- Table View
- List View
Security Dynamics in the South China Sea: Contemporary Challenges and Opportunities (Military Strategy and Operational Art)
by Howard M. HenselThis volume examines the South China Sea’s regional security dynamics, highlighting the challenges and opportunities for both littoral and non-littoral states.The South China Sea is a vital pathway for the great container ships and tankers, as well as for the naval vessels of today. Indeed, the security of the contemporary global economy is reliant more than ever upon the dependability of freedom of navigation through the waters of the South China Sea. This volume concentrates on the security of the South China Sea sub-region. It is designed to help illuminate the contemporary security dynamics within this important sub-region by highlighting its development, the contemporary challenges and opportunities confronting both the littoral states and the non-littoral powers that are active in the sub-region, and the policy responses of those states as they seek to defend and promote their national interests. This book is composed of 16 chapters and is organized into five thematic sections. Part I of the book is designed to set the historical context. Part II examines some of the contemporary challenges and opportunities that present themselves in the sub-region, while Part III focuses on Chinese policy in the South China Sea sub-region. Parts IV and Part V analyse and evaluate the contemporary policies of the various littoral and non-littoral powers that are active in the South China Sea sub-region. The collective analyses and assessments of the contemporary perceptions and policies of the various littoral and non-littoral powers active in the South China Sea in response to the traditional and non-traditional challenges within the sub-region that are examined in the chapters contained in Parts III, IV, and V, framed against the material presented in Parts I and II, provides the basis for observations concerning areas of conflicting and coinciding interests in the concluding chapter of the book.This book will be of interest to students of the South China Sea, maritime security, Asian politics, and international relations.
Security First: For a Muscular, Moral Foreign Policy
by Amitai Etzioni"Rarely have more profound changes in American foreign policy been called for than today," begins Amitai Etzioni in the preface to this book. Yet Etzioni's concern is not to lay blame for past mistakes but to address the future: What can now be done to improve U. S. relations with the rest of the world? What should American policies be toward recently liberated countries such as Iraq and Afghanistan, or rogue states like North Korea and Iran? When should the United States undertake humanitarian intervention abroad? What must be done to protect America from nuclear terrorism? The author asserts that providing basic security must be the first priority in all foreign policy considerations, even ahead of efforts to democratize. He sets out essential guidelines for a foreign policy that makes sense in the real world, builds on moral principles, and creates the possibility of establishing positive relationships with Muslim nations and all others. Etzioni has considered the issues deeply and for many years. His conclusions fall into no neat categories--neither "liberal" nor "conservative"--for he is guided not by ideology but by empirical evidence and moral deliberation. His proposal rings with the sound of reason, and this important book belongs on the reading list of every concerned leader, policy maker, and voter in America.
Security Force Assistance in Afghanistan: Identifying Lessons for Future Efforts
by Olga Oliker Nora Bensahel Terrence K. KellySecurity force assistance (SFA) is a central pillar of the counterinsurgency campaign being waged by U.S. and coalition forces in Afghanistan. This monograph analyzes SFA efforts in Afghanistan over time, documents U.S. and international approaches to building the Afghan force from 2001 to 2009, and provides observations and recommendations that emerged from extensive fieldwork in Afghanistan in 2009 and their implications for the U.S. Army.
The Security Implications of the New Taiwan (Adelphi series #No. 331)
by Bernice LeeHow can fresh conflict between China and Taiwan be avoided? This paper argues that unless the key players - Taiwan, China and the US - accept the existence of a new and increasingly democratic Taiwan, the conflict across the Taiwan Straits will remain one of the most contentious and dangerous in East Asia.
Security in Iraq: A Framework for Analyzing Emerging Threats as U. S. Forces Leave
by Terrence K. Kelly Jessica Watkins David C. GompertU.S. withdrawal could affect Iraq's internal security and stability, which could, in turn, affect U.S. strategic interests and the safety of U.S. troops and civilians in Iraq. U.S. policy-makers need a dynamic analytic framework with which to examine the shifting motivations and capabilities of the actors that affect Iraq's security. Within this framework, the United States should be able to contribute to continued strengthening of the internal security and stability of Iraq even as it withdraws its forces.
Security, Law and Borders: At the Limits of Liberties (Routledge Studies in Liberty and Security)
by Tugba BasaranThis book focuses on security practices, civil liberties and the politics of borders in liberal democracies. In the aftermath of 9/11, security practices and the denial of human rights and civil liberties are often portrayed as an exception to liberal rule, and seen as institutionally, legally and spatially distinct from the liberal state. Drawing upon detailed empirical studies from migration controls, such as the French waiting zone, Australian off-shore processing and US maritime interceptions, this study demonstrates that the limitation of liberties is not an anomaly of liberal rule, but embedded within the legal order of liberal democracies. The most ordinary, yet powerful way, of limiting liberties is the creation of legal identities, legal borders and legal spaces. It is the possibility of limiting liberties through liberal and democratic procedures that poses the key challenge to the protection of liberties. The book develops three inter-related arguments. First, it questions the discourse of exception that portrays liberal and illiberal rule as distinct ways of governing and scrutinizes liberal techniques for limiting liberties. Second, it highlights the space of government and argues for a change in perspective from territorial to legal borders, especially legal borders of policing and legal borders of rights. Third, it emphasizes the role of ordinary law for illiberal practices and argues that the legal order itself privileges policing powers and prevents access to liberties. This book will be of interest to students of critical security studies, social and political theory, political geography and legal studies, and IR in general.
Security, Loyalty, and Science (Cornell Studies in Civil Liberties)
by Walter GellhornBoth sides of a sensitive problem are assessed by Professor Gellhorn in this penetrating analysis of national security and its effect upon scientific progress.The costs and advantages of secrecy in certain areas of science and the conflict between national safety and individual rights in the administration of our federal loyalty program are presented; all the arguments are objectively weighed. The book answers such questions as: Can young scientists be well trained when publication and teaching are not free? Have we gone far enough-or too far-in avoiding "security risks" in important scientific establishments? How does the federal drive against "potentially disloyal" persons actually work? Do "fear of the smear" and crude methods discourage public service by American scientists?This study, a unit of an investigation of control of subversive activities supported by grants from the Rockefeller Foundation, is based upon two years of research and numerous field interviews of scientists, administrators, defense officials, and educators. Security, Loyalty, and Science is a volume in the series Cornell Studies in Civil Liberty, of which Robert E. Cushman is advisory editor.
Security, Rights and Law: The Israeli High Court of Justice and Israeli Settlements in the Occupied West Bank (Comparative Constitutionalism in Muslim Majority States)
by Rouba Al-SalemThis book examines how the Israeli High Court of Justice (HCJ) has interpreted and applied international law principles in adjudicating petitions filed by Palestinians. The research focuses on HCJ judgments that have been rendered since the outbreak of the Second Intifada (2000) in relation to petitions challenging the legality of measures implemented by various Israeli governments and military authorities for the professed need of enhancing the security of Israeli settlements and settlers in the occupied West Bank. It discusses to what extent the HCJ provides a venue for an effective domestic remedy for alleged violations of the Palestinians’ internationally protected rights. It further analyses the judgments of the Court seeking to demonstrate why it appears to show a preference for invoking principles of Israeli administrative and constitutional law, thereby promoting the domestic rather than international Rule of Law. Although the jurisprudence of the HCJ has often been hailed as that of an ‘activist’ court, the analysis of petitions adjudicated by the Court between 2000 and 2014 illustrates why its approach is ill-suited to a situation of prolonged military occupation. Finally, the book evaluates what impact the Court’s adjudication, reasoning and interpretation has on the normative coherence of the international law of belligerent occupation.
Security, Risk and the Biometric State: Governing Borders and Bodies (PRIO New Security Studies)
by Benjamin J MullerThis book examines a series of questions associated with the increasing application and implications of biometrics in contemporary everyday life. In the wake of the events of 9/11, the reliance on increasingly sophisticated and invasive technologies across a burgeoning field of applications has accelerated, giving rise to the term 'biometric state'. This book explores how these ‘virtual borders’ are created and the effect they have upon the politics of citizenship and immigration, especially how they contribute to the treatment of citizens as suspects. Finally and most importantly, this text argues that the rationale of 'governing through risk' facilitates pre-emptory logics, a negligent attitude towards 'false positives', and an overall proliferation of borders and ubiquitous risk, which becomes integral to contemporary everyday life, far beyond the confined politics of national borders and frontiers. By focusing on specific sites, such as virtual borders in airports, trusted traveller programs like the NEXUS program and those delivered by airlines and supported by governmental authorities (TSA and CATSA respectively), this book raises critical questions about the emerging biometric state and its commitment and constitution vis-à-vis technology of ‘governing through risk’. This book will be of interest to students of biopolitics, critical security, surveillance studies and International Relations in general. Benjamin J. Muller is assistant professor in International Relations at Simon Fraser University, Burnaby, Canada. He completed his PhD in the School of Politics and International Studies at Queen’s University Belfast, Northern Ireland, in 2005.
Security Sector Reconstruction and Reform in Peace Support Operations
by Michael Brzoska and David LawThis volume provides a framework for analyzing security sector reform under international tutelage.Following violent conflict and military interventions, international organizations or coalitions of countries increasingly engage in post-conflict reconstruction. Part of the international post-conflict agenda is thereconstruction orreform of th
Security Sector Reform in Southeast Asia
by Felix HeidukSuccessful reform of the security sector has been regarded as pivotal for a successful transition from authoritarianism to democracy by Western donors. A global cast of contributors examines SSR in a variety of policy fields in Southeast Asia, paying specific attention to the adaption of 'Western' reform concepts by local actors.
Security Sector Reform in Ukraine
by Andrew Radin Andriy Bega Bryan Frederick Celeste Ward Gventer Hlavka Jacopo Bellasio James T. Quinlivan Keith Crane Lynn E. Davis Olga Oliker Stephan B. Seabrook Susanne SondergaardThe Maidan Revolution in Ukraine created an opportunity for change and reforms in a system that had resisted them for 25 years. This report examines Ukraine’s security sector—assessing what different institutions need to do and where gaps exist—and offers recommendations for the reform of Ukraine’s security and defense institutions that meet Ukraine’s security needs and align with Euro-Atlantic standards and approaches.
Security Strategies and American World Order: Lost Power (Contemporary Security Studies)
by Birthe Hansen Peter Toft Anders WivelThis book analyses security strategies in the American world order, systematically comparing Russian, Middle Eastern and European policies. The main finding is that the loss of relative power has decisive importance for the security strategies of states, but that particular strategies can only be explained when relative power is combined with ideology and the probability of military conflict. Research on the unipolar world order has focused largely on the general dynamics of the system and the actions of the American unipole. By contrast, this book focuses on states that lost out relatively as a consequence of unipolarity, and seeks to explain how this loss has affected their security strategies. Thus, in essence, the book tells ‘the other side of the story’ about the contemporary world order. In addition, it makes an important theoretical contribution by systematically coupling relative ideology and relative security with relative power and exploring their explanatory value. This book will be of great interest to students of international relations, security studies and foreign policy.
Security, Strategy and Military Change in the 21st Century: Cross-Regional Perspectives (Cass Military Studies)
by Jo Inge Bekkevold Ian Bowers Michael RaskaThis edited volume explores and analyses strategic thinking, military reform and adaptation in an era of Asian growth, European austerity and US rebalancing. A significant shift in policy, strategy and military affairs is underway in both Asia and Europe, with the former gaining increasing prominence in the domain of global security. At the same time, the world’s powers are now faced with an array of diverse challenges. The resurgence of great power politics in both Europe and Asia, along with the long term threats of terrorism, piracy and sustained geopolitical instability has placed great strain on militaries and security institutions operating with constrained budgets and wary public support. The volume covers a wide range of case studies, including the transformation of China’s military in the 21st century, the internal and external challenges facing India, Russia’s military modernization program and the USA’s reassessment of its strategic interests. In doing so, the book provides the reader with the opportunity to conceptualize how strategic thinking, military reform, operational adaptation and technological integration have interacted with the challenges outlined above. With contributions by leading scholars and practitioners from Europe and Asia, this book provides a valuable contribution to the understanding of strategic and operational thinking and adjustment across the world. This book will be of much interest to students of military and strategic studies, security studies, defence studies, Asian politics, Russian politics, US foreign policy and IR in general.
Security v. Liberty: Conflicts Between National Security and Civil Liberties in American History
by Daniel FarberIn the weeks following 9/11, the Bush administration launched the Patriot Act, rejected key provisions of the Geneva Convention, and inaugurated a sweeping electronic surveillance program for intelligence purposes―all in the name of protecting national security. But the current administration is hardly unique in pursuing such measures. <p><p>In Security v. Liberty, Daniel Farber leads a group of prominent historians and legal experts in exploring the varied ways in which threats to national security have affected civil liberties throughout American history. Has the government's response to such threats led to a gradual loss of freedoms once taken for granted, or has the nation learned how to restore civil liberties after threats subside and how to put protections in place for the future? Security v. Liberty focuses on periods of national emergency in the twentieth century―from World War I through the Vietnam War―to explore how past episodes might bear upon today's dilemma. <p><p>Distinguished historian Alan Brinkley shows that during World War I the government targeted vulnerable groups―including socialists, anarchists, and labor leaders―not because of a real threat to the nation, but because it was politically expedient to scapegoat unpopular groups. Nonetheless, within ten years the Supreme Court had rolled back the most egregious of the World War I restrictions on civil liberties. <p><p>Legal scholar John Yoo argues for the legitimacy of the Bush administration's War on Terror policies―such as the detainment and trials of suspected al Qaeda members―by citing historical precedent in the Roosevelt administration's prosecution of World War II. Yoo contends that, compared to Roosevelt's sweeping use of executive orders, Bush has exercised relative restraint in curtailing civil liberties. <p><p>Law professor Geoffrey Stone describes how J. Edgar Hoover used domestic surveillance to harass anti-war protestors and civil rights groups throughout the 1960s and early 1970s. Congress later enacted legislation to prevent a recurrence of the Hoover era excesses, but Stone notes that the Bush administration has argued for the right to circumvent some of these restrictions in its campaign against terrorism. Historian <p><p>Jan Ellen Lewis looks at early U.S. history to show how an individual's civil liberties often depended on the extent to which he or she fit the definition of "American" as the country's borders expanded. <p><p>Legal experts Paul Schwartz and Ronald Lee examine the national security implications of rapid advances in information technology, which is increasingly driven by a highly globalized private sector, rather than by the U.S. government. <p><p>Security v. Liberty shows that civil liberties are a not an immutable right, but the historically shifting result of a continuous struggle that has extended over two centuries. This important new volume provides a penetrating historical and legal analysis of the trade-offs between security and liberty that have shaped our national history―trade-offs that we confront with renewed urgency in a post-9/11 world.
The Security Watershed: Russians Debating Defense and Foreign Policy after the Cold War (Routledge Library Editions: Cold War Security Studies #44)
by Alexei G. ArbatovThis book, first published in 1993, is an analytical review that discusses the changes in the international security policies of the USA and USSR at the end of the Cold War, as well as the main events that occurred in the area of arms control. A distinctive feature of this work is the detailed analysis of competing Russian views concerning arms control agreements and Russian military reforms.
Seduced by Her Rebel Warrior (Harlequin Historical Ser.)
by Greta GilbertA forbidden warriorAn irresistible seduction!Atia’s father, a Roman governor, wants her help to quash a rebellion in his lands. But ordered to keep a close eye on a rebel prisoner, Rab, downtrodden Atia is utterly spellbound. When she’s sent with Rab on a punishing mission through Arabia, their instant, wild attraction becomes a powerful longing. Atia must choose: guard her damaged heart forever or surrender to the promise of pleasure in Rab’s arms…“Singing with atmosphere and with scholarship, In Thrall to the Enemy Commander gives us an enigmatic heroine who fascinates at every turn, and immerses us fully in a world long-gone, but wonderfully-conjured.”— Romantic Intentions Quarterly on In Thrall to the Enemy Commander“Greta Gilbert is a truly gifted author…This amazing story has it all. Suspense, intrigue, duplicity, conspiracies, betrayal and most abundantly it has love.”— Goodreads on In Thrall to the Enemy Commander
Seduced by the Wealthy Playboy (The Garrisons #1813)
by Sara OrwigUnless Brittany Garrison came up withcold hard cash right away, she'd lose herbeloved restaurant. So when handsomemillionaire Emilio Jefferies offered her anirresistible proposition, Brittany signedon the dotted line and sealed the dealwith a kiss-unaware of the family feudbetween the Jefferies and the Garrisons.Or Emilio's cruel intentions.Emilio hadn't expected the takeover-business and body-of Brittany Garrison to be so easy. But he also didn't counton Brittany owning a part of him.
Seducing the Marine
by Kate HoffmannSubject: Marine Will MacIntyre Current Status: Medical leave One day a year Will MacIntyre lets himself remember the woman who left him after he enlisted. But seven years later, on the anniversary of that fateful day, Will is defusing a bomb in Afghanistan-and it explodes. Dr. Oliva Eklund can barely find the boy she loved inside the hard, chiseled body of the man Will is now-a Marine who knows just how to tempt her, just how to seduce her. Olivia is well aware that Will plans to return to his unit after he recovers, but she can't resist trying to heal him. Even if it means sending him back into a war zone. And breaking them apart forever.
See It/Shoot It: The Secret History of the CIA's Lethal Drone Program
by Christopher J. FullerAn illuminating study tracing the evolution of drone technology and counterterrorism policy from the Reagan to the Obama administrations This eye-opening study uncovers the history of the most important instrument of U.S. counterterrorism today: the armed drone. It reveals that, contrary to popular belief, the CIA’s covert drone program is not a product of 9/11. Rather, it is the result of U.S. counterterrorism practices extending back to an influential group of policy makers in the Reagan administration. Tracing the evolution of counterterrorism policy and drone technology from the fallout of Iran-Contra and the CIA’s “Eagle Program” prototype in the mid-1980s to the emergence of al-Qaeda, Fuller shows how George W. Bush and Obama built upon or discarded strategies from the Reagan and Clinton eras as they responded to changes in the partisan environment, the perceived level of threat, and technological advances. Examining a range of counterterrorism strategies, he reveals why the CIA’s drones became the United States’ preferred tool for pursuing the decades-old goal of preemptively targeting anti-American terrorists around the world.
The Seed and the Sower
by Sir Laurens Van Der PostWhat follows is the story of two British officers whose spirit the Japanese try to break. Yet out of all the violence and misery strange bonds are forged between prisoners - and their gaolers. In a battle for survival that becomes a battle of contrasting wills and philosophies as the intensity of the men's relationships develop.
The Seed of Evil
by Barrington J. BayleyAfter The Knights of the Limits, here is a second collection of endlessly inventive stories by Barrington J. Bayley; dark fables resounding with sombre undertones - love used as a weapon, God assassinated by the ingenuity of man, the secret of death revealed, the inexplicable explained! Tales which will be pondered on, and remembered.Contains the following:Sporting with the ChidThe God-GunThe Ship that Sailed the Ocean of SpaceThe Radius RidersMan in TransitWizard Wazo's RevengeThe Infinite SearchlightIntegrityPerfect LoveThe CountenanceLife TrapFarewell Dear BrotherThe Seed of Evil
The Seeds of Disaster: The Development of French Army Doctrine, 1919–39 (Stackpole Military History Series)
by Robert A DoughtyAn examination of the military doctrine that animated the French defense against the German invasion in 1940.
Seeds of Terror: An Eyewitness Account of Al Qaeda's Newest Center of Operations in Southeast Asia
by Maria RessaFor anyone wishing to understand the next, post-9/11 generation of al-Qaeda planning, leadership, and tactics, there is only one place to begin: Southeast Asia. In fact, such countries as the Philippines, Indonesia, Thailand, and Malaysia have been crucial nodes in the al-Qaeda network since long before the strikes on the Pentagon and World Trade Center, but when the allies overran Afghanistan, the new camps in Southeast Asia became the key training grounds for the future. It is in the Muslim strongholds in the Philippines and Indonesia that the next generation of al-Qaeda can be found. In this powerful, eye-opening work, Maria Ressa casts the most illuminating light ever on this fascinating but little-known "terrorist HQ." Every major al-Qaeda attack since 1993 has had a connection to the Philippines, and Maria Ressa, CNN's lead investigative reporter for Asia and a Filipino-American who has lived in the region since 1986, has broken story after story about them. From the early, failed attempts to assassinate Pope John Paul II and Bill Clinton to the planning of the 9/11 strikes and the "48 Hours of Terror," in which eleven American jetliners were to be blown up over the Pacific, she has interviewed the terrorists, their neighbors and families, and the investigators from six different countries who have tracked them down. After the Bali bombing, al-Qaeda's worst strike since 9/11, which killed more than two hundred, Ressa broke major revelations about how it was planned, why it was a Plan B substitute for an even more ambitious scheme aimed at Singapore, and why the suicide bomber recruited to deliver the explosives almost caused the whole plan to fall apart when he admitted he could barely drive a car. Above all, Ressa has seen how al-Qaeda's tactics are shifting under the pressures of the war on terror. Rather than depending upon its own core membership (estimated at three to four thousand at its peak), the network is now enmeshing itself in local conflicts, co-opting Muslim independence movements wherever they can be found, and helping local "revolutionaries" to fund, plan, and execute sinister attacks against their neighbors and the West. If history is any guide, al-Qaeda revisits its plans over and over until they can succeed -- and many of those plans have already been discovered and are here revealed, thanks to classified investigative documents uncovered by Ressa.
Seeing Redd (The Looking Glass Wars #2)
by Frank BeddorWhen Alyss Heart returns to her rightful place on the throne of Wonderland, she is put to the test as enemies, both inside and outside the borders of her queendom, push their own agendas, while she strives to unify them all.