Introduction to Political Psychology
This fifth edition of Introduction to Political Psychology explores the many psychological patterns that influence individual political behavior. The authors introduce readers to a broad range of theories, concepts, and case studies of political activity, arguing that individuals are driven or motivated to act in accordance with personality characteristics, values, beliefs, and attachments to groups. The book explains many aspects of political behavior--whether seemingly pathological actions or normal decision-making practices, which sometimes work optimally, and sometimes fail.Thoroughly updated throughout, the book examines patterns of political behavior in areas including leadership, group behavior, voting, race, nationalism, terrorism, and war. This edition features: Detailed coverage of political polarization, and the psychology behind it; Up-to-date topics and case studies focused on the 2024 US election, the war in Ukraine, and the Israel-Palestine conflict, as well as social movements such as climate change activism, Black Lives Matter, and #MeToo; A robust suite of timesaving support material. Accessibly written and comprehensive in scope, it is an essential companion for all graduate and upper-level undergraduate students of psychology, political science, and political psychology. It will also be of interest to those in the policy-making community, especially those looking to learn more about the extent to which perceptions, personality, and group dynamics affect the policy-making arena.
Securitisation and Islamism in Egypt and Saudi Arabia
This book provides a comparative analysis of how Egypt and Saudi Arabia have framed Islamism as a security threat to consolidate power. Using securitisation theory, it explores how both regimes systematically criminalise Islamist movements--blurring the line between political opposition and extremism--to justify sweeping authoritarian measures. It exposes the far-reaching implications of this securitisation for governance, civil liberties and human rights by examining mass incarcerations, legal restrictions and state-controlled narratives. Situating these practices within broader global security and counterterrorism discourses, the book highlights how securitisation reinforces authoritarian resilience and shapes international perceptions of political Islam. It critiques global support for repressive policies enacted under the guise of counterterrorism and advocates for inclusive governance that upholds human rights and fosters long-term stability. This book serves as a vital resource for scholars, policymakers and students seeking critical insights into the nexus of security, governance and human rights in the contemporary Middle East.
Social Psychology of Leadership and Crowds
This timely volume brings together research on leadership and social movements, exploring the psychological and social processes at the intersection of crowd psychology and leadership studies.
French in Multilingual Anglophone Africa
Examining the impact of French language in Nigeria, this book discusses the prospects of French language use for development as well as its connection to literature and translation. Despite its ambiguous and indistinct official status in the country, French remains the preferred foreign language in Nigeria and academia. Michael Akinpelu and Tunde Ajiboye's, French in Multilingual Anglophone Africa: Language, Literature, and Translation in Nigeria discusses how the French language is not only taught as a foreign language in Nigerian higher education, but is also an important linguistic code for literary creation, translation, and interpretation, blending local and international francophone cultures. Part I explores issues related to bilingualism, language resource management, and comparison between French and local languages. Part II considers the French language's exploitation in relation to translation and interpretation with particular interests in cultural challenges. Part III provides historical context tracing the evolution of literary engagement of Nigerian writers' contact with French and evolving perspectives on the language in Nigerian literature from the 1930s to present day. Using case studies, classroom fieldwork, and policy analyses, this book shows how French in multilingual Africa is not just a mode of communication, but a powerful instrument of socio-economic integration and mobility in a globalized world.
Humor as Social Critique
This interdisciplinary collection by Jennalee Donian and Andrea Hurst brings together insights from various humanities disciplines to examine humor's role in navigating complex political, cultural, and personal landscapes. Humor as Social Critique: Widening the African Perspective explores how humor functions as a powerful tool for social critique in the African context. Part I delves into humor's relationship with political critique, analyzing how comedians, writers, and artists use humor to resist oppressive power structures and foster dialogue. Part II examines humor's potential for socio-cultural critique, exploring how it reflects and shapes cultural norms, identities, and power dynamics. Part III investigates the role of humor in self-critique, highlighting its therapeutic potential and ability to promote humility and self-awareness. By centering African perspectives while engaging with global voices, Humor as Social Critique challenges the notion that humor is a uniquely localized phenomenon. Instead, it celebrates humor's ability to transcend geographical and cultural boundaries, enriching the tapestry of human experience. This book offers valuable insights for scholars and readers interested in the intersections of humor, culture, and social justice.
Arab Spring and Its Legacies
This edited volume examines the impact of the protest movements that shook West Asia and North Africa in the early 2010s.
The Struggle for Abolition
This book investigates the pursuit by states, civil society groups, and international organisations of nuclear abolition. Detailing the evolution of the institutional architecture for multilateral nuclear disarmament from the 1960s onwards, it tells a story of clashing views of history, security, and the future.
From Friends to Collaborators
Italy and Germany's relations are intense and manifold, but undergo a structural estrangement since the end of the cold war. This book provides with a sound analysis of those changes. It compares Italo-German relations after German unification with the period before, and shows how solidarity among 'friends' have become challenged by the individualist pragmatism of 'collaborators'. The study addresses two shortcomings in the existing literature: The lack of theory-driven analysis of bilateral relations in general, and of the Italo-German relationship in particular. Employing a constructivist understanding of inter-state relations, it develops a theoretical model of three different layers of bilateral relations, pertaining to interaction, interests and identities. In the empirical part, six case comparisons give deep insight into the development of Italo-German relations over time. They are based on an extensive analysis of newspapers, government documents, and expert interviews. Results draw a picture of alienated partners who have to renegotiate the very basis of their relationship - and so this study is also a plea for renewed Italo-German cooperation in Europe.
Importing the American Way of War?
This study takes a closer look at the adoption of the U.S. military concept of network-centric warfare (NCW) by the British and the German armed forces. The book uncovers the striking differences between NCW adoption in the UK and in Germany in terms of timing, pace, concept faithfulness and implementation. Relying on the process tracing technique and framed by an institutionalist argument the study establishes that a different composition of efficiency/effectiveness and legitimacy-related drivers in the two cases can account for the different adoption outcomes. In the case of NCW adoption, the British military was an efficiency maximiser whereas the German military was a legitimacy maximiser.
The Dogs of Diplomacy
The Dogs of Diplomacy: Exploring the Radical Geographies of Modern Times by Daniele-Hadi Irandoost investigates diplomacy through the lens of radical geography as a conceptual framework. Engaging with international relations theory, comparative foreign policy, and the global political economy, Daniele foregrounds postcolonial global justice and the positioning of subaltern social groups within dominant discourses of power. Grounded in his immigrant experience, Daniele's critical qualitative research draws on literary fiction such as Persepolis by Marjane Satrapi and Things Fall Apart by Chinua Achebe to challenge conventional geopolitical maps. Daniele-Hadi Irandoost is based at Glasgow University and works at the intersection of surveillance capitalism, sociology in action, and social movements. In addition to contributions to social science, he is also the author of two espionage books and has written a volume on the philosophy of education.
Silencing the Guns, Volume 2
This book, part of a two-volume set, explores a wide range of critical topics related to 'Silencing the Guns' (STG) agenda in Africa. Key themes include: From Conception to Practice: Examining the Philosophical and Theoretical Foundations of 'Silencing the Guns'; Seven Years On: Can Africa Achieve the Silencing the Guns Agenda?; Hindsight, Insight, and Foresight: Three Perspectives on Assessing Progress in Silencing the Guns in Africa; Private Military Companies and Their Role in Silencing the Guns; Oil Governance and Its Impact on the African Union's Silencing the Guns Agenda; Extremism and Transnational Terrorist Organizations in the Context of Silencing the Guns; The 'New Scramble for Africa' and Its Implications for the Silencing the Guns Initiative on Africa's Peace and Security, Climate Governance and the Silencing the Guns Agenda in Africa. This comprehensive exploration provides a nuanced understanding of the multifaceted challenges and opportunities for peace and security in Africa, examining the intersection of armed conflict, mass atrocities, small and light weapons proliferation, and conflict prevention. This book appeals broadly to academia and to fields such as peace and conflict studies, international relations, international law, and African studies.
Imperial Sexism
Communities across the world engage in gender practices that are seen by many as in conflict with women's rights, such as Muslim women's face veils and polygyny. But in Imperial Sexism, Denise M. Walsh argues that culture and women's rights are not inherently at odds. The root problem is imperial sexism: the legacy of colonial-era racism and sexism and their compounding harms. Through a cross-regional comparative analysis of three dissimilar policy debates in three very different democracies--the 2014 French "burka ban" adjudicated at the European Court of Human Rights, the 1998 legalization of polygyny in post-apartheid South Africa, and the 1985 reform of the "marrying out" rule for Indigenous women in Canada--Walsh confirms that a clash between culture and women's rights is always avoidable, examines why the presumption of a clash endures, and highlights the damage this presumption causes. She centers the voices of women who experience imperial sexism, many of whom resist the notion of a clash and instead harmonize cultural, religious, and women's rights by focusing on their plural identities and lived experiences. By contrast, when politicians and conservative group leaders insist upon a clash, they rely on imperial myths, binaries, and tropes, and a misuse of history. Ultimately, by amplifying the arguments of women most affected by controversial gender practices, Imperial Sexism develops a framework to promote justice, reject colonial prejudice, and strengthen the indivisibility of human rights and democratic inclusiveness.
Breakneck
For close to a decade, technology analyst Dan Wang--"a gifted observer of contemporary China" (Ross Douthat)--has been living through the country's astonishing, messy progress. China's towering bridges, gleaming railways, and sprawling factories have improved economic outcomes in record time. But rapid change has also sent ripples of pain throughout the society. This reality--political repression and astonishing growth--is not a paradox, but rather a feature of China's engineering mindset.In Breakneck, Wang blends political, economic, and philosophical analysis with reportage to reveal a provocative new framework for understanding China--one that helps us see America more clearly, too. While China is an engineering state, relentlessly pursuing megaprojects, the United States has stalled. America has transformed into a lawyerly society, reflexively blocking everything, good and badBlending razor-sharp analysis with immersive storytelling, Wang offers a gripping portrait of a nation in flux. Breakneck traverses metropolises like Shanghai, Chongqing, and Shenzhen, where the engineering state has created not only dazzling infrastructure but also a sense of optimism. The book also exposes the downsides of social engineering, including the surveillance of ethnic minorities, political suppression, and the traumas of the one-child policy and zero-Covid.In an era of animosity and mistrust, Wang unmasks the shocking similarities between the United States and China. Breakneck reveals how each country points toward a better path for the other: Chinese citizens would be better off if their government could learn to value individual liberties, while Americans would be better off if their government could learn to embrace engineering--and to produce better outcomes for the many, not just the few.
Most Agonizing Path to Greatest Tomorrow
This book traces the history of humankind from its earliest days on Earth, through generations, into the pre-colonial and colonial eras, and onward to the period of Africa's independence. It explores how Africa's global standing declined following the industrialization of Europe, a shift that brought immense suffering to its people. The book also delves into the early post-colonial period, which presented its own set of challenges. Despite the hardships, signs of a brighter future have gradually begun to emerge.
Foreign Policy And Commerce; Speeches Delivered At A Dinner Given By The Commercial Community Of Glasgow To David Urquhart, Esq., On The 23d Of May, 1838
This volume contains speeches delivered at a dinner given in Glasgow to David Urquhart in 1838, focusing on foreign policy and commerce. Urquhart, a diplomat, writer, and politician, was known for his strong views on British foreign policy and his advocacy for free trade. The speeches offer insights into the commercial and political concerns of the time, reflecting the debates surrounding international relations and economic policy in 19th-century Britain.Foreign Policy And Commerce provides a valuable historical perspective on the development of British trade policy and the intellectual currents that shaped it. It is a useful resource for scholars interested in the history of economic thought, British foreign policy, and the commercial history of Glasgow.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Imperial Sexisn
Communities across the world engage in gender practices that are seen by many as in conflict with women's rights, such as Muslim women's face veils and polygyny. But in Imperial Sexism, Denise M. Walsh argues that culture and women's rights are not inherently at odds. The root problem is imperial sexism: the legacy of colonial-era racism and sexism and their compounding harms. Through a cross-regional comparative analysis of three dissimilar policy debates in three very different democracies--the 2014 French "burka ban" adjudicated at the European Court of Human Rights, the 1998 legalization of polygyny in post-apartheid South Africa, and the 1985 reform of the "marrying out" rule for Indigenous women in Canada--Walsh confirms that a clash between culture and women's rights is always avoidable, examines why the presumption of a clash endures, and highlights the damage this presumption causes. She centers the voices of women who experience imperial sexism, many of whom resist the notion of a clash and instead harmonize cultural, religious, and women's rights by focusing on their plural identities and lived experiences. By contrast, when politicians and conservative group leaders insist upon a clash, they rely on imperial myths, binaries, and tropes, and a misuse of history. Ultimately, by amplifying the arguments of women most affected by controversial gender practices, Imperial Sexism develops a framework to promote justice, reject colonial prejudice, and strengthen the indivisibility of human rights and democratic inclusiveness.
Aid Dynamics in Jamaican Development: Empowering Communities Through Loans and Grants
Achieving sustainable development goals in Jamaican communities requires addressing persistent obstacles that have hindered progress in the past. This book examines how accessing loans and grants can help communities overcome these barriers, focusing on fostering accountability and sustainability in long-term initiatives. By investigating the impact of these funding sources on communities, it aims to shed light on essential strategies that maximize their benefits for community members. In Jamaica, loans and grants are vital financial tools that support both economic and social development. Loans primarily empower economic growth by providing much-needed capital to local businesses and entrepreneurs, fueling job creation and financial stability. Grants, on the other hand, target social needs and fund community development projects that contribute to sustainable growth. The book presents an integrated approach, demonstrating how the complementary roles of loans and grants can uplift Jamaican communities, strengthening the path toward prosperity and equity. The Book reveals a significant insight: many communities hesitate to utilize loans due to concerns about repayment obligations. This book encourages a shift in perspective, emphasizing that loans, like grants, can play an essential role in meeting community needs and building resilience. Ultimately, this book serves as a resource for policy guidance, offering recommendations that foster community resilience through effective use of both loans and grants. It identifies key challenges and opportunities unique to Jamaica, providing a roadmap that stakeholders can adopt to enhance the impact of these financial resources on community development. Comprehensive analysis highlights ways to ensure these tools drive meaningful change in Jamaican and Caribbean communities, offering a unique and valuable contribution to the discourse on sustainable community development.
Understanding Modern Warfare
Understanding Modern Warfare has established itself as a leading text in professional military education and undergraduate teaching. This third edition has been revised throughout to reflect dramatic changes during the past decade. Introducing three brand new chapters, this updated volume provides in-depth analysis of the most pertinent issues of the 2020s and beyond, including cyber warfare, information activities, hybrid and grey zone warfare, multi-domain operations and recent conflicts in Ukraine, Gaza, and Syria. It also includes a range of features to maximise its value as a learning tool: a structure designed to guide students through key strategic principles; key questions and annotated reading guides for deeper understanding; text boxes highlighting critical thinkers and operational concepts; and a glossary explaining key terms. Providing debate driven analysis that encourages students to develop a balanced perspective, Understanding Modern Warfare remains essential reading both for officers and for students of international relations more broadly.
Foreign Policy And Commerce; Speeches Delivered At A Dinner Given By The Commercial Community Of Glasgow To David Urquhart, Esq., On The 23d Of May, 1838
This volume contains speeches delivered at a dinner given in Glasgow to David Urquhart in 1838, focusing on foreign policy and commerce. Urquhart, a diplomat, writer, and politician, was known for his strong views on British foreign policy and his advocacy for free trade. The speeches offer insights into the commercial and political concerns of the time, reflecting the debates surrounding international relations and economic policy in 19th-century Britain.Foreign Policy And Commerce provides a valuable historical perspective on the development of British trade policy and the intellectual currents that shaped it. It is a useful resource for scholars interested in the history of economic thought, British foreign policy, and the commercial history of Glasgow.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
IOM-NCFRMI Collaboration in Nigeria
Building Hegemonic Order Russia's Way
As Russia challenges the US-led Global Order, Moscow had to create its own version of regional order. From the ashes of the Soviet Union, Moscow had to rebuild its relations with each of the former Soviet states. To do so, Russia had to overcome both mistrust and power asymmetry. While some of the states have chosen not to cooperate with Russia, other states have chosen to cooperate with Russia to create a regional architecture and order. Many argue that Russia is a coercive power in the region that forces other states to act in only its own interests. While recognizing Russia's power Michael O. Slobodchikoff maintains that it is not able to simply force states to behave as it wants them to. Instead, Russia must use bilateral and multilateral cooperation for both Russia as the hegemon and the weaker powers in the region. Russia has been successful at creating regional order. While it has worked to achieve global multipolarity, it has built regional unipolarity, putting its global strategy at odds with its regional goals.
Canada's Intelligence Oversight
How can intelligence agencies be held accountable without compromising their ability to act quickly and effectively? This book presents how, since 2017, Canada has reshaped its oversight of the CSIS and CSE intelligence services. It describes how the new oversight bodies - the NSIRA, the NSICOP, and the Intelligence Commissioner - work together to review, monitor, and guide intelligence operations. Using open-source reports and data, the book conducts case studies and international comparisons to evaluate whether these reforms have increased transparency and accountability while maintaining operational effectiveness. Addressing professionals, policymakers, and researchers, the book introduces an innovative performance review method tailored to intelligence work. It highlights the gains and growing pains of Canada's oversight system and offers five practical reforms to improve it. Written in a clear, evidence-based, and policy-focused style, the book helps readers understand the real-world impact of intelligence oversight and how democratic values and national security can coexist.
Silence and Silencing in Selected African Novels
Through literary analysis, this book examines how African writers address silence and oppression in novels and poetry. Silence and Silencing in Selected African Novels: Power Dynamics and Transformative Voices by Oumar Ch矇rif Diop explores representations of rhetorical, sociocultural, and gendered silence and silencing within selected African literature. He examines how African writers deconstruct normative discourses and use aesthetic forms and narrative techniques to confront silencing systems. Within these literary works, characters express their thoughts, emotions, fears, anxieties, and protest through their silence. Through textual analysis, Diop explores the spaces where silence and silencing occur and how they highlight power dynamics and enforce oppressive structures. These texts also reveal the transformative potential of silence to illustrate the resilience of marginalized characters and their inspiring struggle against the censoring mechanisms of repressive institutions. Breaking the silence becomes an act of reclaiming agency and challenging oppressive forces. Diop shows how the importance of voice in the struggle for justice and the potential for individual actions inspires broader movements for change.
Havana Syndrome
Havana Syndrome is most likely caused by unknown types of directed energy weapons, either of the acoustic or electromagnetic variety. The technology for such weapons has been under development since at least the 1960s. The first covert attacks on U.S. diplomats may go back to that time when the phenomenon was called the "Moscow Signal." Havana Syndrome: A Threat to National Security covers the history of anti-personnel directed-energy weapons (DEW) from the Soviet psychotronic weapons that were rumored to exist since the 1970s to the nonlethal weapons developed in the West in the 1980s onward. The book examines the publicly known details of Havana Syndrome and provides some analysis of the U.S. government investigations into Havana Syndrome with respect to what has been declassified. The most likely perpetrators are the Russian or Chinese governments, as some incidents seem to be related to their strategic interests, and as both would have the technology to carry out such sophisticated attacks. Havana Syndrome establishes a connection between the Anomalous Health Incidents and what NATO analysts have termed cognitive warfare to speculate about the true purpose of these mysterious attacks.
The Ife-Modakeke Conflict
Bukola Adeyemi Oyeniyi examines the complex interplay of history, culture, and politics that have shaped the longstanding conflict between the Ife and Modakeke communities in Nigeria. This book argues that the roots of this conflict extend beyond immediate sociopolitical grievances and are deeply entwined with historical legacies and cultural divergences that have evolved over centuries. Using archival materials, oral histories, and contemporary narratives, Oyeniyi illustrates how colonial legacies, ethnic identities, and local power dynamics have contributed to ongoing tensions. The analysis reveals how historical grievances are often reframed in contemporary contexts, influencing community relations and political alignments. Ultimately, this book sheds light on the necessity of understanding historical contexts to address current conflicts, offering insights into conflict resolution and peacebuilding strategies that are informed by a nuanced grasp of local histories and cultural identities. This book contributes significantly to the broader discourse on conflict in Nigeria and Africa, emphasizing the importance of historical awareness in contemporary sociopolitical landscapes.
Failure. Russia Under Putin
Examines the significant failures Russia has faced under Vladimir Putin's leadership and presents an important counterpoint to a broad range of studies emphasizing Russia's resurrection, status as a persistent power, or successful military reform.Despite Putin's claims of restoring Russia's rightful place in the world, reviving the economic and industrial capacity destroyed in the 1990s, and improving living standards, data show that the gains from the oil price bonanza of 2000-2008 have long since vanished. The success Putin has achieved in centralizing power and repressing opposition now prevents any effective changes to address Russia's long-term decline. Failures include the inability to diversify the economy, reduce corruption, reverse demographic and educational decline, alleviate poverty, or address social inequalities. This edited volume examines how Putin's policy choices have led to Russia's inexorable decline on the global stage. Depicting Russia's inability under Vladimir Putin's rule to improve critical spheres of its national life, aggravated by military belligerence and adventurism abroad, chapters detail how Putin's policies have severely limited Russia's development and institutional stability, leaving the country without a clear leadership transition mechanism or capacity to abandon flawed policies.
Evaluation of the Intensity of Radical Islam in the Balkans and the Assessment of its Level of Threat for European Security
In the past two decades, Radical Islam rooted in Europe became an obvious security threat. This monograph argues that Western Europeans are partially responsible for permitting or not preventing the presence of radical Islamists in the Balkans and therefore in EU. While Islam came in Western Europe with the wave of immigration from African and Asian Muslim countries in the 1970s and 1980s, Islam in the Balkans existed for centuries. Radical Islam in Europe was initially imported from the mujahedeens that came to fight in the Balkan wars in the 1990s, and only later boosted by the events of the post 9/11 world. To define a valid problem statement, this monograph offers understanding of the cultural differences between the Western European Muslims and the Balkan Muslims. While the Balkan Muslims that lived on European soil for centuries are among the most secular in the world, Western European Muslims that are recent immigrants are showing high level of intolerance and radicalism, opposing the democratic values embedded in Western European culture. The Western European states failed to integrate Muslims into their societies and declared the idea of multiculturalism as a failed project, at the same time asking the Balkans governments to accommodate Muslims, indirectly facilitating the infiltration of radical Islam. The purpose of this monograph is to evaluate the intensity of radical Islam in the Balkans compared with the same problem that Western Europe has, by explaining the connections between Balkans Islam and Western European Islam. The patterns show that radical Islamists'; strategic objective is Western Europe, and not the Balkans itself. Balkan countries are merely a safe haven for radical Islam and base for further operations into Western Europe. The Muslim population in several Balkan states is vulnerable to the emergence of radical Islam that in the past two decades is targeting moderate Muslims using the social-economic instability in the Balkans and suppoThis work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Globalization of the International Arms Industry
This paper explores the relationship between globalization of the arms industry and interoperability. Its premise is that while the arms industry has undertaken significant steps to globalize, NATO and ABCA military force interoperability levels remain woefully inadequate. Over sixty years ago NATO and the ABCA program sought to standardize the militaries of their member nations. Each member country agreed to take steps to ensure that interoperability among force elements was achieved. A truly globalized arms industry offers a platform to achieve greater standardization and interoperability amongst joint and combined forces. In fact, it is clear that a nexus should exist between a globalized arms development and truly interoperable forces. This study examines the relationship between a globalized arms industry and interoperable armed forces within the context of NATO and the ABCA program. The primary vehicle it uses to do this is a case study of the development and procurement of the Joint Strike Fighter (JSF). The study concludes that four barriers bar the development of interoperable forces. First, defense spending has significantly reduced for all members of NATO and ABCA, with the exception of the United States. Second, democratically elected leaders are unable to justify increased defense spending in financially constrained times. The absence of an identifiable external threat to the sovereignty of nation states is paramount in politician's minds. Thirdly, the proliferation of defense technologies to third parties prevents the arms industry from achieving interoperability of systems. Finally, little emphasis is placed on the importance of non technical interoperability. The requirement of forces to train together and understand differing military cultures and doctrine is often overlooked. The absence of joint and combined training prior to conducting operations has limited the ability of international forces to operate together effectively. Critically, whereveThis work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Iranian Tentacles Into Iraq
Most of those who comment on Iran's attempt to influence Iraqi Shia, do so without considering the historical and cultural connection between these two peoples. The research presented directs its attention to the Iranian motives and capabilities and then to the first targets of Iranian influence efforts. Finally, the research considered the historical and cultural connections between Iraqi and Iranian Shia to identify the themes and methods that persuade Iraqi Shia to collaborate with Iran. Iran is presently conducting an aggressive strategic influence campaign into southern Iraq. The Iraqi Shia community is the primary target of Iranian efforts. Tehran's bases its motivations on national self-interest and religious-political ideals. The Iranian Regime advocates a religious-political activism to expand fundamental religious ideals. The Shia community in Iraq holds on to the practice of religious-political self-preservation and seeks to conform to the state in order to exist. Members of both Shia communities hold varied cultural values, based on their historical development. Tehran uses methods along the spectrum of psychological persuasion to influence and subvert the Iraqi Shia community. Specifically, they target individual communities. The Iranian regime attempts to gain authority in Iraq via the same government institutions designed to control over its own population. The formidable Iranian government apparatus allows the targeting of the Iraqi population through efforts designed to achieve compliance and conformity. The Iraqi Shia society is fragmented, but nationalism also provides a powerful influence for this group. The majority of the Iraqi Shia community identify themselves as Iraqi citizens despite a common historical narrative and ethnic ties with the Iranian Shia population. Independent national principles foster Iraqi and Iranian nationalist sentiments and the division between the two states are likely to grow with the Iraqi government becoming more cThis work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Military Modernization in the People's Republic of China
China is experiencing extremely rapid changes in every element of its national power--economic, political, and military. Its economy is booming, producing double-digit gains each year since the mid-1980's. This explosive growth raises the prospect of China emerging as a major global power. To help protect this potential new status, Beijing decided to modernize its military to "gain respect" in the world community and become militarily competitive with other global powers. This resulted in a nation possessing one of the fastest growing economies in the world combined with one of the largest military machines -- that is slowly gaining an offensive force-projection capability. These factors may upset the balance of power in the Asian region, in addition to posing a threat to U.S. interests. This paper examines the implications for U.S. and regional security posed by the economic reforms and the military modernization taking place in China, focusing on Chinese acquisition and indigenous production of high-technology weapons to produce an offensive force-projection capability. After surveying the lack of resources available to the Chinese defense industries, it analyzes China's military equipment modernization program and impediments to that program.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Foie Gras With Ketchup
This study assesses the prospect of improving military cooperation with the French through an examination of why French cooperation is desirable, how the French view the United States and the historical basis on which those views are founded, and the manner in which four additional factors complicate the security relationship. The assessment of France in terms of military, economic, and political strength reveals a French capacity to disrupt American defense policy and, therefore, underscores the desirability of French military cooperation. The negative component of ambivalent French views of the United States appears to be based upon historical events in which American action abroad has impressed the French as inadequately deferent, obstructive of their aspirations to reclaim their prestige after World War II, and unilateral.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Faction Liaison Teams
The United Kingdom's Joint Warfare Publication on Peace Support Operations stresses the need for effective liaison in order to prevent misunderstanding, friction, opposition and escalation of the conflict. Beyond this doctrinal support, little has been written to define how this liaison should be conducted. The purpose of this monograph is to fill part of that void. The monograph firstly examines peacekeeping and the reasons why liaison is so important to it, before analyzing the British Liaison structures that were used in Bosnia between 1992 and 1996. The review identifies certain issues that were key in shaping this structure. These issues were team structure, interpreters, command and control, communications and force protection. Subsequent analysis of them provides insights which are then used to develop a conceptual model. This model could be used as a skeleton upon which future faction liaison organizations may be built. The model proposed by this monograph is of a small team with one liaison officer, equipped with both secure and nonsecure communication equipment. The use of local civilian interpreters is recommended, as is the basing of the team in the local community, preferably in civilian housing. The core principle of this model is based upon the team's primary purpose being that of a directed telescope for the commander, one that is permanently focused on the factions command structures.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Impact of Alleged Russian Cyber Attacks
High profile cyber attacks against Estonia and Georgia have brought the subject of cyber security from the realm of internet magazines to main stream media outlets. The cyber attacks advanced the perceptions of animosity between the Russian Federation and former Soviet satellites. The cyber attacks that have occurred in the last few years have shown the vulnerabilities of using the internet and the weaknesses of cyber defenses. The international framework, either through regional organization such as the North Atlantic Treaty Organization (NATO) and the European Union (EU), or through international organizations such as the United Nations (UN), has been inadequate for preventing cyber attacks for political purposes or for bringing cyber criminals to justice. There is little concrete proof of involvement of the Russian Federation government in any cyber attacks. The circumstantial evidence does lead to the perception that the Russian government was behind or supported recent cyber attacks. When countries or organizations stand in opposition to Russia they are likely to receive a cyber attack in order to influence their position. The high likelihood of future cyber attacks, the ease of conducting cyber attacks, and the amount of networks to conduct the attacks make this monograph relevant for study. Government and organizational leaders need to ensure that their cyber defenses are ready to protect private information, internet services, and electrical grids that rely on internet technology to function. Former Soviet satellites, the United States, and international organizations need to strive to increase international co-operation in order to defeat cyber crime. Without a legal international framework cyber criminals will continue to operate in areas where there are no laws or agreements concerning cyber security. Nations can build their own defenses but co-operation and the sharing of technical data will enable a safer internet environment for everyone. The computerThis work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
HIV/AIDS
The purpose of this study is to analyze the effectiveness of the militaries of southern Africa given the nature of the HIV/AIDS epidemic and the complexities through which African Command must navigate. This study will draw on the research of the HIV/AIDS epidemic and its effect on the effectiveness of the militaries of southern Africa, leaning heavily on the research of Stefan Elbe and a small cadre of associated scholars that focused their academic attention on this specific issue. Prior to the discussion of the effect the epidemic has on the militaries, this study discusses the military effectiveness, utilizing the model of effectiveness prescribed by Allan Millett, Williamson Murray, and Kenneth Watman in their article, "The Effectiveness of Military Organizations." The paper then analyzes the discussion of HIV/AIDS as a security issue, focusing on the scholarship of Stefan Elbe and Barry Buzan in this matter. The study then focuses on the regional implications of the epidemic and its effect on the militaries of southern Africa before moving on to the international ramifications of the epidemic. The last analysis this paper offers is a discussion of the U.S. national interests in southern Africa and the ramifications of the effects of HIV/AIDS on U.S. national security policies. The study shows that the current U.S. national security policies do not adequately address the security interests of the U.S. with regard to southern Africa. Specifically, the U.S. fails to adequately address the impacts of the HIV/AIDS epidemic on the effectiveness of the militaries of southern Africa and the epidemics ramifications on the national security interests of the U.S.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Engagement and Implications for Future National Security Strategies
This monograph addresses the perplexing issue of ensuring US security strategy is coherently mated with emerging defense doctrines. America's current security strategy, "engagement," is inherently dynamic in nature. Consequently, it has surfaced four defense related issues: mission profiles beyond the design of US armed forces, debate over the role of US armed forces within an "engagement" construct, debate over the future nature of US Security Policy and doctrinal changes by the Armed forces to meet the demands generated by "engagement." This monograph investigates the challenges facing the US Armed Services to develop relevant doctrines adaptable to dynamic changes in national security strategies. To meet the challenges of "Engagement" the services have adopted new doctrines affecting they way they organize, train and equip: USAF, "Global Engagement;" USN, "Forward From the Sea;" and USA, "Army Vision 2010." Simultaneously, "engagement" itself has been debated with three schools of thought emerging: the "dynamic," "selective" and "disengagement" schools. Consequently, a programmatic dilemma is emerging; while the services are actively developing new doctrines to satisfy national security needs, the more cardinal issue of long-term national security policy is unsettled. The monograph assess the emerging service doctrines ability to meet the demands of possible future national security strategies by contrasting focus of each emerging service doctrine against the argument of each security strategy "school." It employs complexity theory, the historic dynamics of "great nation" foreign policy development, historic and contemporary views of US security policy and theories of international security to develop perspectives on the nature of security policy. It surveys components of US power and reviews the National Security Strategy (NSS) to evaluate the ability of the armed forces to support the NSS. Finally, it investigates the US security strategy debate and contrastsThis work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Impediments to the Effectiveness of the United Nations-African Union Mission in Darfur (UNAMID)
Within the UN, the "Mogadishu Line" is a reference to the failed UN mission in Somalia in 1992-1993, intended to mark the limit of UN peacekeeping capabilities. The UN/African Union Mission in Darfur (UNAMID) has been so disastrous that more recently, the "Darfur Line" has gained currency as the new limit that the UN should not cross for future peacekeeping missions. Further investigation of UNAMID is relevant to any military force generation department that may contribute to a UN peacekeeping operation in the future. This paper takes into account the latest UN reports on UNAMID, Government of Sudan, and rebel actions that affected the mission's operations. Interviews with well-informed, anonymous UN officials reveal chronic problems with force generation, and ongoing issues associated with the Government of Sudan. Case studies on three different UN missions are introduced to permit comparative analysis and situate the UNAMID mission in a broader peacekeeping context. This research finds that UNAMID's force generation was problematic. Additionally, both the Government of Sudan and the rebels obstructed UNAMID operations in a deliberate and sustained manner. These factors retarded the growth in UNAMID's operational capability and hindered its ability to implement its mandate. However, the absence of a peace agreement has resulted in persistent military conflict and an unstable security environment. Improved force generation and the cooperation of the Darfur Peace Agreement signatories can only have a limited impact on UNAMID's ability to protect civilians as long as there is no peace to keep.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
American Soft Power
Twenty-five years of United States' (U.S.) diplomatic isolation and unilateral economic sanctions have failed to alleviate the security threat posed by Iran, a state renowned for sponsoring terrorism, ignoring human rights, and seemingly bent on acquiring nuclear weapon technology. While Iran's government negotiates with the European Union over nuclear power safeguards, Iranian students and unemployed college graduates grow evermore resentful at their lack of social freedoms, economic opportunities, and democratic voice. This research paper explores the relatively new concept of soft power and its applicability in neutralizing Iran's security threat to the U.S. by facilitating social changes, economic investment, and democratic reforms within the strict Islamic state. It first examines how past hard-power strategies have failed to further U.S. interests in Iran. Next, it analyzes successful examples of positive relationships between the U.S. and Middle Eastern countries, where soft power has been employed effectively. Third, it exposes current opportunities for affecting the hearts and minds of Iranians through U. S. soft power. Finally, it concludes by offering a fresh strategy of how the U.S. should deal with Iran to effect the necessary social and governmental changes that will become the foundation for restoring strong diplomatic and economic ties between the two countries.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Engaging the Borderlands
The security of the U.S.-Mexican border is an issue of considerable interest for both countries. The North American Free Trade Agreement has created a web of symbiotic links between the two countries. Unfortunately, this has also presented opportunities for illegal transit. These opportunities are increasingly exploited by Mexican Drug Trafficking Organizations (DTO) whose actions are destabilizing Mexico and increasingly penetrating into the United States. Increasing levels of violence, intimidation, and influence have rapidly become intolerable, demanding a government response. While widespread use of the U.S. military remains an option, the costs both economic and operational, make the use an unviable one. Rather a mixed approach of U.S. and Mexican capacity building and economic assistance is a preferred alternative. The increased capacity of U.S. and Mexican security and law enforcement organizations will over time disrupt, then dismantle the Mexican DTOs. Simultaneously, economic assistance aimed at developing impoverished Mexican regions will both legitimize the Mexican government while marginalizing the influx of narco-dollars. This combined approach provides stability to the region, increases cooperation between neighboring governments, and fosters further legitimate economic growth in the region.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Global War on Terrorism
This work asks two questions. Is the National Security Strategy (NSS) of 2002, The Global War on Terrorism, (GWOT) a policy of containment and why does it matter? This work identifies the NSS as a policy of containment by comparing the national strategies of Presidents Nixon, Clinton and Bush. This comparison shows that although the strategic environment has changed the policy of containing threats has remained. Establishing that the United States national strategy is still a policy of containment, this work points out that the military has an excellent strategy already in place. That strategy is the National Military Strategy of 1997. This work asserts that the strategy clearly identifies the current threat and if aggressively implemented it can meet the political objectives stated in the NSS 2002 .This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
The Prince
"Everyone sees what you seem to be, few know what you really are; and those few do not dare take a stand against the general opinion." - Machiavelli, The Prince."Contemporary Americans, perhaps more than anyone else, could learn a lesson or two from Machiavelli." - John T. Scott, Robert Zaretsky and Michael Gonchar, The New York Times. "Machiavelli's The Prince is one of those rare brain-children with which all respectable minds claim acquaintance." -- Lloyd Eshleman, The New York Times."The first method for estimating the intelligence of a ruler is to look at the men he has around him." - Machiavelli, The Prince."His city's tempestuous history taught Machiavelli a lesson he tries to convey to future readers: that no one man can overpower a free people unless they let him." - Erica Benner, The Guardian.Machiavelli is often portrayed as the first honest teacher of dishonest politics." - Erica Benner, The Guardian.The Prince is a manual for those who wish to win and keep power. Plato and Aristotle viewed politics as an aspect of ethics. They described an ideal state and presumed that a good leader would aim to create an ideal state, and that the pursuit of virtue would lead to the success of the leader and the state. Niccol簷 Machiavelli set aside political ideals and went straight to the truth of how things really work. For him, virtue was the set of characteristics that lead to success. Machiavelli had read widely on the military and political history of Rome, Greece, and Persia, and, from his position as second chancellor of the Florentine Republic, in charge of diplomacy and warfare, he observed the fortunes of the warring Italian states and their leaders. Florence was caught between the much greater powers of Milan, Venice and Rome, and relied more on diplomatic strategy than military strength for its security.Machiavelli's careful, concise analysis of human nature over the ages has made The Prince as important in political science as Plato's Republic and Thomas More's Utopia, and it deserves a careful reading.Niccol簷 Machiavelli (1469-1527) was an Italian Renaissance political philosopher and statesman, secretary of the Florentine republic. His most famous work is The Prince. However, his writing includes the lengthy Discourses on Livy, and works of poetry, fiction, and drama. Machiavelli is regarded as the first political scientist.
NATO Expansion in the Post Cold War Era
During its first forty years, the North Atlantic Treaty Organization (NATO) successfully deterred Soviet expansion in Europe. Since the end of the Cold War, NATO has moved from confrontation with the East Bloc to cooperation, partnership and dialogue with most of Europe. As Yugoslavia disintegrated and the Balkans erupted in violence, the alliance broadened its historically defensive military strategy to include out of area peace operations. NATO's focus changed from collective defense to collective security. NATO chose to expand its membership as part of this process with Poland, Hungary and the Czech Republic joining in 1999. At the same time, NATO revised its Strategic Concept to codify its collective security focus while also leaving the door open for future expansion. What should the entrance criteria be for future NATO members? A case study of the Czech Republic's progress towards accession in the 1990s provides a framework to analyze the relationship between expansion and the alliance's Strategic Concept of cooperation and collective security. Specifically, the Czech Republic not only met basic entrance requirements, but also used NATO's Partnership for Peace program and peacekeeping operations in Bosnia to ensure their membership bid.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
The Rejectionists
After examining the Oslo Accord, this research paper defines and characterizes the rejectionist groups Gush Emunim, the Likud Party, and Hamas who represent the radical beliefs and tactics of many rejectionist Groups. Israeli and Palestinian rejectionists, with their beliefs and actions, welcomed the 2002 Bush Administration Roadmap to Peace plan as dead on arrival. Rejectionists pose a major obstacle for the success of the Israeli-Palestinian peace process. To jump-start the Oslo Accord or promote any new agreements, leaders on both sides must first neutralize the rejectionist groups.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
American Border Security and Its Challenge to American National Security
The attacks of September 11th, 2001 brought terrorism to the United States and the realization that America was vulnerable to attack on its homeland. America now finds itself engaged in a Global War on Terror against an enemy in Al Qaeda that is intent on attacking again. Osama Bin Laden and his Al Qaeda leadership have made it known that they intend on continuing their war of terror against the United States, its citizens, and its interests. Not only do they intend on continuing this war, but they are intent on executing another large scale attack on American soil equal to if not greater than the ones of September 11th, 2001.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Taming the Bear
European energy supplies are not secure. While individual nations have varying levels of energy security, too many European Union (EU) members, particularly those in Central and Eastern Europe, rely almost completely upon Russian state-owned monopolies for their energy supply. These monopolies act at the behest of the Kremlin and political motivations often outweigh financial incentives. The Putin administration has proved time and again in Ukraine, Czech Republic, Belarus, Poland, the Baltics, Georgia and others nations that it is willing and able to wield its energy dominance as a weapon of foreign policy. This paper's thesis is to determine how the United States and EU can limit this Russian influence over Europe. The paper begins with an analysis of the current key issues in the European-Russian energy relationship, including pipelines and infrastructure, Russian politics in the energy industry, and a history of past energy disputes while building an argument on why action is required. It then examines potential methods of countering Russian influence through increasing pipeline, supplier, and energy source diversity; enforcing current laws; and reforming the EU energy market. Critical analysis shows that gas market reform and diversifying suppliers are the best methods.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Exploring Sectarian Opportunities in the Middle East
Since the death of the Prophet Mohammad sectarian violence has existed in the Middle East. This monograph details the history of the Sunni - Shia split and explains the origins of the violence still present today. This conflict presents opportunities to Western governments and militaries to explore in the operational and strategic realms. Two dissimilar case studies, Yemen and Syria, are used to recommend engagements to exploit these opportunities. Both of these countries have existing or potential sectarian violence and clear tensions between the Sunni - Shia sects. Yemen has a sectarian insurgency led primarily by members of the Zaydi Tribe who were the former ruling party. The Shia Zaydi feel marginalized and targeted by Sunni extremists and al-Qaeda elements with-in Yemen. Western militaries must use the advisors already engaged in Yemen to convince the GoY to initiate the amnesty, reconciliation, and reintegration process in Yemen. This will undermine al-Qaeda initiatives in Yemen and, hopefully, build a bond between Sunnis and Shias creating a stronger, more stable governance structure. Syria is governed by a Shia minority. Western governments' isolationist policies toward Syria have pushed the Syrian minority government to become overly reliant on Iran. With the introduction of a new American Ambassador to Syria operational opportunities are present that have not existed in many years. Military to military exchanges, foreign military sales, and theater security cooperation exercises are ways western militaries can begin to exert influence in a country with which the American government and military has had little or no interaction. Leveraging a Sunni majority could help the United States to apply its national power in a positive way to shape the Shia minority government and drive a wedge between Syria and Iran.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.