African Peace and Security Architecture
In recent years, global players such as the United States, the European Union (EU) and the People's Republic of China (PRC) have noted Africa's growing strategic importance to their respective interests. Among those interests is the increasing importance of Africa's natural resources particularly oil, agricultural raw materials, and mineral resources, but also growing concerns over other peace and security threats such as conflicts, terrorism, cross-border crimes, cyber threats, or piracy. African Union (AU) Member States are developing an African Peace and Security Architecture (APSA) to address all these types of threats. This study is a descriptive study in the realm of strategy, focused on creating a holistic and meaningful picture about the mechanisms and purpose of the APSA. The overall intent of this study is to analyze the mechanisms developed, or in a developing stage, by the AU and regional organizations to address peace and security issues in the Africa, with the ultimate goal of contributing to a better understanding of African security context at the strategic level. By using the strategic model of Ends-Ways-Means, this study concluded that the APSA is a viable security strategy to deal with the principal threats in Africa. However, there are still important shortcomings and its effectiveness is dependent upon three critical ingredients: political will of AU Member States, developments at the regional level, and by addressing the external threats much more consistently, covering the security dimension of the APSA in the same extent of its peace dimension.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Exploring the Future of Regional Security in the Caribbean
The transnational threats of narco trafficking, arms smuggling, terrorism and organized crime, among others, coupled with a lack of resources have overwhelmed the ability of individual nation states in the Caribbean to adequately ensure their security. These threats pose a threat not only to the Caribbean Basin but to the continental United States as well. As the region seeks to effectively address its security needs in the context of the interconnectedness and interdependence among states, a collective approach to security offers a possible solution for enhancing the security of the region. This thesis examines the historical political attitudes and initiatives towards the security issues of the region, reviews three regional security arrangements to identify best practices, pitfalls, challenges and other relevant issues, and assesses the feasibility, suitability, and acceptability of a Regional Security Partnership (RSP) between the United States and the nations of the Caribbean as an appropriate security model for the region. It concludes that the governments of the Caribbean and the United States have demonstrated sufficient commitment at the operational level to security in the Caribbean Basin, and are poised to take this cooperative approach to the strategic level in the form of a formal regional security arrangement. It proposes a possible decision making structure and process, and discusses the importance of developing and nurturing the relationships within the RSP, as well as the relationships with countries and regions outside of the partnership. The intimately connected existences of the nations of the Caribbean and the United States, and the far reaching impact and consequences of the now matured transnational threats on both the US and the Caribbean, requires an integrated collective approach to maintaining a positive security environment in the Caribbean Basin.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Iran and Saudi Arabia
The relationship between Iran and Saudi Arabia has been a tenuous one following the 1979 Iranian Revolution. The research question investigates what type of threat Iran poses to Saudi Arabia and how the Saudi's will respond. This threat is not limited to a military one; it includes those to the Saudi economy and political instability. Iran seeks regional dominance; standing in its way is Saudi Arabia. It has rebuilt its military, sponsored violent organizations, and threatened to close the Strait of Hormuz. These threaten not only the security of Saudi Arabia but its legitimacy in the Arab world. The relationship of these two nations will continue to impact the region and possibly the world economy.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Maritime Security and the Strait of Malacca
The Strait of Malacca in Southeast Asia is one of the world's most important waterways. Piracy, terrorism, and instability within the region have prompted representatives of global commerce to consider this strait dangerous to shipping. Any major incident could restrict navigation in these waters and have a negative impact on global trade and economy, in particular the economies of Pacific nations. National, regional, and international agreements and initiatives have attempted to address this situation with varying degrees of success. The US, through the US Pacific Command, while participating in many of these agreements, proposed the Regional Maritime Security Initiative (RMSI) to provide a clear set of requirements and capabilities that address maritime security within the region. The RMSI framework correctly identifies the four critical elements necessary for maritime security within the strait. National and international dynamics impact the ability for any and all of these initiatives to achieve success.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
NATO Enlargement
This study examines NATO enlargement and its potential effects on the Republic of Italy. Initial emphasis falls on context, with stress on Southern Region security issues and NATO enlargement in general. The analysis extends to the likely impact NATO expansion on Italy's foreign policy, its military, the domestic-political situation, and the Italian economy. The conclusion is that NATO enlargement will affect Italy's foreign policy more than the other areas analyzed. The Italian military will make some contributions to new NATO missions resulting from expansion, mostly in the way of logistical support, but with some Immediate and Rapid Reaction forces. Enlargement has the potential to influence the domestic-political situation as an issue which unites or divides political coalitions in Italy's government. NATO enlargement should have minimal impact on Italy's economy. This study shows that the NATO enlargement initiative is complex and holds no easy answers. Much thought and study should precede the expansion of the Alliance. In the event that NATO enlargement actually occurs, the Republic of Italy will be affected, although the exact degree and nature of the impact remain to be determined.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Changing Dynamics of Military Advantage in the Information Age
The information revolution causes dramatic changes in the geopolitical environment, which result in new challenges to U.S. national security, particularly from a new form of global insurgency. The continued development and proliferation of information technology impacts the very nature of conflict and military competitive advantage. Can the U.S. expect to maintain its current unprecedented degree of military advantage in the information-age? This thesis examines this question using a qualitative research methodology. The research analyzes the impact of information technology on the geopolitical system, the nature of conflict, and the realm of military competition. Within this context, the research examines the changing nature of military advantage. Three elements of advantage are analyzed to determine qualitative changes that result from the changing conditions of the information-age. The elements are power, legitimacy, and effects. The research also includes a comparative analysis that seeks to determine how these changing conditions affect the ability of both the U.S. military and global insurgents to gain advantage. The research concludes that U.S. military advantage will decline relative to a global insurgency. As a result, the U.S. will face significant challenges in its effort to achieve lasting success in the Global War on Terrorism (GWOT).This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Cohesion in Multinational Military Units
Several studies have described the relationship between leadership and cohesion, albeit not within a multinational context. Previous researchers have also identified a variety of factors that appear to influence the performance of multinational units. The literature has yet to address how a military leader can foster multinational unit cohesiveness. This research describes the importance of unit cohesion and how it can be fostered in multinational units. Using synthesis of findings from document study and the oral group interview data this thesis develops a framework whose key factors include (a) the conditions that exist in cohesive units and (b) the qualities and the tools that might help leaders facilitate a small multinational unit's cohesion. Unit cohesion evolves from mutual loyalty, trust, and compatibility of norms, values, and goals of all unit members. Leadership in multinational units is different than leadership in homogeneous units in many areas. Leaders of multinational units may cultivate unit cohesion if they exhibit interpersonal and emotional intelligence, cultural intelligence, and adaptable leadership style.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Formal Sino-Singapore Defense Relation
South East Asia (SEA) is a highly diversified region, culturally, ethnically, and religiously. Currently, territorial disputes and domestic instability make SEA a rather volatile region, masked by a seemingly benign facade. Singapore, an island state, not endowed with any natural resources, actively engages regional as well as international nation states to maintain a balanced of power in the region to ensure its continued economic survival and sovereignty. Amid the changing geopolitical climate of SEA and China's rising influence in the region, this thesis investigates the feasibility, acceptability, and suitability (FAS) for Singapore to establish a formal defense relationship with China. The thesis differentiates the characteristics of the various forms of defense relations; formal and informal, to provide the basis for the cost and benefit analysis and the also the FAS test. The thesis also addresses Singapore's bilateral relations with key nation states and how these will be affected by a Sino-Singapore defense alliance. The results from the analysis showed that a proposition of such nature is highly time-dependent and also geopolitically dependent. The conclusion highlights the realization of the alliance will have to be built on continued security cooperation and greater integration in the military security arenas between the two nations, capitalizing on the continued presence of Singapore's Senior Minister, touted as the cornerstone for such an alliance to be initiated.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Forcing Doctrine to Match Reality
Australian military forces across a broad spectrum of military rank and branch are serving a crucial operational requisite for enduring stability in Iraq through the training of Iraqi security forces. There most certainly exist numerous circumstances suited to Special Operations Forces assuming the lead of providing Foreign Military Training; however, to assume sole responsibility only serves to impede the development of the capability in the rest of the Australian Defence Force. Whilst it behooves the Special Operations community to maintain excellence in what has become a traditional role, conventional single services and branches must similarly embrace the role and be prepared to conduct the full spectrum of military operations. A great deal can be learned from historical case studies of foreign military training models. Similarly, contemporary models are equally valuable in establishing 璽€~best practices' for what is a scantily documented and often misinterpreted capability. Australian military forces possess a proud tradition of training foreign militaries both historically and contemporarily. However, they have repeatedly failed to produce timely formal doctrine for subsequent use and professional development. Australia has identified an enduring requirement to provide foreign military training and advisory assistance within its strategic sphere of influence. Conventional and unconventional Australian military forces currently train foreign security forces in a number of countries such as Iraq, Afghanistan, East Timor, and the Solomons. The necessity for doctrine has been established, but not developed. Conducting a military attack under high intensity, asymmetric, and complex conditions without the foundation of validated doctrine is both nonsensical to consider and destined for failure.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Improving Southeast Asian Security Within the ASEAN Framework -- Insurgencies and Counterinsurgencies
Since the end of the Cold War, changing global dynamics have brought about important political, social and economic developments to Southeast Asia. Foreign relations between the Southeast Asian states have also improved, reducing intra-regional tensions to the degree where inter-state armed conflicts are no longer likely. The domestic security situation of some Southeast Asian nations, however, remain precarious as local insurgencies resulting from political disagreements, ideological divergences and socio-economic gaps continue to plague these states. Terrorism, a second-order effect of these conflicts, has also become a security concern as regional terrorist groups, such as the Jemaah Islamiah and the Abu Sayyaf Group, have been working with global jihadist organizations to establish an ideological presence within these troubled states. If unchecked, these threats could potentially disrupt the peace in Southeast Asia and de-stabilize the region. This thesis will analyze Southeast Asia's ongoing insurgencies as well as its counterinsurgency efforts. It will examine whether the Association of Southeast Asian Nations (ASEAN), under the constraints imposed by its organizational principles, is able to play a more significant role than it has thus far in improving regional security by addressing the problem of insurgencies within its member states.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Religious-Based Violence and National Security in Nigeria
This study is on Religious-Based Violence and National Security in Nigeria: Nigeria is a multi-religious and multi-ethnic society with enormous potential for economic, social, and democratic development. However, intense conflicts and violence that manifested within it from its earliest time under colonial rule have made development and elude the country. Nigeria is usually characterized as a deeply divided state in which major political issues are vigorously contested along the lines of complex ethnic, religious, and regional divisions. The causes of these conflicts may not be unconnected with the way and manner religion is portrayed to its adherents and mistrust between the followers of the various religious and ethnic groups. The purpose of this study therefore is to examine the phenomenon of religious violence in Nigeria with special focus on some selected violence within Kaduna State and an attack launched against security agencies by a group referred to as Taliban, in Borno State, Nigeria. The study outlines the general background of religious violence in Nigeria, discusses its origin, and highlights the key concepts used in the thesis. The researcher considered the nature, and causes of religious violence in Nigeria, and highlights some of its impact on national security.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
China's Energy Security and the South China Sea
The extraordinary economic rates of growth demonstrated in the Asia-Pacific region over the past decade are inextricably linked to an increase in energy consumption within the region. As annual consumption of energy resources continues to rise in order to fuel growing economies, energy demand in most countries has developed into energy need. Competition for energy in the name of energy security can take many forms. Contested claims, such as those driven by overlapping exclusive economic zones in maritime areas, have generally been settled through diplomacy. At other times, skirmishes involving military forces have resulted where words have failed. A textbook example of using the military in support of energy security is provided by China and its actions in the South China Sea against Vietnam and the Philippines. This study questions whether China believes access to the South China Sea is of vital interest, one directly connected to the survival, safety, and vitality of its future. Initial discussion focuses on review of Chinese economic and energy policies. Subsequent analysis details Chinese behavior within the broader context of international relations theory, concluding with discussion on Chinese policy, resource, and sovereignty issues specific to the South China Sea.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Army's Counterintelligence Role in Homeland Defense
This thesis examines how the Army's counterintelligence elements currently conduct and could legally increase operations against domestic threats in support of homeland defense. It reviews the joint view of terrorism as the dominant threat to American security and the Army's view of domestic threat based on current doctrine. This thesis suggests combining joint threat indicators with the threat and criminal categories used by Army counterintelligence and law enforcement. Once combined, a new model would yield a hierarchy of threat groups or criminal categories ranging from terrorist group organizers and supporters to the common criminal. The thesis also examines current legal guidance for conducting counterintelligence in support of domestic operations. Army counterintelligence is usually prohibited from conducting activities that cross into the jurisdiction of the Federal Bureau of Investigation; a few exceptions are allowed to support military operations. When exceptions are allowed, strict parameters are outlined and only for a short duration. With the Army's increased and continuous role in homeland defense, a review of restrictive procedures is necessary. Research suggest that a need exist for a more definitive and systematic process for conducting such activities. Conclusions and recommendations are provided for improving Army counterintelligence support to homeland defense operations. The objective of this thesis is to provide additional insight toward this goal and generate new concepts and ideas for future research.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Public Affairs
As operations in Afghanistan and Iraq demonstrate, America's adversaries are capable of manipulating domestic and international media with lies, distortion and propaganda disseminated via the internet or media outlets. The U.S. military's inability to dominate the global information environment, as it does on conventional battlefields, represents a strategic and operational weakness that must be addressed. This study investigates the roles and responsibilities of deployed military public affairs officers as they pertain to influencing selected target audiences in order to gain and maintain popular support. Current and past doctrine is examined, along with marketing and advertising practices to determine military applicability. The research explores mass communication theories and techniques to improve public affairs officers' ability to influence these key audiences. This study concludes that influencing audiences, to include the U.S. domestic audience is the primary role and responsibility of military public affairs officers. Recommendations in this study include altering Public Affairs Joint and Service doctrine to reflect the responsibility for public affairs officers to influence their audiences and change public affairs training to teach mass communication theories that are designed to influence their audiences.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Dynamics of Interagency Cooperation Process at Provincial Reconstruction Team in Operations ISAF and Enduring Freedom
The interagency cooperation process at provincial reconstruction team level in Afghanistan is assessed and analysed through Literature review and oral history interviews. The aim is to examine deficiencies and find possible solutions in order to improve the effectiveness of the PRT. In the conclusions the author delineates areas of concerns at the three different levels of war, provides possible solutions to the issues raised by literature and during individual interviews. In the recommendations the author delineates possible future areas of further investigation, specifically a deeper and broader presence of PRTs in the afghan territory in order to be more in contact with the needs of the local populace.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Leveraging Interdependence to Avoid Armed Conflict Between the US and China
Today, many analysts predict China's growing economy and military strength will eventually create a peer competitor for the United States (US). Others fear China's globally expanding influence will threaten US national security interests and question whether the rise of China as an economic and political world power can be accomplished without armed conflict, especially armed conflict with the US. The purpose of the thesis is to identify key friction points between the US and China, discover areas of interdependence, and discuss management options that can be used to minimize friction and avoid a military conflict. The study provides a focused look at the US-China relationship and offers insights into how the US strategy with respect to China could be shaped to enable a more informed, tailored, and effective strategy.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Private Military Company
This thesis investigates the post-Cold War evolution of private military companies. Specifically this study will focus on the measure of international legitimacy that is afforded to private military companies that conduct active military assistance operations that have a strategic impact on the political and security environments in which they are contracted to operate. The thesis has focussed the contract operations conducted by Executive Outcomes (Republic of South Africa), Sandline International (United Kingdom), and Military Professional Resources Incorporated (United States of America) within the time frame of 1988 to the present. The study concludes that at the international level, active military assistance operations conducted by private military companies are indeed legitimate, but that measurement of legitimacy can only be assessed as being de-facto and amoral. Moreover these missions are being conducted within a vacuum of effective regulation and accountability at the international and national levels that is decidedly inappropriate for the international realm in the twenty first century.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Deterrence by Denial
The United States has significantly increased the deployment of missile defense systems, specifically Patriot and Aegis Ballistic Missile Defense (Aegis-BMD), to the Persian Gulf over the past six years. The increase from no missile defense assets in 2005 to two Patriot battalions spread across four Gulf Cooperation Council (GCC) countries was specifically intended for Iran. According to published Department of Defense reviews and statements from United States (U.S.) officials, the increase in forward presence is intended to deter an Iranian regional missile attack and to assure GCC partners of the U.S. resolve in the region. The purpose of this study is to assess whether or not the presence of the U.S. missile defense assets actually contributes deterrent effects against the will of Iranian leaders, to execute a necessary regional missile attack. The author investigates the credibility of the Iranian threat in terms of capability and will. He also assesses the effectiveness of U.S. missile defense assets in the region by investigating the relationship between intent of the deployment, forces allocated for this intent, and the offensive/defensive balance with the Iranian threat. Ultimately, this paper finds that U.S. missile defense assets in the Persian Gulf region, though arguably the best in the world, are not postured to strengthen conditions for deterrence.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Implications of a Resurgent Russian Federation for U.S. European Command
This thesis explores the Russian Federation璽€~s resurgence as a center of influence and the implications of this resurgence for United States European Command. This is accomplished by examining three countries within European Command璽€~s area of responsibility as case studies to determine Russian and U.S. interests, the convergence and divergence of those interests, and ultimately the implications for European Command. This study is based on the hypothesis that the Russian Federation璽€~s resurgence impacts European Command璽€~s activities by forcing European Command to strike a balance between cultivating Russia as a strategic partner on security cooperation issues and preparing to defend US allies against Russian aggression.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Apples and Oranges
Changes in the operating environment have resulted in a fundamental change to the shape and nature of peace operations (PO). The result is that PO have become closer in nature to intervention operations, with a focus on peace enforcement operations, rather than the traditional peacekeeping operations upon which most nations developed their PO doctrine. This has resulted in changes to PO doctrine by Canada, the United States, and the United Kingdom. Given that doctrine establishes the conceptual framework for how militaries conduct operations; a common doctrine is desired to ensure interoperability among allies and coalition members. Conversely, differences in doctrine can result in differing attitudes, approaches, and foci when the doctrine is operationalized for a particular mission. Thus, the intent of this paper is to determine if and where Canadian, American, and British operational-level PO doctrines diverge and converge.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Relevance and Optimal Structure of the Military in Jamaica in the Current and Emerging Geo-Security Environment
In most democratic countries that are not engaged in conflict one can expect debates regarding the amount of the gross domestic product (GDP) that is spent on national security. The issue is even more significant in small states with limited resources. The Jamaican military is occasionally the subject of such debates. The arguments raised against expenditure on an active military force, as opposed to the police force, include the view that there is no apparent conventional external threat, while the internal police-type tasks are increasing. This study considers current and emerging threats to determine what capabilities are required to face them. Case studies of Costa Rica, Iceland, Singapore and the Eastern Caribbean States, are used to determine some of the options available for small-state security linked to the issue of sovereignty. Interviews of both military and nonmilitary experts on national security issues provide additional data for comparison and contrast. The dissertation concludes with recommendations for retaining the military's distinct character, with a reduced regular/active force structure, though not necessarily less personnel, and a significantly larger reserve component. The main theme is that Jamaica cannot afford to be complacent because the nature of security threats globally is evolving.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Present and Future of the United States-Bolivia Relations
Bolivia is one of the poorest countries in Latin America. Nonetheless, it has great geopolitical importance in South America due to its geographical position at the center of the continent and its potential impact on the stability of the entire region. Bolivia has been for centuries one of the countries with the largest indigenous population in the area. Almost half of the population identifies with the native peoples--mainly the Aymara and Quechua--who consider the moderate use of coca leaf as a sacred element in their culture. However, the coca leaf is also used for the production of cocaine in Bolivia and other countries. For many years, political and diplomatic relations between Bolivia and the United States have been dominated by the problems posed by the cultivation and use of coca to the exclusion of other, arguably more important, concerns. In 2005, Evo Morales, was democratically elected as president of Bolivia. President Morales comes from the Chapare province, an area characterized by the cultivation of coca. Moreover, President Morales rose to political prominence after several years of activity as the leader of the coca growers associations. After taking office, the historical and traditional relationship of cooperation between Bolivia and United States has suffered a series of setbacks. Tensions have arisen over his approach to the coca problem. The United States government sees all coca products are destined for drug trafficking; ignoring the traditional cultural and religious aspects of traditional Bolivian culture. In contrast, the Bolivian government argues that coca is mainly intended for traditional consumption (ignoring drug-related issues). Relations between the two countries have been stressed for some time; but while there are signs of rapprochement, they remain marked by perceptions and policies associated with the coca problem. This thesis offers recommendations that would guide the bilateral relationship in a more fruitful direction.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
In Search of an Identity
In the twenty-first century military organizations throughout the world are going through an identity crisis in a changing world as the international community is faced with the vagaries of major shifts in the security environment. This environment is characterized with complexities and changes as new security issues and challenges are brought to the fore. In this complex and challenging international security environment, the problem is that the military in the English-speaking Caribbean cannot continue doing business as usual. The military cannot continue to exist without a Caribbean identity, without a Caribbean mandate, without a Caribbean philosophy, and without a Caribbean doctrine. The primary research question is therefore: Can the military in the English-speaking Caribbean develop its own identity and redefine national security from a Caribbean perspective in the twenty-first century? This study examines the historical perspectives that shape the identity of the military, the international security environment that impact on the military, and the Caribbean security environment within which the military operates. Using a multidisciplinary approach, the study analyses the military within each of these criteria.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Russian Influence on Ukrainian Strategic Policy
Ukrainian strategic policy decisions have a direct impact on US policy in Eastern Europe. Ukraine is often at the forefront of political tensions between the US, EU and Russia. The gas crisis of 2009 resulted in the cutoff of natural gas supplies to Europe for nearly two weeks highlighting the importance of Ukrainian-Russian relations to Europe and the West. The Ukrainian government is still struggling with the democratic process and a weak economy. Economic demands are the driving component of Ukrainian strategic policy decisions. Ukraine's requirements for western economic aid and attempts to gain NATO membership have raised tensions between Russia and Ukraine. Russia has been perceived as increasingly assertive in its foreign policy actions in the region, particularly after the invasion of Georgia. Using energy policy and an increasing use of soft power, Russia has attempted to influence Ukrainian strategic policy. The current government of Ukraine has set a course balancing their needs from the west while placating some of Russia's issues such as the Black Sea Fleet, NATO and energy issues. The challenges that Ukraine faces and how they develop strategic policy will have important implications on United States foreign policy in the region.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Peacekeeping on the Golan Heights in the Event of an Israeli-Syrian Peace Accord
In 1996 Syria and Israel came close to ratifying a peace accord. Currently, however, negotiations are stalled, but a change of government in Israel could provide the impetus for them to recommence. A peacekeeping force is most likely to be deployed as part of the security arrangements of a peace accord. The objective of this study is to determine what type of peacekeeping force would be applicable for deployment on the Golan Heights. Two ongoing Middle East peacekeeping missions, the Multinational Force and Observers (MFO) and the United Nations Disengagement Observer Force (UNDOF) are evaluated to determine their suitability as models upon which to structure a peacekeeping force for deployment on the Golan Heights. The purpose of this thesis is to detail the perspectives of the Israelis and the Syrians in formulating a peace accord and rationalize those perspectives to determine the mission and structure of the peacekeeping force. The study concludes that a hybrid of the MFO and UNDOF models should be utilized to structure a Golan Heights peacekeeping force with a monitoring mission. The political organization of the MFO should be adopted and the military force would be a unique structure using the better aspects of both the MFO and UNDOF.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Chaos, Complexity, and Ethnic Conflict
This thesis examines the application of the principles of chaos and complexity theory to the analysis of ethnic conflict. In the post cold war era, the United States continues to become entangled in ethnic quagmires throughout the world. However, current analytical methods prove unable to encompass the full dynamic of these conflicts. Understanding and prediction suffer. To help overcome this shortfall, intelligence doctrine must now go beyond the principles of Newtonian reductionism and embrace the new science of systems. This study compares the principles of chaos and complexity theory to ethnic conflict factors contained in an author developed ethnic conflict complexity model (ECCM). Historical examples are superimposed on the model to help illustrate these relationships. This thesis demonstrates that chaos and complexity theory can aid in intelligence analysis. Combined with the ECCM, these principles provide the analyst a cognitive roadmap. In addition, as illustrated in this study, chaos and complexity theory not only have the potential to revolutionize intelligence doctrine but leadership doctrine as well. Armed with the knowledge of system dynamics, military leaders of tomorrow may learn how to thrive within the maelstrom of conflict.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Declawing the Dragon
To what extent do the Chinese cyber-warriors--within the People's Liberation Army along with both state and non-state sponsored hackers/crackers--represent a viable threat to both the security and prosperity of our nation as a whole? In the past several years the Chinese have developed a myriad of both lethal and non-lethal cyber-weapons with the intention of denying or degrading an adversary's ability to use space-based intercommunication network platforms. The PRC and PLA have demonstrated a rapid expansion of their asymmetric operations, especially in the realm of Cyberspace. This paper will seek to ascertain the United States military's ability to defend and enforce our national interests, both in regards to our own domestic infrastructures as well as our partners abroad from Chinese-directed cyber-attacks.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Counter-Narcotics Operations in Afghanistan
Narcotics trade is a major funding source for the insurgency in Afghanistan. Afghan law enforcement (LE) units target traffickers, processing labs, and drug caches to minimize this supply chain. These LE units are mentored by US Drug Enforcement Administration teams and British military personnel. However, they are limited in assets which degrades their ability to conduct missions in more dangerous areas, specifically the southern provinces, which is home to the Taliban. Military enablers are needed to enhance the effectiveness of counter-narcotics (CN) missions. The military has been asked to provide enablers such as helicopter lift, cordon security, and close air support. Traditionally, the military does not "do" law enforcement. However, CN intelligence has proven a nexus between drug traffickers and the insurgency. Should the military be involved? This study argues that the military needs to be more involved in CN missions in Afghanistan. Friction exists whenever the military is involved with traditional LE functions. However, these barriers to military involvement are policy issues. It is not against the law. Although the narcotics link to the insurgency is known, there is resistance to military involvement. Proving the nexus takes time, and may result in missed opportunities to target traffickers and insurgents. This paper highlights the need to target the narcotics "industry" to defeat the insurgency. Proof of the nexus should not be required.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Caribbean Regional Security
Since the mid-1950s there have been attempts to create a regional military force in the English-speaking Caribbean. Although for differing reasons, these attempts have been driven by the interests of the extraregional powers, and at the times of crises, by Caribbean states themselves. To date, however, none of the initiatives for a regional collective or cooperative military arrangement have been realized. This study therefore seeks to determine the main impediments that have stood in the way of achieving this goal. The study analyses the impact of the international system on the region, it describes the Caribbean security environment, and the approaches the countries in the region have adopted in response to the perceived threats. The research shows that there are international, regional, and subregional challenges that preclude the establishment of a regional force. The thesis recommends that cohesiveness among the Caribbean militaries could be achieved through coordination at the operational level.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
China in International Institutions
Since China first opened its economy in 1978, it has slowly begun playing a larger role in international institutions. As a country that participates actively in multilateral organizations, Singapore is keenly affected by developments in such institutions. International organizations represent an important avenue that small countries like Singapore can use to pursue national objectives and mitigate inherent geopolitical limitations. By comparing China's recent actions at multilateral institutions against Singapore's diplomatic and economic objectives, this thesis finds that China's increased participation and influence in these institutions present near-term opportunities for Singapore. China's willingness to participate in global activities such as peacekeeping and binding treaties are aligned with Singapore's objective of strengthening rules-based institutions among nations to promote stability. Furthermore, China's increased involvement has corresponded with greater trade and investment volumes for Singapore. Nonetheless, there are underlying challenges for Singapore. China's participation in international institutions does not represent a policy that prioritizes institutional solutions when its national interests are challenged. China remains open to flexing its diplomatic and economic muscles to protect its interests. Furthermore, as China's economic prowess increases, its ability to shape international institutions will likely grow. Therefore, Singapore will need to adapt as China plays a larger role in international affairs.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Deterrence Versus Reassurance
The purpose of this analysis is to determine the impact on Norwegian security should NATO and the United States apply the Maritime Strategy to operational planning for the Norwegian Sea. The Maritime Strategy is a global strategy, which in competition for acceptance against the continental-coalition strategy, has to satisfy U.S. needs to counter the Soviet Union. Although much of the campaign for the Maritime Strategy has focused on the Norwegian Sea, the goal is global. The presence of NATO naval forces in the Norwegian Sea has been limited to the STANAVFORLANT and other allied forces during exercises. Recent exercises and force deployment demonstrate that NATO leaders have decided to increase allied presence in northern waters to counter Soviet Naval expansion. The 600-Ship U.S. Navy, being built as the result of the Maritime Strategy campaign, gives NATO the possibility to increase NATO presence further and make such an aggressive strategy in this area more credible. Official Norwegian Security and Defense policy rests on the twin pillars of deterrence and reassurance, and if implemented, the Maritime Strategy has to fit into the constraints made up by these two pillars. The preference of the Norwegian government seems to be a continuation of the system of previous restraints and confidence building measures to avoid confusion and superpower rivalry in the northern waters. The study identifies three areas which cause some concern: 1) the horizontal escalation aspect, 2) early strikes against Soviet SSBN's, and 3) peacetime presence within the Norwegian Sea required to assure that The Maritime Strategy, if implemented will be successful. The study concludes that the Maritime Strategy is suitable and acceptable from a Norwegian perspective. The main reason is that it contributes to deterrence against the Soviet expansion into the Norwegian Sea, and thereby makes Norwegian security policy more credible.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Safeguarding Canadian Arctic Sovereignty Against Conventional Threats
The effects of climate change as well as national interests over control of vast amounts of natural resources in the Arctic seem to be destabilizing the geostrategic environment involving the circumpolar states. A traditional conflict scenario in the near future is not out of the question, particularly if the legal framework governing the region, the United Nations Law of the Sea Treaty, is proved inadequate to address the full range of issues in the region and fails to resolve territorial claims. Canada has ongoing disputes in the Arctic region with the United States, Russia, and Denmark, and has recently reaffirmed its commitment to its national sovereignty. Based on an analysis of military capabilities for Arctic operations as well as a qualitative comparison between each of these countries, this study establishes that Canada does not have the necessary military capabilities to deter and counter conventional threats to its sovereignty in the Arctic. Consequently, Canada should leverage the other means of national power, specifically its existing multilateral security and defense agreements, to ensure its sovereignty in the Arctic.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Romania as a NATO Member
This thesis is about contemporary Romania and its adherence to the North Atlantic Treaty Organization (NATO). The object of research and analysis is to determine the extent to which Romania, as a NATO member, constitutes a reliable military ally for the United States (US) in Afghanistan. The treatment includes an examination of the origins, nature, and parameters of Romania's post-Cold War commitment to Euro-Atlantic security arrangements, especially after the advent of the "long war" against terrorism. Special attention is devoted to the varying impact of structures, sentiments, threats, interests, and allegiances on processes and outcomes. After discussing the concept of "reliability" in alliance and bilateral perspective, the thesis examines the application of this concept in the evolving security relationship between Romania and the US within the larger NATO context. The thesis concludes that a number of factors underpin reliability, ranging from altruism through shared threat perceptions to a community of geo-political interests. In politico-military perspective, it is these factors that account for Romania's persistence as a reliable ally for the US in Afghanistan.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Processes and Approaches That Africa Should Adopt for a More Responsive and Effective Management and Resolution of Conflicts on the Continent
This thesis examines the processes and approaches that Africa (regional and sub regional bodies alike) should adopt to be able to manage conflict situations before they get blown out, or resolve them when they have escalated. The time when African countries and organizations remained dormant and awaited the United Nations and super power nations to intervene to solve her problems is over, and Africa will have to take the initiative in this direction. This realization compelled the Organization of African Unity (OAU) to set up a mechanism for conflict resolution within its organizational structure. In view of this initiative by the OAU, this study looked at two separate conflict situations in Africa that the regional organization (OAU) and a sub regional organization (ECOWAS) put in efforts to resolve the conflicts. These situations were in Chad and Liberia. The study examines the two situations to identify the causes of the conflicts and areas where these organizations were found wanting in their peacemaking and peacekeeping efforts in line with the basic tenets of mediation, negotiations, and peace support operations. The study goes further to suggest ways that Africa could prepare to tackle such situations in future more responsively without losing credibility, either in the eyes of the adversaries or the international community.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Failure to End the Kivu Conflict
A long conflict has been going on in the Kivu region of Eastern Democratic Republic of Congo (DRC). Today, in its later stages, the conflict has become an amalgamation of insurgencies by the former Rwanda Armed Forces (FAR) and genocidal forces under the umbrella of the Democratic Forces for the Liberation of Rwanda (FDLR), fighting to overthrow the Government of Rwanda, a multitude of Congolese militias, insurgents and renegade Congolese soldiers, and bandits fighting for varying causes. Rwanda, on the other side of the border, the country recovering from its horrible past of conflict and genocide, has always been wary of these negative forces a few miles from its Western Province, seeing it as a powder keg waiting to explode and upset the current development strategies taken. All stakeholders seem to be aware that this conflict is a big sore in the Great Lakes Region of Africa, but have failed to end it. This thesis will show that as long as this conflict in North and South Kivu Provinces of the DRC is not resolved, the political, military, security, and economic stability of Rwanda will be at risk. It will also recommend some possible solutions to ending this persistent conflict.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
How Does India's Energy Security Affect her National Security?
India faces formidable challenges in meeting its energy needs and providing adequate and varied energy of desired quality to users in a sustainable manner and at reasonable costs. With a population in excess of one billion, India needs economic growth for human development, which in turn requires access to clean, convenient and reliable energy for all. The keys to energy security are assurance of supply and diversity of sources. As India seeks to secure her energy security needs, it is probable that she will seek to explore new options. The wars in Iraq and Afghanistan have led to spiraling oil prices which have adversely affected the Indian economy. The major impediments to India's ability to secure her energy are inadequate domestic energy capacity, the conflicting interests with China and India's geographic location. The Indian government has followed a policy of resource diversification. Overland trans-national energy pipelines are one of the options being explored by India to meet her energy security requirements. Overland trans-national energy pipelines by their very nature incorporate multiple nations (source nations, transit nations and destination nations) and are affected by regional and geo-strategic interests of the nations involved. Thus, they provide an excellent platform for analysis of India's energy and geo-strategic interests and its security. Based on this premise the study shall limit itself to assessing the feasibility of overland trans-national energy pipelines and determining the effects of such pipelines on India's energy security and its national security.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Principles of Insurgency and Counterinsurgency, and Support in Counterinsurgency to a Developing Nation
Beneath a nuclear umbrella insurgency has proliferated amongst the developing nations of the world. Insurgency if unchecked poses a threat to the stability of the world. To maintain stability, developed nations might have to support developing nations to combat insurgency. This support should be based upon common principles of insurgency, counterinsurgency and counterinsurgency support to the host nation. Using the principles of revolutionary warfare evolved by the British Staff College, Camberley, the author has examined the validity of those principles.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Nuclear South Asia
This study investigates the military stability of South Asia, after overt display of nuclear explosions by Pakistan and India in May 1998. The two countries have been loggerhead on Kashmir dispute since their inception in 1948. Both have fought three major wars and are in the process of fighting a limited war in the Himalayan Mountains for the last seventeen years. The specific emphasis was on the analyses of the genesis of problem and the roots of mistrust between the two countries. The present day military scenario and relationship of both countries have been discussed with special emphasis on the military government in Pakistan and hard-line religious government in India. The recent Kargil crisis in 1999, soon after nuclearization of both countries was also discussed during the course of study. The study explained the problem areas, arms race and nuclear thresholds of two countries. It also briefly touched upon the reasons for nonadherence of nonproliferation treaties in vogue by the two countries. The study also includes the overall geopolitical environments of South Asia including the China factor in the region. The study advocates that the world, in general, and South Asia, in particular, will remain under the clouds of nuclear holocaust due to Pakistan and India, unless Kashmir problem is amicably solved. In this regard the importance of intervention by world powers especially United States is extremely important. Both Pakistan and India have failed to resolve their core issue of Kashmir by bilateral talks so far; thus, third party intervention is extremely essential. If world powers fail to do so, it is a matter of time only when both countries will once again indulge in another full-scale war, which may have a potential to turn into a nuclear war.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Multinational Operations and Small Nations
With Lithuania as case in point, this thesis utilizes extensive primary and secondary materials to examine the pros and cons inherent in the participation of small nations in multinational operations. The examination begins with a discussion of the nature of multinational operations with an emphasis on their diplomatic and military aspects. The larger theoretical context relies heavily on neorealist approaches and definitions to establish perspective, framework, and terminology. As the treatment shifts from theory to application, increasing emphasis falls on Lithuania as a small nation and on its relations with the United States and the North Atlantic Treaty Organization. These latter entities provide both the impulse and likely organizational context for potential Lithuanian participation in multinational operations. The same actors and circumstances afford a near-classic example of relations between superpower actors and small and weak actors within the international system. The core of the thesis rests on a balanced assessment and analysis of the pluses and minuses, including opportunities and threats, associated with the participation of Lithuania in US- and NATO-led multinational operations. A major conclusion, resting on the criteria of feasibility, acceptability, and suitability, holds that such operations largely coincide with the interests and policies of both the minor and major actors.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Nuclear Attack on U.S. Space-Based Assets
This study examines what changes need to be made in U.S. strategy, policy, and programs in order to prevent a nuclear attack on its space-based assets. The study was inspired by an event, which occurred during the Army After Next Winter Wargame conducted at Carlisle Barracks, Pennsylvania, in the winter of 1997. Although this attack took place in a wargame set in the year 2020, the threat is relevant today. As the proliferation of nuclear weapons continues, the possibility of a rogue nation using a nuclear weapon as what has been called the "cheapest form of ASAT" (Anti-satellite Weapon) is a contingency that the political and military leaders of the U.S. cannot dismiss. This study will review the technical aspects of the use of nuclear weapons in space, deterrence, strategy, and policy issues that affect such an attack. Finally, this thesis will identify the gaps in U.S. strategy and policy and demonstrate how these same gaps potentially leave the U.S. vulnerable to this form of attack in the present time frame. It concludes that the nation cannot currently prevent a nuclear attack on its space-based assets, the best it can achieve is to attempt to deter such an attack and limit the effects should deterrence fail. It proposes what is needed to augment the mission of space control under the present circumstances.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
In View of Current Trends in Peace Support Operations
The United Nations, in pursuit of conflict resolution, established numerous peacekeeping missions in the world. Some of these missions date back to as early as when the UN itself came into being. Military observers, as part of the effort, have been employed unarmed despite the different situations that they have operated in, some of which might have required a different approach. This study analyses three case studies; United Nations Truce Supervision Organization (UNTSO) set up in 1948 in the Middle East, United Nations Protection Force (UNPROFOR) established in 1992 in the Balkans, and United Nations Organization Mission in Congo (MONUC) set up in 1999 and currently operating in the Democratic Republic of Congo. Analysis shows that accusations of lack of impartiality, lack of security and lack of cooperation hampers UNMOS' work. The study concludes that different situations require different approaches as far as employment of UNMOS is concerned. In the contemporary operating environment, the United Nations should consider arming UNMOS according to the demands of the situation.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Crush the American Oligarchy
The American democratic republic is under attack. The procedure to be followed, for all federal elections, as per the Twelfth Amendment to the Constitution, is being violated. It is the duty of the Electors to vote for the individuals of their choice, for the offices of President and Vice President. The states have no right to meddle in a federal election. Now is the time to support the Electors, so that they can properly perform their duty. The states have no right to force any Elector to vote for Trump, or anyone else. Act now, in the interest of democracy.
CAG - What It Ought to Be Auditing? - 75 Years of Indian Constitution
CAG - What It Ought to Be Auditing by P. Sesh Kumar, a retired senior officer of the Indian Audit and Accounts Service, is a bold and timely critique of India's Supreme Audit Institution. Drawing on decades of insider experience. The book questions whether the Comptroller and Auditor General (CAG) is truly fulfilling its constitutional mandate. Why does it audit some areas while ignoring others of far greater consequence? Why are crucial reports delayed until their relevance fades? This work explores missed opportunities in auditing key governance failures-like GST compliance, international taxation, welfare schemes with expenditure in billions, impact of government interventions in MSME sector and judicial delays-while advocating for risk-based, data-driven audits modelled on global best practices like PEFA and lessons from UN audits. More than a critique, the book offers a roadmap for reform, urging the CAG to reclaim its watchdog role and adapt to 21st-century governance needs. Essential reading for policymakers, professionals, and citizens who believe in financial accountability and democratic transparency.
Counter-Narcotics Operations in Afghanistan
Narcotics trade is a major funding source for the insurgency in Afghanistan. Afghan law enforcement (LE) units target traffickers, processing labs, and drug caches to minimize this supply chain. These LE units are mentored by US Drug Enforcement Administration teams and British military personnel. However, they are limited in assets which degrades their ability to conduct missions in more dangerous areas, specifically the southern provinces, which is home to the Taliban. Military enablers are needed to enhance the effectiveness of counter-narcotics (CN) missions. The military has been asked to provide enablers such as helicopter lift, cordon security, and close air support. Traditionally, the military does not "do" law enforcement. However, CN intelligence has proven a nexus between drug traffickers and the insurgency. Should the military be involved? This study argues that the military needs to be more involved in CN missions in Afghanistan. Friction exists whenever the military is involved with traditional LE functions. However, these barriers to military involvement are policy issues. It is not against the law. Although the narcotics link to the insurgency is known, there is resistance to military involvement. Proving the nexus takes time, and may result in missed opportunities to target traffickers and insurgents. This paper highlights the need to target the narcotics "industry" to defeat the insurgency. Proof of the nexus should not be required.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Pakistan and Nuclear Weapon Proliferation
The study is a historical analysis of the Pakistani nuclear program which aims at bringing out the compulsions, restraints and constraints which forced Pakistan to undertake a nuclear program. The perceptions and responses, past, present and future, of the superpowers and some of the affected regional states are also discussed in the backdrop of the Pakistani nuclear activities. The development of the Pakistani nuclear program falls under two time frames, i.e., the pre 1971 period and the post 1971 period because of the differences in the scope and direction of the two. The paper follows a chronological pattern but it analyzes various factors using a combination of the deductive, the compare-and-contrast, and the cause-and-effect pattern. Each factor contribution to the Pakistani nuclear program is examined in detail. The pre 1971 period highlights three major factors; international developments in the nuclear field, desperate energy requirement and lack of natural energy resources. The post 1971 synthesizes four factors, i.e., the oil crisis of 1973, quest for security and survival, the credibility of the alliances and the Indian nuclear explosion of 1974. The study concludes that the analysis will provide a new framework for the future investigations of other such like complex situations.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
China's Energy Security and the South China Sea
The extraordinary economic rates of growth demonstrated in the Asia-Pacific region over the past decade are inextricably linked to an increase in energy consumption within the region. As annual consumption of energy resources continues to rise in order to fuel growing economies, energy demand in most countries has developed into energy need. Competition for energy in the name of energy security can take many forms. Contested claims, such as those driven by overlapping exclusive economic zones in maritime areas, have generally been settled through diplomacy. At other times, skirmishes involving military forces have resulted where words have failed. A textbook example of using the military in support of energy security is provided by China and its actions in the South China Sea against Vietnam and the Philippines. This study questions whether China believes access to the South China Sea is of vital interest, one directly connected to the survival, safety, and vitality of its future. Initial discussion focuses on review of Chinese economic and energy policies. Subsequent analysis details Chinese behavior within the broader context of international relations theory, concluding with discussion on Chinese policy, resource, and sovereignty issues specific to the South China Sea.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Impact of Globalization on African Conflicts
There is no region of this world that not experienced wars, but while many parts of the world have moved towards greater political and economic stability and co-operation, sub-Saharan Africa remains a cauldron of instability and economic deprivation. Globalization, which in simple terms means a worldwide network of interdependence, is a phenomenon, which emerged at the end of the Cold War and the advent of the information revolution. While economic interdependence and liberalization has been acclaimed as the only hope for prosperity for the world, it has also been blamed as source of conflict in many parts of the world. This thesis examines the nexus between globalization and contemporary African conflicts with case studies of conflict scenarios in four African countries namely, the Democratic Republic of Congo, Sierra Leone, Nigeria and Guinea to ascertain the extent to which globalization played a role in sustaining these conflicts. The conclusion of this dissertation is that contemporary African conflicts have both national and international underpinnings, and include political, social and economic parameters. On the socio-political side, the conflicts are directly related to the circumstances surrounding the acquisition of independence, the multiethnic composition of the states, and the more often cited causes generally subsumed under the generic label governance. It also shows that the increased liberalization and expansion of international trade, which occurred in the aftermath of the Cold War, has exacerbated the level and intensity of the conflicts in three of the countries analyzed.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.