You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Secrecy is a staple of world politics and a pervasive feature of political life. Leaders keep secrets as they conduct sensitive diplomatic missions, convince reluctant publics to throw their support behind costly wars, and collect sensitive intelligence about sworn enemies. In the Shadow of International Law explores one of the most controversial forms of secret statecraft: the use of covert action to change or overthrow foreign regimes. Drawing from a broad range of cases of US-backed regime change during the Cold War, Michael Poznansky develops a legal theory of covert action to explain why leaders sometimes turn to covert action when conducting regime change, rather than using force to ac...
This second edition of Military Strategy, Joint Operations, and Airpower introduces contemporary strategy at the operational level of war. Developed as foundational reading for all US Air Force Academy cadets, this textbook is designed to close the gap between military theory and practice.
A new assessment on the role, influence, and limitations of the Democratic and Republican National Committees in American political development. Scholars have long debated the role and importance of the Democratic and Republican National Committees in American politics. In National Party Organizations and Party Brands in American Politics, Boris Heersink identifies a core DNC and RNC role that has thus far been missed: creating national party brands. Drawing on extensive historical case studies and quantitative analysis, Heersink argues that the DNC and RNC have consistently prioritized their role of using publicity to inform voters about their parties' policies and priorities from the begin...
"The idea of "cyber war" has played a dominant role both in academic and popular discourses concerning the nature of statecraft and conflict in the cyber domain. However, this lens of war and its expectations for death and destruction may distort rather than help clarify the nature of cyber competition. Are cyber activities actually more like an intelligence contest, where both states and nonstate actors grapple for advantage below the threshold of war? This book debates that question. The contributors unpack the conceptual and theoretical logics of the framing of cyber competition as an intelligence contest, particularly in the areas of information theft and manipulation. Taken as a whole, the chapters give rise to a unique dialogue, illustrating areas of agreement and disagreement among leading experts, and placing all of it in conversation with the larger fields of international relations and intelligence studies"--
The American presidency has long tested the capacity of the system of checks and balances to constrain executive power, especially in times of war. While scholars have examined presidents starting military conflicts without congressional authorization or infringing on civil liberties in the name of national security, Stuart Streichler focuses on the conduct of hostilities. Using the treatment of war-on-terror detainees under President George W. Bush as a case study, he integrates international humanitarian law into a constitutional analysis of the repercussions of presidential war powers for human rights around the world. Putting President Bush’s actions in a wider context, Presidential Ac...
"Owen is generous, rational and balanced ... [H]e is astute enough to understand the vast real-world differences that block the resolution of conflict."--Publishers Weekly.
This volume conceptualizes the threats, challenges, opportunities, and boundaries of great power cyber competition of the 21st century. This book focuses on a key dimension of contemporary great power competition that is often less understood due to its intangible character: the competition taking place in the cyber domain, including information and cyber operations. Democracies across the globe find themselves in an unrelenting competition with peer and near-peer competitors, with a prevailing notion that no state is "safe" from the informational contest. Adversarial powers, particularly China and Russia, recognize that most competition is principally non-kinetic but dominates the informati...
If you take an interest in military and national security affairs, you have probably read the works of Clausewitz, Sun Tzu, and Thucydides. But what about the books of the underappreciated military strategist Theodor Geisel, also known as Dr. Seuss? Until Dr. Seuss & National Security, the military aspect of Ted Geisel’s biography and his books have been overlooked by scholars and critics alike. Yet Dr. Seuss books possess direct relevance to national security in part because Ted Geisel’s service in the the US Army during WWII made a lasting impact on his worldview. Numerous traces of Ted Geisel’s intense and dangerous wartime experiences can be found in his children’s books. Tucked ...
Introduction: The subterranean world of clandestine interventions -- The forms of covert action -- A ladder of clandestine escalation -- A shadowy foreign policy, 1947-1960 -- Murder most foul, 1960-1975 -- A new approach to covert action, 1975-2000 -- The third option in an age of terror, 2000-2020 -- Legal foundations -- Decision paths and accountability -- Drawing bright lines : ethics and covert action -- The third option reconsidered.
Cyberspace is essential for socializing, learning, shopping, and just about everything in modern life. Yet, there is also a dark side to cyberspace: sub-national, transnational, and international actors are challenging the ability of sovereign governments to provide a secure environment for their citizens. Criminal groups hold businesses and local governments hostage through ransomware, foreign intelligence services steal intellectual property and conduct influence operations, governments attempt to rewrite Internet protocols to facilitate censorship, and militaries prepare to use cyberspace operations in wars. Security in the Cyber Age breaks-down how cyberspace works, analyzes how state and non-state actors exploit vulnerabilities in cyberspace, and provides ways to improve cybersecurity. Written by a computer scientist and national security scholar-practitioner, the book offers technological, policy, and ethical ways to protect cyberspace. Its interdisciplinary approach and engaging style make the book accessible to the lay audience as well as computer science and political science students.