The main aim of this book is to argue that the use of private force by states has been restricted by a norm against mercenary use. The book traces the evolution of this norm, from mercenaries in medieval Europe through to private security companies in modern day Iraq, telling a story about how the mercenaries of yesterday have evolved into those of today in the process. The norm against mercenaries has two components. First, mercenaries are considered to be immoral because they use force outsid...
In the twenty-first century, the Indo-Pacific, which spans from the western Pacific Ocean to the western Indian Ocean along the eastern coast of Africa, has emerged as a crucial geostrategic region for trade, investment, energy supplies, cooperation, and competition. It presents complex maritime security challenges and interlocking economic interests that require the development of an overarching multilateral security framework. This volume develops common approaches by focusing on geopolitical...
Security Meets Gender Equality in the EU (Gender and Politics)
by Lucrecia Rubio Grundell
This book explores the triangular dynamics of securitisation and desecuritisation that underpin the EU’s approach to trafficking in women for sexual exploitation. That is, the progressive securitisation of trafficking in women for sexual exploitation within the EU’s anti-trafficking policies and the existence of two distinct and competing approaches that coexist among feminist struggles against such trend and that largely follow the two opposing views that structure feminist debates on prostitut...
Domestic Trends in the United States, China, and Iran (Rand Corporation Monograph)
by John Gordon, Robert W Button, Karla J Cunningham, Toy I Reid, Irv Blickstein, Peter A Wilson, and Andreas Goldthau
A startling spotlight on the darkest corners of America's "War on Terror," where nothing is quite what it seems. The Convenient Terrorist is the definitive inside account of the capture, torture, and detention of Abu Zubaydah, the first "high-value target" captured by the CIA after 9/11. But was Abu Zubaydah, who is still being indefinitely held by the United States under shadowy circumstances, the blue-ribbon capture that the Bush White House claimed he was? Authors John Kiriakou, who led the...
The Influence of Polictics, Technology, and Asia on the Future of U.S. Missile Defense
by Jeffrey T Butler
British Fighting Methods in the Great War
This collection points out the very real and substantial evolution of tactics that went on in response to new warfare and how this had a real effect on the positive performance of the British Army from 1916 onwards.
Making Twenty-First-Century Strategy - An Introduction to Modern National Security Processes and Problems
by Donald M. Snow and Dennis M. Drew
Rethinking the Nature of War (Contemporary Security Studies) (Cass Contemporary Security Studies)
by Jan Angstrom and Isabelle Duyvesteyn
Have globalization, virulent ethnic differences, and globally operating insurgents fundamentally changed the nature of war in the last decade? Interpretations of war as driven by politics and state rationale, formulated most importantly by the 19th century practitioner Carl von Clausewitz, have received strong criticism. Political explanations have been said to fall short in explaining conflicts in the Balkans, Africa, Asia and the attacks of 11 September 2001 in the United States.This book re...
Hybrid Warfare
This book is available as open access through the Bloomsbury Open Access programme and is available on www.bloomsburycollections.com. Hybrid Warfare refers to a military strategy that blends conventional warfare, so-called 'irregular warfare' and cyber-attacks with other influencing methods, such as fake news, diplomacy and foreign political intervention. As Hybrid Warfare becomes increasingly commonplace, there is an imminent need for research bringing attention to how these challenges can be...
National security intelligence is a vast, complicated, and important topic, whose workings have often been hidden beneath thick veils of secrecy. Combining scholarly depth with insider knowledge, National Security Intelligence is the definitive introduction to the field, written by a leading authority on intelligence agencies.
At least two things are certain about world politics today: environmental problems are important, and discourses on security remain powerful. Environment and security have been progressively linked in theory, and environmental security is now manifest in policy. But the meaning of environmental security is ambiguous and open to appropriation, and an examination of its various interpretations and applications reveals much about the state of global environmental politics. This book offers a compr...
Accountability and democracy in Poland and Spain (Studies in Politics, Security and Society, #8)
by Anna Sroka
This book is a response to the need for scientific research on one of the components of quality of democracy, id est accountability. The author analyses thoroughly in cross-section the accountability mechanisms in Poland and Spain. This approach required that each of the issues under investigation be reviewed synthetically, and only the aspects meaningful for the notion of accountability have been explored. This book may be a starting point for further, more in-depth analyses of accountability,...
The NSA Report
by Richard A Clarke, Michael J. Morell, Geoffrey R. Stone, Cass R Sunstein, and Peter Swire
"We cannot discount the risk, in light of the lessons of our own history, that at some point in the future, high-level government officials will decide that this massive database of extraordinarily sensitive private information is there for the plucking. Americans must never make the mistake of wholly 'trusting' our public officials."--The NSA Report This is the official report that is helping shape the international debate about the unprecedented surveillance activities of the National Security...
U.S. Army Futures Command Research Program Realignment
The U.S. Army Futures Command (AFC) leads a continuous effort to modernize and innovate to support future warfighters. AFC now oversees Combat Capability Development Command and has recently reorganized certain research offices, laboratories, and engineering centers. In response to this realignment, the Senate Armed Services Committee asked the National Academies' Board on Army Research and Development to examine these research portfolio changes and assess their impact. This report investigates...
A Federal Volunteer Regiment in the Philippine Insurrection
by United States Army Command and General S
Right-wing Extremism in the Twenty-first Century (Cass Series on Political Violence)
Revising the 1997 first edition, this study covers events that occurred in Oldham and Bradford after the year 2000. The rise of right-wing extremist groups is put under scrutiny in a number of states including Britain, Germany, Austria, Russia and France.
Envisioning Uncertain Futures (Zukunft und Forschung)
This book contains a collection of projects and scenarios dealing with new risks from emerging technologies, future peace keeping operations, and water distribution issues by combining analysis with dialogue. Special attention is paid to the methodology of narrative scenarios, and the role of imagination in the generation of these scenarios. Appearing as short stories, narrative scenarios include a great amount of explicit and implicit knowledge and they need story telling skills to become consi...
Since Pakistan was founded in 1947, its army has dominated the state. The military establishment has locked the country in an enduring rivalry with India, with the primary aim of wresting Kashmir from it. To that end, Pakistan initiated three wars over Kashmir-in 1947, 1965, and 1999-and failed to win any of them. Today, the army continues to prosecute this dangerous policy by employing non-state actors under the security of its ever-expanding nuclear umbrella. It has sustained a proxy war in Ka...
The Dual-System Problem in Complex Conflicts
by Melissa Gregg and Robert D. Lamb
Through a rigorous critique of the dominant narrative of the Rwandan genocide, Collins provides an alternative argument to the debate situating the killings within a historically-specific context and drawing out a dynamic interplay between national and international actors.
Innovation and Adaptation in War (Belfer Center Studies in International Security)
by Matthew A. Tattar
Playing the Identity Card: Surveillance, Security and Identification in Global Perspective