Preface -- Abbreviations -- Key figures in the Mayaguez Crisis -- Introduction -- Day one: Monday, May 12 -- Day two: Tuesday, May 13 -- Day three: Wednesday, May 14 -- Day four: Thursday, May 15 -- Critical crisis decisions -- Explaining decisions, behaviors and outcomes -- Refining the explanation: rationality, bureaucracy and beliefs -- Findings, issues, prescriptions -- Conclusion.
In this book, two national-security experts put the exploits of America’s special operation forces in historical and strategic context. David Tucker and Christopher J. Lamb offer an incisive overview of America’s turbulent experience with special operations. Starting with in-depth interviews with special operators, the authors illustrate the diversity of modern special operations forces and the strategic value of their unique attributes. Despite longstanding and growing public fascination with special operators, these forces and their contribution to national security are poorly understood. With this book, Tucker and Lamb dispel common misconceptions and offer a penetrating analysis of how these unique and valuable forces can be employed to even better effect in the future. The book builds toward a comprehensive assessment of the strategic utility of special operations forces, which it then considers in light of the demands of future warfare. This second edition of United States Special Operations Forces, revised throughout to account for lessons learned in the twelve years since its first publication, includes two new case studies, one on High Value Target Teams and another on Village Stability Operations, and two new appendixes charting the evolution of special operation missions and the best literature on all aspects of U.S. special operation forces.
Just two weeks after the close of the Vietnam War, communist Cambodian Khmer Rouge elements seized the S.S. Mayaguez in international waters. Believing they had to act quickly, United States Marines boarded the ship, only to find the crew had been removed. They then launched an assault on a nearby island where they believed the crew had been taken. Instead of a quick strike against a limited foe, the Marines encountered major opposition and were quickly pinned down. With large numbers of Cambodians closing in all around, the a desperate firefight developed as US forces tried to extract the Marines. This book recounts the bloody struggle on Koh Tang island, as a badly botched hostage rescue turned into a desperate evacuation.
This publication is the eighth in the series The U.S. Navy and the Vietnam War. The publication focuses on the sealift and logistic operations during the war and includes a number of photographs as well as sidebars detailing specific people and ships involved in the logistic operations. This historical pictorial reference would be of interest to students, historians, members of the military, specifically the Navy, and military leaders, veterans, Vietnam War veterans, and the U.S. merchant marines.
This book sheds light on one of the most under-studied but powerful navies in the world. Using a multifaceted approach, it examines how the Republic of Korea Navy (ROKN) has sought to transform itself from a coastal naval force focused solely on deterring North Korea to a navy capable of operating in the blue waters of East Asia and beyond. The project argues that peninsular and regional security dynamics, technological developments, the US-South Korea alliance and internal politics combine to inform and shape ROKN modernisation.
The purchase of this ebook edition does not entitle you to receive access to the Connected eBook on CasebookConnect. You will need to purchase a new print book to get access to the full experience including: lifetime access to the online ebook with highlight, annotation, and search capabilities, plus an outline tool and other helpful resources. National Security Law and the Constitutionprovides a comprehensive examination and analysis of the inherent tension between the Constitution and select national security policies, and it explores the multiple dimensions of that conflict. Specifically, the Second Edition comprehensively explores the constitutional foundation for the development of national security policy and the exercise of a wide array of national security powers. Each chapter focuses on critically important precedents, offering targeted questions following each case to assist students in identifying key concepts to draw from the primary sources. Offering students a comprehensive yet focused treatment of key national security law concepts, National Security Law and the Constitution is well suited for a course that is as much an advanced “as applied” constitutional law course as it is a national security law or international relations course. New to the Second Edition: New author Gary Corn is the program director for the Tech, Law and Security Program at American University Washington College of Law, and most recently served as the Staff Judge Advocate to U.S. Cyber Command, the capstone to a distinguished career spanning over twenty-seven years as a military lawyer Two new chapters: Chapter 1 (An Introduction to the “National Security” Constitution), and Chapter 17 (National Security in the Digital Age) Professors and students will benefit from: An organizational structure tailored to present these national powers as a coherent “big picture,” with the aim of understanding their interrelationship with each other, and the legal principles they share A comprehensive treatment of the relationship between constitutional, statutory, and international law, and the creation and implementation of policies to regulate the primary tools in the government’s national security arsenal Targeted case introductions and follow-on questions, enabling students to maximize understanding of the text Text boxes illustrating key principles with historical events, and highlight important issues, rules, and principles closely related to the primary sources Chapters that focus on primary or key authorities with limited diversion into secondary sources A text structure generally aligned to fit a three-hour, one-semester course offering