, Number 2, Fall/Winter 2019 | Página 4

Editorial Welcome
Global Security and Intelligence Studies • Volume 4 , Number 2 • Fall / Winter 2019
Editorial Welcome

Welcome to the Fall / Winter 2019 issue of GSIS . This second issue of the

year features three original research articles , a unique perspective from a field setting , and research note , commentary on a policy-relevant issue , and two book reviews . Together , the research articles examine a breadth of issues related to intelligence and global security .
First , Keith Ludwick ’ s “ Lone Wolf Terrorism in Legislation : A Legal Overview ” provides in in-depth look at the inconsistent laws addressing lone wolf terrorism that still exist today , as well as a discussion defining lone wolf terrorism . An interesting historical timeline examines terrorism laws pre- 9 / 11 and post 9 / 11 . Given the current landscape regarding terrorism , this article is timely , and a must-read .
The second article , “ The Neglected Dimension of Ideology in Russia ’ s Political Warfare Against the West ” by Armin Krishnan begins by reminding us of the ideological conflict between Russia and the West during The Cold War . This look back in history sets the stage for the introduction of Russia ’ s new ideological social model , which serves as a viable vision that appeals to larger social groups . One of Russia ’ s desired outcomes from this “ war of ideas ” is that the West seriously engage in this effort . This piece is an excellent example of countries working together despite differing political perspectives .
The third article , “ Cyber Force Establishment : Defence Strategy for Protecting Malaysia ’ s Critical National Information Infrastructure Against Cyber Threats ” by research team Norazman Mohamad Nor , Azizi Miskon , Ahmad Mujahid . Ahmad Zaidi Zahri Yunos , and Mustaffa Ahmad , take proactive approach by proposing a conceptual framework toward addressing the critical need for cybersecurity threats in Malaysia . The framework suggests the establishment of a central agency to coordinate cybersecurity efforts between public and private sectors that manage the CNII sectors . Not only is this article a significant contribution to the literature , it is a significant contribution to other countries who may have similar issues .
Our fourth article , “ Network Science in Intelligence : Intelligence Cell ” by Romeo-Ionut Minican takes us into the fascinating world of secret and intelligence services . He shares how a basic hypothesis of graph theory may be used to identify the intelligence cell , information networks , the base circuit of information , the structure of secret services , the organization and the arrangement of safe houses , and the composition of network of informants - internal or external , on national , neutral or foreign territory .
In our fifth article , “ Library of Spies : Building an Intelligence Reading List That Meets Your Needs ”, author Erik Kleinsmith provides the lifelong learner with a wealth of resources on where to find excellent reading lists on intelligence history ,
iii doi : 10.18278 / gsis . 4.2.1