Will Japan Rearm?
This thesis examines the possibility of Japanese rearmament using a comparative case study approach examining the periods 1870 to 1945 and 1945 to 1976. Major actors in each period are examined in order to understand the role they play and their views toward rearmament. For the period 1870 to 1945, the actors are the Emperor, the politicians, the military, the population, and the economic sector. During the later period, these same actors together with the American Occupation force are examined. The shift of political power and influence during each period is charted in order to determine any significant similarities between the two. An examination of the literature of both periods allows for additional similarities to be drawn. It is concluded that Japan probably will continue along a course of conventional but gradual rearmament.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Supporting Civil Society in Somalia
The international community intervened repeatedly in Somalia since the central government fell in 1991. These interventions failed to produce a stable, elected government. Instead, over the last 20 years Somalis faced famine, terrorism, sexual violence and lack of basic public services. Somalia's problems stem from lack political unity and rule of corrupt elites who misappropriate foreign aid and national resources. However, even with the pressures of the last two decades, parts of Somali society prospered and show the development of civil society that would serve as counterweights to a predatory government. The international community and the US should provide support around the edges of Somali politics and society. Actively engaging the center through a brokered peace deal or lengthy military occupation invites corruption and mistrust. Aggressive intervention such as establishing an international administration over Somalia would unnecessarily cause friction. It also would delay Somalia's development as a unified, strong country. Numerous Somalis possess the technical ability to run a government. What is missing is accountability.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
The Strategic Implications of Culture
In this paper, the author used Mary Douglas' group/grid typology model for framing culture to describe the strategic implications of culture and culture's response to a changing global context. The author then applied these concepts to analyze the effect of cultural change in China and its implications for current and future US-China relations. Through this analysis, the author revealed important differences in cultural prespective between China and the US, encouraging different solutions to the common strategic problems of security and prosperity and, thus, potentially causing misperceptions and dangerous miscalculations in policy.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
United States of America and the People璽(TM)s Republic of China in Africa
Africa has recently become strategically important to the US and China, mainly for economic reasons. The US and China, the leading consumers of oil in the world, have devised strategies to secure and expand their interests, especially the quest for resources in Africa. This involves the employment of the DIME instruments of national power to achieve their objectives. The strategies being adopted by both countries in pursuing their interests in Africa differ in principle and implementation. Many conflicts in Africa have been linked to the ways through which the US and the USSR pursued their policies in Africa during the Cold War. This research seeks to point out the likelihood of the Cold War mechanics being replicated with the increased presence of the US and China in Africa. It examines the possibility of instability increasing from the ways through which China and the US are pursuing their policies in Africa, using Nigeria and Sudan as case studies. The research concludes that although the Cold War model cannot be applied to this new competition, there are similarities that cause concern. The research outlines some recommendations to be adopted to prevent intrastate conflicts or at least to minimize their effects.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Why Efforts to Centralize the US Intelligence Community Fail
Prior to World War II, the formal collection and exploitation of foreign intelligence in the United States fell almost exclusively in the domain of the military. The attack on Pearl Harbor and other events during that war created a growing consensus that the nation required a central authority to manage national intelligence pertinent to multiple departments of the government. In response, the national security act of 1947 created the central intelligence agency and the position of director of central intelligence. Over the next half-century, numerous commissions and panels found neither the agency nor the director ever wielded effective control over the diverse and growing intelligence community. In response to such findings, presidents issued National Security Council directives and executive orders and congress signed multiple bills to reinforce the CIA and DCI's authority over the intelligence community, but the problems of decentralization persist. The terrorist attack of 9/11 provided sufficient impetus to make the first significant structural changes to the failed us intelligence community since 1947. To evaluate the prospects of the national intelligence reform act of 2004 to establish effective central control over the community it is helpful to identify the factors that frustrated previous reform efforts.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
A National Security Strategy for Sweden
National security strategies should entail all instruments of power and not just the military. Furthermore, the strategy needs to identify both threats and opportunities. A national security strategy must consider the long-term if the state concerned shall stand any chance to take appropriate action and try to shape the environment in order to avoid or counter threats, mitigate undesired effects, and benefit from arising opportunities. Strategy development requires predictions of the future. A method well suited to strategy development is trend analysis. Trends are broad enough to capture all overarching patterns of change and do not include the degree of detail and speculation that scenario analysis can contain. Each trend consists of drivers and consequences. The role of strategy is to shape undesired drivers, support desired drivers, mitigate undesired consequences, and take advantage of desired consequences, in accordance with core national interests and the strategic situation of a particular country.The paper begins by identifying four foundational trends: climate change, globalization, energy transformation, and global demographic change. It goes on to describe Swedish core national values and interests, and evaluates the Swedish strategic position in the world. Finally, it develops a suggestion for a Swedish national security strategy focusing on global, regional, and local actions. The paper illustrates a method for small states to develop a national security strategy.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
US Power Dominance in the 21st Century
This study comprises an analysis on why the United States will remain the world's pre-eminent superpower through examination of case studies on the Roman and British Empires and the United States. Using patterns adopted from theoretical models on political change, the author assesses the technological, economic, and military factors that led to the rise and fall of the Roman and British Empires. The conclusion is that although dominance in these areas contributed to the empires' power, deficiencies in these same areas led to their respective fall. Next the author examines the United States rise to power and then draws out similarities with and differences between the Roman and British empires with respect to the areas of technology, economics, and military power. The results of this process show that the United States, through the sustainment of its technological advantage, economic strength, and military power, will continue its reign as the global hegemon for the foreseeable future. The final section of the study includes an examination of current issues that the United States must confront to secure its position of power along with lines of rationale for continued US power dominance and implications for political and military strategists.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
CTSS Transatlantic Perspectives 2
The Center for Transatlantic Security Studies (CTSS) serves as a national and international focal point and resource center for multidisciplinary research on issues relating to transatlantic security. The Center provides recommendations to senior U.S. and international government and North Atlantic Treaty Organization (NATO) officials, publishes its research, and conducts a broad range of outreach activities to inform the broader U.S. national and transatlantic security community.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Study of China's Possible Military Intervention in the Event of a Sudden Change in North Korea
This study addresses potential scenarios as to how a North Korean collapse could occur, whether China's military would engage in North Korea, and how China's military might intervene if it did so. First, regarding the likely scenarios for a North Korean collapse, this study looks at a power struggle, a military coup, or a popular uprising as potential scenarios of internal origin. Additionally, it discusses a military conflict between the two Koreas and U.S. military operations against North Korea as scenarios of conflict with an external origin. Second, based on an analysis of China's external environment and national interests, this study proposes that China's military would intervene only if a North Korean collapse were caused by an internal conflict. This study also posits that, despite its military alliance obligations, China would not intervene militarily on the Korean Peninsula if the collapse was due to an external conflict. Finally, concerning the form of China's military intervention in case of an internally driven collapse, based on Lykke's military strategy model, this study compares the advantages and disadvantages of a unilateral intervention, multinational operations, and UN-led peacekeeping operations and concludes that China would prefer a UN-led PKO because such an operation would best balance the ends, ways, and means and present acceptable risks for China.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
From Islands to Networks
From Islands to Networks A Blueprint for a Comprehensive US Security Strategy in the Asia-Pacific Region Historic precedent and power transition theory predict the likelihood of armed conflict between a rising China as it overtakes the world's leading superpower, the United States. Taiwan highlights the dilemma by exposing conflicting US and Chinese interests and the changing nature of China's power. This long-term dilemma complicates the emerging alignment of Asia-Pacific interests. A comprehensive US Asia-Pacific strategy of Assured Partnership would safely manage this dilemma by incorporating a multi-tiered, inclusive, institutional approach. The strategy will decrease the likelihood of a US-China military confrontation for several reasons. First, existing bilateral alliances give the strategy its underpinnings, providing an anchor of assurance to allies and a deterrent to the rise of Chinese hegemony. Second, the strategy transforms the ASEAN Regional Forum into a cooperative security institution, the Organization of Asia-Pacific Cooperation. It will provide continuous dialogue, a region-wide security forum, and an enhanced ability to implement preventive diplomacy, consequence management, and peace support operations. Complimenting it, the Asia-Pacific Council consists of current or developing regional powers including the U.S., China, Japan, Australia, India, and Russia. The council preserves regional power strategic agility while providing for continuous regional direction, leadership, and power balance. Third, the strategy builds military transparency, trust and predictability through an institutionalized military cooperative regime, the Partnership for Security and Peace, similar to Europe's Partnership for Peace program.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Three Capitals for Two States
This study argues that there are historical reasons to focus on Jerusalem first and to use an international Holy Basin methodology to bring Israel and the Palestinian National Authority together towards a workable compromise. This analysis identifies the strategic compromises required to create two distinct capital zones that grants sovereignty and legitimacy over respective capitals for the State of Israel and a future State of Palestine. To address the Arab-Israeli conflict, there have been numerous Middle East peace processes, two intifada's, and six U.S. administrations with little demonstrated progress. In terms of religion and national identity, Jerusalem is a central factor for both Israelis and Palestinians, to the people of three world religions, and to the international community. The critical factors to achieve compromise are sovereignty over their respective capitals combined with international recognition and possible control over remaining contested Holy Places. Resolving the city's role as a national capital for two states can lead to resolving other critical Arab-Israeli issues. The international community has perpetuated the conflict by withholding Jerusalem sovereignty from Israel and the Arab population. When Britain ended their Palestine mandate in 1948, the UN failed to deliberately enforce their vision of a separate Jerusalem entity, or Corpus Separatum. The UN continued to withhold sovereignty while the city was divided for nineteen years between Jordan and Israel and when the city was reunited in 1967. The lack of an international mandate for sixty-four years, while fighting for utopian concepts has perpetuated the conflict by delaying the self-determination of the Palestinian population and withholding sovereignty over Israel's declared capital. Peace negotiations must recognize and incorporate the interests of both sides, but until each side is ready to strictly divide the Old City, an international Holy Basin zone has the potential to crThis work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
United States Military-to-Military Contacts With the People's Liberation Army
The growth and importance of the People's Republic of China (PRC) necessitates that the United States foster a relationship that ensures a stable, prosperous, and peaceful Asia-Pacific region. Given the status and role that the People's Liberation Army (PLA) takes in the PRC, military-to-military contact between the United States Armed Forces and the PLA is vital. Mirroring the political tides between the two countries--from the establishment of diplomatic relations in 1979 to the halting of military-to-military contacts after the Belgrade Embassy bombing in 1999 and EP-3 incident in April 2001-- military-to-military contact is slowly growing again. The purpose and intent of the contacts are to foster access and understanding. Weak reciprocity and inadequate transparency by the PLA are issues that hamper relations. Information about the efficacy of military-to-military contact with the PLA is difficult to gather, thus this analysis draws on analogous experiences from previous contact programs with the Soviet Union and Indonesia to argue that the contact programs can foster behavior supporting U.S. interests. The thesis concludes with recommendations to improve the contact programs between the U.S. Armed Forces and the PLA.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Denting the Hub, or Strengthening the Spokes?
In March 2007, Japan and Australia signed a Joint Declaration on Security Cooperation (JADSC)--Japan's first such agreement with any country other than the United States since World War II (WWII). The agreement pledges cooperation on counter-terrorism, maritime security, peacekeeping operations, and disaster relief. Prevailing international relations theories fail to adequately explain the logic for such a Japan-Australia security agreement. They also do not explain its acceptance by the United States or negative reactions toward it by China.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
India as a Responsible Nuclear Power
"After the tests of 1998, India has merely moved sideways from existential to minimum deterrence. From the options available to it, India would in all probability opt for a nuclear posture in the form of a "force-in-being" which implies that India's nuclear capabilities will be strategically active, but operationally dormant. This would give her capability to execute retaliatory action within a matter of hours to a few weeks. India's draft Nuclear Doctrine is by no means the last word on the subject. India's nuclear doctrine and should be seen as an evolving system of beliefs that governs the rationale and use of nuclear weapons. India's declared policy on the use of nuclear weapons is one of "no first use" but an "assured and massive retaliation" in case of nuclear aggression on the part of its enemies. In keeping with this policy, avoiding the high costs of a ready arsenal and to reinforce its long tradition of strict civilian control over the military, India would try to acquire only a nominal deterrence capability against Pakistan and China. This "de-alerted" capability would be reflected in the form of completed nuclear weapons stored in a dissembled condition, i.e., warheads along with the sub-assemblies and delivery systems being kept at different locations separated by large geographical distances."--Abstract from web site.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Focus Targeting in a COIN Environment
Senior military leaders in Afghanistan recognize that there is a systemic problem in how our intelligence community is trained to look at the enemy and provide proper support to the military's counterinsurgency strategy. Where in the past, the intelligence community focused on enemy forces of a nation state, finding the enemy in a counterinsurgency COIN environment requires a holistic understanding of the environment. At the operational and tactical level, reaching this level of understanding requires intelligence assets to focus on the social networks and how they interrelate. Additionally, effective targeting in today's COIN environment requires a much different approach as well. Dynamic targeting models like the Find, Fix, Finish, Exploit, Analyze, and Disseminate (F3EAD) model, are extremely useful tools for rapidly processing information into useful intelligence for targeting.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
The US Policy of Dual Containment Toward Iran and Iraq in Theory and Practice
The policy of dual containment has been adopted by the Clinton administration as a method whereby the nations of Iran and Iraq may be simultaneously prevented from embarking upon actions deemed counter to the interests of the international community in general, and the United States in particular. This is a departure from policies of previous administrations which had sought a balance of power between the two nations in order to contain whichever nation seemed to present the greatest threat at the time. The ability of the United States to embark on a strategy of containing these two states at once, is a result of the new world order in which America finds itself as the sole remaining superpower, able to work its will with a degree of impunity heretofore unknown. The problem to be considered here is whether this strategy is indeed appropriate and whether it will achieve the desired outcomes with respect to US security strategy. This paper analyzes the position of the Clinton administration in light of current and historic US interests in the Persian Gulf region. It examines the opinions of various strategists and academicians regarding the policy of dual containment in order to determine if this policy can be an effective one. The conclusion of this research is that a linkage of US policy between the two nations of Iran and Iraq is inappropriate. While the state of Iraq must be contained to prevent its aggressive activities, diplomatic methods should be applied to Iran in the hope of engendering a renewed relationship.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Targeting National Security
Many theories have arisen to describe how best to use the military as a coercive tool. This thesis develops another of these coercive theories. This is a security-based model that ... describes the actual mechanism behind effective military coercion. This theory--Targeting National Security (TNS)--is based on the nation's need for security and how security erosion can begin a sequence of events that leads to coercion. To develop this theory, this thesis uses a case study approach involving Japan's surrender in W.W. II, the Rolling Thunder and Linebacker air campaigns in the Vietnam War, and Operation El Dorado Canyon, the 1986 US airstrike on Libya.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
The China Syndrome in Latin America
Since the Monroe Doctrine of 1823, the US has regarded the Western Hemisphere as its own domain. Until the early 21st Century, Latin America was a low priority for China, which viewed the region as too geographically remote to be relevant to the international relationships that preoccupied China. Yet in just the past decade, the Chinese are winning over the hearts and minds of citizens of Latin American countries. Increased Chinese involvement in Latin America is undermining US hegemony, foreign policy and security concerns in the region by promoting better diplomatic relations, economic ties, trade, and military interoperability between China and Latin America. China's interest in Latin America is focused on two key areas; trade for raw materials and diplomatic relations to isolate Taiwan.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Leveraging U.S. Intelligence to Defeat Mexican Drug Trafficking Organization
According to the Mexican daily newspaper Reforma, in 2009 there were 6,567 drug-related homicides in Mexico, with over 2,100 of these killings occurring in the Mexican border town of Ciudad Ju?ƒ?癒rez. Though in many ways this extreme violence has become the face of the drug war in Mexico, it is arguably what is occurring below the surface that is of greater concern to the governments of Mexico and the United States.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Torture
As a part of the response to the Al Qaida attacks on 11 September 2001, the United States found itself having to answer many difficult questions regarding its action in the Global War on Terrorism. One of the most contentious was the use of torture against captured enemy fighters. The United States, a strong proponent for humanitarian law, soon found itself criticized for its treatment of detainees. As a result, commentators and politicians have had endless debates about interrogation techniques and the legal applicability of international law and treaties to a nonstate enemy. The central research question derived from these issues is: Is torture a viable tool for use in achieving goals as outlined in the 2006 National Security Strategy? Interrogational torture was examined from the following standpoints: legal, effectiveness, and ethical. Results showed that torture is wrong. The next step applied the analytical results against the ethical decision-making triangle and also concluded that from the three standpoints torture was wrong and not a feasible means of achieving the United States' national security objectives.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Saudi Arabian Reactions to a Nuclear Iran
An Iran with nuclear weapons would greatly increase the risk of other nations in the Middle East following suit, especially Saudi Arabia, resulting in a possible nuclear "Domino Effect" throughout the region. This research paper focuses on the likely Saudi Arabian reactions to counter and ultimately deter an Iran with a nuclear weapons program. Overall, Iran could pursue four different options with regard to its nuclear weapons program: virtual (e.g. Japan), ambiguous (e.g. Israel), declared (e.g. North Korea), or elimination (e.g. Brazil, Libya). This paper contends that Iran will pursue a virtual program and attempt to remain a party in good standing in the NPT, but have the capacity in-place to quickly build nuclear weapons. To the Iranian leadership, a virtual program would meet their national security interests of regime survival, protecting the homeland, and increasing regional influence. Saudi Arabia looks across the Persian Gulf and sees four grave threats: Iran's pursuit of regional hegemonic power, the impacts of a broadening Shi'a vs. Sunni religious-divide and escalating conflict, the possibility of Iranian missile attacks on its homeland, and the possible weakening of U.S. credibility with respect to its security guarantees with Saudi Arabia. These perceived threats, along with Iran's virtual capability, will eventually drive Saudi Arabia to pursue a nuclear weapons program of their own. This paper concludes that Saudi Arabia in the short-term will seek to "borrow" nuclear weapons from Pakistan. This agreement might also involve deployment of Pakistani Air Force nuclear-capable fighters onto Saudi soil. Similar to U.S. deployment of tactical nuclear weapons onto European soil, this "borrow" option would allow Saudi Arabia to remain a party in good standing in the NPT, thereby reducing the possibility of international sanctions. In the long-term Saudi Arabia will construct the infrastructure, obtain required technology, and train the scientists necessarThis work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Wooing the Dark Continent
This monograph evaluates the strengths and weaknesses of Chinese foreign policy towards Africa, discusses the history of engagement of the People's Republic of China with the African continent, and examines the implications of this relationship in regards to the United States (U.S.). The monograph examines the opinions of Africans regarding the continent's status as a major resource provider for the 21st century and the associated interest from leading economic powers around the world. Finally with the emergence of Africa Command (AFRICOM), this paper lays out recommendations to ensure a more complete understanding of Chinese intentions in Africa and provides AFRICOM planners with methods and means to compete and compliment Chinese efforts across the continent. This paper takes into account both current arguments regarding China as both a partner and competitor and provides an unbiased framework for working with China and Africa that meets U.S. strategic interests and needs.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Coercive Complementarity
This study explores the complementary nature of the economic and military instruments of power in coercive diplomacy. The study seeks to determine if the combined application of military and economic power can amplify coercive effects, and if so, how they might be integrated. Targeted primarily at practitioners of national security, the study combines a primer on the capabilities of the economic instrument of power, a comparison of the economic and military literature on coercion, and a study of strategies used against Iraq and Serbia in the 1990s.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
The Revenge of Europe
The collapse of the Soviet Union, the reunification of Germany, and the emergence of the European Union (EU) have all raised questions regarding the United States' transatlantic relationship and the subsequent role of the North Atlantic Treaty Organization (NATO). The author takes a brief look at past US-European relations and provides an enlightening and provocative analysis of the current state of affairs. Recent tensions in the relationship, he concludes, are a result of the EU's growing role as a state actor in the international system. Policy differences between the United States and the EU are merely symptoms of the changes resulting from the EU's new role. The author proposes a tentative typology of alliances and concludes that the United States and the EU have a co-dependent relationship, with the United States subsidizing the EU's pursuit of policies that, whether by accident or design, undermine US interests. The author calls for a reformulation of the alliance that allows both the United States and the European Union to pursue their own interests while forcing the EU to take responsibility for its own defense.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
The Mechanism for Strategic Coercion
In the post-cold war environment of shrinking budgets and uncertain threats, America can no longer politically, nor economically, afford strategies that rely on our traditional military strategy of annihilation and exhaustion. Furthermore, America's position as the single remaining superpower virtually guarantees that our vital interests will not be directly challenged. This means that the use of military force is becoming even more politicized. Despite military leaders' apparent adherence to Clausewitz's maxim that war is an extension of policy, they usually approach strategic planning as if the application of force can be planned separately from the political effort. The traditional American military brute-force strategy does not always meet our national needs in this new world order.Strategic Coercion offers one alternative to this brute-force approach. Simply stated, strategic coercion is the act of inducing or compelling an adversary to do something to which he is averse. It involves using force and threatening action to compel an adversary to cease his current activity, or coerce him to reverse actions already taken. Two contemporary theories of strategic coercion seem to offer promising alternatives to brute force.First, Robert Pape's Denial Theory is based on the assumption that states make decisions as if they are rational, unitary actors attempting to maximize the utility of their choices. Essentially, nations perform a cost-benefit evaluation to determine the best course of action. Theoretically, one may be able to coerce a target nation by raising the expected costs to a prohibitive level, but Pape advocates that this is generally ineffective in conventional conflicts. Instead, coercion requires that the target nation be denied the probability of achieving the sought-after benefits. Denial Theory proposes that the specific means for coercion is the opponent's military vulnerability: defeating an opponent's military strategy denies him the probabilityThis work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Discerning Iran's Nuclear Strategy
Unable to forge a world consensus against the potential dangers of a nuclear armed Iran, US policy makers must prepare for the inevitable. The development of successful US policy with regards to this issue demands an appreciation of Iran's potential nuclear strategy. Does Iran view nuclear weapons as tools of coercion, useful deterrents, or the ultimate survival guarantee for Shi'ism and Persian culture?Key to speculation about potential strategies is first discerning what motivates Iran's nuclear aspirations, the influences of what Colin Gray calls the "strategic culture," and speculation on the rationality of Iran's policy process.The evidence suggests Iran is perhaps more rational with regards to strategy development than generally believed if we view decisions in terms of the Iranian experience and key influences on decision makers. It seems likely Iran intends to use nuclear weapons as deterrents to further US and Israeli action in the region, while at the same time enhancing its prestige. US policy based on traditional deterrence theory may apply with respect to countering Iran's eventual nuclear capability.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Post-Cold War American Foreign Policy
This study assesses American foreign policy since the end of the Cold War. As the world's sole superpower, American leadership has followed one of four policies in the post-Cold War period: unilateral engagement, multilateral engagement through existing organizations, multilateral engagement through ad hoc coalitions, and non-engagement or engagement through a third party. The author assesses three case studies for each policy category, identifying the intervening variables leading American foreign policy decision-makers to each outcome. The case studies identify six intervening variables: American interest, leadership, legitimacy, required capabilities, available multilateral organizations, and alternate willing actors. The author then constructs a framework for American foreign policy decision-making, applying the six intervening variables as they lead to each of the four possible policy outcomes. Following this, the writer uses one case demonstrating the critical need to adequately contextualize the situation in order to avoid inaccurate results emerging from the framework. Finally, two recent cases of American foreign policy, not yet mature enough to allow comprehensive analysis, validate the potential to apply the framework. Ultimately, the author concludes that, while there is no one foreign policy option for the United States to apply as the lone superpower, the correct analysis of the given situation results in predictable policy choices. The policy choices are recognizable not only for the American policy-makers, but also the domestic population as it scrutinizes its government and the international community as it tries to identify what it expects from the global leader. The framework produced offers a lens to examine American foreign policy-making for this purpose.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
National Security Implications of Inexpensive Space Access
The government of the United States is now embarked on an ambitious enterprise. It is planning to make a significant leap forward in repeatable and economical access to space. Some believe that this routine access to orbit will give the United States a clear advantage in the ability to use near Earth space to serve national political, economic, and military interests. Those responsible for making national space policy and writing military space doctrine are, however, still doing so based upon infrequent and expensive access to space. This assumption may soon be made obsolete by new political, economic, and technological realities. Planning for a world in which access to space is relatively frequent and inexpensive may provide both short and long term opportunities for the United States.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Vladimir Vladimirovich Putin and Russian Foreign Policy for the New Millenium
Russian foreign policy during 2001-2002 revealed an entirely new approach as President Vladimir Putin and his Foreign Minister, Igor Ivanov, expanded the scope of Russian external relations both in terms of numbers of nations and the depth of the relationships. The preceding administration of Boris Yeltsin had alienated many people both internally and externally and there was much to do to repair the damage. The events of 11 September vaulted the Russians into a position of prominence that Putin and Ivanov could not imagine possible. A fast and firm show of support for the United States by Putin and his promise to assist in the war against terrorism in any way put Moscow at the center of the war against terrorism, both as a regional hegemon and as a U.S. partner.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
NATO's New Strategic Concept
The evolution of the Strategic Concept, the North Atlantic Treaty Organization's (NATO) blueprint for its approach to the global security environment, has undergone substantial change during the last ten years. These changes reflect the vastly different international world order precipitated by the fall of the Berlin Wall and the collapse of the Soviet Union. The United States, as a member of NATO, has been equally involved with the developments of the post bi-polar world. It has begun to restructure its military in an attempt to better respond to the full-spectrum of conflict and higher tempo of contemporary operations. The potential for complex multinational operations, coupled with the unique military and strategic dynamics found within such an environment, will ultimately demand a higher level of understanding of such operations from members of the United States Army. Using a contemporary analytical strategy to explore the development of NATO's Strategic Concept, coupled with an examination of Army service specific doctrine, this monograph will answer the problem statement of this research: Is the United States Army aware of the operational ramifications contained within NATO's new strategic concept? The most visible evidence of alliance understanding and awareness rests within the cornerstone publications and service doctrine. This monograph concludes that there is insufficient attention paid to alliance and multinational operations within its doctrine and manuals and points to After Action Reviews from Kosovo and Bosnia to support these findings. The extensive experience accumulated by U.S. Army commanders since the signing of the Dayton Peace Accords must be cultivated and ultimately integrated into future doctrine development.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
India in Africa
This monograph examines India's rapidly expanding network of influence in Africa. The author analyzes the country's burgeoning public and private investments in the region as well as its policies vis-?-vis African regional organizations and individual states, especially in the security sector. After reviewing the historic role that India has played in Africa, the author looks at the principal motivations for India's approach to Africa-including the former's quests for the resources, business opportunities, diplomatic influence, and security-and Africans' responses to it. In the context of the broader U.S.-India strategic partnership, as well as American political and security interests in Africa, India's willingness to make significant contributions to African peacekeeping and to extend its maritime security cover to the continent's eastern littoral ought to be welcomed, not least because of the potential positive impact on regional stability and development. Consequently, the author believes the opportunity thus presented in Africa for greater engagement between the United States and India ought to be seized upon.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Strategic Planning Process and the Need for Grand Strategy
This monograph explores the strategic dilemma facing the Australian Strategic Planning System in the post Cold War environment. Previously the Australian Government and Australian Defense Organization produced Defense White Papers to provide an articulation of government policy regarding Defense. These white papers provided the primary guidance to the military from the government for setting strategic objectives and major defense tasks. Consequently, military strategy sought to attain the objectives set forth in the Defense White Papers. Since the end of the Cold War, the strategic environment in Australia's strategic area of interest has changed dramatically. These changes reflect increased regional instability, occasioned by cultural, economic, military and political change. The development of a globalized market economy has further complicated these changes. The result is the need for the Australian Government to articulate Australian national interests as a means to focus the development of economic, diplomatic, informational and military strategy. Presently no national security document exists in which to guide the development of a national approach to strategy development. This monograph proposes the development of a National Security Organization responsible to the National Security Committee of Cabinet for the production of a grand strategy that will coordinate currently separate economic, diplomatic and military strategy.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Study of China's Possible Military Intervention in the Event of a Sudden Change in North Korea
This study addresses potential scenarios as to how a North Korean collapse could occur, whether China's military would engage in North Korea, and how China's military might intervene if it did so. First, regarding the likely scenarios for a North Korean collapse, this study looks at a power struggle, a military coup, or a popular uprising as potential scenarios of internal origin. Additionally, it discusses a military conflict between the two Koreas and U.S. military operations against North Korea as scenarios of conflict with an external origin. Second, based on an analysis of China's external environment and national interests, this study proposes that China's military would intervene only if a North Korean collapse were caused by an internal conflict. This study also posits that, despite its military alliance obligations, China would not intervene militarily on the Korean Peninsula if the collapse was due to an external conflict. Finally, concerning the form of China's military intervention in case of an internally driven collapse, based on Lykke's military strategy model, this study compares the advantages and disadvantages of a unilateral intervention, multinational operations, and UN-led peacekeeping operations and concludes that China would prefer a UN-led PKO because such an operation would best balance the ends, ways, and means and present acceptable risks for China.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Conservatism, Christian Democracy and the Dynamics of Transformation
Conservatism, Christian Democracy, and the Dynamics of Transformation compares the centre-right political traditions of Britain, the Nordic countries, France, West Germany, and Austria and looks for evidence of political cooperation and influence across borders during the period 1945-90. The book explores howa variety of intellectuals, politicians, and political parties transformed their politics in response to major economic, social, and political challenges and seeks to explain why conservatives and Christian democrats came to feel that they belonged to a wider centre-right political family by the end of this period. It also examines why these political traditions found it difficult to cooperate with each other after the Second World War and why they decided to invest more political capital in inter-party relations and wider transnational projects from the 1960s. As the book shows, these developments resulted in two new centre-right internationals: the European Democrat Union and the International Democrat Union.
Tribalism and Democracy in Libya
This book examines the political and social role of tribes in post-Gaddafi Libya, focusing on the current democratic state-building process. It integrates both quantitative and qualitative research methods, including a survey of 1,000 respondents and in-depth interviews with 14 prominent Libyan figures. The study is supported by a comprehensive review of the historical development of Libyan tribes, revealing their longstanding prominence in local governance. Drawing from various International Relations (IR) theories--such as Realism, Constructivism, Liberalism, and Feminism--and interdisciplinary fields like anthropology, history, psychology, and literature, the book argues that while tribalism can challenge democratic state-building, especially in areas like national security and individual rights, it also provides vital social cohesion, or asabbiyyah, which is crucial for Libyan national identity.The book's originality lies in its interdisciplinary approach, exploring tribalism's impact not only on Libya's internal politics but also its international relations. It introduces concepts like liminality and tribal ambiguity to explain the complex and often contradictory attitudes towards tribalism in modern Libyan society. This analysis challenges Libyan readers to confront their ambivalence towards tribalism and reflects on its role in shaping Libya's future as it strives for democracy and global integration.
International Relations in a Multipolar Middle East
This volume explores the international relations of today's Middle East, a region that has become increasingly multi-polar. The tumult following the Arab Uprisings has expanded the arenas competed over by regional powers, global actors and non-state players. The United States, once seemingly intent on a hegemonic 'Pax Americana' has stepped back, leaving powers such as Russia, China, India and the EU, with opportunities to increase their reach and expand their influence. Meanwhile, regional rivalries and alliances have continued to shape conflict and cooperation in the Middle East. As global politics moves towards a new, multipolar era, this volume sheds important light on how this transition will impact on the region. Comprised of two macro sections that offer theoretical reflections and empirical case studies, this volume is essential reading for scholars of the politics and international relations of the Middle East.
A Grand Strategy of Peace
A grand strategy of peace is the first detailed account of Britain's role in the creation of the United Nations Organization during the Second World War. As a work of traditional diplomatic history that brings in elements of intellectual history, the book describes how British officials, diplomats, politicians, and writers - previously seen to be secondary actors to the United States in this period - thought about, planned for, and helped to establish a future international order. While in the present day, many scholars and analysts have returned to the origins of the post- 1945 international system, this book offers an exhaustive account of how the statesmen and more importantly, the officials working below the statesmen, actually conceived of and worked to establish a post-war world order.
An Introduction to International Negotiation
This textbook provides a comprehensive introduction to the international negotiation system - its key elements and processes, what major issues and challenges it faces, and its impacts on international relations. As a major catalyst of global dynamics, negotiation is used to resolve conflicts and promote cooperation peacefully. It is important to understand how it works. First, the book analyzes the principal factors that interact to move the negotiation system forward - the issues and context, actors, structures, strategies, and outcomes. Then, the discussion considers the four basic subprocesses of international negotiation - getting to the table, conducting negotiations, developing implementation plans, and continuing negotiations in the post-agreement period. Relevant research is presented in each chapter to elaborate on these dynamics and offer case studies of negotiations addressing intrastate conflict, the environment, terrorism, anti-corruption and good governance, and post-agreement issues. In addition, the book examines major conflictual conundrums currently facing the world in the Middle East and Ukraine to explore opportunities for negotiated solutions. Providing a solid mix of theory, research, and real-world cases that offers readers a comprehensive appreciation of the field and how it is used on a practical level, this is an excellent basic text for courses on international relations, peace studies, conflict resolution, and international negotiations, and a useful resource for researchers, policymakers, and practitioners.
The Transatlantic Community and China in the Age of Disruption
This volume analyzes what China's rise means for the transatlantic community in a new age of disruption-an age marked by great power rivalry, technological upheavals, and the diffusion of power.
Great Power Cyber Competition
This volume conceptualizes the threats, challenges, opportunities, and boundaries of great power cyber competition of the 21st century.This book focuses on a key dimension of contemporary great power competition that is often less understood due to its intangible character: the competition taking place in the cyber domain, including information and cyber operations. Democracies across the globe find themselves in an unrelenting competition with peer and near-peer competitors, with a prevailing notion that no state is "safe" from the informational contest. Adversarial powers, particularly China and Russia, recognize that most competition is principally non-kinetic but dominates the information environment and cyberspace, and the volume articulates the Russian and Chinese strategies to elevate cyber and information competition to a central position. Western governments and, in particular, the U.S. government have long conceived of a war-peace duality, but that perspective is giving way to a more nuanced perception of competition. This volume goes beyond analyzing the problems prevalent in the information space and offers a roadmap for Western powers to compete in and protect the global information environment from malicious actors. Its genesis is rooted in the proposition that it is time for the West to push back against aggression and that it needs a relevant framework and tools to do so. The book demonstrates that Western democratic states currently lack both the strategic and intellectual acumen to compete and win in the information and cyber domains, and argues that the West needs a strategy to compete with near-peer powers in information and cyber warfare.This book will be of much interest to students of cyber-warfare, information warfare, defense studies, and international relations in general, as well as practitioners.
Armour
Updated throughout for the new edition, Armour: Materials, Theory, and Design covers extant and emergent protection technologies driving advances in armour systems. Covering materials, theory and design, the book has applications in vehicle, ship, personnel and building use.
Routledge Handbook of Disinformation and National Security
This interdisciplinary Handbook provides an in-depth analysis of the complex security phenomenon of disinformation and offers a toolkit to counter such tactics.
Public Administration Theory
What is theory? What do theorists do? Doctoral students and academics often engage with theory, but there is sometimes misunderstanding about what theory is, does, and explains. This book explores these questions, giving students and academics alike in public administration and management an idea of the breadth of depth of theory use, development, and application.The journal, Administrative Theory & Praxis (ATP), has for more than four decades explored these questions and more within its pages. The aim of the volume is to demystify the word 'theory' and the chapters in this edited volume showcase the various ways in which ATP authors have explored their own ways of using and describing administrative theory. Through this volume, readers will have a broad understanding of how theory shapes thinking and application in public administration and management.The chapters in this book were originally published in Administrative Theory & Praxis.
An Introduction to International Negotiation
This textbook provides a comprehensive introduction to the international negotiation system - its key elements and processes, what major issues and challenges it faces, and its impacts on international relations. As a major catalyst of global dynamics, negotiation is used to resolve conflicts and promote cooperation peacefully. It is important to understand how it works. First, the book analyzes the principal factors that interact to move the negotiation system forward - the issues and context, actors, structures, strategies, and outcomes. Then, the discussion considers the four basic subprocesses of international negotiation - getting to the table, conducting negotiations, developing implementation plans, and continuing negotiations in the post-agreement period. Relevant research is presented in each chapter to elaborate on these dynamics and offer case studies of negotiations addressing intrastate conflict, the environment, terrorism, anti-corruption and good governance, and post-agreement issues. In addition, the book examines major conflictual conundrums currently facing the world in the Middle East and Ukraine to explore opportunities for negotiated solutions. Providing a solid mix of theory, research, and real-world cases that offers readers a comprehensive appreciation of the field and how it is used on a practical level, this is an excellent basic text for courses on international relations, peace studies, conflict resolution, and international negotiations, and a useful resource for researchers, policymakers, and practitioners.
Failing and Failed States
Since the end of the Cold War, Global security has been threatened more by weak nations than by dominant ones. This post 9/11 change in understanding mandates a change in strategic thinking of threats, and therefore engagement of failing states. Failing states present many threats to the international security arena and have recently come to the fore of international security circles. States which have failed require a greater level of effort in terms of intervention to contain their global effects versus those states which are failing. The United States is the only nation with the Military and Economic resources capable of independently engaging both failed and failing states. Unfortunately, U.S. interests, national will and domestic politics all guide whether or not the U.S. intervenes in certain failing states and prevents the U.S. from engagement in others. Engaging failing states with a global perspective requires an organization that is committed to the betterment of states, regions, and the global community as a whole, and is prepared to intervene in state domestic issues in order to ensure regional and global security. To engage failing states, the world needs a globally focused organization capable of engaging a policy of prevention. This work seeks to define the threat failed and failing states present to the global security arena, and postulate that failing states can be more effectively engaged through prevention efforts thereby conserving manpower, time, and resources.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
How Do U.S./Georgia Relations Affect U.S./Russia Relations? Can the U.S. Have Both?
U.S./Georgia/Russia Relations The United States, since its inception, has collaborated with other countries with similar regional and/or global goals. Although, all may not quite see eye-to-eye on all topics, they ultimately are working towards a common interest. Tension may arises as the U.S. works with multiple countries and those countries themselves may not get along with each other, while these countries may attempt to use their growing relationship with the United States to sway them against another country and the intended goals. Beginning with the fall of the Soviet Union, the United States has worked to build relationships with former Soviet Republics. Originally tasked to bring democracy to that part of the world, today the United States continues its relationship building efforts in order to not only spread democracy, but to also improve security in the region. So, the question is, how U.S./Georgian relations affect U.S./Russian relations, and if the United States can successfully have relations with both countries. Each country has a bilateral relationship, which affects their bilateral relationship with the other country. The key is to work with both in order to accomplish your intended goals. For the United States, their intended goals are to spread democracy and diminish terrorism. In order for the United States to achieve those goals in the Middle East, they have realized they must ensure a clear passage way. The passage is possibly via Georgia. Georgia is a fairly new independent country, although they have a long history of struggle to attain that independence. Their most recent struggle has been with Russia, who was once their ruler and oppressor, as well as provider of essential oil and gas. Since their independence, Georgia has looked for ways to lessen their need for resources from Russia.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Guantanamo Bay
This paper compares the costs of detention operations at Guantanamo Bay, Cuba against the benefits derived from holding suspected terrorists there. When Operation Enduring Freedom began, the Bush Administration needed a place to detain enemy fighters captured on the battlefield that the US deemed to be a high threat while also possessing a high intelligence value. The Administration issued policy guidance concerning detainees and the detention center at Guantanamo Bay opened soon thereafter. In the following six years, there has been a great deal of legal analysis and ongoing litigation concerning the legality of the detentions at Guantanamo Bay, including the application of the Geneva Convention to detainees and the permissibility of the pending military commissions. These continue to be contentious issues as the US forges ahead in its efforts in the Global War on Terror (GWOT). Putting the legal questions aside, it is possible to analyze the issues at Guantanamo Bay from a purely cost-benefit standpoint. This paper seeks to conduct this analysis by comparing costs, including monetary, personnel, negative public relations, investigative and Congressional costs against the benefits of operations, including intelligence, positive public relations and deterrence benefits realized by the continued detention of enemy fighters.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Strategic Communication and Public Affairs
Public Affairs and Strategic Communication are becoming increasingly more important in today's information-centric world. Air Force officials have given lip-service to the primacy of these skill sets, but have not reinforced those words with significant action toward training or equipping today's public affairs officers to be strategic communicators. Using the problem-solution research methodology, I begin this paper by examining the current state of Air Force Public Affairs, including the doctrine and training. One of the primary areas considered is the lack of consistent formal training for public affairs officers beyond their initial career field training. I also delve into the realm of the emerging strategic communications field, and how the Air Force and Department of Defense (DoD) officials are struggling to define and meet this mission area. Next, I analyze the necessary ties in strategic communication between public affairs and information operations, the doctrinal overlaps and similarities, and some of the challenges therein. The conclusion of the paper is a recommended roadmap for enhanced, standardized training for Air Force public affairs officers throughout their careers. The application of an operations-type initial qualification training (IQT) and mission qualification training (MQT) system is prescribed, to ensure the necessary training objectives are met. These steps will shape tomorrow's public affairs professionals into well-trained and well-rounded advisers best able to support combatant commanders and DoD strategic communication goals.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.