You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
The response of an autocratic nation's armed forces is crucial to the outcome of democratization movements throughout the world. But what exact internal conditions have led to real-world democratic transitions, and have external forces helped or hurt? Here, experts with military and policy backgrounds, some of whom have played a role in democratic transitions, present instructive case studies of democratic movements. Focusing on the specific domestic context and the many influences that have contributed to successful transitions, the authors write about democratic civil-military relations in fourteen countries and five world regions. The cases include Argentina, Chile, El Salvador, Egypt, Hu...
In the wake of the 9/11 terrorist attacks, the Pentagon may have expanded its counter-terrorism intell. activities as part of the global war on terror. The DoD may have been conducting certain kinds of counterterrorism intell. activities that would statutorily qualify as ¿covert actions (CA),¿ and thus require a presidential finding and the notification of the congressional intell. committees. Contents of this report: Intro.; Background; Post 9/11 Concerns; Current Statute Governing CA; Exceptions Under the Statutory Definition of CA; Traditional Military Activities ; Routine Support of Traditional Military Activities; House Intell. Committee Calls on DoD to Inform Committee of Intell. Activities; Policy Issues for the 111th Congress.
Legislation enacted in 1980 gave the executive branch authority to limit advance notification of especially sensitive covert actions to 8 Members of Congress -- the ¿Gang of Eight¿ (G8) -- when the Pres. determines that it is essential to limit prior notice in order to meet extraordinary circumstances affecting U.S. vital interests. Partial contents of this report: Requirements for Notifications of Sensitive Covert Actions to Congress; Additional G8 Requirements; When Prior Notice to the G8 is Withheld; Directors of National Intell. and CIA Critical of G8 Notifications For Non-Covert Actions; House Intell. Committee Replaces G8 Procedure in FY 2010 Intell. Authorization Act; G8 Notifications: The Historic Record; Conclusion: Striking a Balance. Charts and tables.
Held on September 26, 2008, the 2008 People's Liberation Army (PLA) Conference, conducted by the National Bureau of Asian Research, the Strategic Studies Institute of the U.S. Army War College, and the Bush School of Government and Public Service at Texas A&M University, brought together more than 70 leading experts to examine the PLA's evoloving role and how PLA doctrine will affect both Taiwan and the entire Asia-Pacific region. This monograph discusses the PLA's involvement in disaster and humanitarian relief, United Nations peacekeeping operations (UNPKO), counterterrorism and border defense, security in outer space and cyberspace, and the level of activity in regional "joint" operational contingencies.
In a challenging, provocative book, Andrew Bacevich reconsiders the assumptions and purposes governing the exercise of American global power. Examining the presidencies of George H. W. Bush and Bill Clinton--as well as George W. Bush's first year in office--he demolishes the view that the United States has failed to devise a replacement for containment as a basis for foreign policy. He finds instead that successive post-Cold War administrations have adhered to a well-defined "strategy of openness." Motivated by the imperative of economic expansionism, that strategy aims to foster an open and integrated international order, thereby perpetuating the undisputed primacy of the world's sole remai...
On April 29, 2009 the National Research Council held a 1-day symposium titled, 'Avoiding Technology Surprise for Tomorrow's Warfighter.' This volume, a report of the symposium, highlights key challenges confronting the scientific and technical intelligence (S & TI) community and explores potential solutions that might enable the S & TI community to overcome those challenges. The symposium captured comments and observations from representatives from combatant commands and supporting governmental organizations, together with those of symposium participants, in order to elucidate concepts and trends, knowledge of which could be used to improve the Department of Defense's technology warning capability. Topics addressed included issues stemming from globalization of science and technology, challenges to U.S. warfighters that could result from technology surprise, examples of past technological surprise, and the strengths and weaknesses of current S & TI analysis.
National security intelligence is a vast, complex and intriguing topic, made doubly hard for citizens to understand because of the thick veils of secrecy that surround it. In the third edition of his authoritative introduction to the field, world-renowned intelligence expert Loch K. Johnson guides readers skilfully through this shadowy side of government. Drawing on over forty years of experience studying intelligence agencies and their activities, he explains the three primary missions of intelligence, before addressing the wider dilemmas of accountability posed by the existence of secret government organizations embedded in open, democratic societies. Recent developments examined in this n...
An look at what Intelligence Community analysts do and how, and how they are affected by the political context that shapes, uses and abuses their outputs. The US government spends billions of dollars every year to reduce uncertainty: to monitor and forecast everything from the weather to the spread of disease. In other words, we spend a lot of money to anticipate problems, identify opportunities, and avoid mistakes. A substantial portion of what we spend—over $50 billion a year—goes to the US Intelligence Community. Reducing Uncertainty describes what Intelligence Community analysts do, how they do it, and how they are affected by the political context that shapes, uses, and sometimes ab...