Steve Sin

About

I am an associate research scientist and director of the Unconventional & Asymmetric Threats Division of START at the University of Maryland. I develop, lead, and manage large interdisciplinary research projects spanning across a broad range of national and homeland security challenges. My research projects have been sponsored by offices and agencies such as the OUSD (I&S), DARPA, DTRA, NSA, DOD Basic Research Office, DHS CWMD Office, and TSA. My research area includes adversary decision modeling; operations in the information environment; insider risk management and Mitigation; irregular warfare; countering weapons of mass destruction; and Northeast Asia regional security. Prior to joining START, I served as the Senior Research Associate and Section Chief at the National Center for Security & Preparedness (NCSP) at University at Albany (SUNY), a strategic partner with the New York State Division of Homeland Security & Emergency Services (DHSES). My professional experience also includes a career as a U.S. Army Officer for over 15 years. I hold a Ph.D. in political science from the University at Albany (SUNY) and am fluent in Korean, Japanese, and Mandarin Chinese.

Work

University of Maryland
|

Associate Research Scientist

US

American University
|

Adjunct Professorial Lecturer

US

University of Maryland
|

Lecturer

US

University of Maryland
|

Director, Unconventional Weapons & Technology Division

US

University of Maryland
|

Assistant Research Scientist

US

University at Albany, State University of New York
|

Adjunct Professor

US

University of Maryland
|

Senior Faculty Specialist, Unconventional Weapons & Technology Division

US

University at Albany, State University of New York
|

Senior Research Associate

US

United States Army
|

Commissioned Officer

US

Education

University at Albany, State University of New York
United States of America

Ph.D.

University of Texas at Austin
United States of America

BA

Publications

Ukrainian Information Resistance

Published by

The War in Ukraine: Understanding Western Tools Short of War

Summary

book-chapter

Trends and Characteristics of Terrorist Attacks Against Nightclub Venues Over 5 Decades

Published by

Disaster Medicine and Public Health Preparedness

Summary

journal-article

Reinterpreting the (Relatively) Immutable Features of the North Korean Strategic Culture

Published by

Routledge Handbook of Strategic Culture

Summary

book-chapter

A semi-stochastic algorithm approach to generating CBRNE terrorist attack plot scenarios

Published by

Journal of Policing, Intelligence and Counter Terrorism

Summary

journal-article

Countering Insider Threat Workforce Development and Professionalization Initiative

Published by

Office of the Under Secretary of Defense (Intelligence & Security)

Summary

report

Monitor, Detect, Assess, and Prevent: Support to the Department of the Air Force Counter-Insider Threat Program Final Report

Published by

The Secretary of the Air Force, Administrative Assistant's Concepts, Development, and Management Office (SAF/CDM)

Summary

report

Biosecurity Threat Assessment: Dominican Republic

Published by

UNSCR 1540 Implementation Program of the Inter-American Committee against Terrorism (CICTE) of the Organization of American States (OAS)

Summary

report

Influence-to-Action Model Campaign/Narrative Impact Assessment Tool (I-AM Assessment Tool)

Published by

American Political Science Association Annual Meeting & Exhibition

Summary

conference-poster

Influence-to-Action Model and Campaign/Narrative Impact Assessment Tool

Published by

Laboratory for Analytic Sciences

Summary

report

Influence-to-Action Model

Published by

Midwest Political Science Association Conference

Summary

conference-paper

When the Levee Breaks: A Global Trend of Cyber-Physical and Cyber-Operational Attacks Against Critical Infrastructure and Future Implications on the Great Power Competition

Summary

book-chapter

Influence-to-Action Model Development: A Tool to Assess the Impact of Foreign Influence Operations

Published by

Laboratory for Analytic Sciences

Summary

report

A Course on Understanding Insider Threat: From Threat to Risk and Trust

Published by

Office of the Under Secretary of Defense (Intelligence & Security)

Summary

report

Support to the Department of the Air Force Counter-Insider Threat Program

Published by

The Secretary of the Air Force, Administrative Assistant's Concepts, Development, and Management Office (SAF/CDM)

Summary

report

Automated Adversary Threat Generation Tool

Published by

89th Military Operations Research Society Symposium

Summary

conference-paper

War and Political Rights in Iraq during the Iran-Iraq War 1980-88

Published by

War and Rights: The Impact of War on Political and Civil Rights

Summary

book-chapter

Islamic State’s Chemical Weapons use in Syria and Iraq

Published by

American Political Science Association Annual Meeting & Exhibition

Summary

conference-paper

Vulnerability and Consequence Assessment and Visualization Tool for Radiological/Nuclear Detection and Adjudication Capability Development Framework (CDF)

Published by

88th Military Operations Research Society Symposium

Summary

conference-paper

Back to the future

Published by

European Political Science

Summary

journal-article

Improvised Threat Technology Adoption Identification Framework (IT2AIF)

Published by

87th Military Operations research Society Symposium

Summary

conference-paper

Estimating Terrorist Attacks Targeting the Aviation Sector

Published by

60th Annual International Studies Association Convention

Summary

conference-paper

Organised Criminal Groups of the Balkan Region

Published by

18th Annual Conference of the European Society of Criminology (EUROCRIM 2018)

Summary

conference-paper

While the Enemy is Preoccupied

Published by

Doctoral Dissertation, Rockefeller College of Public Affairs and Policy, University at Albany, State University of New York

Summary

dissertation-thesis

Maritime Security Initiatives

Published by

Natural Hazards Observer

Summary

magazine-article

Determining extremist organisations' likelihood of conducting cyber attacks

Published by

2016 8th International Conference on Cyber Conflict (CyCon)

Summary

book-chapter

Another Tool in the Arsenal

Published by

The Cipher Brief

Summary

newsletter-article

Democracy, Inclusion, and Failure in CounterInsurgency

Published by

Foreign Policy Analysis

Summary

journal-article

Searching for the nuclear silk road

Published by

Nuclear Terrorism: Countering the Threat

Summary

book-chapter

The Comparative Politics Game Show

Published by

International Studies Perspectives

Summary

journal-article

‘Till Death do Us Part

Published by

55th Annual International Studies Association Convention

Summary

conference-paper

What is Peace Worth

Published by

55th Annual International Studies Association Convention

Summary

conference-paper

Oh, How Quickly do They Change Their Tune

Published by

2014 APSA Teaching and Learning Conference

Summary

conference-paper

The North Korean Regime Survival

Published by

Institutions and Societies: Graduate Student Conference

Summary

conference-paper

Anger or Ability

Published by

Combating Terrorism Exchange (CTX)

Summary

magazine-article

Democratic leaders and war

Published by

Australian Journal of International Affairs

Summary

journal-article

Greater Tumen Area Economic Development Project

Published by

United States Forces Korea

Summary

report

Contributing Factors to North Korea’s Different Treatment of 2006 and 2009 Missile Launches

Published by

United States Forces Korea

Summary

report

Homegrown Terrorism

Published by

Asian Affairs: A Hong Kong Publication

Summary

journal-article

North Korea: Working toward Full Political and Economic Relations with the U.S.

Published by

United States Forces Korea

Summary

report

Two Birds with One Stone

Published by

United States Forces Korea

Summary

report

한국과 주한미군에 대한 북한과 중국으로부터의 사이버 위협

Published by

국방과기술

Summary

journal-article

North Korean Media Reaction to Ulchi-Freedom Guardian Exercise 2008

Published by

United States Forces Korea

Summary

report

South Korean Printed and Internet Media: An Information Operations Challenge

Published by

United States Forces Korea

Summary

report