A collection of the papers from the 1995 Sandhurst conference presented by leading members of the armed forces, the media and academia. The conference marked a major advance in British thinking on this very topical and fast-moving subject, bringing together authorities from various fields in a multidisciplinary investigation which has been, and will be of great interest to a wide variety of specialist readers.
For more than a century, from 1900 to 2006, campaigns of nonviolent resistance were more than twice as effective as their violent counterparts in achieving their stated goals. By attracting impressive support from citizens, whose activism takes the form of protests, boycotts, civil disobedience, and other forms of nonviolent noncooperation, these efforts help separate regimes from their main sources of power and produce remarkable results, even in Iran, Burma, the Philippines, and the Palestinian Territories. Combining statistical analysis with case studies of specific countries and territories, Erica Chenoweth and Maria J. Stephan detail the factors enabling such campaigns to succeed and, sometimes, causing them to fail. They find that nonviolent resistance presents fewer obstacles to moral and physical involvement and commitment, and that higher levels of participation contribute to enhanced resilience, greater opportunities for tactical innovation and civic disruption (and therefore less incentive for a regime to maintain its status quo), and shifts in loyalty among opponents' erstwhile supporters, including members of the military establishment. Chenoweth and Stephan conclude that successful nonviolent resistance ushers in more durable and internally peaceful democracies, which are less likely to regress into civil war. Presenting a rich, evidentiary argument, they originally and systematically compare violent and nonviolent outcomes in different historical periods and geographical contexts, debunking the myth that violence occurs because of structural and environmental factors and that it is necessary to achieve certain political goals. Instead, the authors discover, violent insurgency is rarely justifiable on strategic grounds.
This innovative new text focuses on the politics of international security: how and why issues are interpreted as threats to international security and how such threats are managed. After a brief introduction to the field and its major theories and approaches, the core chapters systematically analyze the major issues on the contemporary international security agenda. Each is examined according to a common framework that brings out the nature of the threat and the responses open to policy makers. From war, terrorism and weapons of mass destruction, through environmental and economic crises, to epidemics, cyber-war and piracy, the twenty-first century world seems beset by a daunting range of international security problems. At the same time, the academic study of security has become more fragmented and contested than ever before as new actors, issues and theories increasingly challenge traditional concepts and approaches. This new edition has been heavily revised to discuss for the failings of the Obama admiration and its strategic partners on a number of different security issues, and the constant, evolving instances of turmoil the world has experienced since, whilst providing the skills students need to conduct their own research of international security issues occurring outside of this text, and for issues yet to occur. Cyber security, the 'Arab Spring' revolutions, the Ebola outbreak, and the refugee crisis are just some examples of the plethora of subjects that Smith analyses within this text. This textbook is an essential for those studying international security, whether at undergraduate or postgraduate level as part of a degree in international relations, politics, and other social sciences more generally. New to this Edition: - Chapter on cyber security - Up-to-date issues and field coverage - New 'mini-case studies' in each chapter - Updated analytical/pedagogical framework Pioneering framework for students to apply theory and empirical evidence correctly to tackle analytical and comparative tasks concerning both traditional and non-traditional security issues
Conventional wisdom among policymakers in both the US and Europe holds that weak and failing states are the source of the world's most pressing security threats today. However, as this book shows, our assumptions about the threats posed by failed and failing states are based on false premises.
This book develops the idea that since decolonisation, regional patterns of security have become more prominent in international politics. The authors combine an operational theory of regional security with an empirical application across the whole of the international system. Individual chapters cover Africa, the Balkans, CIS Europe, East Asia, EU Europe, the Middle East, North America, South America, and South Asia. The main focus is on the post-Cold War period, but the history of each regional security complex is traced back to its beginnings. By relating the regional dynamics of security to current debates about the global power structure, the authors unfold a distinctive interpretation of post-Cold War international security, avoiding both the extreme oversimplifications of the unipolar view, and the extreme deterritorialisations of many globalist visions of a new world disorder. Their framework brings out the radical diversity of security dynamics in different parts of the world.
International Security Studies (ISS) has changed and diversified in many ways since 1945. This book provides the first intellectual history of the development of the subject in that period. It explains how ISS evolved from an initial concern with the strategic consequences of superpower rivalry and nuclear weapons, to its current diversity in which environmental, economic, human and other securities sit alongside military security, and in which approaches ranging from traditional Realist analysis to Feminism and Post-colonialism are in play. It sets out the driving forces that shaped debates in ISS, shows what makes ISS a single conversation across its diversity, and gives an authoritative account of debates on all the main topics within ISS. This is an unparalleled survey of the literature and institutions of ISS that will be an invaluable guide for all students and scholars of ISS, whether traditionalist, 'new agenda' or critical.
CMH 72-23. Provides one in a series of 40 illustrated brochures that describe the campaigns in which U.S. Army troops participated during the war. Each brochure describes the strategic setting, traces the operations of the major American units involved, and analyzes the impact of the campaign on future operations. Other Related Publications: United States Army and World War 2: European, Mediterranean, Middle East Theaters of Operations (CD-ROM) is available here: https://bookstore.gpo.gov/products/sku/008-029-00376-7 Tunisia: The Army Campaigns of World War II -Print Paperback Pamphlet format -is available here: https://bookstore.gpo.gov/products/sku/008-029-00261-2 World War II resources collection can be found here: https://bookstore.gpo.gov/catalog/us-military-history/battles-wars/world-war-ii Other publications produced by the US Army, Center of Military History (CMH) can be found here: https://bookstore.gpo.gov/agency/1061
This book offers a multidisciplinary analysis of emerging technologies and their impact on the new international security environment across three levels of analysis. While recent technological developments, such as Artificial Intelligence (AI), robotics and automation, have the potential to transform international relations in positive ways, they also pose challenges to peace and security and raise new ethical, legal and political questions about the use of power and the role of humans in war and conflict. This book makes a contribution to these debates by considering emerging technologies across three levels of analysis: (1) the international system (systemic level) including the balance of power; (2) the state and its role in international affairs and how these technologies are redefining and challenging the state’s traditional roles; and (3) the relationship between the state and society, including how these technologies affect individuals and non-state actors. This provides specific insights at each of these levels and generates a better understanding of the connections between the international and the local when it comes to technological advance across time and space The chapters examine the implications of these technologies for the balance of power, examining the strategies of the US, Russia, and China to harness AI, robotics and automation (and how their militaries and private corporations are responding); how smaller and less powerful states and non-state actors are adjusting; the political, ethical and legal implications of AI and automation; what these technologies mean for how war and power is understood and utilized in the 21st century; and how these technologies diffuse power away from the state to society, individuals and non-state actors. This volume will be of much interest to students of international security, science and technology studies, law, philosophy, and international relations.
National secuirty strategy is a vast subject involving a daunting array of interrelated subelements woven in intricate, sometimes vague, and ever-changing patterns. Its processes are often irregular and confusing and are always based on difficult decisions laden with serious risks. In short, it is a subject understood by few and confusing to most. It is, at the same time, a subject of overwhelming importance to the fate of the United States and civilization itself. Col. Dennis M. Drew and Dr. Donald M. Snow have done a considerable service by drawing together many of the diverse threads of national security strategy into a coherent whole. They consider political and military strategy elements as part of a larger decisionmaking process influenced by economic, technological, cultural, and historical factors. I know of no other recent volume that addresses the entire national security milieu in such a logical manner and yet also manages to address current concerns so thoroughly. It is equally remarkable that they have addressed so many contentious problems in such an evenhanded manner. Although the title suggests that this is an introductory volume - and it is - I am convinced that experienced practitioners in the field of national security strategy would benefit greatly from a close examination of this excellent book. Sidney J. Wise Colonel, United States Air Force Commander, Center for Aerospace Doctrine, Research and Education
Cyber influence is an ongoing source of power in the international security arena. Although the U.S. has an enormous cyber information capacity, its cyber influence is not proportional to that capacity. This pub. by the Nat. Defense University Center for Technology and National Security Policy discusses impediments to American cyber influence. It also offers a multifaceted strategy to enhance the influence of the U.S in cyberspace that differentiates the circumstances of the messages, key places of delivery, and sophistication with which message are created and delivered, with particular focus on channels and messengers.